article thumbnail

CIPL Publishes New White Paper on the Approach of British Columbia, Canada to Cross-Border Data Transfers by Public Sector Bodies

Hunton Privacy

On June 10, 2022, the Centre for Information Policy Leadership at Hunton Andrews Kurth published a white paper entitled “ Local Law Assessments and Online Services – Refining the Approach to Beneficial and Privacy-Protective Cross-Border Data Flows A: Case Study from British Columbia.”

Paper 101
article thumbnail

European Data Protection Board Issues Final Schrems II Recommendations

Data Matters

The European Data Protection Board (“ EDPB ”), adopted on 18 June 2021 its final recommendations describing how controllers and processors transferring personal data outside the European Economic Area (“ EEA ”) may comply with the Schrems II ruling (“ Final Schrems II Recommendations ”). STEP 1 – Mapping Exercise.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Microsoft fixed Azure AD bug that led to Bing.com results manipulation and account takeover

Security Affairs

” reads the post published by security firm Wiz. “Those attacks could compromise users’ personal data, including Outlook emails and SharePoint documents.” Those attacks could compromise users’ personal data, including Outlook emails and SharePoint documents.” ” continues the analysis.

CMS 76
article thumbnail

5 best online cyber security training courses and certifications in 2020

IT Governance

With the coronavirus pandemic keeping us stuck inside and struggling to find ways to remain productive, now might be the perfect time to take an online cyber security training course. Let’s take a look at five of the best online courses for cyber security. Certified Cyber Security Foundation Training Course.

article thumbnail

1,859 Android and iOS apps were containing hard-coded Amazon AWS credentials

Security Affairs

In some cases, the presence of the access keys has no specific reason, in other cases, they are part of testing and never removed code. “The credentials could expose private authentication data and keys belonging to every banking and financial app using the SDK. were exposed in the cloud.” Pierluigi Paganini.

Cloud 92
article thumbnail

ICO Consultation on Draft AI Auditing Framework Guidance for Organizations

Hunton Privacy

The Guidance contains advice on how to understand data protection law in relation to artificial intelligence (“AI”) and recommendations for organizational and technical measures to mitigate the risks AI poses to individuals. It also provides a methodology to audit AI applications and ensure they process personal data fairly.

article thumbnail

CCPA and the future of the health data economy

Collibra

Over the next few years, the compliance requirements around personal healthcare data are set to evolve at breakneck speed. Surviving and thriving in this environment of regulatory change will require a more strategic approach to managing personal data. Exploring CCPA and healthcare data.