article thumbnail

Connecticut Enacts Consumer Privacy Law

Hunton Privacy

On May 10, 2022, Connecticut Governor Ned Lamont signed An Act Concerning Personal Data Privacy and Online Monitoring , after the law was previously passed by the Connecticut General Assembly in April. Connecticut is now the fifth state to enact a consumer privacy law.

Privacy 118
article thumbnail

California Privacy Law Overhaul – Proposition 24 Passes

Data Matters

The CPRA incorporates the principle of data minimization, requiring that a business’s collection and use of a consumers data be reasonably necessary and proportionate to the purposes for which it was collected and to refrain from using personal data incompatible with the disclosed purposes for which it was collected.

Privacy 122
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why Twilio’s $3.2B acquisition of Segment may not be enough

Reltio

Twilio as an acquirer is not a surprise because Twilio is positioned as a Customer Engagement Platform for voice and messaging but did not have any coverage for data. Segment is a Customer Data Platform (CDP) player that focuses exclusively on person data. Why focusing only on 3 rd party data enrichment is a limitation .

article thumbnail

Fixing Data Breaches Part 2: Data Ownership & Minimisation

Troy Hunt

Yesterday, I wrote the first part of this 5-part series on fixing data breaches and I focused on education. The next few parts of this series all focus on cures - how do we fix data breaches once bad code has already been written or bad server configurations deployed? Who Owns Our Personal Data?

article thumbnail

Global CRM Provider Exposed Millions of Clients’ Files Online

Security Affairs

Researcher discovered that global B2B CRM provider Really Simple Systems exposed online a non-password-protected database with million records. Upon further research, records indicated that the database belonged to global B2B CRM provider Really Simple Systems. Jeremiah finds and reports data breaches and vulnerabilities.

article thumbnail

How Telcos are embracing data to become the back-end infrastructure for organizations

Reltio

Telcos will be working a lot more with the B2B sector. They are also doing a lot around privacy and regulation because if the data is kept in the cloud they need to ensure it is secure. Much of what they are collecting is personal data that has to be stored, analyzed and used in a confidential way. About Sarit Bose.

MDM 52