Remove 10
Remove 2013 Remove Data collection Remove Government Remove Groups
article thumbnail

The Week in Cyber Security and Data Privacy: 22 – 28 April 2024

IT Governance

The company has fixed the issue, blaming it on a vulnerability in the app’s groups feature. Data breached: >35 million people’s data. Publicly disclosed data breaches and cyber attacks: full list This week, we found 5,255,944,117 records known to be compromised, and 128 organisations suffering a newly disclosed incident.

article thumbnail

CNIL Fines Google and Amazon 135 Million Euros for Alleged Cookie Violations

Hunton Privacy

The French cookie rules are laid down in (1) Article 82 of the French Data Protection Act, which implements into French law the provisions of the EU ePrivacy Directive governing the use of cookies; and (2) soft law instruments aimed at guiding operators in implementing Article 82 of the French Data Protection Act in practice.

GDPR 102
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Burden of Privacy In Discovery

Data Matters

Most of that focus has centered on data collection, storage, sharing, and, in particular, third-party transactions in which customer information is harnessed for advertising purposes. Could a party, for instance, decline to produce, review, or even collect certain types of data due to privacy concerns?

Privacy 97
article thumbnail

Predictions 2017: A Chain Reaction

John Battelle's Searchblog

2017 will be the year the industry is cast as a villain – for its ravenous and largely opaque data collection practices, its closed and self-serving approach to its own platforms, and its refusal to acknowledge or address the very real externalities, particularly in employment , created by its products and services.

article thumbnail

An Approach to Cybersecurity Risk Oversight for Corporate Directors

Data Matters

Increasingly, thought leaders, professional organizations, and government agencies are beginning to provide answers. Creating an enterprise-wide governance structure. Creating an Enterprise-Wide Governance Structure. Aligning cyber risk with corporate strategy. Designing an Enterprise-Level Approach.