Remove 12
Remove 2012 Remove Analysis Remove Data Remove Government Remove Security
article thumbnail

2020 in review: January to June

IT Governance

IT Governance has recorded more than 1,000 publicly disclosed cyber security incidents so far this year and 20 billion breached records. To close out the year, we’ve gathered some of the most notable stories from the past 12 months. Microsoft suffers data breach affecting up to 250 million people. And so it began.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

Some technology trends such as real-time data analytics are on-going, while others are more recent, such as blockchain. Information and data are synonyms but have different definitions. ARMA defines information as “Data that has been given value through analysis, interpretation, or compilation in a meaningful form” (ARMA 2016, p 28).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

What follows below is an edited version of the debate in the House of Lords of the Second Reading of the Data Protection Bill, held on 10 October. Data is not just a resource for better marketing, better service and delivery. Data is used to build products themselves. It has become a cliché that data is the new oil.

GDPR 120
article thumbnail

The Burden of Privacy In Discovery

Data Matters

Most of that focus has centered on data collection, storage, sharing, and, in particular, third-party transactions in which customer information is harnessed for advertising purposes. Could a party, for instance, decline to produce, review, or even collect certain types of data due to privacy concerns? But what about other contexts?

Privacy 97
article thumbnail

Wednesday LTNY 2018 Sessions: eDiscovery Trends

eDiscovery Daily

ESI sources: now that we routinely deal with email, text messages and mobile discovery, what is happening with data sources like Bluetooth connections, wearables, medical devices or smart home video? Will we see lawyers subpoena the connected car for its sensor data? Tired of looking at Enron data?

article thumbnail

Regulatory Update: NAIC Spring 2019 National Meeting

Data Matters

Volunteer groups also continued to request further clarity from the GCC Working Group as to how confidentiality will be maintained for the data such groups provide during the field-testing process. NAIC Continues to Consider the Use of Big Data and Blockchain Technology in the Insurance Industry.

article thumbnail

Top Cybersecurity Startups to Watch in 2022

eSecurity Planet

Information security products , services, and professionals have never been in higher demand, making for a world of opportunities for cybersecurity startups. With evolving attack methodologies due to machine learning, quantum computing, and sophisticated nation-state hackers, security startups are receiving record funding.