article thumbnail

The Week in Cyber Security and Data Privacy: 30 October – 5 November 2023

IT Governance

At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. When MOVEit was hacked by the Russian Cl0p ransomware gang in May, email addresses and links to government employee surveys were compromised.

article thumbnail

China: new rules on use of algorithms for digital business, data analytics and decision-making

DLA Piper Privacy Matters

The new “Administrative Regulations on Algorithm Recommendation of Internet Business Services” comes into force on 1 March 2022, and will introduce important rules on the use of algorithms when operating digital platforms/websites/apps – including targeted marketing – in China. Authors: Carolyn Bigg , Venus Cheung , Fangfang Song.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to prioritize data strategy investments as a CDO

IBM Big Data Hub

My first task as a Chief Data Officer (CDO) is to implement a data strategy. Over the past 15 years, I’ve learned that an effective data strategy enables the enterprise’s business strategy and is critical to elevate the role of a CDO from the backroom to the boardroom. A data-literate culture.

article thumbnail

Yahoo! Agrees to Settle Data Breach Class Actions with $50 Million Fund and Credit Monitoring

Hunton Privacy

Customer Data Security Breach Litigation pending in the Northern District of California and the parties in the related litigation pending in California state court filed a motion seeking preliminary approval of a settlement related to breaches of the company’s data. had completed an asset sale transaction, pursuant to which Yahoo!

article thumbnail

Draft E-Commerce Standards Published for Comment in China

Hunton Privacy

On March 22, 2016, the Ministry of Commerce of the People’s Republic of China published drafts of its proposed (1) Specifications for Business Services in Mobile E-commerce (“Mobile E-commerce Specifications”) and (2) Specifications for Business Services in Cross-border E-commerce (“Cross-border E-commerce Specifications”).

article thumbnail

California Consumer Privacy Act: The Challenge Ahead — Key Terms in the CCPA

HL Chronicle of Data Protection

The CCPA applies to businesses, service providers, and other third parties. The CCPA does not cover every business. Service Provider. This obligation, insofar as it pertains to a data subject’s deletion rights, will now be expanded to include requests from California residents. Who must comply with the CCPA?

Privacy 40
article thumbnail

5 Ways You Can Get More from Your Terminal Emulator

Rocket Software

For businesses that rely on mainframes, secure access to the data stored there is simply a business requirement. Terminal emulation and host access to these critical resources is key to enabling a range of business processes from serving customers more efficiently to ensuring regulatory compliance. Improve experiences.

Retail 52