Remove 12
Remove 2018 Remove Computer and Electronics Remove Data Remove Privacy
article thumbnail

The Burden of Privacy In Discovery

Data Matters

With the proliferation of social media platforms and other new technologies has come a renewed legal focus on privacy. Most of that focus has centered on data collection, storage, sharing, and, in particular, third-party transactions in which customer information is harnessed for advertising purposes. But what about other contexts?

Privacy 97
article thumbnail

What IG Professionals Should Know About the Internet of Bodies

ARMA International

Once connected, data can be exchanged, and the body and device can be remotely monitored and controlled.” Another common name for the IoB is embodied computing , where the human body is used as a technology platform. As with other connected devices, the tracked data can be hacked, breached, or otherwise exploited.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Belgium Adopts Law Reforming the Belgian Privacy Commission

Hunton Privacy

On January 10, 2018, the Law of 3 December 2017 creating the Data Protection Authority (the “Law”) was published in the Belgian Official Gazette (available in French and Dutch ). The EU General Data Protection Regulation (“GDPR”) provides national data protection authorities with a strengthened enforcement role.

Privacy 55
article thumbnail

FERC Approves NERC’s Supply Chain Risk Management Reliability Standards and Directs NERC to Expand Their Scope

Data Matters

FERC also used the rule to direct NERC to expand scope of the Reliability Standards so that they covered Electronic Access Control and Monitoring Systems (“EACMS”) associated with medium and high impact bulk electric system (“BES”) Cyber Systems. FERC’s final rule, issued on October 18, 2018, closely follows its proposed rulemaking.

Risk 68
article thumbnail

Application Security: Complete Definition, Types & Solutions

eSecurity Planet

Application security is the practice of securing software and data from hackers, whether that application comes from a third party or was developed in house, regardless of where it resides or how it’s accessed. Implement secure server configurations to maintain security and privacy of websites and protect private and sensitive data.

article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Brian Krebs is an independent investigative reporter known for his coverage of technology, malware , data breaches , and cybercrime developments. ICYMI, Equifax forced to pull offline a huge database of consumer data guarded only by credentials "admin/admin" [link] — briankrebs (@briankrebs) September 13, 2017.

article thumbnail

The ‘MartyMcFly’ investigation: Italian naval industry under attack

Security Affairs

Fincantieri who was not involved in the previous ‘MartyMcFly’ attack identified and blocked additional threats targeting their wide infrastructure intercepted on during the week of 20th August 2018, about a couple of months before the ‘MartyMcFly’ campaign. Whois data of “anchors-chain.com”. anchors-chain.com.