Remove category
Remove Cybersecurity Remove Education Remove Government Remove Insurance
article thumbnail

ICYMI –December in privacy and cybersecurity

Data Protection Report

On December 9, 2023, the California Privacy Protection Agency (CPPA) met to discuss, among many other topics, three proposed draft regulations that were required by the California Privacy Rights Act (CPRA) amendment to the California Consumer Privacy Act (CCPA): Automated Decision-Making Technology, Cybersecurity Audits, and Risk Assessments.

Privacy 111
article thumbnail

Security Compliance & Data Privacy Regulations

eSecurity Planet

See the Top Governance, Risk and Compliance (GRC) Tools. Relatedly, PIPL outlines some categories of sensitive information that do not receive additional protection under GDPR. See the Best Cybersecurity Awareness Training for Employees. But those aren’t the only laws or regulations that affect IT security teams.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

China Publishes Draft Regulations on Protecting the Security of Key Information Infrastructure

Hunton Privacy

The Cybersecurity Law of China establishes a new category of information infrastructure, called “key [or critical] information infrastructure,” and imposes certain cybersecurity obligations on enterprises that operate such infrastructure. The Draft Regulations will remain open for comment through August 10, 2017.

article thumbnail

U.S. Department of Transportation Issues Third Round of Guidance on Automated Vehicles

Data Matters

notes that the “traditional roles of the Federal Government; State and local governments; and private industry are well suited for addressing automation.” Federal government. To fulfill this role, the guidance lays out three broad categories for federal action: First, AV 3.0 State, local, and tribal governments.

article thumbnail

The Good, Bad, And The Ugly: Key Takeaways From California’s New Privacy Law

Privacy and Cybersecurity Law

The CCPA governs how businesses treat “consumer” “personal information.” Consumers will be permitted to request that a business disclose both the categories and specific pieces of the personal information collected. The business community is already lobbying the California legislature to narrow this definition. What Is Covered?

Privacy 58
article thumbnail

The Good, Bad, And The Ugly: Key Takeaways From California’s New Privacy Law

Privacy and Cybersecurity Law

The CCPA governs how businesses treat “consumer” “personal information.” Consumers will be permitted to request that a business disclose both the categories and specific pieces of the personal information collected. The business community is already lobbying the California legislature to narrow this definition. What Is Covered?

Privacy 58
article thumbnail

What Is Encryption? Definition, How it Works, & Examples

eSecurity Planet

This guide will provide a high level overview of encryption and how it fits into IT through the following topics: How Encryption Works To understand how encryption works, we need to understand how it fits into the broader realm of cryptology, how it processes data, common categories, top algorithms, and how encryption fits into IT security.