Remove Computer and Electronics Remove Education Remove Personal data Remove Security
article thumbnail

Draft Released in the Philippines Implementing Rules for the Data Privacy Act

Hunton Privacy

Under the IRR, the processing of personal data has to adhere to the principles of transparency, legitimate purpose and proportionality. The IRR defines personal data as personal information, sensitive information and privileged information. The IRR stipulates general principles for data sharing.

article thumbnail

Me on the Equifax Breach

Schneier on Security

Hearing on "Securing Consumers' Credit Data in the Age of Digital Commerce". Mister Chairman and Members of the Committee, thank you for the opportunity to testify today concerning the security of credit data. My name is Bruce Schneier, and I am a security technologist. Before the. Committee on Energy and Commerce.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Weekly podcast: NCSC and Kaspersky, parliamentary passwords and macOS High Sierra (again)

IT Governance

The chief executive of the UK’s National Cyber Security Centre, Ciaran Martin, has warned senior civil servants about using Russian antivirus (AV) software in government departments. In particular we are seeking verifiable measures to prevent the transfer of UK data to the Russian state.”. Here are this week’s stories.

article thumbnail

Your New Neighborhood Library

Information Governance Perspectives

His advocacy work helps libraries secure funding, expand influence within communities, and stay relevant in the digital age. A QUESTION OF CONNECTIVITY They say information is at everyone’s fingertips because of computers and the internet. Today, the issue is more complicated. Where’s the line in the sand?

article thumbnail

If You’re a Cloud Provider or Consumer, Consider These Guidelines on How to Conduct Yourself in Europe: eDiscovery Best Practices

eDiscovery Daily

While we were preparing to eat turkey and stuff ourselves with various goodies last week, the Cloud Security Alliance (CSA) provided an important guideline for compliance with the European Union General Data Protection Regulation (GDPR). With the introduction of GDPR, data protection compliance becomes increasingly risk-based.

Cloud 40
article thumbnail

Uber’s Response to Data Breach? Pay the Hackers to Keep Quiet About It: Cybersecurity Trends

eDiscovery Daily

Hackers stole the personal data of 57 million customers and drivers from Uber last year. Conceal the breach for more than a year, and pay the hackers $100,000 to delete the data (sure they did) and keep quiet about the breach. The personal information of about 7 million drivers was accessed as well, including some 600,000 U.S.

article thumbnail

The Week in Cyber Security and Data Privacy: 26 February – 3 March 2024

IT Governance

Known data breached Pure Incubation Ventures Source (New) Professional services USA Yes 183,754,481 EasyPark Source 1 ; source 2 ; source 3 (Update) Software Sweden Yes 21,100,000 Cutout.Pro Source (New) Software Hong Kong Yes 19,972,829 Optum Source 1 ; source 2 (New) Healthcare USA Yes 6 TB Kumagai Gumi Group Co.,