Article 28 Standard Contractual Clauses

DLA Piper Privacy Matters

However, it shouldn’t be overlooked that another set of standard clauses has been issued by the EU, namely the Article 28 Standard Clauses. These are contained in Article 28 of the GDPR. The EU has published a new set of Article 28 Standard Clauses.

GDPR 56

2019 DIR Article index

Document Imaging Report

2019 DIR article index 12-13. Index

52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

20 for 2020: The Edge's Top Articles of the Year

Dark Reading

Variety is the spice of life, and it's also the perfect analogy for the article topics that resonated most with Edge readers this past year

IT 103

9-27-2019 DIR Article Index

Document Imaging Report

2019 DIR article index 9-27. Index

40

SDL Article in CACM

Adam Shostack

Mary Ellen Zurko and I have a short article on the subject in the May Communications of the ACM: “ Secure Development Tools and Techniques Need More Research That Will Increase Their Impact and Effectiveness in Practice.” Most of my time, I’m helping organizations develop the skills and discipline to build security in. We give the best advice available, and I recognize that we’re early in developing the science around how to build an SDL that works.

No, I Won't Link to Your Spammy Article

Troy Hunt

I also have an article on [thing] and I think it would be a great addition to your blog. So now when people search for [thing], they'll hopefully end up here rather than on the spammy article thus penalising you for your behaviour.

Test article

CILIP

TITLE. LOREM IPSUM DOLOR SIT AMET, CONSECTETUR ADIPISCING ELIT. DUO REGES: CONSTRUCTIO INTERRETE. PRODEST, INQUIT, MIHI EO ESSE ANIMO. SEQUITUR DISSERENDI RATIO COGNITIOQUE NATURAE; IN QUA QUID EST BONI PRAETER SUMMAM VOLUPTATEM, ET EAM SEMPITERNAM? NOS QUIDEM VIRTUTES SIC NATAE SUMUS, UT TIBI SERVIREMUS, ALIUD NEGOTII NIHIL HABEMUS. QUI AUTEM DE SUMMO BONO DISSENTIT DE TOTA PHILOSOPHIAE RATIONE DISSENTIT. AVARITIAMNE MINUIS?

40

Interesting Article on Marcus Hutchins

Schneier on Security

This is a good article on the complicated story of hacker Marcus Hutchins. bitcoin cybersecurity fraud hacking killswitch privacy ransomware

GDPR Article 32: Your guide to the requirements

IT Governance

Perhaps the most widely discussed set of compliance requirements within the GDPR (General Data Protection Regulation) are those found in Article 32. In this blog, we look at how you can meet your GDPR Article 32 requirements. What is Article 32 of the GDPR?

GDPR 56

How to comply with Article 30 of the GDPR

IT Governance

What does Article 30 require? Article 30 of the EU General Data Protection Regulation (GDPR) sets out what exactly organisations need to document in order to comply with the Regulation. What do you need to do to comply with Article 30? If a new process is made or your data protection officer (DPO) changes, make sure part of the process is to update your Article 30 records. If you have a question about Article 30 or any other GDPR topic, use our GDPR Ask Us service.

GDPR 40

PRESS RELEASE – CALL FOR AUTHORS: ARTICLES ON INFORMATION MANAGEMENT (WITH COMPENSATION)

IG Guru

The post PRESS RELEASE – CALL FOR AUTHORS: ARTICLES ON INFORMATION MANAGEMENT (WITH COMPENSATION) appeared first on IG GURU. Check out the press release here. AIEF Information Governance Records Management Sponsored authors Information Management Press Release

Second Circuit Affirms Dismissal of Data Breach Class Action on Article III Standing Grounds

Hunton Privacy

Court of Appeals for the Second Circuit affirmed the dismissal on Article III standing grounds of a data breach class action predicated on an alleged increased risk of identity theft. On those facts, the court found the plaintiffs lacked Article III standing.

Long Article on NSA and the Shadow Brokers

Schneier on Security

The New York Times just published a long article on the Shadow Brokers and their effects on NSA operations. Summary: it's been an operational disaster, the NSA still doesn't know who did it or how, and NSA morale has suffered considerably. This is me on the Shadow Brokers from last May. breaches hacking insiders leaks nsa

IT 59

EDPB Adopts Guidelines on Relevant and Reasoned Objection under Article 60 of the GDPR

Hunton Privacy

Specifically, an LSA is required under Article 60(3) of the GDPR to submit a draft decision to the CSAs, which may then raise a relevant and reasoned objection within a specific timeframe.

GDPR 82

Lawfare Publishes Article on “Why Schrems II Might Not Be a Problem for EU-U.S. Data Transfers”

Data Matters

This article was adapted from a longer article on our Data Matters blog, “ Schrems II Concerns Regarding U.S. Note that this article was published by the Lawfare Institute in cooperation with Brookings.). The post Lawfare Publishes Article on “Why Schrems II Might Not Be a Problem for EU-U.S. Lawfare recently published “ Why Schrems II Might Not Be a Problem for EU-U.S. Data Transfers *,” written by Sidley Partner Alan Charles Raul.

11th Circuit Rules Single Text Message Not Sufficient for Article III Standing

Data Matters

For any lawsuit filed in federal court, the plaintiff must have standing under Article III of the U.S. Some federal statutes, including the TCPA, confer a right to sue, but Congress’s say-so does not necessarily suffice under Article III. In the wake of Spokeo , defendants in TCPA cases redoubled their efforts to challenge plaintiffs’ standing under Article III. Creating a circuit split, the U.S.

Paper 90

Information Professional article featuring Dominic Cummings ? an apology

CILIP

I want to acknowledge that we made a mistake in the way we presented the article and to apologise for that and the offence it has caused. As CILIP?s s Chief Executive, my role carries with it both the opportunity to promote the good that we do and a duty to represent the values that unite us.

Top Ten Blog Articles of 2019

Synergis Software

Some of these articles seem to be more popular than others; we think of them as our Top Ten. Written in 2016 but still current and popular, this article explains the ins and outs of supporting a variety of CAD formats as part of engineering documentation management. In this informative article, Brian Cristiano, CEO and Founder of BOLD Worldwide shares three tips for crushing information silos. Up above we listed part 2 of this article, and added an 11th mistake.

CIPL Submits Response to European Commission’s Article 28 Standard Contractual Clauses

Hunton Privacy

Article 28 of the GDPR sets out specific provisions that must be executed between data controllers and processors when personal data is shared.

GDPR 64

Want to succeed as a CDO? 6 articles to read this week

IBM Big Data Hub

Learn more about the right way to approach your data governance governance strategy in 2018 by checking out our top performing articles

Article from a Former Chinese PLA General on Cyber Sovereignty

Schneier on Security

Interesting article by Major General Hao Yeli, Chinese People's Liberation Army (ret.), a senior advisor at the China International Institute for Strategic Society, Vice President of China Institute for Innovation and Development Strategy, and the Chair of the Guanchao Cyber Forum.

The top 10 news articles from Information Management in 2018

Information Management Resources

A look back at the 10 top news articles, features and slideshows that were the most popular with Information Management readers. MDM Analytics Machine learning Business intelligence Artificial intelligence Big data Industry salaries Data security Data governance

MDM 38

European Commission Releases Draft Standard Contractual Clauses for Article 28 Data Processing Agreements

Hunton Privacy

In particular, Article 28 of the GDPR requires data controllers to put in place an agreement (or other legal act) when outsourcing data processing activities to a data processor and sets forth the data protection obligations that must be covered in such data processing agreement.

GDPR 61

Learning Machine Learning? Six articles you don’t want to miss

IBM Big Data Hub

Digital disruption has revolutionized the way we live and do business — and machine learning is the latest wave of that revolution

87

A Cautionary Tale for GDPR Article 5 Compliance

InfoGoTo

Recent enforcement actions by data protection authorities in the European Union demonstrate that they’re more than willing to enforce GDPR Article 5. What Does GDPR Article 5 Require? GDPR Article 5 details the standards organizations have to follow when processing personal data. ” GDPR Article 5(1)(c) addresses data minimization by requiring that personal data be limited to what is necessary relative to the purpose for which it is processed.

My MEDIUM Article: Deepfakes and Deep Video Portraits?—?What are they and what is the difference?

Architect Security

Check out my latest article on MEDIUM: Deepfakes and Deep Video Portraits?—?What Media MEDIUM Articles Privacy Social Media TechWhat are they and what is the difference? link].

My MEDIUM Article: Is it even possible to be “completely secure”?

Architect Security

Check out my latest article on MEDIUM: Is it even possible to be “completely secure”? Business Defense Devil's Advocate Humans MEDIUM Articles Mobile and Device Personal Security Privacy Softwarelink].

IT 40

My Latest Article Published at Today’s General Counsel

Getting Information Done

General Counsel Can Spur Legal Hold Success Check out my latest article which was published in the December/January 2017 digital edition of Today’s General Counsel titled: “General Counsel Can Spur Legal Hold Success” . I coauthored the article with Doug Deems, General Counsel, The Claro Group. ” Our article provides three things that general counsel, specifically, can do to lead their organizations toward legal hold program excellence.

Paper 40

ARTICLE 29 WORKING PARTY GUIDANCE – DATA BREACH NOTIFICATIONS

DLA Piper Privacy Matters

Last week the Article 29 Data Protection Working Party released updated guidelines in relation to personal data breach notifications and automated individual decision-making and profiling under the General Data Protection Regulation. The significance of ‘awareness’ is that this concept triggered when the clock starts ticking to notify the relevant supervisory authority under Article 33(1) GDPR.

GDPR 40

Throwback article is a good reminder on how mobile devices are vulnerable via Citizen Lab

IG Guru

The post Throwback article is a good reminder on how mobile devices are vulnerable via Citizen Lab appeared first on IG GURU. The Many Identifiers in Our Pockets. Breach Business IG News Information Governance information privacy information security Privacy Cyber Security IMEI MAC Address Mobile Security

The top 10 news articles for 2017

Information Management Resources

Data science, machine learning, artificial intelligence and big data were the topics that drew the most interest from Information Management readers. Data science Machine learning Artificial intelligence Analytics Big data

My Latest Article Published at Document Strategy Magazine

Getting Information Done

Creating a Culture of Information Management Excellence Last year, I wrote an article titled, “ What Does Culture Have to Do with Information Management? ” which made the case for addressing culture as a part of any successful information management implementation project. Today, I wanted to offer some practical advice on how to create or install a culture of information management excellence. So, how do we actually create this type of culture? Borrowing from John C.

40

EUROPE: Article 29 Working Party publish draft Guidelines on Consent

DLA Piper Privacy Matters

On 12 December 2017, the Article 29 Working Party (WP29) published draft Guidelines on Consent under the General Data Protection Regulation (GDPR). The Guidelines begin with an overview of the elements of valid consent under Article 4(11), reiterating that consent must be (i) freely given, (ii) specific, (iii) informed, and (iv) unambiguously indicated. Article 7(3) requires controllers to ensure that consent can be withdrawn as easily it was given.

GDPR 40

Articles and Presentations

ChiefTech

I'm still in the process of migrating content from my old blog - for a consolidated list of my articles, presentations and papers please see this page

Paper 40

Working party publishes draft of GDPR guidelines for Article 49 (export derogations)

Data Protection Report

On February 12, 2018, the Article 29 Working Party (WP29) published guidance regarding Article 49 of the General Data Protection Regulation (GDPR) for public comment. and (2) where the entity therein has committed to handle the Personal Data of European data subjects applying appropriate safeguards in accordance with Article 46 of the GDPR. The February 12 draft guidance for public comment addresses each of the exemptions specified in Article 49.

GDPR 40

Article 29 Working Party Releases GDPR Action Plan for 2017

Hunton Privacy

On January 16, 2017, the Article 29 Working Party (“Working Party”) published further information about its Action Plan for 2017 , which sets forth the Working Party’s priorities and objectives in the context of implementation of the EU General Data Protection Regulation (“GDPR”) for the year ahead. International Article 29 Working Party Data Protection Authority Data Transfer EU Regulation

Illinois BIPA Suit Dismissed for Lack of Article III Standing

Hunton Privacy

The cases subsequently were consolidated, and on December 29, 2018, the Northern District of Illinois dismissed the case on standing grounds, finding that despite the existence of statutory standing under BIPA, neither plaintiff had claimed any injury that would support Article III standing. Robins , the Supreme Court held that Article III standing requires a concrete and particularized injury even in the context of a statutory violation.

Head of Austrian DPA Appointed Chair of Article 29 Working Party

Hunton Privacy

On February 7, 2018, representatives of European Data Protection Authorities (“DPAs”) met in Brussels to appoint the new leader of the current Article 29 Data Protection Working Party (the “Working Party”). European Union International Article 29 Working Party Austria Data Protection Authority EU Member States EU Regulation Germany

GDPR 48

I’m quoted in CSO Online article: 25 API Security Tips You’re Probably Not Considering

Architect Security

I contributed to this article by David Spark of CISO/Security Vendor Relationship Series. These are some of the best API security tips right now: 25 API Security Tips You’re Probably Not Considering. Defense enterprise Interviews Media SDLC Software Tips

Article on Document-Level Redaction of Electronic Documents

Positively RIM

On June 30 online , KM World published an article I wrote on Document-Level Redaction of Electronic Documents. The article can be found at [link]. While this is not everyone's cup of tea, it is an important tool for many RIMmers. [As As it has fallen out of use a bit, I remind my gentle readers that RIM is an acronym for Records & Information Management.] As always, your comments are valued. Thanks for reading

IT 40