Remove category
Remove Conference Remove Events Remove Insurance Remove Privacy
article thumbnail

Regulatory Update: NAIC Summer 2020 National Meeting

Data Matters

The National Association of Insurance Commissioners (NAIC) held its Summer 2020 National Meeting (Summer Meeting) from July 27 to August 14, 2020. As a result of the COVID-19 pandemic, the NAIC held the Summer Meeting in a virtual format, with conference calls taking place over a three-week period. GCC Template and Instructions.

article thumbnail

How to Find & Choose IT Outsourcing Services

eSecurity Planet

However, a search for IT outsourcing, MSP, VAR, or a similar sub-category will produce many more results about the topic than potential candidates. or cybersecurity-focused trade shows (RSA Conference, Black Hat, etc.) Email Address By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy.

IT 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SEC Chair: Sweeping New Cybersecurity Rules Are Coming Soon

Data Matters

On Monday, January 24, 2022, in a speech at the Northwestern University Pritzker School of Law annual Securities Regulation Institute conference, Gary Gensler, Chair of the U.S. 3 Chair Gary Gensler, Remarks at 2021 FINRA Annual Conference , SEC (May 20, 2021), [link]. 24, 2022), [link]. 20, 2021), [link]. 30, 2021), [link].

article thumbnail

2019 eDiscovery Case Law Year in Review, Part 3

eDiscovery Daily

Today, let’s take a look back at cases related to disputes regarding proportionality vs. relevancy vs. privacy. PROPORTIONALITY vs. RELEVANCY vs. PRIVACY. We grouped those cases into common subject themes and will review them over the next few posts. Perhaps you missed some of these? Now is your chance to catch up!

article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

This part also discusses managing CS risks such as ransomware, privacy, change management, and user adoption. Thus, common tools and techniques are risk matrices, risk registers, risk logs, risk breakdown structures, risk categories, Monte Carlo simulations, and sensitivity analyses. Jurisdiction and Privacy Data Risks.

article thumbnail

Join Our Webinar on November 16th: IGI & Preservica Address the Governance of Long-Term Digital Information

IGI

Every organization had at least a few categories of information that they keep long-term, whether that was 25+ years, permanently or indefinitely until a future trigger event. And more than a few of my clients had dozens of categories of content that internal and external stakeholders expect will be managed well into the future.

article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

The new right to be forgotten will allow children to enjoy their childhood without having every personal event, achievement, failure, antic or prank that they posted online to be digitally recorded for ever more. Of course, as new rights like this are created, the Bill will ensure that they cannot be taken too far.

GDPR 120