Remove Case Study Remove Definition Remove IT Remove Security
article thumbnail

UK ICO Publishes New Report on Neurotechnology and Warns of “Real Danger” of  Discrimination

Hunton Privacy

The ICO is in the process of developing guidance on the topic, which will, among other things, consider the interpretation of core legislative and technical neurotechnology definitions, link to existing ICO guidance where appropriate, and provide case studies.

Risk 55
article thumbnail

How to become an ISO 27001 lead implementer

IT Governance

It’s an advanced cyber security position that comes with a lot of responsibility. You’ll be given a combination of theoretical study and hands-on work, including group discussions, practical exercises and case studies. How to manage and drive continual improvement under ISO 27001. How much does the exam cost?

Risk 66
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How IBM Planning Analytics can help fix your supply chain

IBM Big Data Hub

IBM Planning Analytics, or TM1 as it used to be known, has always been a powerful upgrade from spreadsheets for all kinds of planning and reporting use cases, including financial planning and analysis (FP&A), sales & operations planning (S&OP), and many aspects of supply chain planning (SCP).

article thumbnail

Why Is TAR Like a Bag of M&M’s?, Part Four: eDiscovery Best Practices

eDiscovery Daily

Tom has also written several terrific informational overview series for CloudNine, including eDiscovery and the GDPR: Ready or Not, Here it Comes (which we covered as a webcast ), Understanding eDiscovery in Criminal Cases (which we also covered as a webcast ) and ALSP – Not Just Your Daddy’s LPO.

article thumbnail

Summary – “Blockchain Technology and Recordkeeping”

ARMA International

The first one is Project ARCHANGEL, which combines computer vision and artificial intelligence techniques to fingerprint visual records using blockchain technology as a curation tool and as a means of securing content against tampering during the custody of the record. What could blockchain records retention look like?

article thumbnail

A Case Study: Implementing a Db2 for z/OS Implicit Trusted Connection

Robert's Db2

First, the backstory: the DBA's organization wanted to tighten Db2 for z/OS data security by preventing unauthorized utilization of the authentication credentials used by an application to connect to a Db2 system. These Db2 features work together to shut down the potential security exposure just described. How does this work?

article thumbnail

Ireland: New DPC Guidance Sets Regulatory Expectations around Use of Website Cookies

DLA Piper Privacy Matters

a misunderstanding of the definitions contained in ePrivacy laws on which cookies are exempt from the consent requirement. a misunderstanding of the definitions contained in ePrivacy laws on which cookies are exempt from the consent requirement. DPC Concerns and Recommendations.

GDPR 59