Remove 10
Remove 2017 Remove Computer and Electronics Remove Government Remove Privacy Remove Security
article thumbnail

The Burden of Privacy In Discovery

Data Matters

With the proliferation of social media platforms and other new technologies has come a renewed legal focus on privacy. Could a party, for instance, decline to produce, review, or even collect certain types of data due to privacy concerns? But what about other contexts? In this essay, Robert D.

Privacy 97
article thumbnail

Me on the Equifax Breach

Schneier on Security

Hearing on "Securing Consumers' Credit Data in the Age of Digital Commerce". 1 November 2017. Mister Chairman and Members of the Committee, thank you for the opportunity to testify today concerning the security of credit data. My name is Bruce Schneier, and I am a security technologist. Before the. Washington, DC 20515.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Strengthening cybersecurity in life sciences with IBM and AWS

IBM Big Data Hub

Cloud computing offers the potential to redefine and personalize customer relationships, transform and optimize operations, improve governance and transparency, and expand business agility and capability. In 2017, 94% of hospitals used electronic clinical data from their EHR.

article thumbnail

Part 2: OMG! Not another digital transformation article! Is it about the evolution from RIM to Content Services?

ARMA International

This means imagining the “art of the possible” for a new future using a cloud computing model to deliver transformative change. This part will also discuss managing CS risks such as ransomware, privacy, change management, and user adoption. Introduction. What are traditional RIM practices?

article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Here are the top Twitter accounts to follow for the latest commentary, research, and much-needed humor in the ever-evolving information security space. Security enthusiast and Linux evangelist Binni Shah consistently offers valuable tutorials, guides, and insights for the cybersecurity community. Binni Shah | @binitamshah.

article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

This means imagining the “art of the possible” for a new future using a cloud computer model to deliver transformative change. This part also discusses managing CS risks such as ransomware, privacy, change management, and user adoption. Finally, Part 3 looks to the future, presents next steps, and discusses key takeaways. Introduction.

article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

What follows below is an edited version of the debate in the House of Lords of the Second Reading of the Data Protection Bill, held on 10 October. When we do the weekly supermarket shop online, we should be able to move our shopping list electronically. change it substantially.

GDPR 120