Remove category general
article thumbnail

China’s PIPL has finally arrived, and brings helpful clarification (rather than substantial change) to China’s data privacy framework

DLA Piper Privacy Matters

Definition of Personal information and Sensitive Personal information “Personal information” means any kind of information relating to an identified or identifiable natural person, either electronically or otherwise recorded, but excluding information that has been de-identified or anonymised.

article thumbnail

2019 eDiscovery Case Law Year in Review, Part 1

eDiscovery Daily

A few of them could be categorized in more than one category, so we took our best shot (let’s face it, there were a ton of sanctions cases we covered, but chose to classify some of them in other areas). Pennsylvania Supreme Court Rules that Forcing Provision of Computer Password Violates the Fifth Amendment : In Commonwealth v.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Burden of Privacy In Discovery

Data Matters

Although these proportionality factors began as an integral part of the definition of the scope of discovery, for more than two decades these limitations resided in a separate subsection of the Rule, resulting in considerable confusion and less-than-rigorous enforcement. 21 If it is not both relevant and proportional, it is not discoverable.

Privacy 97
article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

This means imagining the “art of the possible” for a new future using a cloud computer model to deliver transformative change. Thus, common tools and techniques are risk matrices, risk registers, risk logs, risk breakdown structures, risk categories, Monte Carlo simulations, and sensitivity analyses. Cloud-first “Mind-shift”.

article thumbnail

The Hacker Mind Podcast: Hacking With Light And Sound

ForAllSecure

Researchers claim they’ve found a flaw that allows hackers to access your device from hundreds of feet away, giving them the ability to unlock your front door, even start your car. [It’s That's right, it's really general purpose. It’s 9:43]. Vamosi: Sounds crazy, but it was true. Fu: That's one of the consequences.

article thumbnail

The Hacker Mind Podcast: Hacking With Light And Sound

ForAllSecure

Researchers claim they’ve found a flaw that allows hackers to access your device from hundreds of feet away, giving them the ability to unlock your front door, even start your car. [It’s That's right, it's really general purpose. It’s 9:43]. Vamosi: Sounds crazy, but it was true. Fu: That's one of the consequences.

article thumbnail

The Hacker Mind Podcast: Hacking With Light And Sound

ForAllSecure

Researchers claim they’ve found a flaw that allows hackers to access your device from hundreds of feet away, giving them the ability to unlock your front door, even start your car. [It’s That's right, it's really general purpose. It’s 9:43]. Vamosi: Sounds crazy, but it was true. Fu: That's one of the consequences.