article thumbnail

Connecticut Tightens its Data Breach Notification Laws

Data Protection Report

The amendment: Expands the definition of “personal information”; Shortens the notification deadline after discovery of a breach from 90 to 60 days; Removes the requirement to consult with law enforcement as part of a risk assessment; Deems compliant any person subject to and in compliance with HIPAA and HITECH; and.

article thumbnail

Colorado Amends Data Breach Notification Law and Enacts Data Security Requirements

Hunton Privacy

Applicability: The information security and disposal provisions of the Bill apply to “covered entities,” defined as persons that maintain, own or license personal identifying information in the course of the person’s business, vocation or occupation.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

China Publishes Draft Measures for Security Assessments of Data Transfers

Hunton Privacy

The Cybersecurity Law of China , which was passed in November of 2016, introduced a data localization requirement requiring “operators of key information infrastructure” to retain, within China, critical data and personal information which they collect or generate in the course of operating their business in China.

article thumbnail

The Pushmi-Pullyu Impact of Technology Innovation on Information Preservation

AIIM

So here's a quick definition of terms for those mystified by the title of this post. Of course, this was all back around 1995 -- about the time I joined AIIM -- and family research was a far different kettle of fish than it is now. Give our new course a look. That was enough to get me going. Ancestry.co.uk That needs to change.

article thumbnail

The Week in Cyber Security and Data Privacy: 5 – 11 February 2024

IT Governance

Only 2 definitely haven’t had data breached. Fortinet brushes off DDoS claims Despite going viral, a story that 3 million electric toothbrushes were hacked and used as a botnet to conduct DDoS (distributed-denial-of-service) attacks is, of course, untrue. Organisation(s) Sector Location Data breached?

article thumbnail

New Leak Shows Business Side of China’s APT Menace

Krebs on Security

A large cache of more than 500 documents published to GitHub last week indicate the records come from i-SOON , a technology company headquartered in Shanghai that is perhaps best known for providing cybersecurity training courses throughout China. Danowski believes the i-SOON data was probably leaked by one of those disgruntled employees.

article thumbnail

The Hacker Mind: Hacking Aerospace

ForAllSecure

So I'd say it's definitely possible. So I definitely think it's possible. And of course, when you say things like that you get a lot of press. So I think that's a fairly short version of what got us there, but it's definitely a good detail and the background of it and I'm just amazed and seeing all these things come together.