Remove 10
Remove 2011 Remove Analysis Remove Data Remove Insurance
article thumbnail

Regulatory Update: NAIC Fall 2019 National Meeting

Data Matters

The National Association of Insurance Commissioners (the NAIC) held its Fall 2019 National Meeting (Fall Meeting) in Austin, Texas, from December 7 to 10, 2019. Term and Universal Life Insurance Reserve Financing Model Regulation and 2016 Revisions to the CFR Model Laws.

article thumbnail

Regulatory Update: NAIC Fall 2019 National Meeting

Data Matters

The National Association of Insurance Commissioners (the NAIC) held its Fall 2019 National Meeting (Fall Meeting) in Austin, Texas, from December 7 to 10, 2019. Term and Universal Life Insurance Reserve Financing Model Regulation and 2016 Revisions to the CFR Model Laws.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

What follows below is an edited version of the debate in the House of Lords of the Second Reading of the Data Protection Bill, held on 10 October. Data is not just a resource for better marketing, better service and delivery. Data is used to build products themselves. It has become a cliché that data is the new oil.

GDPR 120
article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

Some technology trends such as real-time data analytics are ongoing, while others are more recent, such as blockchain. The intent of this analysis is to link the scope and the CSFs with the use cases into a succinct narrative describing the new DT capabilities to deliver products and services. DT Capabilities.

article thumbnail

An Approach to Cybersecurity Risk Oversight for Corporate Directors

Data Matters

A high-profile cyber incident may cause substantial financial and reputational losses to an organization, including the disruption of corporate business processes, destruction or theft of critical data assets, loss of goodwill, and shareholder and consumer litigation. Encrypting critical data assets. Using appropriate access controls.