Remove category
Remove Analysis Remove Definition Remove Education Remove Government Remove Marketing
article thumbnail

California Enacts Broad Privacy Laws Modeled on GDPR

Data Matters

An analysis of the bill prepared by the California Assembly before the vote also indicated that AB 375 was intended to address controversies concerning third-party sale of personal information acquired from social media without data subjects’ authorization. The definition of personal information under AB 375 is expansive.

GDPR 79
article thumbnail

California Enacts Broad Privacy Protections Modeled on GDPR

Data Matters

An analysis of the bill prepared by the California Assembly before the vote also indicated that AB 375 was intended to address controversies concerning third-party sale of personal information acquired from social media without data subjects’ authorization. The definition of personal information under AB 375 is expansive.

GDPR 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

California Governor Signs into Law Bills Updating the CPRA and Bills Addressing the Privacy and Security of Genetic and Medical Data, Among Others

Hunton Privacy

AB-825 : This bill amends California’s (1) data breach notification law (for both government agencies (Cal. to add “genetic data” as a category of personal information that would trigger individual and regulator notification if breached (data breach notification law) and is required to be protected (data security law).

Privacy 98
article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

Data is not just a resource for better marketing, better service and delivery. On the UK’s exit from the EU, the UK will need to satisfy the European Commission that our legislative framework ensures an “adequate level of protection”, but achieving a positive adequacy decision for the UK is not as uncontentious as the Government think.

GDPR 120
article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

Thus, common tools and techniques are risk matrices, risk registers, risk logs, risk breakdown structures, risk categories, Monte Carlo simulations, and sensitivity analyses. Take the example of the pandemic: only some governments engaged pandemic experts to develop actions plans. Many organizations have business case templates.

article thumbnail

Open Source Security Podcast EP. 151 - The DARPA Cyber Grand Challenge With David Brumley

ForAllSecure

You're obviously in the government space which means you love your acronyms. We're here, two years after the contest, trying to commercialize some of the technology, but definitely not everything that was demonstrated at the CGC. One of the things we're doing when we go to market is look at modern dev shops. Can you fix it?

article thumbnail

Open Source Security Podcast EP. 151 - The DARPA Cyber Grand Challenge With David Brumley

ForAllSecure

You're obviously in the government space which means you love your acronyms. We're here, two years after the contest, trying to commercialize some of the technology, but definitely not everything that was demonstrated at the CGC. One of the things we're doing when we go to market is look at modern dev shops. Can you fix it?