article thumbnail

Connecticut Enacts Consumer Privacy Law

Hunton Privacy

The CTDPA exempts certain entities, including, for example, state and local government entities, nonprofits, higher education institutions, financial institutions subject to the Gramm-Leach-Bliley Act (“GLB”), and qualifying covered entities and business associates subject to the Health Insurance Portability and Accountability Act (“HIPAA”).

Privacy 118
article thumbnail

Clutch Names RoleModel Software a Top 1000 Company!

Role Model Software

a B2B ratings and reviews platform?—?has For example The Manifest, a leading company ranking site , can help you with your B2B purchasing decisions. Here at RoleModel Software, we’re capable of crafting sustainable software that can give your business a competitive edge. We’re proud to announce that Clutch.co?—?a

B2B 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

Editor’s note: I recently had the chance to participate in a discussion about the overall state of privacy and cybersecurity with Erin Kapczynski, OneRep’s senior vice president of B2B marketing. Byron: Companies often underestimate threats, neglect basic cyber hygiene, and fail to educate employees on cybersecurity.

article thumbnail

Creating a holistic 360-degree “citizen” view with data and AI

IBM Big Data Hub

In B2B or B2C circles, a 360-degree view of customers or citizens offers a holistic, comprehensive picture of a person based on data collected from all touch points. Throughout the US, state departments of health, education and behavioral health are using data to overcome other health crises, including the opioid and suicide epidemics.

B2C 52
article thumbnail

Why Twilio’s $3.2B acquisition of Segment may not be enough

Reltio

Reltio’s goal is to provide clarity, educate the market and explain our differentiation. Let’s take a common banking example, people use different email addresses for different purposes. Let’s go back to the banking example I shared earlier. Let’s take another example, Twilio’s acquisition of Segment.

article thumbnail

Global CRM Provider Exposed Millions of Clients’ Files Online

Security Affairs

Researcher discovered that global B2B CRM provider Really Simple Systems exposed online a non-password-protected database with million records. Upon further research, records indicated that the database belonged to global B2B CRM provider Really Simple Systems. As an ethical security researcher, I never download the data I find.

article thumbnail

Fixing Data Breaches Part 2: Data Ownership & Minimisation

Troy Hunt

Yesterday, I wrote the first part of this 5-part series on fixing data breaches and I focused on education. Take the sign-up form on HIBP as an example: And for good measure, I'll add the sign-up form for Report URI too: These are spartan. Best of all, it's about prevention rather than cure.