Remove 12
Remove 2015 Remove Examples Remove Exercises Remove Security
article thumbnail

The Burden of Privacy In Discovery

Data Matters

The 2015 amendments to Rule 26(b)(1), however, were meant to resolve any doubt, returning the proportionality factors to their original place as part of the very definition of what is discoverable. 12 In other words, the 1983 amendment was seen as limiting the depth rather than the breadth of discovery.13.

Privacy 97
article thumbnail

GDPR: One Year On

Data Matters

Perhaps of most interest has been how the data protection authorities (“ DPAs ”) would exercise their expanded enforcement powers under the GDPR. These data breach notifications and subsequent investigations by DPAs will likely lead to further enforcement actions as compliance and security programs come under scrutiny from the DPAs.

GDPR 68
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Track Your Kids (and Other People's Kids) With the TicTocTrack Watch

Troy Hunt

For example, there was VTech back in 2015 who leaked millions of kids' info after they registered with "smart" tablets. The Gator3 watch turned out to have even more serious security flaws, storing parents and kids’ voice messages on an openly available webserver. but the link to the privacy and security policies was dead.

Passwords 111
article thumbnail

A Flurry of Recent Cybersecurity Activity from the Trump Administration

Data Matters

For example, in 2013, the Federal Bureau of Investigation (FBI) partnered with Microsoft to disrupt more than 1,400 Citadel botnets. Subsequent joint public-private efforts targeted a botnet known as “ Beebone ” in 2015 and the more recent “ Mirai ” and “ Reaper ” attacks. Botnet Report. in isolation.”. in isolation.”.