Long Article on NSO Group

Schneier on Security

Ronan Farrow has a long article in The New Yorker on NSO Group, which includes the news that someone — probably Spain — used the software to spy on domestic Catalonian sepratists

Article 28 Standard Contractual Clauses

DLA Piper Privacy Matters

However, it shouldn’t be overlooked that another set of standard clauses has been issued by the EU, namely the Article 28 Standard Clauses. These are contained in Article 28 of the GDPR. The EU has published a new set of Article 28 Standard Clauses.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

2019 DIR Article index

Info Source

2019 DIR article index 12-13. Index

52

Legacy Disposition Program Series: Article Two—Tangible First Steps

ARMA International

This article is a continuation of the Legacy Disposition White Paper article series. Keep in mind that a disposition program is not “one size fits all,” and the steps below (and really, from this article on) should be approached with that in mind. That’s a wrap on article two!

20 for 2020: The Edge's Top Articles of the Year

Dark Reading

Variety is the spice of life, and it's also the perfect analogy for the article topics that resonated most with Edge readers this past year

IT 113

Test article Information Professional

CILIP

TITLE. LOREM IPSUM DOLOR SIT AMET, CONSECTETUR ADIPISCING ELIT. DUO REGES: CONSTRUCTIO INTERRETE. PRODEST, INQUIT, MIHI EO ESSE ANIMO. SEQUITUR DISSERENDI RATIO COGNITIOQUE NATURAE; IN QUA QUID EST BONI PRAETER SUMMAM VOLUPTATEM, ET EAM SEMPITERNAM?

52

9-27-2019 DIR Article Index

Info Source

2019 DIR article index 9-27. Index

40

SDL Article in CACM

Adam Shostack

Mary Ellen Zurko and I have a short article on the subject in the May Communications of the ACM: “ Secure Development Tools and Techniques Need More Research That Will Increase Their Impact and Effectiveness in Practice.” Most of my time, I’m helping organizations develop the skills and discipline to build security in. We give the best advice available, and I recognize that we’re early in developing the science around how to build an SDL that works.

Test article

CILIP

TITLE. LOREM IPSUM DOLOR SIT AMET, CONSECTETUR ADIPISCING ELIT. DUO REGES: CONSTRUCTIO INTERRETE. PRODEST, INQUIT, MIHI EO ESSE ANIMO. SEQUITUR DISSERENDI RATIO COGNITIOQUE NATURAE; IN QUA QUID EST BONI PRAETER SUMMAM VOLUPTATEM, ET EAM SEMPITERNAM? NOS QUIDEM VIRTUTES SIC NATAE SUMUS, UT TIBI SERVIREMUS, ALIUD NEGOTII NIHIL HABEMUS. QUI AUTEM DE SUMMO BONO DISSENTIT DE TOTA PHILOSOPHIAE RATIONE DISSENTIT. AVARITIAMNE MINUIS?

40

Interesting Article on Marcus Hutchins

Schneier on Security

This is a good article on the complicated story of hacker Marcus Hutchins. bitcoin cybersecurity fraud hacking killswitch privacy ransomware

Europe: EDPB issues guidelines on interplay between Article 3 and Chapter V of GDPR

DLA Piper Privacy Matters

On 19 November, the European Data Protection Board (‘ EDPB ‘) published, its draft Guidelines 05/2021 on the Interplay between the application of Article 3 and the provisions on international transfers as per Chapter V of the GDPR (“ Guidelines ”).

GDPR Article 32: Your guide to the requirements

IT Governance

Perhaps the most widely discussed set of compliance requirements within the GDPR (General Data Protection Regulation) are those found in Article 32. In this blog, we look at how you can meet your GDPR Article 32 requirements. What is Article 32 of the GDPR?

IT 61

No, I Won't Link to Your Spammy Article

Troy Hunt

I also have an article on [thing] and I think it would be a great addition to your blog. So now when people search for [thing], they'll hopefully end up here rather than on the spammy article thus penalising you for your behaviour.

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

In the context of DT, this article defines content as information or data that has context and is consumable by humans and automated systems that allow them to make decisions, support operations, take actions, and monetize value by delivering products and services. Abstract.

How to comply with Article 30 of the GDPR

IT Governance

What does Article 30 require? Article 30 of the EU General Data Protection Regulation (GDPR) sets out what exactly organisations need to document in order to comply with the Regulation. What do you need to do to comply with Article 30? If a new process is made or your data protection officer (DPO) changes, make sure part of the process is to update your Article 30 records. If you have a question about Article 30 or any other GDPR topic, use our GDPR Ask Us service.

IT 41

Second Circuit Affirms Dismissal of Data Breach Class Action on Article III Standing Grounds

Hunton Privacy

Court of Appeals for the Second Circuit affirmed the dismissal on Article III standing grounds of a data breach class action predicated on an alleged increased risk of identity theft. On those facts, the court found the plaintiffs lacked Article III standing.

US CISA releases Social Media Tip Sheet citing “Half a Billion Users Joined Social in the Last Year” Hootsuite Article #CyberMonth

IG Guru

The post US CISA releases Social Media Tip Sheet citing “Half a Billion Users Joined Social in the Last Year” Hootsuite Article #CyberMonth appeared first on IG GURU. Check out the tip sheet here.

Risk 69

PRESS RELEASE – CALL FOR AUTHORS: ARTICLES ON INFORMATION MANAGEMENT (WITH COMPENSATION)

IG Guru

The post PRESS RELEASE – CALL FOR AUTHORS: ARTICLES ON INFORMATION MANAGEMENT (WITH COMPENSATION) appeared first on IG GURU. Check out the press release here. AIEF Information Governance Records Management Sponsored authors Information Management Press Release

Want to succeed as a CDO? 6 articles to read this week

IBM Big Data Hub

Learn more about the right way to approach your data governance governance strategy in 2018 by checking out our top performing articles

EDPB Adopts Guidelines on Relevant and Reasoned Objection under Article 60 of the GDPR

Hunton Privacy

Specifically, an LSA is required under Article 60(3) of the GDPR to submit a draft decision to the CSAs, which may then raise a relevant and reasoned objection within a specific timeframe.

11th Circuit Rules Single Text Message Not Sufficient for Article III Standing

Data Matters

For any lawsuit filed in federal court, the plaintiff must have standing under Article III of the U.S. Some federal statutes, including the TCPA, confer a right to sue, but Congress’s say-so does not necessarily suffice under Article III. In the wake of Spokeo , defendants in TCPA cases redoubled their efforts to challenge plaintiffs’ standing under Article III. Creating a circuit split, the U.S.

Paper 91

European Commission Releases Draft Standard Contractual Clauses for Article 28 Data Processing Agreements

Hunton Privacy

In particular, Article 28 of the GDPR requires data controllers to put in place an agreement (or other legal act) when outsourcing data processing activities to a data processor and sets forth the data protection obligations that must be covered in such data processing agreement.

GDPR 76

CIPL Submits Response to European Commission’s Article 28 Standard Contractual Clauses

Hunton Privacy

Article 28 of the GDPR sets out specific provisions that must be executed between data controllers and processors when personal data is shared.

GDPR 74

Top Ten Blog Articles of 2019

Synergis Software

Some of these articles seem to be more popular than others; we think of them as our Top Ten. Written in 2016 but still current and popular, this article explains the ins and outs of supporting a variety of CAD formats as part of engineering documentation management. In this informative article, Brian Cristiano, CEO and Founder of BOLD Worldwide shares three tips for crushing information silos. Up above we listed part 2 of this article, and added an 11th mistake.

Long Article on NSA and the Shadow Brokers

Schneier on Security

The New York Times just published a long article on the Shadow Brokers and their effects on NSA operations. Summary: it's been an operational disaster, the NSA still doesn't know who did it or how, and NSA morale has suffered considerably. This is me on the Shadow Brokers from last May. breaches hacking insiders leaks nsa

Article from a Former Chinese PLA General on Cyber Sovereignty

Schneier on Security

Interesting article by Major General Hao Yeli, Chinese People's Liberation Army (ret.), a senior advisor at the China International Institute for Strategic Society, Vice President of China Institute for Innovation and Development Strategy, and the Chair of the Guanchao Cyber Forum.

Information Professional article featuring Dominic Cummings ? an apology

CILIP

I want to acknowledge that we made a mistake in the way we presented the article and to apologise for that and the offence it has caused. As CILIP?s s Chief Executive, my role carries with it both the opportunity to promote the good that we do and a duty to represent the values that unite us.

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

The previous article –Part 2 of this 3-part series – discussed DT by imagining how the “art of the possible” can help define the end state of the DT journey. The key takeaway from these articles is that DT is complex, broad, and diverse, but its benefits are significant. Abstract.

Article 29 WP response to “Privacy Shield”

Privacy and Cybersecurity Law

The Article 29 Working Party (WP 29) published their initial response to the new Privacy Shield yesterday. Here’s the good […]. Europe

Lawfare Publishes Article on “Why Schrems II Might Not Be a Problem for EU-U.S. Data Transfers”

Data Matters

This article was adapted from a longer article on our Data Matters blog, “ Schrems II Concerns Regarding U.S. Note that this article was published by the Lawfare Institute in cooperation with Brookings.). The post Lawfare Publishes Article on “Why Schrems II Might Not Be a Problem for EU-U.S. Lawfare recently published “ Why Schrems II Might Not Be a Problem for EU-U.S. Data Transfers *,” written by Sidley Partner Alan Charles Raul.

Part 2: OMG! Not another digital transformation article! Is it about the evolution from RIM to Content Services?

ARMA International

Therefore, the position of this article is that IG includes DG because information is data in context. Abstract. Humans have used technology to transform their societies from prehistoric times up to the present.

The top 10 news articles from Information Management in 2018

Information Management Resources

A look back at the 10 top news articles, features and slideshows that were the most popular with Information Management readers. MDM Analytics Machine learning Business intelligence Artificial intelligence Big data Industry salaries Data security Data governance

MDM 38

Learning Machine Learning? Six articles you don’t want to miss

IBM Big Data Hub

Digital disruption has revolutionized the way we live and do business — and machine learning is the latest wave of that revolution

Article 29 Working Party Releases GDPR Action Plan for 2017

Hunton Privacy

On January 16, 2017, the Article 29 Working Party (“Working Party”) published further information about its Action Plan for 2017 , which sets forth the Working Party’s priorities and objectives in the context of implementation of the EU General Data Protection Regulation (“GDPR”) for the year ahead. International Article 29 Working Party Data Protection Authority Data Transfer EU Regulation

My MEDIUM Article: Deepfakes and Deep Video Portraits?—?What are they and what is the difference?

Architect Security

Check out my latest article on MEDIUM: Deepfakes and Deep Video Portraits?—?What Media MEDIUM Articles Privacy Social Media TechWhat are they and what is the difference? link].

My Latest Article Published at Today’s General Counsel

Getting Information Done

General Counsel Can Spur Legal Hold Success Check out my latest article which was published in the December/January 2017 digital edition of Today’s General Counsel titled: “General Counsel Can Spur Legal Hold Success” . I coauthored the article with Doug Deems, General Counsel, The Claro Group. ” Our article provides three things that general counsel, specifically, can do to lead their organizations toward legal hold program excellence.

Paper 40

Illinois BIPA Suit Dismissed for Lack of Article III Standing

Hunton Privacy

The cases subsequently were consolidated, and on December 29, 2018, the Northern District of Illinois dismissed the case on standing grounds, finding that despite the existence of statutory standing under BIPA, neither plaintiff had claimed any injury that would support Article III standing. Robins , the Supreme Court held that Article III standing requires a concrete and particularized injury even in the context of a statutory violation.

ARTICLE 29 WORKING PARTY GUIDANCE – DATA BREACH NOTIFICATIONS

DLA Piper Privacy Matters

Last week the Article 29 Data Protection Working Party released updated guidelines in relation to personal data breach notifications and automated individual decision-making and profiling under the General Data Protection Regulation. The significance of ‘awareness’ is that this concept triggered when the clock starts ticking to notify the relevant supervisory authority under Article 33(1) GDPR.

My MEDIUM Article: Is it even possible to be “completely secure”?

Architect Security

Check out my latest article on MEDIUM: Is it even possible to be “completely secure”? Business Defense Devil's Advocate Humans MEDIUM Articles Mobile and Device Personal Security Privacy Softwarelink].

IT 40

The top 10 news articles for 2017

Information Management Resources

Data science, machine learning, artificial intelligence and big data were the topics that drew the most interest from Information Management readers. Data science Machine learning Artificial intelligence Analytics Big data