Remove category cyber-insurance
article thumbnail

German court: monitoring of employees by key logger is not allowed

Data Protection Report

Subsequently, the firm installed key logger software on its employees’ computers. When reviewing the files created by the software, the employer became aware that an employee had used his work computer for private purposes during working hours and, thereupon, terminated the employment relationship.

article thumbnail

What IG Professionals Should Know About the Internet of Bodies

ARMA International

Another common name for the IoB is embodied computing , where the human body is used as a technology platform. Additionally, cyber-attacks against the human body through the devices is a real (and terrifying) threat. Wearable technology began as any kind of electronic device designed to be worn on the user’s body.

article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

This means imagining the “art of the possible” for a new future using a cloud computer model to deliver transformative change. Thus, common tools and techniques are risk matrices, risk registers, risk logs, risk breakdown structures, risk categories, Monte Carlo simulations, and sensitivity analyses. Cloud-first “Mind-shift”.