From data collection to data consumption

IBM Big Data Hub

Not every startup is going to become a world-changing behemoth, but when a small, agile company hits on a truly disruptive idea, it can transform an entire industry

Better data collection and management key for digital transformation

Information Management Resources

But IT personnel too often feel they lack the skills, technology and bandwidth to create the data-centric foundation needed. Data acquisition Data integration Data transparency Data management Data visualization Data discovery

German regulator orders Facebook to restrict data collection

The Guardian Data Protection

User consent will be required before combining WhatsApp and Instagram account data Germany’s anti-monopoly regulator has ordered Facebook not to combine user data from its WhatsApp, Instagram and Facebook apps without consent, after a major three-year investigation into potentially anti-competitive actions. The federal cartel office announced on Thursday that it would be giving the technology company 12 months to change its data policies.

GCHQ data collection violated human rights, Strasbourg court rules

The Guardian Data Protection

GCHQ Privacy UK security and counter-terrorism UK news Data protection Edward SnowdenUK agency breached right to privacy in programme revealed by Edward Snowden, judges say GCHQ’s methods in carrying out bulk interception of online communications violated privacy and failed to provide sufficient surveillance safeguards, the European court of human rights has ruled in a test case judgment.

CFPB's Mulvaney to Warren: Breaches justified data-collection halt

Information Management Resources

Acting Consumer Financial Protection Bureau Director Mick Mulvaney has cited hundreds of confirmed and suspected data breaches as justification for his halting the bureau's data collection activities last month. Law and regulation Compliance Data security Data breaches Mick Mulvaney Elizabeth Warren CFPB

89% of Android Users Didn't Consent to Facebook Data Collection

Dark Reading

A new survey shows most Android users did not give Facebook permission to collect their call and text data

House Passes Bill Limiting NSA Data Collection

Hunton Privacy

3361 , a bill aimed at limiting the federal government’s ability to collect bulk phone records and increasing transparency regarding decisions by the Foreign Intelligence Surveillance Court (“FISC”). The bill is designed to prohibit the bulk collection of telephone records by the National Security Agency, but if it becomes law, the federal government still would have access to individuals’ phone records. On May 22, 2014, the United States House of Representatives passed H.R.

Narrowing the Scope of Slack Collections: Stop Trying to Drink From a Firehose

Hanzo Learning Center

Slack ediscovery ESI scope data collection legal hold preservation capture native format productionPicture this: you’re in a busy open-concept office space. There are clusters of people everywhere, hard at work, but they’re all chattering nonstop.

Federal District Judge Ruling Casts Cloud Over NSA Data Collection

Hunton Privacy

On December 16, 2013, the United States District Court for the District of Columbia granted a preliminary injunction barring the federal government from collecting and analyzing metadata related to two consumers’ mobile phone accounts. The court held that the two individual plaintiffs were entitled to a preliminary injunction because they had standing to challenge the government’s data collection practices and were substantially likely to succeed on the merits of their claim.

Massive Online Data Collection Class Action Lawsuit Moves Forward

Hunton Privacy

s petition to appeal class certification in a litigation related to comScore software that allegedly collected extensive data from consumers’ computers without authorization. The plaintiffs alleged that comScore (an online analytics company) gathered data from consumers’ computers through software that it bundled with third-party software, such as free screensavers, games, music-copying programs and greeting card templates.

NTIA Seeks Comment on New, Outcome-Based Privacy Approach

HL Chronicle of Data Protection

The RFC proposes seven desired outcomes that should underpin privacy protections: Transparency, control, reasonable minimization (of data collection, storage length, use, and sharing), security, access and correction, risk management, and accountability. Yesterday, the U.S.

Second Circuit Rules that NSA Phone Data Collection Not Authorized by PATRIOT Act

Hunton Privacy

Court of Appeals for the Second Circuit sided with the American Civil Liberties Union, holding that the National Security Agency’s (“NSA’s”) collection of metadata relating to domestic phone records is not permitted under the PATRIOT Act. This ruling overturns a December 2013 Southern District of New York decision finding that the NSA’s telephone data collection program is lawful under Section 215 of the PATRIOT Act. On May 7, 2015, the U.S.

800K Patient Records At Issue in ProCare Health Snafu

Threatpost

Cloud Security Privacy consent data collection New Zealand patient records privacy commissioner procareIT companies allege that one of New Zealand’s largest networks of doctors and nurses has been storing hundreds of thousands of sensitive patient records, without express consent.

IT 54

OnStar Announces Reversal of Controversial Vehicle Data Collection Proposals

Hunton Privacy

On September 27, 2011, OnStar announced it was reversing proposed changes to its Terms and Conditions that would have allowed the company to continue to receive data from former subscribers’ vehicles unless they specifically opted out. OnStar recently notified customers by email that it would continue to collect data from former subscribers, and that it reserved the right to distribute such data to third parties.

NTIA Seeks Comment on New, Outcome-Based Privacy Approach

HL Chronicle of Data Protection

The RFC proposes seven desired outcomes that should underpin privacy protections: Transparency, control, reasonable minimization (of data collection, storage length, use, and sharing), security, access and correction, risk management, and accountability. Yesterday, the U.S.

NTIA Seeks Comment on New, Outcome-Based Privacy Approach

HL Chronicle of Data Protection

The RFC proposes seven desired outcomes that should underpin privacy protections: Transparency, control, reasonable minimization (of data collection, storage length, use, and sharing), security, access and correction, risk management, and accountability. Yesterday, the U.S.

Data Integration: Taming the Beast of Healthcare

Perficient Data & Analytics

To accomplish this, operational data has to be extracted and integrated. Integrating clinical data at this level of detail requires a (wait for it) monstrous effort. To satisfy these complex reporting and analysis requirements requires finding the needed data in many operating systems then merge it all together in a usable way. Lack of expertise in these areas can adversely affect the quality, accuracy and usability of a data warehouse.

California Consumer Privacy Act: The Challenge Ahead — Key Terms in the CCPA

HL Chronicle of Data Protection

Accordingly, a number of otherwise exempt companies could be read as covered under the CCPA if they collect the personal information of 50,000 or more consumers in California, and households or devices nationwide. Businesses must also make no attempts to reidentify the data. Collection.

Sales 52

Web Vulnerabilities Up, IoT Flaws Down

Dark Reading

The number of flaws found in WordPress and its associated plugins have tripled since 2017, while Internet of Things vulnerabilities dropped significantly, according to data collected by Imperva

IoT 94

Facebook's '10 Year Challenge' Is Just a Harmless Meme—Right?

WIRED Threat Level

Opinion: The 2009 vs. 2019 profile picture trend may or may not have been a data collection ruse to train its facial recognition algorithm. But we can't afford to blithely play along. Security Opinion

Mortgage Records: A Good Time to Review Storage Processes

InfoGoTo

Your system needs to be able to collect and store all customer loan details, including communications with customers, data collected on customer finances, work history and the like. It also needs to be able to collect and store property details, including title, appraisal, property tax, insurance and other relevant information. All data collection and storage needs to be done in a secure manner, so that only authorized personnel have access.

The legal risks of using artificial intelligence in brick-and-mortar retail

Information Management Resources

There are three main legal issues where retailers need to observe caution—data collection, bias and ownership. Artificial intelligence Machine learning Data strategy

The 5 top trends for data governance strategies in 2019

Information Management Resources

At the heart of all things data-oriented is the concept of data governance, which calls for proper protocols for data collection, storage, management, security and processing. Data governance Data management Data strategy

China’s Data Protection Laws Go Further Than GDPR

InfoGoTo

Though much of the news concerning China and data protection in recent months has featured Chinese threat actors, the country’s citizens are often targets, too. China’s data protection laws have been presented as a response to the data security threats facing the nation. They join China’s existing Cyber Security Law, which went into effect in June 2017, helping to bring its previous data protection regulations into the 21st century.

Get a jump start on real-time analytics and insights

IBM Big Data Hub

Unlock the trusted information about your customers with MDM and empower your business analysts to search, explore and match with other data collections with governed freedom

MDM 92

How Artificial Intelligence Will Yield a Gusher of Benefits for Energy Companies

InfoGoTo

Machine learning software can comb through unstructured information like emails, as well as semi-structured information like maintenance reports, to identify and classify data. Engineers can then take advantage of natural language processing to query the data in the same way they would interact with a search engine. Using the same data capture techniques noted above, historical records can be loaded into a searchable database for engineers to query and learn from.

Cambridge Analytica Shook Up the Way We View Data Privacy—and Ediscovery Collections

Hanzo Learning Center

After 2018, companies may never view online data collection in the same way again. social media collection social media archiving social media Facebook native format Compliance Cambridge Analytica WARC web archive API

What constitutes a complete intelligent forms platform?

OpenText Information Management

In fact, many off-the-shelf forms applications lack the capabilities to develop complete end-to-end data collection forms that can solve everything from simple to complex business problems.

Google Pulls Data-Chugging App From iOS Devices

Threatpost

A day after Facebook was dinged for shady iOS distribution techniques of its data-collecting research app, Google was discovered using the same methods for its own app.

Machine learning enables physical activity data to be re-identified

Information Management Resources

Current practices for de-identifying data collected from wearable devices are insufficient to ensure patient privacy, finds study. Machine learning Data privacy Artificial intelligence Wearable technology HIPAA regulations Protected health information

Study 60

The Risks of Skipping Data Backup: No Fallback for Disaster

Record Nations

The amount of data collected and analyzed each day is constantly growing and will continue to grow as we move into the future. The post The Risks of Skipping Data Backup: No Fallback for Disaster appeared first on Record Nations. Data Backup

Risk 72

How the General Data Protection Regulation (GDPR) Helps Improve RIM Policies and Processes

InfoGoTo

A good incentive to update and strengthen your organization’s records and information management (RIM) policies is the looming threat of fines upwards of 20 million euros, courtesy of the European Union’s General Data Protection Regulation (GDPR) , which became effective on May 25, 2018.

GDPR 91

Privacy and Security of Data at Universities

Schneier on Security

The boundaries between research and grey data are blurring, making it more difficult to assess the risks and responsibilities associated with any data collection. Many sets of data, both research and grey, fall outside privacy regulations such as HIPAA, FERPA, and PII.

At this high-tech farm, the boss is an AI algorithm

Information Management Resources

The daily to-do list’s author isn’t human; it’s a piece of proprietary software that uses reams of data collected at the indoor farm to make important decisions: how much to water each plant, the intensity of light required, when to harvest and so forth. Artificial intelligence Machine learning Data strategy

Senior Democrats to Mulvaney: Stop 'starving' CFPB of consumer data

Information Management Resources

Though Mick Mulvaney has restarted the agency's data collection process, Sens. Elizabeth Warren and Mark Warner said collecting more information was the key to writing better rules. Dodd-Frank Policymaking Elizabeth Warren Mark Warner Mick Mulvaney CFPB

Cashing in on the monetization opportunities of edge data

Information Management Resources

Benefits need to be framed less around the implications of data collection and downstream analysis, and more about direct actions made possible from employee to action. Data visualization Data management Data mining Data discovery

5 ways to turn data into insights and revenue with cognitive content analytics

IBM Big Data Hub

Many companies are expected to pursue data management, advanced analytics and cognitive computing to stay competitive and drive revenue.

Children’s Commissioner’s report calls on firms to be transparent about collection of children’s data

IT Governance

The Who Knows What report from the Office of the Children’s Commissioner for England draws attention to the vast amount of data that is shared and collected about today’s children. You can read more about data subject’s rights under the GDPR here. Cyber Security data

GDPR 101: Keeping Data Safe Throughout the 'Supply Chain'

Dark Reading

There are a lot of moving pieces involved with data collection, retention, and processing in the EU's new General Data Protection Regulation. Here's how to break down responsibilities between your security team and service providers

Collection #1 Mega Breach Leaks 773 Million Email Accounts

Adam Levin

The breached data, dubbed “Collection #1” by cybersecurity expert Troy Hunt , is more than 87 gigabytes and contains roughly 773 million email address and 21 million unique passwords. The post Collection #1 Mega Breach Leaks 773 Million Email Accounts appeared first on Adam Levin.