Remove category online-privacy
article thumbnail

How to implement the General Data Protection Regulation (GDPR)

IBM Big Data Hub

The General Data Protection Regulation (GDPR), the European Union’s landmark data privacy law, took effect in 2018. Think: an online retailer that stores customers’ email addresses to send order updates. Even the world’s biggest businesses are not free from GDPR woes. Irish regulators hit Meta with a EUR 1.2

GDPR 76
article thumbnail

CCPA In-Depth Series: Draft Attorney General Regulations on Consumer Notice

Data Matters

In the summer of 2018, the California Legislature drafted and passed the California Consumer Privacy Act (CCPA) in record time. Businesses, consumer advocates, and privacy watchers thus have been eagerly waiting for over a year for the Attorney General to propose the regulations the CCPA requires him to promulgate.

Privacy 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CCPA In-Depth Series: Draft Attorney General Regulations on Verification, Children’s Privacy and Non-Discrimination

Data Matters

Today we look at verification, children’s privacy and the non-discrimination provisions. In the summer of 2018, the California Legislature drafted and passed the California Consumer Privacy Act (CCPA) in record time. DETAILED ANALYSIS ON VERIFICATION, CHILDREN’S PRIVACY AND NON-DISCRIMINATION. INTRO AND BACKGROUND.

Privacy 60
article thumbnail

The Results Are in: Modest Changes to CCPA Await the Governor’s Signature

HL Chronicle of Data Protection

Since the California Consumer Privacy Act’s (CCPA) hasty passage in June last year and minor changes last September , the CCPA has vexed businesses working on compliance. Businesses, some academics, and various legislators thought that further amendments were needed to make the CCPA work effectively and accomplish its objectives.

Sales 40
article thumbnail

Examples of data processing activities that require a DPIA

IT Governance

You can do this by breaking risk into its two component parts: Probability : the likelihood that the data processing will result in a data breach or privacy violation. Damage : the effects on the individual if a data breach or privacy violation occurs. Online services. Large-scale use of sensitive information.

GDPR 67
article thumbnail

What Is Encryption? Definition, How it Works, & Examples

eSecurity Planet

This guide will provide a high level overview of encryption and how it fits into IT through the following topics: How Encryption Works To understand how encryption works, we need to understand how it fits into the broader realm of cryptology, how it processes data, common categories, top algorithms, and how encryption fits into IT security.

article thumbnail

Majority of CCPA Amendment Bills Passed by California Legislature

Hunton Privacy

California marked the end of the 2019 legislative session this past Friday, September 13, by passing five out of six pending bills to amend the California Consumer Privacy Act of 2018 (“CCPA”). Below is a summary of the CCPA amendment bills passed by the legislature at this session.

Sales 48