Remove category general
article thumbnail

The Week in Cyber Security and Data Privacy: 20 – 26 November 2023

IT Governance

This week, we’re taking a slightly different approach with the ‘publicly disclosed data breaches and cyber attacks’ category, presenting the most interesting data points in a table format. The ‘enforcement’ and ‘other news’ categories remain unchanged. Only 3 definitely haven’t had data breached. Among those affected was SAP SE.

article thumbnail

U.S. Commerce Department Issues Interim Regulations Establishing Review Process for Information and Communications Technology and Services Supply Chains

Data Matters

The new review mechanism focuses on transactions involving any acquisition, importation, transfer, installation, dealing in, or use of ICTS that has been designed, developed, manufactured, or supplied by parties owned by, controlled by, or subject to the jurisdiction or direction of “foreign adversaries.”. The definition is very broad.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

European Commission Provides Important Guidance on Qualification and Classification of Software Under New Medical Devices Regulations

Data Matters

The Guidance seeks to provide clarification to medical software manufacturers with respect to (i) when software is considered a device (qualification) and (ii) what risk category the device falls into (classification). This is a broad category of software and the Guidance sets out that image optimizing means can be medical software.

article thumbnail

What Is an Insider Threat? Definition, Types, and Examples

IT Governance

An insider threat is someone who works for, or with, an organisation and uses their legitimate access to company data to breach sensitive information or damage systems. Insider threats fall into two categories: malicious or negligent. Availability refers to an organisation’s ability to access information when needed.

article thumbnail

And then there were five: CCPA amendments pass legislature

Data Protection Report

Changes range from clarifications to definitions and new exemptions to technical corrections. Section (a)(2) is amended to permit the consumer to request that the business notifies a consumer of the categories of personal information sold for “each category of third party”, rather than “each third party.”

B2B 40
article thumbnail

One-Month Countdown to Pass CCPA Amendments Begins

Data Protection Report

2) Will employers be exempted from other CCPA requirements, such as access, deletion and opt out?; (3) AB 1146 would exclude from the “opt out” right vehicle information or ownership information retained or shared between a new motor vehicle dealer and the vehicle’s manufacturer, if shared for warranty repair or recall purposes. .

article thumbnail

Nevada, New York and other states follow California’s CCPA

Data Protection Report

Although the concept of providing consumers certain privacy rights is similar, the law has some significant differences from the CCPA, including the definition of “sale”. Unlike CCPA, the new law has no provisions relating to access or deletion or a private right of action relating to breaches.

Sales 40