article thumbnail

The Week in Cyber Security and Data Privacy: 30 October – 5 November 2023

IT Governance

At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. Most documents date from 2019 and 2020, and contain Social Security numbers, employees’ salaries, birthdates, addresses, phone numbers and other personal data.

article thumbnail

Network Encryption Keeps Our Data in Motion Secure for Business Services

Thales Cloud Protection & Licensing

Network Encryption Keeps Our Data in Motion Secure for Business Services madhav Tue, 07/25/2023 - 04:59 The demand for high-speed networks and fast data transfers is increasing due to cloud adoption, digital transformation, and hybrid work. Why do you need network encryption in business services?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Improve your data relationships with third parties

Collibra

Data is the water that enables digital transformation to flourish and so ensuring an organization has a robust approach to managing its data, including personal data, within third party relationships can morph into a competitive advantage. Exploring third party data relationship risk.

article thumbnail

Dutch DPA Publishes Post-GDPR Complaints Report

Hunton Privacy

On December 13, 2018, the Dutch Data Protection Authority (“ Autoriteit Persoonsgegevens ”) (the “Dutch DPA”) published a report on the complaints it has received since the EU General Data Protection Regulation (“GDPR”) became applicable on May 25, 2018 (the “Report”). View the Report and the press release (in Dutch).

GDPR 59
article thumbnail

Draft E-Commerce Standards Published for Comment in China

Hunton Privacy

On March 22, 2016, the Ministry of Commerce of the People’s Republic of China published drafts of its proposed (1) Specifications for Business Services in Mobile E-commerce (“Mobile E-commerce Specifications”) and (2) Specifications for Business Services in Cross-border E-commerce (“Cross-border E-commerce Specifications”).

article thumbnail

China issues Personal Information Security Specification

Data Protection Report

Although the Specification is not a mandatory regulation, it nonetheless has a key implementing role in relation to China’s Cyber Security Law (“Cyber Security Law”) in respect of protecting personal information in China. Such requirements give rise to significant compliance issues for business operations in China.

article thumbnail

Podcast Episode 123: HaveIBeenPwned’s Troy Hunt on Marriott’s Big Mess and GreatHorn on the Asymmetric Threat of Email

The Security Ledger

And: you’ve heard of Business Email Compromise attacks but what about Business Service Impersonation scams? Hunt’s web site has become something of a first stop for victims of data breaches. It now holds information on more than 5.6