article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

OneRep provides a consumer service that scrubs your personal information from Google and dozens of privacy-breaching websites. Organizations can and should get ahead of these compliance trends to gain competitive advantage and to assure long-term viability. Acohido Pulitzer Prize-winning business journalist Byron V.

article thumbnail

UK Tribunal Rules on Direct Marketing ICO Case Against Experian

Hunton Privacy

On February 20, 2023, in the case of Experian Limited v The Information Commissioner , the First-Tier Tribunal in the UK (the “ Tribunal ”) ruled on the ICO’s action to require Experian to make changes to how it processes personal data for direct marketing purposes. Experian appealed the enforcement notice, which was heard by the Tribunal.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

California Bulks Up Security Breach Notification Requirements

Hunton Privacy

Building on existing substitute notification requirements, the law also requires California businesses and persons invoking substitute notice to notify the Office of Privacy Protection within the State and Consumer Services Agency. A general description of the breach incident.

article thumbnail

This is the old ChiefTech blog.: Another Web 2.0 service model risk blown away - Google and Postini

ChiefTech

service model risk blown away - Google and Postini I noticed in this case study about a law firms decision to pick Google Apps for email and collaboration over Microsoft Exchange or IBM Lotus Domino , that they mention Google has acquired a company called Postini (actually back last year ). Sunday, 13 January 2008 Another Web 2.0

Risk 40
article thumbnail

NEW TECH: ‘Passwordless authentication’ takes us closer to eliminating passwords as the weak link

The Last Watchdog

Username and password logins emerged as the go-to way to control access to network servers, business applications and Internet-delivered consumer services. If there ever was such a thing as a cybersecurity silver bullet it would do one thing really well: eliminate passwords. Passwords may have been very effective securing Roman roads.

Passwords 164
article thumbnail

The Week in Cyber Security and Data Privacy: 29 January – 4 February 2024

IT Governance

Source 1 ; source 2 (New) Professional services USA Yes 11,556 Poder Judicial de Santa Cruz Source (New) Legal Argentina Yes 8,732 J.D. Organisation(s) Sector Location Data breached? Given that we can’t know the exact numbers, as it depends on the types of records included (e.g.

article thumbnail

Cloud models for reducing security risks

CGI

In my first blog on this topic, I shared some of the different types of cloud security risks that emerge from cloud services themselves, the data involved in their delivery, accessing cloud services and the unique compliance issues involved with cloud computing. Two of these key approaches are outlined below. . Add new comment.

Cloud 40