article thumbnail

CIPL Publishes Article on COVID-19 as a Case Study for Privacy Accountability

Hunton Privacy

On April 14, 2020, the Centre for Information Policy Leadership (“CIPL”) at Hunton Andrews Kurth LLP published an article entitled “ COVID-19 Meets Privacy: A Case Study for Accountability ” (the “Article”). To read about the accountability measures above in more detail, view the full Article.

Privacy 99
article thumbnail

Enterprise-managed IAM: An SRE team case study

IBM Big Data Hub

Enterprise-managed identity and access management (IAM) enables cloud administrators to centrally configure access and security settings for the entire organization. ” The case study in this blog post shows how to easily and securely implement and manage a site reliability engineering (SRE) team’s access across an enterprise.

Cloud 72
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Accelerating Data Security and Manufacturing Production for Medical Sensors by 20x with nTropy.io and Thales

Thales Cloud Protection & Licensing

Accelerating Data Security and Manufacturing Production for Medical Sensors by 20x with nTropy.io This article explores how nTropy successfully designed a solution leveraging Thales Luna HSM to accelerate key injection material for wearable medical devices by 20x. For these reasons, medical device security is a top priority.

article thumbnail

European Data Protection Board Issues Final Schrems II Recommendations

Data Matters

The EDPB in the Final Schrems II Recommendations re-iterate that Article 49 derogations cannot be used in a way that contradicts the nature of the derogations as being exceptions, and so should be restricted to specific situations. Nevertheless, Case Study 6 and 7 remain in the Final Schrems II Recommendations.

article thumbnail

CyberheistNews Vol 13 #11 [Heads Up] Employees Are Feeding Sensitive Biz Data to ChatGPT, Raising Security Fears

KnowBe4

CyberheistNews Vol 13 #11 | March 14th, 2023 [Heads Up] Employees Are Feeding Sensitive Biz Data to ChatGPT, Raising Security Fears Robert Lemos at DARKReading just reported on a worrying trend. I'm giving you a short extract of the story and the link to the whole article is below.

article thumbnail

Information Disaster Plan

The Texas Record

This article will promote critical thinking and provide some guidance for developing your office’s information management disaster plan. When reviewing this article and establishing your plan, keep in mind the impact of losing information is not always immediately apparent. What records require critical security measures?

Paper 98
article thumbnail

Business process reengineering (BPR) examples

IBM Big Data Hub

The methodology gained prominence with the publication of a 1990 article in the Harvard Business Review, “Reengineering Work: Don’t Automate, Obliterate,” by Michael Hammer, and the 1993 book by Hammer and James Champy, Reengineering the Corporation. This can enable significant cost savings and improve profitability.