Remove tag privacy-policy
article thumbnail

$10,000,000 civil penalty for disclosing personal data without consent

Data Protection Report

The claims related to the company’s sharing personal data without consumer consent and making it very difficult for consumers to cancel their subscriptions to this telehealth service. As indicated in the paragraph quoted above, the company collected some very sensitive personal information.

article thumbnail

CHINA: uncertainties helpfully clarified on various key data compliance activities

DLA Piper Privacy Matters

The Draft Measures propose to introduce or flesh out other compliance requirements contained in the PIPL. This will, therefore, require more in-depth privacy notices than businesses may be used to providing in China. International businesses should already have tweaked such existing global policies for China purposes.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Data privacy examples

IBM Big Data Hub

These are just some examples of how organizations support data privacy , the principle that people should have control of their personal data, including who can see it, who can collect it, and how it can be used. One cannot overstate the importance of data privacy for businesses today.

article thumbnail

Guest Post -- GDPR Compliance starts with Data Discovery

AIIM

This is the seventh post in a series on privacy by Andrew Pery. You might also be interested in: Mitigate Data Privacy and Security Risks with Machine Learning. The Privacy and Security Dichotomy. GDPR and Cross Border Data Flows between the EU and the US: Current State of the Law.

GDPR 102
article thumbnail

How Data Governance Protects Sensitive Data

erwin

With more companies increasingly migrating their data to the cloud to ensure availability and scalability, the risks associated with data management and protection also are growing. Data Security Starts with Data Governance. Lack of a solid data governance foundation increases the risk of data-security incidents.

article thumbnail

Work Remotely Without Compromising Your Data

AIIM

IT executives are also implementing new data use policies, deploying artificial intelligence, centralizing content, and restricting unauthorized apps. These measures are about operationalizing security at scale while maintaining productivity so that users have secure access to the data they need to work and collaborate from anywhere.

article thumbnail

Guest Post -- New Global Data  and Privacy Regulations in 2018 and the GDPR

AIIM

Data privacy breaches have been in the news again and again this year, eliciting increased concern from regulators and legislative bodies. But one of the most important data privacy milestones on the horizon in 2018 has its roots far earlier, and has been of utmost concern to multinational organizations.

GDPR 86