Remove category security-breach
article thumbnail

Information Security vs Cyber Security: The Difference

IT Governance

You’ll often see the terms cyber security and information security used interchangeably. In this blog, we explain what information security and cyber security are, the differences between them and how they fit into your data protection practices. What is information security? This is cyber security.

article thumbnail

What is data loss and how does it work?

IT Governance

Data loss refers to the destruction of sensitive information. It’s a specific type of data breach, falling into the ‘availability’ category of data security (the other two categories being ‘confidentiality’ and ‘integrity’). What causes data loss? Computer viruses. Human error.

IT 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

China’s PIPL has finally arrived, and brings helpful clarification (rather than substantial change) to China’s data privacy framework

DLA Piper Privacy Matters

Instead the PIPL is a robust data privacy framework designed to safeguard individuals’ personal data against abuse, but at the same time to reflect cultural and business attitudes to data in China, as well as new technologies (including advances in AI, biometrics and data analytics), and to enable flows of personal data.

article thumbnail

The Burden of Privacy In Discovery

Data Matters

Relatively recent advances in technology — smartphones and social media, in particular — have allowed businesses to collect, store, and find ways to monetize far more personal data than ever before. Private matters were discoverable by default, even where the privacy interests were significant and the relevance only marginal.

Privacy 97
article thumbnail

If You’re a Cloud Provider or Consumer, Consider These Guidelines on How to Conduct Yourself in Europe: eDiscovery Best Practices

eDiscovery Daily

While we were preparing to eat turkey and stuff ourselves with various goodies last week, the Cloud Security Alliance (CSA) provided an important guideline for compliance with the European Union General Data Protection Regulation (GDPR). Transfer of personal data to third countries.

Cloud 40
article thumbnail

Cyber Blackmail: More Than Just Ransomware

The Texas Record

We are happy to welcome guest writers from the Texas Department of Information Resources, Daniel Hankins, Shared Services Security Manager and Andy Bennett, Director Information Security Governance. The first category is a new twist on an old criminals’ favorite: blackmail-based extortion. Ransomware Hits CDOT Computers.

article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

Data is not just a resource for better marketing, better service and delivery. Data is used to build products themselves. It has become a cliché that data is the new oil. When we do the weekly supermarket shop online, we should be able to move our shopping list electronically.

GDPR 120