To get the most from blockchain in government, a sharing mindset is needed

CGI

To get the most from blockchain in government, a sharing mindset is needed. When I was at university earning my Masters in Computer Science, I devoted a lot of my coursework to distributed computing. federal government. Released in April, the playbook helps government organizations envision how blockchain technology can solve a myriad of government challenges. Importance of governance.

What’s a Lawyer’s Duty When a Data Breach Occurs within the Law Firm: Cybersecurity Best Practices

eDiscovery Daily

Right inside the door, you see a handwritten notice on a big whiteboard which says: All network services are down, DO NOT turn on your computers! Electronic Discovery Security

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

#ModernDataMasters: Henrik Liliendahl, Chairman & CTO, Product Data Lake

Reltio

I got good grades in mathematics at school but it was an evening class in secondary school that I took in what was then called EDP (Electronic Data Processing) that got me started. We didn’t even have a computer at that school so the whole class was about things drawn on the blackboard. Then one day we had a trip to a larger college that actually had computers and I was hooked! I was educated in computer engineering but my first job was on the business side.

MDM 46

The Personnel File: Retention & Best Practices

The Texas Record

Every state agency and local government creates and maintains employee records. Local Government Retention Schedule GR. The longest retention period of any personnel record series on both the State and Local Government schedules is: Date of Employee Termination + 75 Years.

Does Your Business Depend on Stronger Election Security?

Adam Levin

If you doubt it, consider the recent Chubb survey , which found a 930% increase in cyber insurance claims filed by businesses alongside this: 75% of respondents believing that their companies had “excellent” or “good” cybersecurity practices.

2019 eDiscovery Case Law Year in Review, Part 3

eDiscovery Daily

DiGiusti granted the “Children” defendants’ Motion to Compel against non-party City of Oklahoma City Police Department (“OCPD”) to comply with the Children’s subpoena of records related to the murder of their father in a civil case with the insurance company. Case Law Electronic Discovery

Weekly podcast: NHS upgrade, $242m Equifax loss and prison hacker jailed

IT Governance

Hello and welcome to the IT Governance podcast for Friday, 4 May 2018. However, a large part of the loss has been offset by the company’s cyber insurance: Equifax announced that it maintains “$125 million of cybersecurity insurance coverage, above a $7.5

List of data breaches and cyber attacks in October 2018 – 44,701,278 records leaked

IT Governance

The representative did a “visual review” of the buckets, as USPS’s internal policy is not to plug any USB sticks into a computer (not all bad practice, eh?), Social insurance numbers. The law will apply to consumer electronics from 2020.

List of data breaches and cyber attacks in October 2018 – 44,701,278 records leaked

IT Governance

The representative did a “visual review” of the buckets, as USPS’s internal policy is not to plug any USB sticks into a computer (not all bad practice, eh?), Social insurance numbers. The law will apply to consumer electronics from 2020.

Podcast Episode 119: EFF on Expanding Researchers Rights and AT&T talks IoT Security Fails

The Security Ledger

In this episode of the podcast, #119: Electronic Frontier Foundation General Counsel Kurt Opsahl joins us to talk about the Coders’ Rights Project. » Related Stories Podcast Episode 117: Insurance Industry Confronts Silent Cyber Risk, Converged Threats Spotlight Podcast: At 15 Cybersecurity Awareness Month Grows with Cyber Risk Spotlight Podcast: 15 Years Later Is Cybersecurity Awareness Month Working?

The debate on the Data Protection Bill in the House of Lords

Data Protector

When we do the weekly supermarket shop online, we should be able to move our shopping list electronically. Banks must still be allowed to process data to prevent fraud; regulators must still be allowed to process data to investigate malpractice and corruption; sports governing bodies must be allowed to process data to keep the cheats out; and journalists must still be able to investigate scandal and malpractice. Perhaps the Government could respond on that point.

GDPR 120

OPC reconsiders its approach to cross-border data transfers with the Equifax decision

Data Protection Report

Any organization governed by the federal Personal Information Protection and Electronic Documents Act (PIPEDA) will have to re-evaluate and likely adjust its approach to such cross-border data transfers, possibly affecting its outsourcing and cloud computing relationships with vendors and related companies. This included social insurance numbers and other sensitive personally identifiable information.

Me on the Equifax Breach

Schneier on Security

Additionally, I am a Fellow and Lecturer at the Harvard Kennedy School of Government --where I teach Internet security policy -- and a Fellow at the Berkman-Klein Center for Internet and Society at Harvard Law School. I am a board member of the Electronic Frontier Foundation, AccessNow, and the Tor Project; and an advisory board member of Electronic Privacy Information Center and VerifiedVoting.org. Testimony and Statement for the Record of Bruce Schneier.

German DPAs Address a Wide Range of Topics at Annual Conference and Adopt Resolutions

Hunton Privacy

The Conference covered the following topics: strengthening data protection law at the national, European and international level; requests to the German government for the next legislative period; strengthening of data protection in the social and health care sector; and. securing electronic communications by implementing and developing end-to-end encryption. During the Conference, the following Resolutions were adopted: Resolution on Requests to the German Government.

HHS Announces Settlements with Health Care System and Medical Research Institute over Potential HIPAA Violations

Hunton Privacy

The HHS’s Office for Civil Rights (“OCR”) began an investigation of North Memorial, a non-profit health care system based in Minnesota, after North Memorial filed a breach report indicating that in September 2011, an unencrypted, password-protected laptop computer containing the protected health information (“PHI”) of 9,947 individuals was stolen from a locked vehicle of an employee of its contractor, Accretive Health (“Accretive”).

2019 end-of-year review part 1: January to June

IT Governance

IT Governance is closing out the year by rounding up 2019’s biggest information security stories. IT Governance released its final Weekly Podcast. That was a disastrous decision, as it reinforced the precedent that if you infect local governments then they will pay up.