Remove category
Remove 2017 Remove Encryption Remove Insurance Remove Marketing
article thumbnail

Delaware amends data breach notification law

Data Protection Report

A “breach of security” will now exclude unauthorized acquisition of encrypted data unless the acquisition includes, or is reasonably believed to include, the encryption key and the person who owns or licenses the data has a reasonable belief that the encryption key could render that personal information readable or useable.

article thumbnail

“But the emails” – companies’ SEC filings reflect ransomware risks

Data Protection Report

In one example of a post-attack disclosure, FedEx’s most recent 10-K (May 2017) discusses the impact of the WannaCry and Petya attacks on FedEx systems and subsidiaries. Norton Rose Fulbright has been shortlisted for ‘Cyber law firm of the year’ at the Insurance Insider Cyber Ranking Awards 2017. Ransomware incident disclosures.

Risk 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Good, Bad, And The Ugly: Key Takeaways From California’s New Privacy Law

Privacy and Cybersecurity Law

In the aftermath of the Cambridge Analytica scandal, and in the footsteps of Europe’s General Data Protection Regulation (“GDPR”), California privacy advocates introduced a ballot initiative on October 12, 2017 called “The Consumer Right to Privacy Act of 2018” (No. The ballot initiative largely mirrored what is now the language in the CCPA.

Privacy 58
article thumbnail

The Good, Bad, And The Ugly: Key Takeaways From California’s New Privacy Law

Privacy and Cybersecurity Law

In the aftermath of the Cambridge Analytica scandal, and in the footsteps of Europe’s General Data Protection Regulation (“GDPR”), California privacy advocates introduced a ballot initiative on October 12, 2017 called “The Consumer Right to Privacy Act of 2018” (No. The ballot initiative largely mirrored what is now the language in the CCPA.

Privacy 58
article thumbnail

An Approach to Cybersecurity Risk Oversight for Corporate Directors

Data Matters

Encrypting critical data assets. In January 2017, seeking to provide practical advice for directors to address their oversight responsibilities, the National Association of Corporate Directors (NACD) released its (revised) Handbook on Cyber-Risk Oversight (NACD Handbook). Creating an enterprise-wide governance structure. Principle 5.

article thumbnail

Top Cybersecurity Startups to Watch in 2022

eSecurity Planet

We’ll start with the top 10 overall and then look at other noteworthy startups in a number of markets. With sizable growth in a short span and the market presence to show for it, SECURITI.ai Series A SenseOn 2017 London, UK 61 $26.4 Series A GitGuardian 2017 Paris, France 63 $56.0 Top 10 Cybersecurity Startups.

article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

Data is not just a resource for better marketing, better service and delivery. The Bill says that manual unstructured files come within that category. It effectively required me to give it the right to use my family photos and videos for marketing purposes and to resell them to anybody. Data is used to build products themselves.

GDPR 120