Remove 11
Remove 2017 Remove Compliance Remove Examples Remove Financial Services
article thumbnail

CIPL Responds to ICO Call for Views on Creating a Regulatory Sandbox

Hunton Privacy

On October 11, 2018, the Centre for Information Policy Leadership (“CIPL”) at Hunton Andrews Kurth LLP submitted comments to the UK Information Commissioner’s Office (“ICO”) in response to its call for views on creating a regulatory sandbox.

article thumbnail

Cloud, Intelligent Content Services, and Digital Fragility: What’s on the RIM Horizon for 2020

ARMA International

Nineteen percent of RIM programs report into IT (up from 15% in 2017), and 28% into legal (up from 18.5% in 2017), with the remainder reporting into senior administrative roles, compliance, corporate services, or finance teams. In 2017, only 25% of respondents reported they had re-organized their programs.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top 12 Cloud Security Best Practices for 2021

eSecurity Planet

Leading IaaS and platform as a service (PaaS) vendors like Amazon Web Services (AWS) and Microsoft Azure provide documentation to their customers so all parties understand where specific responsibilities lie according to different types of deployment. What compliance requirements does the provider support?

Cloud 132
article thumbnail

U.S. Office of the Comptroller of the Currency Updates Third-Party Relationships Risk Management Guidance

Data Matters

On March 5, 2020, the Office of the Comptroller of the Currency (OCC) issued an updated set of answers to frequently asked questions (FAQs) 1 regarding risk management in national bank relationships with third parties to further supplement its 2013 guidance, OCC Bulletin 2013-29 (the Bulletin), 2 and its 2017 FAQs (Prior FAQs) on the topic.

Risk 68
article thumbnail

Privacy and Cybersecurity Top 10 for 2018

Data Matters

In November 2017, the Supreme Court heard oral arguments in Carpenter v. These cases have been a central part of post-9/11 privacy law. China’s major cybersecurity legislation went into effect 2017, but experts are still unclear on its precise contours and requirements. Robins will certainly be back in play.

article thumbnail

Cybersecurity Standards for the Insurance Sector – A New Patchwork Quilt in the US?

HL Chronicle of Data Protection

For example, the New York Department of Financial Services (‘NYDFS’) in March 2017 issued its Cybersecurity Regulation (23 NYCRR 500) (‘the NYDFS Cybersecurity Regulation’), a groundbreaking and far-reaching regulatory regime focused on financial institutions licensed in New York, including insurance companies.

article thumbnail

Ransomware Protection in 2021

eSecurity Planet

Screenshot example. Expanding on what a ransomware attack looks like, here is an example of how Locky would appear on your desktop. This includes active tagging of workloads, threat hunting , and virus assessments, and consistent evaluation of traffic for mission-critical applications, data, or services. Utilize a CASB.