Remove 2019 Remove Examples Remove Exercises Remove Mining
article thumbnail

Selling and utilising personal data in an insolvency situation

Data Protection Report

For example, in February of this year, the FCA and ICO issued a joint statement warning regulated firms and insolvency practitioners of their responsibilities when dealing with personal data.

article thumbnail

Sustaining Performance Under Extreme Stress

Troy Hunt

The thing that perhaps surprised me most about those discussions with friends was how much their own stories resonated with mine. A perfect example is that the house purchase fell through due to the vendor not being agreeable to the terms I set forth. Legal jargon in contracts is a prime example.

Sales 142
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The 773 Million Record "Collection #1" Data Breach

Troy Hunt

I've written before about what's involved in verifying data breaches and it's often a non-trivial exercise. For example, logging on to a mobile app is dead easy: Password managers are one of the few security constructs that actually make your life easier. pic.twitter.com/6ZKcGHfHhq — Troy Hunt (@troyhunt) January 13, 2019.

article thumbnail

Sharenting, BYOD and Kids Online: 10 Digital Tips for Modern Day Parents

Troy Hunt

My views are shaped by a life that's very public due to the nature of what I do and as such, my kids receive more exposure than most (the picture above, for example). For example, my son teaching kids to code in London a couple of weeks ago: Teaching kids to code at #NDCLondon with @CodeCombat. They can't change their passcodes.

Privacy 141
article thumbnail

Project Svalbard, Have I Been Pwned and its Ongoing Independence

Troy Hunt

So that's the tl;dr, let me now share as much as I can about what's been happening since April 2019 and how the service will operate in the future. It wasn't something I could have seen coming nor was it anything to do with HIBP itself, but it introduced a range of new and insurmountable barriers. of the company.

IT 136
article thumbnail

How to Track Your Kids (and Other People's Kids) With the TicTocTrack Watch

Troy Hunt

For example, there was VTech back in 2015 who leaked millions of kids' info after they registered with "smart" tablets. Wearco produces "mining consumables". Wearco produces "mining consumables". It's the little things that keep popping up, for example the language and grammar in the aforementioned user manual.

Passwords 111
article thumbnail

Project Svalbard: The Future of Have I Been Pwned

Troy Hunt

And there are the governments around the world using it to protect their departments , the law enforcement agencies leveraging it for their investigations and all sorts of other use cases I never, ever saw coming (my legitimisation of HIBP post from last year has a heap of other examples). haveibeenpwned Ho. 3,505 results for my org.