Remove Communications Remove Data preservation Remove IT Remove Privacy
article thumbnail

Now You See Them, Now You Don’t: Regulatory Risks of Ephemeral Messages

Data Matters

Corporate use of ephemeral messaging applications (communications that disappear after a set time) has become increasingly common across the globe in recent years, with companies recognizing its value in decreasing data storage costs and providing employees a convenient method for communicating quickly with customers and clients.

Risk 68
article thumbnail

European Data Protection Supervisor Publishes 2010 Annual Report; Sets Agenda for the Future

Hunton Privacy

He referenced his recent Opinion in which he concluded that the Data Retention Directive does not meet general EU data protection requirements and that the European Commission should explore the possibility of replacing it with alternative measures such as data preservation through a “quick freeze” procedure.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

European Commission Presents Evaluation Report on Telecommunications Data Retention

Hunton Privacy

The Data Retention Directive requires that, for law enforcement purposes, telecommunications service and network providers (“Operators”) must retain certain categories of telecommunications data (excluding the content of the communication) for not less than six months and not more than two years.

article thumbnail

Another Commentary from The Sedona Conference: eDiscovery Best Practices

eDiscovery Daily

This Commentary is contained within a manageable 43 page PDF document and, as many good TSC commentaries do, includes several guidelines “to help a party meet its duty to preserve discoverable information and to provide pragmatic suggestions and a framework for creating a set of preservation procedures.”

article thumbnail

European Commission Issues New Cloud Computing Strategy

Hunton Privacy

The Commission’s strategy is outlined on a new webpage that includes a communication document and a more detailed staff working paper. The certification schemes will address data protection, especially data portability, and focus on increased transparency of cloud service providers’ security practices. subcontracting.

Cloud 40