article thumbnail

Data Protection: Where’s the Brexit Privacy Dividend?

Data Protector

Removing the UK from the decision-making structures of the EU should also result in the UK Government feeling able to update other privacy legislation, such as the outdated Privacy & Electronic Communications Regulations, without having to delay for years and years until EU countries managed to reach a political consensus on the way ahead.

Privacy 156
article thumbnail

U.S. Supreme Court to Weigh in on Extraterritorial Search Warrant Dispute

Data Matters

government’s request for review of a lower court decision that rejected the government’s construction of the Stored Communications Act (SCA) and embraced a more restrictive view that Microsoft had advanced, backed by much of the tech industry and many privacy groups. officials, by using computers and personnel based in the United States.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What is data loss and how does it work?

IT Governance

Reminding employees to exercise caution and to back up information wherever possible will mitigate this risk. Unlike desktop computers, laptops don’t have extra covers to protect them from water damage, which increases your risk of electronic components short circuiting. Computer viruses.

IT 98
article thumbnail

Saudi Arabia’s New Data Protection Law – What you need to know

DLA Piper Privacy Matters

The Central Bank and the Communications and Information Technology Commission (CITC) both appear to maintain their jurisdiction to regulate data protection within their remit. Some of these steps include: Conduct a data mapping exercise. Do you have alternative methods by which you can communicate with that team?

article thumbnail

FRANCE: NEW GUIDELINES FOR COOKIES AND AN ACTION PLAN FOR ONLINE TARGETED ADVERTISING

DLA Piper Privacy Matters

The new guidelines apply to all types of operations aiming to gain access through electronic transmission to information stored on the subscriber or user terminal or to store information in such terminal. ii) F rom soft opt-in to active consent.

GDPR 40
article thumbnail

What Counts as “Good Faith Security Research?”

Krebs on Security

Department of Justice (DOJ) recently revised its policy on charging violations of the Computer Fraud and Abuse Act (CFAA), a 1986 law that remains the primary statute by which federal prosecutors pursue cybercrime cases. In a statemen t about the changes, Deputy Attorney General Lisa O.

Security 245
article thumbnail

If You’re a Cloud Provider or Consumer, Consider These Guidelines on How to Conduct Yourself in Europe: eDiscovery Best Practices

eDiscovery Daily

While we were preparing to eat turkey and stuff ourselves with various goodies last week, the Cloud Security Alliance (CSA) provided an important guideline for compliance with the European Union General Data Protection Regulation (GDPR).

Cloud 40