Remove category online-privacy
article thumbnail

California Assembly Proposes Data Privacy Law for Workers

Hunton Privacy

As reported in the Hunton Employment & Labor Perspectives Blog : Assembly Bill 1651 , or the Workplace Technology Accountability Act, a new bill proposed by California Assembly Member Ash Kalra, would regulate employers and their vendors regarding the use of employee data.

Privacy 108
article thumbnail

Building cyber security careers

IT Governance

Cyber security roles are often technical and require knowledge of the threat landscape, detection/monitoring, technical protection, risk management and cyber incident response. Information security is a broader category that protects all information assets, whether in hard copy or digital form.

Security 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

US dismantled and seized SSNDOB cybercrime marketplace

Security Affairs

An international operation led by the US authorities dismantled and seized the infrastructure of the online marketplace SSNDOB. According to the authorities, the SSNDOB Marketplace has listed the personal information for approximately 24 million individuals in the United States, generating more than $19 million USD in sales revenue. .”

article thumbnail

How to implement the General Data Protection Regulation (GDPR)

IBM Big Data Hub

The General Data Protection Regulation (GDPR), the European Union’s landmark data privacy law, took effect in 2018. Think: an online retailer that stores customers’ email addresses to send order updates. Special category data includes biometrics, health records, race, ethnicity, and other highly personal information.

GDPR 76
article thumbnail

Key steps to GDPR compliance – Part 3

IT Governance

In the first two blogs we set out key steps for starting compliance projects, along with some IT Governance solutions should you need any extra help. This third and final blog covers steps 7–9. This includes record keeping of processing activities and consent, testing information security controls and conducting DPIAs.

GDPR 62
article thumbnail

China Releases Draft Regulations on Network Data Security Management

Hunton Privacy

In this blog post, we discuss several of the key areas addressed by the Draft Regulations. The definition of “data handler” under the Draft Regulations is similar to that of “data controller” in other privacy laws, such as the EU General Data Protection Regulation (“GDPR”). Scope of Jurisdiction. Data Handler and Entrusted Party.

Security 116
article thumbnail

Why risk assessments are essential for GDPR compliance

IT Governance

The goal of any information security risk assessment methodology is to make sure everybody conducting the assessment or interpreting its findings are on the same page. The international standard for information security contains a best-practice framework for evaluating risks and is closely aligned with the GDPR.

GDPR 67