Long Article on NSO Group
Schneier on Security
APRIL 21, 2022
Ronan Farrow has a long article in The New Yorker on NSO Group, which includes the news that someone — probably Spain — used the software to spy on domestic Catalonian sepratists
Schneier on Security
APRIL 21, 2022
Ronan Farrow has a long article in The New Yorker on NSO Group, which includes the news that someone — probably Spain — used the software to spy on domestic Catalonian sepratists
DLA Piper Privacy Matters
JUNE 10, 2021
However, it shouldn’t be overlooked that another set of standard clauses has been issued by the EU, namely the Article 28 Standard Clauses. These are contained in Article 28 of the GDPR. The EU has published a new set of Article 28 Standard Clauses.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
CILIP
APRIL 5, 2022
TITLE. LOREM IPSUM DOLOR SIT AMET, CONSECTETUR ADIPISCING ELIT. DUO REGES: CONSTRUCTIO INTERRETE. PRODEST, INQUIT, MIHI EO ESSE ANIMO. SEQUITUR DISSERENDI RATIO COGNITIOQUE NATURAE; IN QUA QUID EST BONI PRAETER SUMMAM VOLUPTATEM, ET EAM SEMPITERNAM?
Dark Reading
DECEMBER 31, 2020
Variety is the spice of life, and it's also the perfect analogy for the article topics that resonated most with Edge readers this past year
ARMA International
MARCH 22, 2022
In the next article in the series, we will begin to sketch out what the program looks like in more granular detail. For as long as there has been communication and work, there has been a means of documenting and tracking it.
Adam Shostack
MAY 11, 2020
Mary Ellen Zurko and I have a short article on the subject in the May Communications of the ACM: “ Secure Development Tools and Techniques Need More Research That Will Increase Their Impact and Effectiveness in Practice.” Most of my time, I’m helping organizations develop the skills and discipline to build security in. We give the best advice available, and I recognize that we’re early in developing the science around how to build an SDL that works.
Troy Hunt
APRIL 6, 2020
I also have an article on [thing] and I think it would be a great addition to your blog. So now when people search for [thing], they'll hopefully end up here rather than on the spammy article thus penalising you for your behaviour.
CILIP
APRIL 16, 2019
TITLE. LOREM IPSUM DOLOR SIT AMET, CONSECTETUR ADIPISCING ELIT. DUO REGES: CONSTRUCTIO INTERRETE. PRODEST, INQUIT, MIHI EO ESSE ANIMO. SEQUITUR DISSERENDI RATIO COGNITIOQUE NATURAE; IN QUA QUID EST BONI PRAETER SUMMAM VOLUPTATEM, ET EAM SEMPITERNAM? NOS QUIDEM VIRTUTES SIC NATAE SUMUS, UT TIBI SERVIREMUS, ALIUD NEGOTII NIHIL HABEMUS. QUI AUTEM DE SUMMO BONO DISSENTIT DE TOTA PHILOSOPHIAE RATIONE DISSENTIT. AVARITIAMNE MINUIS?
DLA Piper Privacy Matters
NOVEMBER 24, 2021
On 19 November, the European Data Protection Board (‘ EDPB ‘) published, its draft Guidelines 05/2021 on the Interplay between the application of Article 3 and the provisions on international transfers as per Chapter V of the GDPR (“ Guidelines ”).
Schneier on Security
MARCH 16, 2018
This is a good article on the complicated story of hacker Marcus Hutchins. bitcoin cybersecurity fraud hacking killswitch privacy ransomware
IT Governance
SEPTEMBER 28, 2020
Perhaps the most widely discussed set of compliance requirements within the GDPR (General Data Protection Regulation) are those found in Article 32. In this blog, we look at how you can meet your GDPR Article 32 requirements. What is Article 32 of the GDPR?
ARMA International
SEPTEMBER 13, 2021
In the context of DT, this article defines content as information or data that has context and is consumable by humans and automated systems that allow them to make decisions, support operations, take actions, and monetize value by delivering products and services. Abstract.
IT Governance
JUNE 21, 2018
What does Article 30 require? Article 30 of the EU General Data Protection Regulation (GDPR) sets out what exactly organisations need to document in order to comply with the Regulation. What do you need to do to comply with Article 30? If a new process is made or your data protection officer (DPO) changes, make sure part of the process is to update your Article 30 records. If you have a question about Article 30 or any other GDPR topic, use our GDPR Ask Us service.
IG Guru
OCTOBER 14, 2021
The post US CISA releases Social Media Tip Sheet citing “Half a Billion Users Joined Social in the Last Year” Hootsuite Article #CyberMonth appeared first on IG GURU. Check out the tip sheet here.
IG Guru
JULY 9, 2020
The post PRESS RELEASE – CALL FOR AUTHORS: ARTICLES ON INFORMATION MANAGEMENT (WITH COMPENSATION) appeared first on IG GURU. Check out the press release here. AIEF Information Governance Records Management Sponsored authors Information Management Press Release
ARMA International
SEPTEMBER 27, 2021
The previous article –Part 2 of this 3-part series – discussed DT by imagining how the “art of the possible” can help define the end state of the DT journey. The key takeaway from these articles is that DT is complex, broad, and diverse, but its benefits are significant. Abstract.
Hunton Privacy
OCTOBER 15, 2020
Specifically, an LSA is required under Article 60(3) of the GDPR to submit a draft decision to the CSAs, which may then raise a relevant and reasoned objection within a specific timeframe.
Hunton Privacy
APRIL 27, 2021
Court of Appeals for the Second Circuit affirmed the dismissal on Article III standing grounds of a data breach class action predicated on an alleged increased risk of identity theft. On those facts, the court found the plaintiffs lacked Article III standing.
Data Matters
SEPTEMBER 10, 2019
For any lawsuit filed in federal court, the plaintiff must have standing under Article III of the U.S. Some federal statutes, including the TCPA, confer a right to sue, but Congress’s say-so does not necessarily suffice under Article III. In the wake of Spokeo , defendants in TCPA cases redoubled their efforts to challenge plaintiffs’ standing under Article III. Creating a circuit split, the U.S.
Synergis Software
DECEMBER 20, 2019
Some of these articles seem to be more popular than others; we think of them as our Top Ten. Written in 2016 but still current and popular, this article explains the ins and outs of supporting a variety of CAD formats as part of engineering documentation management. In this informative article, Brian Cristiano, CEO and Founder of BOLD Worldwide shares three tips for crushing information silos. Up above we listed part 2 of this article, and added an 11th mistake.
CILIP
JUNE 10, 2020
I want to acknowledge that we made a mistake in the way we presented the article and to apologise for that and the offence it has caused. As CILIP?s s Chief Executive, my role carries with it both the opportunity to promote the good that we do and a duty to represent the values that unite us.
ARMA International
SEPTEMBER 22, 2021
Therefore, the position of this article is that IG includes DG because information is data in context. Abstract. Humans have used technology to transform their societies from prehistoric times up to the present.
Schneier on Security
NOVEMBER 14, 2017
The New York Times just published a long article on the Shadow Brokers and their effects on NSA operations. Summary: it's been an operational disaster, the NSA still doesn't know who did it or how, and NSA morale has suffered considerably. This is me on the Shadow Brokers from last May. breaches hacking insiders leaks nsa
Privacy and Cybersecurity Law
FEBRUARY 4, 2016
The Article 29 Working Party (WP 29) published their initial response to the new Privacy Shield yesterday. Here’s the good […]. Europe
Data Matters
DECEMBER 22, 2020
This article was adapted from a longer article on our Data Matters blog, “ Schrems II Concerns Regarding U.S. Note that this article was published by the Lawfare Institute in cooperation with Brookings.). The post Lawfare Publishes Article on “Why Schrems II Might Not Be a Problem for EU-U.S. Lawfare recently published “ Why Schrems II Might Not Be a Problem for EU-U.S. Data Transfers *,” written by Sidley Partner Alan Charles Raul.
Schneier on Security
JANUARY 17, 2018
Interesting article by Major General Hao Yeli, Chinese People's Liberation Army (ret.), a senior advisor at the China International Institute for Strategic Society, Vice President of China Institute for Innovation and Development Strategy, and the Chair of the Guanchao Cyber Forum.
Information Management Resources
JANUARY 10, 2019
A look back at the 10 top news articles, features and slideshows that were the most popular with Information Management readers. MDM Analytics Machine learning Business intelligence Artificial intelligence Big data Industry salaries Data security Data governance
Hunton Privacy
DECEMBER 15, 2020
Article 28 of the GDPR sets out specific provisions that must be executed between data controllers and processors when personal data is shared.
IBM Big Data Hub
SEPTEMBER 28, 2017
Digital disruption has revolutionized the way we live and do business — and machine learning is the latest wave of that revolution
IBM Big Data Hub
MARCH 5, 2018
Learn more about the right way to approach your data governance governance strategy in 2018 by checking out our top performing articles
Architect Security
JANUARY 8, 2019
Check out my latest article on MEDIUM: Deepfakes and Deep Video Portraits?—?What Media MEDIUM Articles Privacy Social Media TechWhat are they and what is the difference? link].
Hunton Privacy
NOVEMBER 16, 2020
In particular, Article 28 of the GDPR requires data controllers to put in place an agreement (or other legal act) when outsourcing data processing activities to a data processor and sets forth the data protection obligations that must be covered in such data processing agreement.
Getting Information Done
DECEMBER 6, 2016
General Counsel Can Spur Legal Hold Success Check out my latest article which was published in the December/January 2017 digital edition of Today’s General Counsel titled: “General Counsel Can Spur Legal Hold Success” . I coauthored the article with Doug Deems, General Counsel, The Claro Group. ” Our article provides three things that general counsel, specifically, can do to lead their organizations toward legal hold program excellence.
Architect Security
JANUARY 8, 2019
Check out my latest article on MEDIUM: Is it even possible to be “completely secure”? Business Defense Devil's Advocate Humans MEDIUM Articles Mobile and Device Personal Security Privacy Softwarelink].
DLA Piper Privacy Matters
FEBRUARY 21, 2018
Last week the Article 29 Data Protection Working Party released updated guidelines in relation to personal data breach notifications and automated individual decision-making and profiling under the General Data Protection Regulation. The significance of ‘awareness’ is that this concept triggered when the clock starts ticking to notify the relevant supervisory authority under Article 33(1) GDPR.
Information Management Resources
JANUARY 22, 2018
Data science, machine learning, artificial intelligence and big data were the topics that drew the most interest from Information Management readers. Data science Machine learning Artificial intelligence Analytics Big data
Getting Information Done
MARCH 14, 2017
Creating a Culture of Information Management Excellence Last year, I wrote an article titled, “ What Does Culture Have to Do with Information Management? ” which made the case for addressing culture as a part of any successful information management implementation project. Today, I wanted to offer some practical advice on how to create or install a culture of information management excellence. So, how do we actually create this type of culture? Borrowing from John C.
IG Guru
NOVEMBER 7, 2019
The post Throwback article is a good reminder on how mobile devices are vulnerable via Citizen Lab appeared first on IG GURU. The Many Identifiers in Our Pockets. Breach Business IG News Information Governance information privacy information security Privacy Cyber Security IMEI MAC Address Mobile Security
DLA Piper Privacy Matters
DECEMBER 13, 2017
On 12 December 2017, the Article 29 Working Party (WP29) published draft Guidelines on Consent under the General Data Protection Regulation (GDPR). The Guidelines begin with an overview of the elements of valid consent under Article 4(11), reiterating that consent must be (i) freely given, (ii) specific, (iii) informed, and (iv) unambiguously indicated. Article 7(3) requires controllers to ensure that consent can be withdrawn as easily it was given.
Let's personalize your content