article thumbnail

California Privacy Law Overhaul – Proposition 24 Passes

Data Matters

Businesses must provide conspicuous links entitled “Limit the Use of My Sensitive Personal Information,” in the same manner Do Not Sell links are currently required, to facilitate consumers’ ability to exercise their rights with respect to sensitive personal information. Extends Employee- and B2B Exemptions for Two Years.

Privacy 122
article thumbnail

Fixing Data Breaches Part 2: Data Ownership & Minimisation

Troy Hunt

Yesterday, I wrote the first part of this 5-part series on fixing data breaches and I focused on education. It's the absolute best bang for your buck by a massive margin and it pays off over and over again across many years and many projects. Best of all, it's about prevention rather than cure. That is absolutely ridiculous!

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Customer Journey Digital Transformation Workbook

Bill Schmarzo - Dell EMC

To support this training, we created a methodology that guided the students through a digital transformation exercise. In the business-to-business (B2B) space, Customer Events could include launching new IOT-connected devices, selling customer retention solutions, or developing new healthcare services. Prepare for Vacation.

article thumbnail

What Is a SaaS Security Checklist? Tips & Free Template

eSecurity Planet

These checklists include security standards and best practices for SaaS and cloud applications, and B2B SaaS providers use them to guarantee that their solutions match customer security standards. Conduct regular tabletop exercises to assess its effectiveness.

article thumbnail

The Customer Journey Digital Transformation Workbook

Bill Schmarzo - Dell EMC

To support this training, we created a methodology that guided the students through a digital transformation exercise. In the business-to-business (B2B) space, Customer Events could include launching new IOT-connected devices, selling customer retention solutions, or developing new healthcare services. Prepare for Vacation.

article thumbnail

Nation-State-Sponsored Attacks: Not Your Grandfather’s Cyber Attacks

Data Matters

The insidiousness and reiterative nature of these attacks could pose significant risk for small businesses, as well as B2B and B2C corporations that may sell or distribute devices to businesses and consumers. Create, maintain, and exercise a cyber incident response plan. Dep’t of Just., and foreign government agencies.