Remove tag security-rule
article thumbnail

China: new rules on use of algorithms for digital business, data analytics and decision-making

DLA Piper Privacy Matters

The new “Administrative Regulations on Algorithm Recommendation of Internet Business Services” comes into force on 1 March 2022, and will introduce important rules on the use of algorithms when operating digital platforms/websites/apps – including targeted marketing – in China. Authors: Carolyn Bigg , Venus Cheung , Fangfang Song.

article thumbnail

6 unbeatable benefits of Collibra Data Quality & Observability pushdown

Collibra

Are you relying on data for reporting and analytics but questioning the accuracy of the data? Collibra uses Machine Learning (ML) to detect anomalies and auto-generate data quality rules. It improves productivity by centralizing and automating workflows to streamline data and analytics.

Cloud 84
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Data Governance Protects Sensitive Data

erwin

Data Security Starts with Data Governance. Lack of a solid data governance foundation increases the risk of data-security incidents. That’s especially true as the data-driven enterprise momentum grows along with self-service analytics that enable users to have greater access to information, often using it without IT’s knowledge.

article thumbnail

What is metadata management and why is it important?

Collibra

Business Metadata: Defines everyday business terms, such as table and column definitions, business rules, data sharing rules and data quality rules. Increasing importance of higher data quality and trusted analytics driving business value from data. Business rules with visibility and the ability to identify exceptions.

article thumbnail

Data management sets the next phase of zero-trust

Collibra

Nowadays zero-trust is being recognized as a principle and a best practice that can be applied to broad aspects of security, accelerated by industry’s innovations. It sets out clear visions and specific actions around the five pillars of security: identity, devices, networks, application & workloads, and data.

article thumbnail

How to Build a Metadata Plan in Five Steps

AIIM

Determine if rules need to be established; for example, a title field may be limited to 100 characters, or date/time fields set to use international display standards. Will the Metadata capture allow collaborative approaches and permit free and open tagging of content by users, known as a “folksonomy”?

Metadata 163
article thumbnail

EUROPE: e-Privacy Regulation – changes regarding electronic communications and digital marketing

DLA Piper Privacy Matters

Since the European Commission unveiled a proposal for an e-Privacy Regulation in January 2017, this new piece of legislation, aiming to adapt rules on electronic communications and cookies, has undergone many iterations. b) Cookies and similar files/tags. Another notable change in the new Art.