Remove Blog Remove Encryption Remove Examples Remove Insurance
article thumbnail

Data privacy examples

IBM Big Data Hub

These are just some examples of how organizations support data privacy , the principle that people should have control of their personal data, including who can see it, who can collect it, and how it can be used. For example, they can decline to have their data shared with third parties while allowing the app to generate personalized offers.

article thumbnail

New York Regulators Call on Insurers to Strengthen the Cyber Underwriting Process

Hunton Privacy

As reported on the Hunton Insurance Recovery blog , on February 4, 2021, the New York Department of Financial Services (“NYDFS”), which regulates the business of insurance in New York, has issued guidelines, in the Insurance Circular Letter No.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to make sure your cyber insurance policy pays out

IT Governance

Cyber insurance is big business these days. Damages incurred by information security incidents generally aren’t covered in commercial insurance policies, so a specific policy is necessary to help cover the costs of things like forensic investigation, incident response and notification procedures. Document an incident response plan.

article thumbnail

Adventures in cyber litigation: Frozen crypto-assets and the role of cyber insurance

Data Protection Report

A few weeks ago, we blogged about the decision of the English High court in AA v. Given the level of interest in the case, we have prepared a deeper-dive into the facts and the implications of the decision, with a focus on the important role played in the case by cyber insurance. Persons Unknown & Ors. This is set out below.

article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

Here is Erin’s Q&A column, which originally went live on OneRep’s well-done blog.) For the first expert interview on our blog, we welcomed Pulitzer-winning investigative reporter Byron V. Erin: Do you think cyber insurance should play a bigger role in companies’ cybersecurity strategies?

article thumbnail

Top 5 Cyber Security Risks for Businesses

IT Governance

In this blog, we look at the top five cyber security risks that businesses face, and explain how you can prevent them. Attackers can guess these details if they know the victim personally or if they’re able to find the information online (for example, by searching for them on a social media site). Poor patch management. Ransomware.

Risk 144
article thumbnail

How to handle a ransomware attack 

IBM Big Data Hub

The photo will expedite the recovery process and help when filing a police report or a possible claim with your insurance company. Hackers know this might be your first instinct, and some types of ransomware notice restart attempts and cause additional harm, like damaging Windows or deleting encrypted files.