Remove 11
Remove 2015 Remove Examples Remove Exercises Remove Security
article thumbnail

SCHREMS 2.0 – the demise of Standard Contractual Clauses and Privacy Shield?

DLA Piper Privacy Matters

Mr Schrems is an Austrian privacy activist who has concerns about the degree of cooperation between US companies and intelligence agencies, in particular in relation to Facebook’s sharing of EU citizens’ personal data with the National Security Agency. The Irish Court has referred a total of 11 questions to the CJEU.

Privacy 94
article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

It seems everything smart is hackable, with IoT startups sometimes repeating security mistakes first made decades ago. How then does one start securing it? Welcome to the hacker by original podcast from for all secure, it's about challenging our expectations about the people who hack for a living.

IoT 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

It seems everything smart is hackable, with IoT startups sometimes repeating security mistakes first made decades ago. How then does one start securing it? Welcome to the hacker by original podcast from for all secure, it's about challenging our expectations about the people who hack for a living.

IoT 52
article thumbnail

Cybersecurity Standards for the Insurance Sector – A New Patchwork Quilt in the US?

HL Chronicle of Data Protection

Of particular concern to state-level policymakers and enforcement authorities are business practices that in their view may contribute to security incidents. The insurance industry has not been immune from such scrutiny, and the imposition of business practice requirements intended to enhance cybersecurity sector-wide.

article thumbnail

The Burden of Privacy In Discovery

Data Matters

The 2015 amendments to Rule 26(b)(1), however, were meant to resolve any doubt, returning the proportionality factors to their original place as part of the very definition of what is discoverable. The principle of proportionality in civil discovery is hardly new.4 5 In keeping with that aim, the scope of discovery has always been cabined.

Privacy 97
article thumbnail

Singapore proposes changes to cybersecurity and data protection regimes

Data Protection Report

These changes will have a significant impact on how companies manage personal data and secure their information systems. On the same day, the Cyber Security Agency (CSA) and the Ministry of Communications and Information (MCI) launched a public consultation to seek views and comments from the industry and members of public on the Cyber Bill.

article thumbnail

How to Track Your Kids (and Other People's Kids) With the TicTocTrack Watch

Troy Hunt

For example, there was VTech back in 2015 who leaked millions of kids' info after they registered with "smart" tablets. The Gator3 watch turned out to have even more serious security flaws, storing parents and kids’ voice messages on an openly available webserver. but the link to the privacy and security policies was dead.

Passwords 111