article thumbnail

UK ICO Publishes New Report on Neurotechnology and Warns of “Real Danger” of  Discrimination

Hunton Privacy

The ICO is in the process of developing guidance on the topic, which will, among other things, consider the interpretation of core legislative and technical neurotechnology definitions, link to existing ICO guidance where appropriate, and provide case studies.

Risk 55
article thumbnail

How to become an ISO 27001 lead implementer

IT Governance

It’s an advanced cyber security position that comes with a lot of responsibility. You’ll be given a combination of theoretical study and hands-on work, including group discussions, practical exercises and case studies. We also offer a Live Online version of this course. What is a lead implementer’s salary?

Risk 66
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How IBM Planning Analytics can help fix your supply chain

IBM Big Data Hub

The need to collaborate, share data and agree on definitions across organizational boundaries and systems. I also encourage you to join the IBM Business Analytics live stream event on October 25 th , to hear more case studies on how businesses have used Planning Analytics to accelerate data-driven business decision making.

article thumbnail

Why Is TAR Like a Bag of M&M’s?, Part Four: eDiscovery Best Practices

eDiscovery Daily

They should be construed, administered, and employed by the court and the parties to secure the just, speedy, and inexpensive determination of every action and proceeding. (emphasis added). I am most interested in pointing out that few if any studies or case law opinions address the issue of inexpensive.

article thumbnail

A Case Study: Implementing a Db2 for z/OS Implicit Trusted Connection

Robert's Db2

First, the backstory: the DBA's organization wanted to tighten Db2 for z/OS data security by preventing unauthorized utilization of the authentication credentials used by an application to connect to a Db2 system. These Db2 features work together to shut down the potential security exposure just described. How does this work?

article thumbnail

Summary – “Blockchain Technology and Recordkeeping”

ARMA International

The first one is Project ARCHANGEL, which combines computer vision and artificial intelligence techniques to fingerprint visual records using blockchain technology as a curation tool and as a means of securing content against tampering during the custody of the record. The final chapter is called “Blockchain Standards and Best Practices.”

article thumbnail

Welcome to Legaltech New York 2020!: eDiscovery Trends

eDiscovery Daily

Case studies where DApps have been successfully deployed. Case studies where RegTech has been successfully deployed. Priming up on the solution landscape in data privacy & security. Review actual case metrics and statistical breakdowns of different workflows and their impact on the review process.