US Passes Law Requiring Better Cybercrime Data Collection

Data Breach Today

DOJ, FBI Tasked With Compiling Detailed Stats, Developing Taxonomy to Sort Data U.S. President Joe Biden on Thursday signed into the law the Better Cybercrime Metrics Act, which aims to improve data collection on cybercrimes.

Secret CIA Data Collection Program

Schneier on Security

Two US Senators claim that the CIA has been running an unregulated — and almost certainly illegal — mass surveillance program on Americans. The senator’s statement. Some declassified information from the CIA. No real details yet

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Technical Woes Hamper California's COVID-19 Data Collection

Data Breach Today

Expired Credentials, Server Outage Lead to Inaccurate Tally An expired digital certificate for Quest Diagnostics, a major test provider, and several technology woes temporarily prevented the state of California from receiving timely COVID-19 lab test data, resulting in an inaccurate tally of cases

Modernizing data collection with OpenText EnCase Information Assurance

OpenText Information Management

cloud collection data collection data preservation ediscovery Information Assurance modern attachment modern data collection Security Cloud CE 22.2

Modern data collection imperatives in today’s remote reality

OpenText Information Management

Modern data collection for eDiscovery has always been demanding. While remote activities associated with data collection are nothing … The post Modern data collection imperatives in today’s remote reality appeared first on OpenText Blogs.

The seven critical requirements for modern data collection

OpenText Information Management

This blog looks at the … The post The seven critical requirements for modern data collection appeared first on OpenText Blogs. Discovery eDiscovery ediscovery modern data collection software

Avast Announces Termination of Data Collection Subsidiary

Adam Levin

Avast will phase out Jumpshot, a subsidiary that sells user browsing data gleaned from its antivirus and security products. . “I The article resulted in a torrent of negative publicity for the company, especially for its promise to deliver data on “every search.

From data collection to data consumption

IBM Big Data Hub

Not every startup is going to become a world-changing behemoth, but when a small, agile company hits on a truly disruptive idea, it can transform an entire industry

Biometric Data Collection Demands Scrutiny of Privacy Law

Dark Reading

An IT lawyer digs into the implications of collecting biometric data, why it can't be anonymized, and what nations are doing about it

Data Collection and Business Intelligence (BI)

Import.IO

Data & Business Intelligence: Connecting The Dots What key data points are you tracking against your buyer personas or go-to-market strategy? Business Intelligence Data Extraction Automated Web Data Collection business intelligence software Competitive Intelligence Price Intelligence

ThreatList: Google’s Advertising Network Dominates Global Data Collection

Threatpost

With DoubleClick, Analytics and AdWords under its belt, Google continues dominating when it comes to global data collection for advertising, a new report found. Most Recent ThreatLists Privacy Adsense Advertising advertising network AdWords Analytics aol advertising data collection DoubleClick google moat tracking

UN warns of impact of smart borders on refugees: ‘Data collection isn't apolitical’

The Guardian Data Protection

Migration and development Global development Technology Refugees Facial recognition Human rights World news Coronavirus Data protection

Microsoft Products Under EU Investigation About Data Collection

Dark Reading

A new inquiry aims to determine whether contracts between Microsoft and EU organizations violate GDPR

GDPR 66

John Oliver on Data Brokers

Schneier on Security

John Oliver has an excellent segment on data brokers and surveillance capitalism. Uncategorized data collection national security policy privacy video

Poland and Lithuania fear that data collected via FaceApp could be misused

Security Affairs

Many security experts are warning of the risks of using the popular app, threat actors could be potentially interested in data collected by FaceApp. Poland’s digital affairs ministry is investigating into the app and it is evaluating the security risks posed by FaceApp to the personal data of its users. FaceApp CEO Yaroslav Goncharov attempted to reassure privacy advocates by explaining that Russian authorities did not have access to any user data.

The Dark Sides of Modern Cars: Hacking and Data Collection

Threatpost

How features such as infotainment and driver-assist can give others a leg up on car owners. Privacy Vulnerabilities Web Security Audi BMW Charlie Miller Chris Valasek driverless vehicles electronic control units smart cars Society of Automotive Engineers

89% of Android Users Didn't Consent to Facebook Data Collection

Dark Reading

A new survey shows most Android users did not give Facebook permission to collect their call and text data

Surveillance of Your Car

Schneier on Security

TheMarkup has an extensive analysis of connected vehicle data and the companies that are collecting it. Uncategorized cars data collection privacy surveillance

Sales 107

What Happens With the Data Collected by Doorbell Cameras?

Zapproved

The post What Happens With the Data Collected by Doorbell Cameras? Best Practices Ediscovery Security Technology data privacy doorbell camera news reaction technologyappeared first on Zapproved.

Better data collection and management key for digital transformation

Information Management Resources

But IT personnel too often feel they lack the skills, technology and bandwidth to create the data-centric foundation needed. Data acquisition Data integration Data transparency Data management Data visualization Data discovery

Colorado Passes Consumer Privacy Law

Schneier on Security

Uncategorized data collection data protection privacyFirst California. Then Virginia. Now Colorado. Here’s a good comparison of the three states’ laws.

Questions remain over whether data collected by Covidsafe app could be accessed by US law enforcement

The Guardian Data Protection

Law (Australia) Privacy Australian politics Coronavirus outbreak Australia news Marise Payne Peter Dutton Technology Coalition Data protection Australian foreign policy Amazon

Strong security defense starts with prioritizing, limiting data collection

Information Management Resources

Some businesses hold large volumes of personal data because they believe it’s necessary for comprehensive identity and credential verification, but this practice can be risky. Data security Cyber security Cyber attacks Data privacy GDPR

GCHQ data collection violated human rights, Strasbourg court rules

The Guardian Data Protection

GCHQ Privacy UK security and counter-terrorism UK news Data protection Edward SnowdenUK agency breached right to privacy in programme revealed by Edward Snowden, judges say GCHQ’s methods in carrying out bulk interception of online communications violated privacy and failed to provide sufficient surveillance safeguards, the European court of human rights has ruled in a test case judgment.

Data collection leads to discrimination and self-censorship, MPs told

The Guardian Data Protection

Human rights committee launches inquiry into right to privacy and digital revolution Widespread data collection practices lead to self-censorship and discrimination even though most users are not fully aware of how much their privacy is being infringed, a parliamentary committee has been warned. Data protection UK news Technology Human rights

Facebook Has No Idea What Data It Has

Schneier on Security

This is from a court deposition : Facebook’s stonewalling has been revealing on its own, providing variations on the same theme: It has amassed so much data on so many billions of people and organized it so confusingly that full transparency is impossible on a technical level.

Crapo, Brown probe Facebook over financial data collection

Information Management Resources

Mike Crapo and Sherrod Brown are asking Facebook about its consumer financial data collection practices as they consider data privacy legislation. Data privacy Data security Data privacy rules Law and regulation Mike Crapo Sherrod Brown Senate Banking Committee Facebook

ProtonMail Now Keeps IP Logs

Schneier on Security

” Uncategorized anonymity courts data collection data protection e-mail privacyAfter being compelled by a Swiss court to monitor IP logs for a particular user, ProtonMail no longer claims that “we do not keep any IP logs.”

Websites that Collect Your Data as You Type

Schneier on Security

A surprising number of websites include JavaScript keyloggers that collect everything you type as you type it, not just when you submit a form. Uncategorized academic papers data collection key logging privacy

German regulator orders Facebook to restrict data collection

The Guardian Data Protection

User consent will be required before combining WhatsApp and Instagram account data Germany’s anti-monopoly regulator has ordered Facebook not to combine user data from its WhatsApp, Instagram and Facebook apps without consent, after a major three-year investigation into potentially anti-competitive actions. The federal cartel office announced on Thursday that it would be giving the technology company 12 months to change its data policies.

CFPB's Mulvaney to Warren: Breaches justified data-collection halt

Information Management Resources

Acting Consumer Financial Protection Bureau Director Mick Mulvaney has cited hundreds of confirmed and suspected data breaches as justification for his halting the bureau's data collection activities last month. Law and regulation Compliance Data security Data breaches Mick Mulvaney Elizabeth Warren CFPB

Commercial Location Data Used to Out Priest

Schneier on Security

A Catholic priest was outed through commercially available surveillance data. There is a whole industry devoted to re-identifying anonymized data. Uncategorized cell phones data collection data mining de-anonymization geolocation privacy surveillance

Mining 111

China’s Olympics App Is Horribly Insecure

Schneier on Security

MY2022 is fairly straightforward about the types of data it collects from users in its public-facing documents. However, as the app collects a range of highly sensitive medical information, it is unclear with whom or which organization(s) it shares this information.

Changes in WhatsApp’s Privacy Policy

Schneier on Security

In 2016, WhatsApp gave users a one-time ability to opt out of having account data turned over to Facebook. Some of the data that WhatsApp collects includes: User phone numbers. Diagnostic data collected from app logs.

Are Fake COVID Testing Sites Harvesting Data?

Schneier on Security

Speculation centered around data harvesting, but that didn’t make sense because it was far too labor intensive for that and — sorry to break it to you — your data isn’t worth all that much. Uncategorized COVID-19 data collection fraud healthcare

Interview with the Head of the NSA’s Research Directorate

Schneier on Security

There’s a lot of talk about quantum computing, monitoring 5G networks, and the problems of big data: The math department, often in conjunction with the computer science department, helps tackle one of NSA’s most interesting problems: big data.

De-anonymization Story

Schneier on Security

The data that resulted in Burrill’s ouster was reportedly obtained through legal means. Carriers were caught in 2018 selling real-time location data to brokers , drawing the ire of Congress. Location data is not anonymous.

Data collection cheat sheet: how Parler, Twitter, Facebook, MeWe’s data policies compare

Security Affairs

CyberNews researchers analyzed data from multiple social platforms like Parler, Twitter, Facebook, MeWe’s to compare data policies. Users would need to read both Triller’s and Quickblox’ privacy policies to get a good idea of how their data is being collected and processed.

TikTok Surreptitiously Collected Android User Data Using Google-Prohibited Tactic

Threatpost

data collection Encryption google mobile apps mobile devices Smartphones tiktok Wall Street JournalApp concealed the practice of gathering device unique identifiers using an added layer of encryption. Government Mobile Security Privacy Android ByteDance Ltd.

Web's 'dark patterns' targeted as U.S. senators take aim at tech data collecting

Information Management Resources

senators introduced a bipartisan bill that would ban 'manipulative' design features and prompts that let large websites 'trick consumers into handing over their personal data.'. Customer data Data privacy Facebook TwitterTwo U.S.