Remove Computer and Electronics Remove Education Remove Insurance Remove Study
article thumbnail

Me on the Equifax Breach

Schneier on Security

For over 30 years I have studied the technologies of security and privacy. I am a board member of the Electronic Frontier Foundation, AccessNow, and the Tor Project; and an advisory board member of Electronic Privacy Information Center and VerifiedVoting.org. Just one of the data brokers studied holds information on more than 1.4

article thumbnail

Debut of the Texas State Records Retention Schedule (RRS): 5th Edition – 5/10/2020

The Texas Record

2.1.001 Processing Files These types of records should be classified under Master Files and Application Data (2.1.002) and Computer Software Programs (2.1.007), as applicable. 2.2.004 Computer Job Schedules and Reports This type of record should be classified under Activity Reports (1.1.069). What do we need to keep longer?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

This means imagining the “art of the possible” for a new future using a cloud computer model to deliver transformative change. There are many customer acquisition, engagement, and retention models, as well as studies describing the costs of finding new customers versus retaining them. One such model is illustrated in Figure 4.

article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

When we do the weekly supermarket shop online, we should be able to move our shopping list electronically. This becomes very onerous if you are doing a long study. If you think that your data has been anonymised, according to the computational privacy group at Imperial College, you will be wrong.

GDPR 120