Long Article on NSO Group
Schneier on Security
APRIL 21, 2022
Ronan Farrow has a long article in The New Yorker on NSO Group, which includes the news that someone — probably Spain — used the software to spy on domestic Catalonian sepratists.
This site uses cookies to improve your experience. By viewing our content, you are accepting the use of cookies. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country we will assume you are from the United States. View our privacy policy and terms of use.
Schneier on Security
APRIL 21, 2022
Ronan Farrow has a long article in The New Yorker on NSO Group, which includes the news that someone — probably Spain — used the software to spy on domestic Catalonian sepratists.
DLA Piper Privacy Matters
JUNE 10, 2021
However, it shouldn’t be overlooked that another set of standard clauses has been issued by the EU, namely the Article 28 Standard Clauses. These are contained in Article 28 of the GDPR. The EU has published a new set of Article 28 Standard Clauses. The EU has published a new set of Article 28 Standard Clauses.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
The Power of Storytelling in Risk Management
ERM Program Fundamentals for Success in the Banking Industry
IT Governance
MARCH 30, 2023
Article 17 of the GDPR (General Data Protection Regulation) plays a distinctive yet essential role in data protection law. Learn more The post GDPR Article 17: What Is the Right to Erasure? There are several reasons why someone might make such a request, and in almost all instances, the organisation must comply.
Dark Reading
DECEMBER 31, 2020
Variety is the spice of life, and it's also the perfect analogy for the article topics that resonated most with Edge readers this past year.
ARMA International
AUGUST 29, 2022
This article is a continuation of the Legacy Disposition White Paper article series. Keep in mind that a disposition program is not “one size fits all,” and the steps below (and really, from this article on) should be approached with that in mind. That’s a wrap on article two!
ARMA International
MARCH 22, 2022
In the next article in the series, we will begin to sketch out what the program looks like in more granular detail. It’s strongly recommended to check (and if warranted, recheck) with responsible attorneys and clients to make sure disposition of client data is appropriate and ensure compliance with any pre-established client agreements.
Troy Hunt
APRIL 6, 2020
I also have an article on [thing] and I think it would be a great addition to your blog. So now when people search for [thing], they'll hopefully end up here rather than on the spammy article thus penalising you for your behaviour. No, no it wouldn't and there are all sorts of reasons why not. Just the title. On a popular blog.
DLA Piper Privacy Matters
NOVEMBER 24, 2021
On 19 November, the European Data Protection Board (‘ EDPB ‘) published, its draft Guidelines 05/2021 on the Interplay between the application of Article 3 and the provisions on international transfers as per Chapter V of the GDPR (“ Guidelines ”). This controller or processor (i.e.
eDiscovery Law
MAY 5, 2023
Julie Anne Halter, a co-chair of the K&L Gates e-Discovery Analysis & Technology (“e-DAT”) Group and a partner in the firm’s Seattle office, was recently quoted in a Bloomberg Law article on the increasing focus of government investigators on videoconference recordings as evidence in their investigations.
IT Governance
SEPTEMBER 28, 2020
Perhaps the most widely discussed set of compliance requirements within the GDPR (General Data Protection Regulation) are those found in Article 32. In this blog, we look at how you can meet your GDPR Article 32 requirements. What is Article 32 of the GDPR? Minimum compliance requirements in Article 32. Let’s take a look.
eDiscovery Law
DECEMBER 16, 2022
Reflecting on the new enterprise collaboration and remote work technologies adopted by many employers, Julie Anne Halter (Partner and e-DAT Practice Group Co-Chair) outlines a number of related legal consideration and risks associated with these technologies in a 425 Business article published this week.
Data Matters
SEPTEMBER 10, 2019
For any lawsuit filed in federal court, the plaintiff must have standing under Article III of the U.S. Some federal statutes, including the TCPA, confer a right to sue, but Congress’s say-so does not necessarily suffice under Article III. Constitution. The Supreme Court reiterated that point in its 2016 ruling in Spokeo, Inc.
Hunton Privacy
APRIL 27, 2021
Court of Appeals for the Second Circuit affirmed the dismissal on Article III standing grounds of a data breach class action predicated on an alleged increased risk of identity theft. On those facts, the court found the plaintiffs lacked Article III standing. As reported on the Hunton Retail Law Blog , on April 26, 2021, the U.S.
Hunton Privacy
NOVEMBER 16, 2020
In particular, Article 28 of the GDPR requires data controllers to put in place an agreement (or other legal act) when outsourcing data processing activities to a data processor and sets forth the data protection obligations that must be covered in such data processing agreement.
Hunton Privacy
DECEMBER 15, 2020
Article 28 of the GDPR sets out specific provisions that must be executed between data controllers and processors when personal data is shared.
Adam Shostack
MAY 11, 2020
Mary Ellen Zurko and I have a short article on the subject in the May Communications of the ACM: “ Secure Development Tools and Techniques Need More Research That Will Increase Their Impact and Effectiveness in Practice.” That’s why I spend time working with academics who can objectively study what we’re working on.
Hunton Privacy
OCTOBER 15, 2020
Specifically, an LSA is required under Article 60(3) of the GDPR to submit a draft decision to the CSAs, which may then raise a relevant and reasoned objection within a specific timeframe. The Guidelines aim to establish a common understanding of the meaning of ‘relevant and reasoned.’.
CILIP
JUNE 10, 2020
I want to acknowledge that we made a mistake in the way we presented the article and to apologise for that and the offence it has caused. I understand that I am in a position of privilege to serve and support this professional community and am accountable for how we use this platform on your behalf.
Data Matters
DECEMBER 22, 2020
This article was adapted from a longer article on our Data Matters blog, “ Schrems II Concerns Regarding U.S. Note that this article was published by the Lawfare Institute in cooperation with Brookings.). (*Note that this article was published by the Lawfare Institute in cooperation with Brookings.).
Synergis Software
DECEMBER 20, 2019
Some of these articles seem to be more popular than others; we think of them as our Top Ten. Written in 2016 but still current and popular, this article explains the ins and outs of supporting a variety of CAD formats as part of engineering documentation management. Up above we listed part 2 of this article, and added an 11th mistake.
IG Guru
JULY 9, 2020
The post PRESS RELEASE – CALL FOR AUTHORS: ARTICLES ON INFORMATION MANAGEMENT (WITH COMPENSATION) appeared first on IG GURU. Check out the press release here.
IG Guru
OCTOBER 24, 2022
Check out the original article here.
Hunton Privacy
JANUARY 15, 2019
The cases subsequently were consolidated, and on December 29, 2018, the Northern District of Illinois dismissed the case on standing grounds, finding that despite the existence of statutory standing under BIPA, neither plaintiff had claimed any injury that would support Article III standing. In Spokeo, Inc. Time Warner Cable, Inc.
Schneier on Security
NOVEMBER 14, 2017
The New York Times just published a long article on the Shadow Brokers and their effects on NSA operations. Summary: it's been an operational disaster, the NSA still doesn't know who did it or how, and NSA morale has suffered considerably. This is me on the Shadow Brokers from last May.
IT Governance
JUNE 21, 2018
What does Article 30 require? Article 30 of the EU General Data Protection Regulation (GDPR) sets out what exactly organisations need to document in order to comply with the Regulation. What do you need to do to comply with Article 30? But data flow maps are about more than being organised and efficient.
IG Guru
OCTOBER 14, 2021
The post US CISA releases Social Media Tip Sheet citing “Half a Billion Users Joined Social in the Last Year” Hootsuite Article #CyberMonth appeared first on IG GURU. Check out the tip sheet here.
CILIP
APRIL 16, 2019
LOREM IPSUM DOLOR SIT AMET, CONSECTETUR ADIPISCING ELIT. DUO REGES: CONSTRUCTIO INTERRETE. PRODEST, INQUIT, MIHI EO ESSE ANIMO. SEQUITUR DISSERENDI RATIO COGNITIOQUE NATURAE; IN QUA QUID EST BONI PRAETER SUMMAM VOLUPTATEM, ET EAM SEMPITERNAM? NOS QUIDEM VIRTUTES SIC NATAE SUMUS, UT TIBI SERVIREMUS, ALIUD NEGOTII NIHIL HABEMUS.
Data Matters
DECEMBER 14, 2017
On 28 November 2017, the Article 29 Working Party (the “ WP29 ”) published detailed draft guidelines on consent under the EU General Data Protection Regulation (the “ GDPR ”), which is to come into effect on 25 May 2018. The draft guidance has been submitted for public consultation for a six week period before being adopted.
Hunton Privacy
DECEMBER 20, 2017
On December 12, 2017, the Article 29 Working Party (“Working Party”) published its guidelines on transparency under Regulation 2016/679 (the “Guidelines”). The Working Party also clarifies that all categories of information to be provided pursuant to Articles 13 and 14 of the GDPR are of equal importance.
Hunton Privacy
FEBRUARY 2, 2018
On January 29, 2018, the Centre for Information Policy Leadership (“CIPL”) at Hunton & Williams LLP submitted formal comments to the Article 29 Working Party (the “Working Party”) on its Guidelines on Transparency (the “Guidelines”). The Guidelines were adopted by the Working Party on November 28, 2017, for public consultation.
Hunton Privacy
FEBRUARY 8, 2018
On February 7, 2018, representatives of European Data Protection Authorities (“DPAs”) met in Brussels to appoint the new leader of the current Article 29 Data Protection Working Party (the “Working Party”).
Data Matters
OCTOBER 20, 2017
On 4 October 2017 the Article 29 Working Party (“ WP29 ”) published its final Guidelines on Data Protection Impact Assessment (“ DPIA ”) which were initially released in draft form in April 2017. The post Article 29 Working Party Publishes Final Guidance on Data Protection Impact Assessments appeared first on Data Matters Privacy Blog.
Hunton Privacy
MAY 1, 2018
On April 11, 2018, the Article 29 Working Party (the “Working Party”) adopted two Recommendations on the Standard Application for Approval of Data Controller or Processor Binding Corporate Rules for the Transfer of Personal Data (the “Recommendations”).
Hunton Privacy
FEBRUARY 5, 2018
The Working Party should clarify that companies with approved BCR-C do not have to implement additional controller-processor contracts reiterating the processors’ obligations under Article 28(3) of the GDPR with respect to internal transfers between controllers and processors within the same group of companies. General BCR Recommendations.
Schneier on Security
MARCH 16, 2018
This is a good article on the complicated story of hacker Marcus Hutchins.
IBM Big Data Hub
MARCH 5, 2018
Learn more about the right way to approach your data governance governance strategy in 2018 by checking out our top performing articles.
ARMA International
SEPTEMBER 13, 2021
In the context of DT, this article defines content as information or data that has context and is consumable by humans and automated systems that allow them to make decisions, support operations, take actions, and monetize value by delivering products and services.
Data Protection Report
MARCH 5, 2018
On February 12, 2018, the Article 29 Working Party (WP29) published guidance regarding Article 49 of the General Data Protection Regulation (GDPR) for public comment. The February 12 draft guidance for public comment addresses each of the exemptions specified in Article 49. See Nowak, Khan and Kessler Article. the U.S.);
Schneier on Security
JANUARY 17, 2018
Interesting article by Major General Hao Yeli, Chinese People's Liberation Army (ret.), a senior advisor at the China International Institute for Strategic Society, Vice President of China Institute for Innovation and Development Strategy, and the Chair of the Guanchao Cyber Forum.
Krebs on Security
AUGUST 31, 2022
Last year, I posted a series of articles about a purported “breach” at Ubiquiti. I always endeavor to ensure that my articles are properly sourced and factual. As a result of the new information that has been provided to me, I no longer have faith in the veracity of my source or the information he provided to me.
Architect Security
JUNE 8, 2020
I contributed to this article by David Spark of CISO/Security Vendor Relationship Series. These are some of the best API security tips right now: 25 API Security Tips You’re Probably Not Considering.
Hunton Privacy
JULY 3, 2017
The Article 29 Working Party (“Working Party”) recently issued its Opinion on data processing at work (the “Opinion”). The Opinion considers data protection by design, data protection impact assessments and Article 88 with respect to processing employee data.
DLA Piper Privacy Matters
FEBRUARY 21, 2018
Last week the Article 29 Data Protection Working Party released updated guidelines in relation to personal data breach notifications and automated individual decision-making and profiling under the General Data Protection Regulation. This alert focuses on the key updates to personal data breach guidelines.
Expert insights. Personalized for you.
We have resent the email to
Are you sure you want to cancel your subscriptions?
Let's personalize your content