Webinar: Case Studies on Information Governance in Microsoft 365 | 1:00pm ET on April 2, 2020

IG Guru

VP of Information Governance, IGS, an Access Company and Atle Skjekkeland, CEO, Infotechtion Attend this session to learn how global enterprises with up to 90,000 staff are using Office 365 for information governance, records management and information privacy and protection. The post Webinar: Case Studies on Information Governance in Microsoft 365 | 1:00pm ET on April 2, 2020 appeared first on IG GURU. Presented by John Isaza, Esq.,

eRecords 2018: “A Case Study in Data Mapping – Are You Ready for a New Norm?”

The Texas Record

Privacy – Confidential Information; Risk; PCI; PII. Before taking on this project, apply the lessons learned from KPMG case study so you do not encounter the same issues that slowed them down. Due to the complexity of information in its various forms, your local government offices and state agencies may need to create a records management data map, showing the location of the records within your organization.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Bringing Control to Information in a Cloud-First, Office 365 World: New IGI Case Study

IGI

We recently launched our new series of case studies about how professionals like you are tackling IG. In the first Snapshot we looked at how privacy compliance and IG work hand-in-hand to reduce risk and increase information value. You can read this use case and others here. IG Snapshots are compact case studies drawn from IGI’sinterviews and discussions with our community of IG practitioners.

Risk 20

Today We are Launching a new Series of Information Governance Case Studies

IGI

We are pleased to bring the IGI community another series of case studies about how professionals like you are tackling IG. IG Snapshots are compact case studies drawn from IGI’s interviews and discussions with our community of IG practitioners. Our first Snapshot focuses on the interplay between IG and privacy by telling the story of Sarah, an attorney in a large pharmaceutical company who leveraged GDPR compliance momentum to build a broader IG program.

CIPL Publishes Article on COVID-19 as a Case Study for Privacy Accountability

Hunton Privacy

On April 14, 2020, the Centre for Information Policy Leadership (“CIPL”) at Hunton Andrews Kurth LLP published an article entitled “ COVID-19 Meets Privacy: A Case Study for Accountability ” (the “Article”). Nor should the common good have to trump privacy.

Retail Privacy Network

Data Matters

You are invited to join privacy professionals in the retail sector for topical conversation, learning and networking at the first Retail Privacy Network meeting. This interactive meeting will include hot topics in UK/EU data privacy and cybersecurity with practical case studies on retail industry issues. The post Retail Privacy Network appeared first on Data Matters Privacy Blog.

EUROPE: New privacy rules for connected vehicles in Europe?

DLA Piper Privacy Matters

These draft guidelines highlight the data protection risks related to such applications, with general recommendations regarding the processing of personal data in relation to the non-professional use of connected vehicles and present some use cases. Following the EDBP, the introduction of connected vehicles is associated with various privacy and data protection risks. The proliferation of Internet connection interfaces via Wi-Fi poses greater risks to the privacy of individuals.

Privacy and Cybersecurity May 2019 Events

HL Chronicle of Data Protection

Bret Cohen will speak on the Privacy Bar Section Forum panels, “Working Across Borders: Partnering and Vetting,” and “Case Study: How Working Across Borders Worked for Me,” during the 2019 IAPP Global Summit. Cybersecurity and Privacy: Can They Coexist? News & Events AI cybersecurity Hacking privacy TCPAPlease join us for our May events. May 1. IAPP Global Summit.

MER 2019 – CALL FOR PRESENTERS

IG Guru

We are looking for presentations on solutions to the IG challenges created by new and emerging technologies, the latest legal and regulatory developments that affect IG programs and professionals, practical advice and guidance on traditional IG challenges, and relevant case studies […].

FOIA 52

FTC Releases Summary of Workshop on Privacy Disclosures

Hunton Privacy

The workshop, which was held on September 15, 2016, examined ways of testing and evaluating company disclosures regarding advertising claims and privacy practices. The workshop covered disclosure effectiveness, case studies and future approaches, and applications to disclosure design. On November 30, 2016, the FTC released a staff summary (the “Summary”) of a public workshop called Putting Disclosures to the Test.

APEC Privacy Update – Beijing Meetings

Hunton Privacy

On August 6-10, 2014, the APEC Data Privacy Subgroup (“DPS”) and its parent committee, the Electronic Commerce Steering Group (“ECSG”), met in Beijing, China, for another round of negotiations, meetings and workshops. The principal focus of the meetings was again on the further implementation of the APEC Cross-Border Privacy Rules (“CBPR”) system and related work relevant to cross-border interoperability. Cross-Border Privacy Rules for Processors.

Q&A: The troubling implications of normalizing encryption backdoors — for government use

The Last Watchdog

These technologists are in in full agreement with privacy and civil rights advocates who argue that this is a terrible idea. This lack of privacy is what we see in China, Russia and North Korea, where the government sees and inspects everything. And that is really dangerous to individual privacy; it just absolutely tilts the balance of power completely towards a centralized surveillance capability – and away from the individual. In this case it’s an encryption key.

e-Records 2020 Call for Presentations

The Texas Record

The conference gathers records management and information technology staff from the state and local level together to learn from each other by sharing case studies, solutions, best practices, challenges, and lessons learned. This year the annual e-Records conference is online!

Centre Discusses the Risk-Based Approach to Privacy and APEC-EU Interoperability at IAPP Brussels

Hunton Privacy

At the International Association of Privacy Professionals’ (“IAPP’s”) recent Europe Data Protection Congress in Brussels, the Centre for Information Policy Leadership at Hunton & Williams (the “Centre”) led two panels on the risk-based approach to privacy as a tool for implementing existing privacy principles more effectively and on codes of conduct as a means for creating interoperability between different privacy regimes.

APEC Privacy Committee Meets to Discuss CBPR System and EU Cooperation

Hunton Privacy

From January 30 to February 3, 2015, the APEC Data Privacy Subgroup (“DPS”) and its parent committee, the Electronic Commerce Steering Group (“ECSG”), met in Subic Bay, Philippines, for another round of negotiations and meetings. APEC Privacy Recognition for Processors. The case studies explored the usefulness of the Referential and how companies can leverage their prior work to seek approval in one system to gain approval in the other system.

In-Person Event: A Perfect Storm? Panel Discussion on Handling a Cybersecurity Incident

HL Chronicle of Data Protection

Through an interactive case study, the panel will examine the key challenges that companies face before, during, and after a cybersecurity attack, including cybersecurity preparedness, incident response, notification requirements, and litigation and regulatory enforcement risk. Peter Marta. Arwen Handley. Philip Parish. Nicola Fulford.

Risk 43

Security Affairs newsletter Round 258

Security Affairs

addresses two zero-days exploited in the wild Microsofts case study: Emotet took down an entire network in just 8 days New Coronavirus-themed campaign spread Lokibot worldwide. A new round of the weekly newsletter arrived! The best news of the week with Security Affairs.

Destroying Barriers to Destruction

InfoGoTo

While there’s a case to be made that more destruction is occurring because of new business demands, I’m not confident that much will have changed in the intervening two years since the last survey. A CEO of a global tech company recently told me that it’s his mission to define the minimum amount of data his business requires for ML and AI in order to contain costs and reduce exposure of data to privacy and security risk.

e-Records 2019 Call for Presentations

The Texas Record

The one-day conference gathers records management and information technology staff from the state and local level together to learn from each other by sharing case studies, solutions, best practices, challenges, and lessons learned. The annual e-Records Conference will be held Friday, November 15, 2019. The theme this year is Better Together in a Digital World: Security and Retention. We want to you to speak at e-Records 2019.

CCPA and the future of the health data economy

Collibra

Not surprisingly, today most individuals do not understand when their healthcare data is protected by data privacy rules and when it is not. Now, the advent of new state-level data privacy laws, such as the California Consumer Privacy Act (CCPA), and the possibility of a comprehensive federal level law means it’s likely that those gaps in regulatory coverage will be filled, creating a range of new compliance requirements.

FTC Releases Report on Facial Recognition Technology

Hunton Privacy

The report focuses on privacy concerns associated with facial recognition technology, which is becoming increasingly ubiquitous across a variety of commercial applications ranging from search engines to video games to password authentication. These best practices are based on the principles contained in the FTC’s March 2012 report on privacy and include: (1) privacy by design, (2) simplified consumer choice and (3) transparency.

CCPA and the future of the health data economy

Collibra

Not surprisingly, today most individuals do not understand when their healthcare data is protected by data privacy rules and when it is not. Now, the advent of new state-level data privacy laws, such as the California Consumer Privacy Act (CCPA), and the possibility of a comprehensive federal level law means it’s likely that those gaps in regulatory coverage will be filled, creating a range of new compliance requirements.

What Can We Learn About the IG Profession from the ARMA InfoCon 2020 Taxonomy

ARMA International

Since a taxonomy is a reflection of what it organizes, in this case we’re reflecting our profession. Dark data : There is a case to be made that this should have been added last year, but we deferred then, and have added it this year.

ROT 59

ICO Consultation on Draft AI Auditing Framework Guidance for Organizations

Hunton Privacy

As such, AI systems will inevitably involve trade-offs between privacy and other competing rights and interests. A short overview is provided of some of the most notable trade-offs that organizations are likely to face when designing or procuring AI systems, including privacy and statistical accuracy, statistical accuracy and discrimination, explainability and statistical accuracy, and explainability, exposure of personal data, and commercial security.

Risk 51

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

According to a recent Ponemon Institute study , some 59% of companies experienced a third-party data breach in 2018, yet only 16% believe they are effectively mitigating third-party risk. Privacy Shield , as well as the new EU privacy rules known as General Data Protection Regulation or GDPR. Members gain access to third-party IT security risk management best practices via case studies, surveys, whitepapers, webinars, meetings and conferences.

Risk 119

Regulatory Update: NAIC Fall 2018 National Meeting

Data Matters

At issue is the applicability of the Supreme Court of Pennsylvania’s decision in the case of Warrantech Consumer Products Services, Inc. Instead, RITF decided to monitor developments in the pending cases and to research the extent to which the Pennsylvania statute at issue in Warrantech differs from similar laws in other states. The post Regulatory Update: NAIC Fall 2018 National Meeting appeared first on Data Matters Privacy Blog.

Paper 65

Wednesday LTNY 2020 Sessions: eDiscovery Trends

eDiscovery Daily

There are several interesting sessions today related to eDiscovery, Information Governance, Cybersecurity and Data Privacy. 11:00am – 12:00pm: Mobile Data: Issues in Data Privacy and Data Protection. Key takeaways: Key privacy issues posed by mobile data.

Welcome to Legaltech New York 2020!: eDiscovery Trends

eDiscovery Daily

There are several interesting sessions today related to eDiscovery, Information Governance, Cybersecurity and Data Privacy. Case studies where DApps have been successfully deployed. In just 10 years the case law around eDiscovery AI & Analytics has exploded.

Summary – “Blockchain Technology and Recordkeeping”

ARMA International

The chapters respond to, and are structured according to, an initial set of questions from the AIEF’s call for proposals for a study on blockchain, records, and information management. Chapter 9 , “Blockchain Technology and Privacy,” discusses how society’s notions of records privacy arose when records were in paper form. but the proliferation of digital records has necessitated new tools for managing privacy.

(Discussion Recap) A Perfect Storm? Panel Discussion on Handling a Cybersecurity Incident

HL Chronicle of Data Protection

The panel’s key messages for clients included the following: Data security and privacy are mission critical and should be discussed at the most senior levels of the organisation. Peter Marta. Arwen Handley. Philip Parish. Nicola Fulford. On Tuesday, 3 March 2020, we welcomed our financial services clients in London to a lively panel event, which covered the multitude of issues which arise in a cybersecurity incident.

CNIL Adopts Referentials On DPO Certification

Hunton Privacy

According to the CNIL, this consultation helped it strike “the most appropriate balance” between the knowledge and skills that a DPO must have and the expectations of privacy professionals. Candidates also will need to successfully complete a written test that will consist of at least 100 multiple choice questions, 30% of which will be presented in the form of case studies.

GDPR 61

How did we do on the Chief Information Governance Officer (CIGO) Summit?

Barclay T Blair

In one area we could have done better, but I knew that would be the case going in and will explain why. Believe me, this process is not fun and I had many painful conversations with excellent consultants and experts (personal friends in many cases) as to why they could not attend. in each case, higher than 4 out of 5). Hard numbers and soft skills: Great case studies, roadmaps and networking toward elevating the information governance stewardship.

Welcome to Legaltech New York 2019!: eDiscovery Trends

eDiscovery Daily

Our session will explore best practices of data management and issues relating to document retention, records management, litigation hold policies, legal preservation, data privacy, and discovery management. 4:00pm – 5:00pm: Cross-Border Investigations: Protecting the Privilege and Meeting Privacy Expectations. Data privacy in global investigations: compliance with local law, including GDPR in Europe.

Ireland: New DPC Guidance Sets Regulatory Expectations around Use of Website Cookies

DLA Piper Privacy Matters

Common issues included: setting overly long and unreasonable life spans on cookies; placing pre-ticked boxes on landing pages; poorly designed cookie banners; the absence of distinct cookie polices, separate from general website privacy policies; and. The guidance acknowledges that although some of the information within a cookie policy and a privacy notice may overlap, it is best practice to maintain both. John Magee & Eilis McDonald.

GDPR 43

Resourceful Records Managers! Courtney Bailey, Chair, SAA Records Management Section 2019-2020

The Schedule

Whenever I had the opportunity to focus my own research, I tried to focus on a topic that would fill in a gap for me, and in this case, I looked into records management in the business arena. You can find all the details in the case study I wrote for the Government Records Section.). I also think maintaining privacy is a big challenge for records management, especially as more and more records are created and maintained electronically.

Thursday LTNY 2019 Sessions: eDiscovery Trends

eDiscovery Daily

Hear lessons learned and case studies on: (i) the record classification of 1.5 In this session, highly experienced lawyers and technologists will discuss the major cases and trends from 2018 and will address practical measures organizations can take to try to reduce their risks of breaches and resultant legal liability. 3:00pm – 4:00pm: 2018 CA Consumer Privacy Act: The Big Tail Wagging the U.S.

Cloud 30

Can Enterprises execute a GRC Movement?

Security Affairs

Governance Risk and Compliance (GRC) is about managing your enterprise data effectively but with data comes its security and privacy concerns too. Which means the threat to people and their privacy would always increase! Are applications or use cases of GRC platforms or products for enterprises going to be different for different organisations? If yes then what kind of use cases? You would want to renegotiate your corporate privacy policy!

Risk 69

SAA Session Overviews- Post #1! Session 702 (“Documenting Current Events and Controversial Topics”)

The Schedule

Contextual approach to privacy ,” which includes questions such as, “What do content creators believe about their right to privacy on the web? How does their personal context shape their understanding and expectations of privacy and anonymity?”. Social network theory of privacy”, which emphasizes that users’ “expectations regarding their privacy [is]…based on the number, depth, and breadth of connections that users have on the web”. Author: Steven Gentry.

ALL Data as a Service (DaaS/BDaaS) - EAs in a New Role, as DaaS Enablers

Interactive Information Management

The EA scope includes a heavy focus on enterprise "universal" information management and governance, infused (particularly in the Public Sector) with the currently vogue philosophies of SOA, Open Data, Mobility, Privacy-by-Design (PbD) and Cloud Computing. That's where we're headed, inexorably - you'd like to know what's going on with your systems, what your customers or constituents need, or perhaps the latest metrics concerning device utilization trends during business events.

Legaltech 2019 Preview Edition: eDiscovery Trends

eDiscovery Daily

Next week during the show, I’ll cover the sessions each day that relate to eDiscovery, Information Governance, Cybersecurity and Data Privacy to give you a complete sense of options. The panel will share case studies covering the lifecycle of an AI solution, from assessing contractual risk issues to upstream/downstream customization of the tools to developing internal champions who will ensure adoption. OK, everybody gets hung up on Legalweek vs. Legaltech®.