Remove category health-privacy
article thumbnail

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

Late last year, Atrium Health disclosed it lost sensitive data for some 2.65 Related: Atrium Health breach highlights third-party risks. One might assume top-tier financial services firms and healthcare vendors would have solved third-party cyber exposures by now.

Risk 147
article thumbnail

Understanding China’s Data Regulatory Regime: What Are Important Data? And Can They Be Transferred Outside Of China?

Data Matters

The Cyber Security Law (2017) (the CSL ) prohibits operators of critical information infrastructures ( CIIs ) from transferring their “important data” and personal information outside of China. 4) other information that might affect public health, national security and public interests of the State.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New York Enacts Stricter Data Cybersecurity Laws

Data Matters

Together, the new laws require the implementation of reasonable data security safeguards, expand breach reporting obligations for certain types of information, and require that a “consumer credit reporting agency” that suffers a data breach provide five years of identity theft prevention services for impacted residents.

article thumbnail

New York’s Breach Law Amendments and New Security Requirements

Data Protection Report

Although California has recently captured the lion’s share of attention with respect to privacy and security, on October 23, 2019, New York’s amended security breach law goes into effect, and on March 1, 2020, new security safeguards go live (N.Y. Biometric information that is used to authenticate or ascertain the individual identity.

article thumbnail

An Approach to Cybersecurity Risk Oversight for Corporate Directors

Data Matters

The hope is that the strategy outlined herein will help corporate directors and executives who support them ( e.g. , legal, information technology security, privacy, compliance, and audit) make practical use of the various technical guidelines available without misaligning their systems from the broader corporate mission. Principle 2.