Remove tag service-provider
article thumbnail

$10,000,000 civil penalty for disclosing personal data without consent

Data Protection Report

The claims related to the company’s sharing personal data without consumer consent and making it very difficult for consumers to cancel their subscriptions to this telehealth service. The order also requires that the company destroy personal data for which it had not received consent and to create a document retention and destruction policy.

article thumbnail

Historic Charges: First Enforcement Action Filed by New York Department of Financial Services Under Cybersecurity Regulation

Data Matters

On July 21, 2020, the New York State Department of Financial Services (NYDFS or the Department) issued a statement of charges and notice of hearing (the Statement) against First American Title Insurance Company (First American) for violations of the Department’s Cybersecurity Requirements for Financial Services Companies, 23 N.Y.C.R.R.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Keeping Up with New Data Protection Regulations

erwin

Some suggest the California Consumer Privacy Act (CCPA), which takes effect January 1, 2020, sets a precedent other states will follow by empowering consumers to set limits on how companies can use their personal information. The Regulatory Rationale for Integrating Data Management & Data Governance. employees).

GDPR 100
article thumbnail

7 Benefits of Metadata Management

erwin

It’s valuable because it provides information about the attributes of data elements that can be used to guide strategic and operational decision-making. Govern data. Develop a governance model to manage standards, policies and best practices and associate them with physical assets. Map data flows. Socialize data.

Metadata 110
article thumbnail

Ransomware Protection in 2021

eSecurity Planet

Just in 2020, the SolarWinds hack could’ve been prevented for organizations that promptly patch software. Adaptive Monitoring and Tagging. This includes active tagging of workloads, threat hunting , and virus assessments, and consistent evaluation of traffic for mission-critical applications, data, or services.