Remove B2B Remove Education Remove Personal data Remove Security
article thumbnail

Connecticut Enacts Consumer Privacy Law

Hunton Privacy

On May 10, 2022, Connecticut Governor Ned Lamont signed An Act Concerning Personal Data Privacy and Online Monitoring , after the law was previously passed by the Connecticut General Assembly in April. Connecticut is now the fifth state to enact a consumer privacy law.

Privacy 118
article thumbnail

California Privacy Law Overhaul – Proposition 24 Passes

Data Matters

The CPRA creates a new category of information called “sensitive personal information.” Similarly, businesses will not be permitted to store personal data for longer than is reasonably necessary. Consumers may request information on the length of businesses’ retention of their data.

Privacy 122
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Global CRM Provider Exposed Millions of Clients’ Files Online

Security Affairs

Researcher discovered that global B2B CRM provider Really Simple Systems exposed online a non-password-protected database with million records. Upon further research, records indicated that the database belonged to global B2B CRM provider Really Simple Systems. As an ethical security researcher, I never download the data I find.

article thumbnail

Fixing Data Breaches Part 2: Data Ownership & Minimisation

Troy Hunt

Yesterday, I wrote the first part of this 5-part series on fixing data breaches and I focused on education. The next few parts of this series all focus on cures - how do we fix data breaches once bad code has already been written or bad server configurations deployed? Who Owns Our Personal Data?

article thumbnail

How Telcos are embracing data to become the back-end infrastructure for organizations

Reltio

Telcos will be working a lot more with the B2B sector. They are also doing a lot around privacy and regulation because if the data is kept in the cloud they need to ensure it is secure. Much of what they are collecting is personal data that has to be stored, analyzed and used in a confidential way.

MDM 52