article thumbnail

Data security: Why a proactive stance is best

IBM Big Data Hub

Threats to your data are virtually everywhere these days, and too often, data compromises seem almost inevitable. But with a proactive approach to data security, organizations can fight back against the seemingly endless waves of threats. A comprehensive data security strategy includes people, processes and technology.

article thumbnail

UAE: Federal level data protection law enacted

DLA Piper Privacy Matters

However, businesses that are not used to compliance with laws like the GDPR may find some of the new obligations challenging, for example, the PDPL introduces rights for individuals to access; rectify; correct; delete; restrict processing; request cessation of processing or transfer of data; and object to automated processing.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

European Commission Presents Evaluation Report on Telecommunications Data Retention

Hunton Privacy

The Commission acknowledges, however, that the Data Retention Directive has not been implemented in a harmonized way among the Member States, and that additional measures regarding access to data and further use of data are necessary to ensure compliance with privacy rights and data protection.

article thumbnail

European Commission Issues New Cloud Computing Strategy

Hunton Privacy

The European Network and Information Security Agency (“ENISA”) and other relevant parties will be asked to assist in this process. The certification schemes will address data protection, especially data portability, and focus on increased transparency of cloud service providers’ security practices. subcontracting.

Cloud 40
article thumbnail

eDiscovery Expert Tom O’Connor Reviews CloudNine Platform

eDiscovery Daily

Platform Technology: CloudNine is a secure, web-accessible, SaaS-delivered offering that allows immediate use of ESI without additional downloads or implementation steps. New Targeted Preservation and Collection capability. Platform Security. CSA Security, Trust & Assurance Registry. Cybersecurity. Legal Hold.