Remove 11
Remove 2019 Remove Compliance Remove Government Remove Manufacturing
article thumbnail

2019 end-of-year review part 1: January to June

IT Governance

A royal baby, a fire at Notre-Dame, the highest grossing film of all time and more than 12 billion breached data records: 2019 has been quite a year. IT Governance is closing out the year by rounding up 2019’s biggest information security stories. IT Governance released its final Weekly Podcast.

article thumbnail

Use/non-use

InfoGovNuggets

“China Grounds All Boeing 737 MAX 8 Jets After Ethiopian Airlines Crash,” The Wall Street Journal , March 11, 2019. I have also changed the categories that I am using to tag posts, with the Big Three: Information, Governance, and Compliance.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

One-Month Countdown to Pass CCPA Amendments Begins

Data Protection Report

Next, AB 874 would redefine “personal information” to exclude information from government records. Key issues: (1) Will CCPA place any conditions on information that is publicly available from government records, such as limiting its use only to the purpose for which the information is publicly maintained? (2)

article thumbnail

State of the Union: CCPA and Beyond in 2020

Data Protection Report

To understand the various approaches to CCPA compliance, we reviewed the websites of 50 companies in the Fortune 500® and noticed a few trends: Most companies do not have a “Do Not Sell My Personal Information” Button on their homepage. Many companies are not in full compliance with the proposed regulations. Ballot Initiative.

Privacy 49
article thumbnail

Weekly podcast: 2018 end-of-year roundup

IT Governance

Hello and welcome to the final IT Governance podcast of 2018. The year started with the revelation of Spectre and Meltdown – major security flaws affecting processors manufactured by Intel, ARM and AMD. This week, in our last podcast of the year, we revisit some of the biggest information security stories from the past 12 months.

article thumbnail

China’s First Data Protection Measures Lifting Its Veils

HL Chronicle of Data Protection

On May 28, 2019, the Cyberspace Administration of China (“ CAC “) released the draft Measures on the Administration of Data Security (“ Data Security Measures ” see our in-house English translation here ) for public consultation. The scope of application of the Data Security Measures.

article thumbnail

The Week in Cyber Security and Data Privacy: 22 – 28 January 2024

IT Governance

Compromised data includes victims’ names, addresses, phone numbers and Aadhaar numbers (a 12-digit government identification number). It remains unclear how the data breach occurred, but the attackers apparently suggested it was the result of “exploiting vulnerabilities within government databases of telecommunication systems”.