article thumbnail

GDPR compliance checklist

IBM Big Data Hub

However, GDPR compliance is not necessarily a straightforward matter. The stakes are high, and the GDPR imposes significant penalties for non-compliance. The only data processing activities exempt from the GDPR are national security or law enforcement activities and purely personal uses of data.

GDPR 86
article thumbnail

Turn up the volume with Table Top Exercises

OpenText Information Management

MITRE released a new edition of its book on “the way security operations is done”, 11 Strategies of a World-Class Cybersecurity Operations Center.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Containers Complicate Compliance (And What To Do About It)

The Security Ledger

If you work within the security industry, compliance is seen almost as a dirty word. Here, we see it’s all too common for organizations to treat testing compliance as a checkbox exercise and to thereby view compliance in a way that goes against its entire purpose. Read the whole entry. »

article thumbnail

How FIDO 2 authentication can help achieve regulatory compliance

Thales Cloud Protection & Licensing

How FIDO 2 authentication can help achieve regulatory compliance. Businesses are governed by an increasingly complex network of regulations, jurisdictions, and standards which dictate security and privacy requirements. As such, FIDO2 can become an enabler for regulatory compliance. Compliance with GDPR and CCPA.

article thumbnail

CCPA compliance: A sustainable approach

Collibra

Businesses are required to give consumers notice explaining their privacy practices and not discriminate against consumers for exercising their rights under the CCPA. CCPA compliance requirements. Social security, driver’s license, and passport numbers. The requirements for CCPA compliance include: . IP addresses.

article thumbnail

China: Navigating China episode 17: China’s Draft Privacy and Security Laws – second drafts clarify compliance steps for businesses

DLA Piper Privacy Matters

Second drafts of the new overarching national personal data protection and data security laws have just been published, and give a clearer picture of the impending new national frameworks in China. regularly publishing reports on the organisation’s data protection compliance. Draft Data Security Law.

article thumbnail

Guest Post - Three Critical Steps for GDPR Compliance

AIIM

You might also be interested in: Mitigate Data Privacy and Security Risks with Machine Learning. The Privacy and Security Dichotomy. GDPR Compliance Starts with Data Discovery. Compliance with GDPR is just a short five months away. This is the eighth post in a series on privacy by Andrew Pery. Step 1: Data Discovery.

GDPR 83