article thumbnail

NEW TECH: DigiCert Document Signing Manager leverages PKI to advance electronic signatures

The Last Watchdog

Most of us, by now, take electronic signatures for granted. Yet electronic signatures do have their security limitations. As digital transformation has quickened, it has become clear that electronic signatures are destined to become even more pervasively used to conduct business remotely. Achieving high assurance.

article thumbnail

Acer Philippines disclosed a data breach after a third-party vendor hack

Security Affairs

Acer Philippines disclosed a data breach after employee data was leaked by a threat actor on a hacking forum. Acer Philippines confirmed that employee data was compromised in an attack targeting a third-party service provider. The hacked third-party company manages the Acer employee attendance data.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Data Protection: Where’s the Brexit Privacy Dividend?

Data Protector

One of the Government's core objectives throughout the Brexit negotiations has been to respect data protection rights, slash Brussels' red tape and allow the United Kingdom to be a competitive safe haven for businesses all over the world. No longer might UK privacy pros feel obliged to wait for the publication of weirdly worded EDPB opinions.

Privacy 156
article thumbnail

Notice of employer electronic monitoring

Data Protection Report

who monitors or otherwise intercepts telephone conversations or transmissions, electronic mail or transmissions, or internet access or usage of or by an employee by any electronic device or system, including but not limited to the use of a computer, telephone, wire, radio, or electromagnetic, photoelectronic or photooptical systems.

article thumbnail

New Wave of Website Privacy Lawsuits Under the Pen Register and Trap and Trace Device Theory

Hunton Privacy

of the California Invasion of Privacy Act (“CIPA”). A number of courts have found that the information collected must in itself have a reasonable expectation of privacy. July 27, 2023), the plaintiff alleged that the defendant data broker that provides software development kits to app developers violates section 638.51

Privacy 67
article thumbnail

Large-Scale Collection of Cell Phone Data at US Borders

Schneier on Security

The Washington Post is reporting that the US Customs and Border Protection agency is seizing and copying cell phone, tablet, and computer data from “as many as” 10,000 phones per year, including an unspecified number of American citizens. ports of entry.

article thumbnail

Indonesia Soon to Become the Fifth ASEAN Country to Adapt Data Privacy Laws

Security Affairs

Earlier this year, Indonesia joined the ranks with the first four ASEAN countries including Malaysia, Singapore, Philippines and Thailand to have enacted laws relating to personal data protection. Some key provisions in the draft personal data protection law are: Personal Data. General personal data v. Data controllers v.