Remove Big data Remove Education Remove Information Security Remove Privacy
article thumbnail

FTC Releases New Report on Big Data

Hunton Privacy

On January 6, 2015, the Federal Trade Commission released its report on big data entitled Big Data: A Tool for Inclusion or Exclusion? The majority of the report provides guidance for industry on how to mitigate the risks associated with big data when using big data for business purposes.

article thumbnail

Live from Mexico City: Opening Session Highlights the Potential and Challenges of Big Data

Hunton Privacy

On November 2, 2011, following welcome comments by Federal Institute for Access to Information and Data Protection (“IFAI”) Commissioner Jacqueline Peschard, the 33rd International Conference of Data Protection and Privacy Commissioners opened in Mexico City with an examination of the phenomenon of “Big Data” as a definer of a new economic era.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Data security: Why a proactive stance is best

IBM Big Data Hub

Data protection and data privacy Data protection , defined as protecting important information from corruption, damage or loss, is critical because data breaches resulting from cyberattacks can include personally identifiable information (PII), health information, financial information, intellectual property and other personal data.

article thumbnail

Digital Transformation starts with the Employees

Thales Cloud Protection & Licensing

This past month, CEOs, elected leaders and academics from around the globe gathered at the World Economic Forum (WEF) in Davos, Switzerland, to discuss the world’s most pressing problems including technological change, global trade, education, sustainability, and gender equality. million by 2022.

article thumbnail

What is a phishing simulation?

IBM Big Data Hub

Because even the best email gateways and security tools can’t protect organizations from every phishing campaign, organizations increasingly turn to phishing simulations. Simulations provide information security teams need to educate employees to better recognize and avoid real-life phishing attacks.

article thumbnail

China Publishes Draft Regulations on Protecting the Security of Key Information Infrastructure

Hunton Privacy

According to the Draft Regulations, this may include network facilities and information systems operated and managed by (1) government agencies and entities in the energy, finance, transportation, water conservation, health care, education, social insurance, environmental protection and public utilities sectors; (2) information networks, such as telecommunications (..)

article thumbnail

Top GRC Tools & Software for 2021

eSecurity Planet

Data privacy regulations like the EU’s General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) can be hard to navigate for businesses of any size, but GRC tools can simplify and streamline compliance with all of the requirements. Privacy governance and management. Back to top.