article thumbnail

EUROPE: New privacy rules for connected vehicles in Europe?

DLA Piper Privacy Matters

This would cause the risk that there are insufficient functionalities or options offered to exercise the control necessary for affected individuals to avail themselves of their data protection and privacy rights. The draft guidelines conclude with some case studies. Rights of the data subject. Conclusion.

Privacy 69
article thumbnail

Rock the Blockchain: Thales and DigiCert Secure the Data

Thales Cloud Protection & Licensing

It’s not hard to understand why companies are exercising diligence when selecting a data protection solution. This is particularly true when it comes to authenticating and managing the identity of blockchain users and devices. PKI authenticates the identity of users and devices. Confidentiality, Integrity, Availability.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What Is a SaaS Security Checklist? Tips & Free Template

eSecurity Planet

This framework guarantees that appropriate authentication measures, encryption techniques, data retention policies, and backup procedures are in place. Questions to Answer Consider these questions to verify your organization’s data security and threat detection strategies: Are multi-factor authentication techniques required for user access?

article thumbnail

Comics for Consumer Communication

ChiefTech

In some cases, the comic book format has been used as a way to help people get access to critical legal help. This case study from my time as a Publication Manager at the Legal Services Society (LSS) of British Columbia (BC) could inspire the use of comics outside the development process.