From data collection to data consumption

IBM Big Data Hub

Not every startup is going to become a world-changing behemoth, but when a small, agile company hits on a truly disruptive idea, it can transform an entire industry

Better data collection and management key for digital transformation

Information Management Resources

But IT personnel too often feel they lack the skills, technology and bandwidth to create the data-centric foundation needed. Data acquisition Data integration Data transparency Data management Data visualization Data discovery

GCHQ data collection violated human rights, Strasbourg court rules

The Guardian Data Protection

GCHQ Privacy UK security and counter-terrorism UK news Data protection Edward SnowdenUK agency breached right to privacy in programme revealed by Edward Snowden, judges say GCHQ’s methods in carrying out bulk interception of online communications violated privacy and failed to provide sufficient surveillance safeguards, the European court of human rights has ruled in a test case judgment.

CFPB's Mulvaney to Warren: Breaches justified data-collection halt

Information Management Resources

Acting Consumer Financial Protection Bureau Director Mick Mulvaney has cited hundreds of confirmed and suspected data breaches as justification for his halting the bureau's data collection activities last month. Law and regulation Compliance Data security Data breaches Mick Mulvaney Elizabeth Warren CFPB

89% of Android Users Didn't Consent to Facebook Data Collection

Dark Reading

A new survey shows most Android users did not give Facebook permission to collect their call and text data

Narrowing the Scope of Slack Collections: Stop Trying to Drink From a Firehose

Hanzo Learning Center

Slack ediscovery ESI scope data collection legal hold preservation capture native format productionPicture this: you’re in a busy open-concept office space. There are clusters of people everywhere, hard at work, but they’re all chattering nonstop.

NTIA Seeks Comment on New, Outcome-Based Privacy Approach

HL Chronicle of Data Protection

The RFC proposes seven desired outcomes that should underpin privacy protections: Transparency, control, reasonable minimization (of data collection, storage length, use, and sharing), security, access and correction, risk management, and accountability. Yesterday, the U.S.

Data Integration: Taming the Beast of Healthcare

Perficient Data & Analytics

To accomplish this, operational data has to be extracted and integrated. Integrating clinical data at this level of detail requires a (wait for it) monstrous effort. To satisfy these complex reporting and analysis requirements requires finding the needed data in many operating systems then merge it all together in a usable way. Lack of expertise in these areas can adversely affect the quality, accuracy and usability of a data warehouse.

NTIA Seeks Comment on New, Outcome-Based Privacy Approach

HL Chronicle of Data Protection

The RFC proposes seven desired outcomes that should underpin privacy protections: Transparency, control, reasonable minimization (of data collection, storage length, use, and sharing), security, access and correction, risk management, and accountability. Yesterday, the U.S.

NTIA Seeks Comment on New, Outcome-Based Privacy Approach

HL Chronicle of Data Protection

The RFC proposes seven desired outcomes that should underpin privacy protections: Transparency, control, reasonable minimization (of data collection, storage length, use, and sharing), security, access and correction, risk management, and accountability. Yesterday, the U.S.

California Consumer Privacy Act: The Challenge Ahead — Key Terms in the CCPA

HL Chronicle of Data Protection

Accordingly, a number of otherwise exempt companies could be read as covered under the CCPA if they collect the personal information of 50,000 or more consumers in California, and households or devices nationwide. Businesses must also make no attempts to reidentify the data. Collection.

Sales 52

The legal risks of using artificial intelligence in brick-and-mortar retail

Information Management Resources

There are three main legal issues where retailers need to observe caution—data collection, bias and ownership. Artificial intelligence Machine learning Data strategy

Get a jump start on real-time analytics and insights

IBM Big Data Hub

Unlock the trusted information about your customers with MDM and empower your business analysts to search, explore and match with other data collections with governed freedom

MDM 98

Cambridge Analytica Shook Up the Way We View Data Privacy—and Ediscovery Collections

Hanzo Learning Center

After 2018, companies may never view online data collection in the same way again. social media collection social media archiving social media Facebook native format Compliance Cambridge Analytica WARC web archive API

The Risks of Skipping Data Backup: No Fallback for Disaster

Record Nations

The amount of data collected and analyzed each day is constantly growing and will continue to grow as we move into the future. The post The Risks of Skipping Data Backup: No Fallback for Disaster appeared first on Record Nations. Data Backup

How the General Data Protection Regulation (GDPR) Helps Improve RIM Policies and Processes

InfoGoTo

A good incentive to update and strengthen your organization’s records and information management (RIM) policies is the looming threat of fines upwards of 20 million euros, courtesy of the European Union’s General Data Protection Regulation (GDPR) , which became effective on May 25, 2018.

GDPR 79

At this high-tech farm, the boss is an AI algorithm

Information Management Resources

The daily to-do list’s author isn’t human; it’s a piece of proprietary software that uses reams of data collected at the indoor farm to make important decisions: how much to water each plant, the intensity of light required, when to harvest and so forth. Artificial intelligence Machine learning Data strategy

Privacy and Security of Data at Universities

Schneier on Security

The boundaries between research and grey data are blurring, making it more difficult to assess the risks and responsibilities associated with any data collection. Many sets of data, both research and grey, fall outside privacy regulations such as HIPAA, FERPA, and PII.

Senior Democrats to Mulvaney: Stop 'starving' CFPB of consumer data

Information Management Resources

Though Mick Mulvaney has restarted the agency's data collection process, Sens. Elizabeth Warren and Mark Warner said collecting more information was the key to writing better rules. Dodd-Frank Policymaking Elizabeth Warren Mark Warner Mick Mulvaney CFPB

Children’s Commissioner’s report calls on firms to be transparent about collection of children’s data

IT Governance

The Who Knows What report from the Office of the Children’s Commissioner for England draws attention to the vast amount of data that is shared and collected about today’s children. You can read more about data subject’s rights under the GDPR here. Cyber Security data

Cashing in on the monetization opportunities of edge data

Information Management Resources

Benefits need to be framed less around the implications of data collection and downstream analysis, and more about direct actions made possible from employee to action. Data visualization Data management Data mining Data discovery

5 ways to turn data into insights and revenue with cognitive content analytics

IBM Big Data Hub

Many companies are expected to pursue data management, advanced analytics and cognitive computing to stay competitive and drive revenue.

GDPR 101: Keeping Data Safe Throughout the 'Supply Chain'

Dark Reading

There are a lot of moving pieces involved with data collection, retention, and processing in the EU's new General Data Protection Regulation. Here's how to break down responsibilities between your security team and service providers

How Artificial Intelligence Will Yield a Gusher of Benefits for Energy Companies

InfoGoTo

Machine learning software can comb through unstructured information like emails, as well as semi-structured information like maintenance reports, to identify and classify data. Engineers can then take advantage of natural language processing to query the data in the same way they would interact with a search engine. Using the same data capture techniques noted above, historical records can be loaded into a searchable database for engineers to query and learn from.

114 Million US Citizens and Companies Found Unprotected Online

Adam Levin

The data of 114 million businesses and individuals has been discovered in an unprotected database. Hackenproof, the Estonian cybersecurity company that found the data trove online, announced their discovery on their blog. The data is thought to have originated from Data&Leads, Inc.

Websites Use Session-Replay Scripts to Eavesdrop on Every Keystroke and Mouse Movement

Schneier on Security

The stated purpose of this data collection includes gathering insights into how users interact with websites and discovering broken or confusing pages. This data can't reasonably be expected to be kept anonymous. The security researchers at Princeton are posting.

Recording Now Available: DocuWare Forms Webinar from 26.07.2018

Docuware

Avoiding Incorrect Entries – Defining Default Values – Immediate Forwarding of Collected Data – Structured Collection of Information – Available Anytime, Anywhere. Modern web forms not only simplify, enhance and accelerate data collection.

Facebook apologises for storing draft videos users thought they had deleted

The Guardian Data Protection

Facebook says ‘bug’ resulted in videos being kept, while CEO Mark Zuckerberg hits back at Apple chief Tim Cook’s ‘extremely glib’ attack Facebook continues to deal with the fallout of the Cambridge Analytica files , announcing policy changes and bug fixes aimed at undoing some of the company’s more controversial data collection features.

GUEST ESSAY: California pioneers privacy law at state level; VA, VT, CO, NJ take steps to follow

The Last Watchdog

News of data breaches, data vulnerabilities and compromised private information is released almost daily from businesses both small and large. Legislation has recently been proposed for individual states, addressing data privacy regulations head-on. Vermont recently implemented a law regulating data broker companies that buy and sell personal information. Furthermore, consumers can sue data brokers if they sell any information that causes illegal discrimination.

Apple to Require Privacy Policies for All New Apps and App Updates

Hunton Privacy

The privacy policy must detail what data the app gathers, how the data will be collected and how such data will be used. The policy also must confirm that third parties with whom an app shares user data will provide the same or equal protection of user data as stated in the app’s privacy policy and the App Store Review Guidelines. On August 30, 2018, Apple Inc.

Protonmail hacked …. a very strange scam attempt

Security Affairs

At the time it is not clear if the hacker belongs to a cyber crime gang, it claims to have stolen a “significant” amounts of data from the company. “We hacked Protonmail and have a significant amount of their data from the past few months.

GUEST ESSAY: 5 security steps all companies should adopt from the Intelligence Community

The Last Watchdog

The IC gathers, stores and processes large amounts of data, from a variety of sources, in order to provide actionable information for key stakeholders. And, in doing so, the IC has developed an effective set of data handling and cybersecurity best practices. Businesses at large would do well to model their data collection and security processes after what the IC refers to as the “intelligence cycle.” Collection. Gather raw data from various sources.

UK spy agencies may be circumventing data-sharing law, tribunal told

The Guardian Data Protection

Challenge brought by Privacy International alleges MI5 and MI6 data-sharing regimes and legal oversight system are illegal MI5 and MI6 may be circumventing legal safeguards when they share bulk datasets with foreign intelligence services and commercial partners, a court has been told. Related: UK spy agencies have collected bulk personal data since 1990s, files show Related: MI5 resisting independent oversight of bulk data collection Continue reading.

Facebook logged SMS texts and phone calls without explicitly notifying users

The Guardian Data Protection

Users complain of phone and text data collected by the company despite never having agreed to practice Facebook began logging the text messages and phone calls of its users before it explicitly notified them of its practice, contradicting the company’s earlier claims that “uploading this information has always been opt-in only”. Facebook Technology Social networking Media Data protection Telecoms US news UK news World news

The GDPR: Everything you need to know about data controllers and data processors

IT Governance

Data controllers and data processors are an integral part of the GDPR. The terms ‘data controller’ and ‘data processor’ have been around for years, but it’s only since the EU GDPR (General Data Protection Regulation) took effect that they’ve been scrutinised.

GDPR 102

Visualization Tools Help Put Data to Work

Perficient Data & Analytics

Army claim that clinical data visualization is a key component in the usage and delivery of EHRs because it: Presents data in a pleasing, easy-to-understand manner. Makes digesting and sharing data faster and simpler. Researchers with the U.S.

Tools 62

For 2nd Time in 3 Years, Mobile Spyware Maker mSpy Leaks Millions of Sensitive Records

Krebs on Security

Less than a week ago, security researcher Nitish Shah directed KrebsOnSecurity to an open database on the Web that allowed anyone to query up-to-the-minute mSpy records for both customer transactions at mSpy’s site and for mobile phone data collected by mSpy’s software.

Who's Watching Your Operations?

AIIM

In today’s world data and information of all types is received from many different sources. This data can then be analyzed and matched against the results of what would be considered normal patterns, to determine abnormalities. content analytics machine learning data analytics

Tips 69

Personal data breaches in schools, to report or not to report?

IT Governance

Under the GDPR, all personal data breaches need to be recorded by the organisation and there should be a clear and defined process for doing so. Understanding what constitutes a personal data breach. The ICO defines a personal data breach as. “…a

Trend Micro Apps removed from Mac App Store after being caught exfiltrating user data

Security Affairs

The security researcher that handle the Twitter account Privacy First first reported the alleged unethical behavior and published a video that shows how the app harvest users ‘data. Breaking News Digital ID Security data leak Pierluigi Paganini privacy Security Affairs Trend Micro Apps

5 Ways PDF Solutions Transform Digital Strategy

AIIM

Under these conditions, search is difficult; unused operational information atrophies into “dark data,” or the untapped, operational content that sits idle in our repositories. A Spotlight on Dark Data. pdf Digital business digital transformation, dark data

Weapons

InfoGovNuggets

“Apple CEO Urges Action on Data Misuse,” The Wall Street Journal , October 25, 2018 B1. ” He went on to suggest that the data collection practices of some online advertising companies are the equivalent of government surveillance. Tim Cook wants GDPR-style privacy protections in the US. Claims “[o]ur own information … is being weaponized against us with military efficiency.”

French DPA Publishes a Compliance Pack Regarding Connected Vehicles

Hunton Privacy

On October 17, 2017, the French Data Protection Authority (“CNIL”), after a consultation with multiple industry participants that was launched on March 23, 2016, published its compliance pack on connected vehicles (the “Pack”) in line with its report of October 3, 2016. The data collected in the vehicle is shared outside of the vehicle for the purposes of providing a specific service to the individual ( e.g. , when a pay-as-you-drive contract is purchased from an insurance company).