Remove about
article thumbnail

What IG Professionals Should Know About the Internet of Bodies

ARMA International

Think about the omnipresent smart phone (now just called phone ), seemingly always in hand, which captures photos, contains apps, and provides location data through GPS, among many other functions. Case law is beginning to address data collection and data privacy issues associated with the IoB. FOOTNOTES. [1]

article thumbnail

Data privacy examples

IBM Big Data Hub

Rules for handling children’s data might become even stricter if the Kids Online Safety Act (KOSA), currently under consideration in the US Senate, becomes law. Finally, the retailer classifies data based on sensitivity levels and applies appropriate controls to each type. Retention policies should also be limited.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

California’s Data Broker Registration Deadline Looming

HL Chronicle of Data Protection

AB 1202 defines “data broker” to mean a “business that knowingly collects and sells to third parties the personal information of a consumer with whom the business does not have a direct relationship,” with limited exceptions for entities subject to FCRA, GLBA, or California’s Insurance Information and Privacy Protection Act.

article thumbnail

Generative AI that’s tailored for your business needs with watsonx.ai

IBM Big Data Hub

The newly launched features and capabilities of watsonx.ai, a capability within watsonx, include new general-purpose and code-generation foundation models, an increased variety of open-source model options, and additional data options and tuning capabilities that can broaden the potential business impact of generative AI.

Risk 88
article thumbnail

The Hacker Mind Podcast: The Internet As A Pen Test

ForAllSecure

Chris Gray of Deep Watch talks about the view from the inside of a virtual SOC, the ability to see threats against a large number of SMB organizations, and the changes to cyber insurance we’re seeing as a result. And if if the threat were distributed through several SMBs, again, how would any of them know.

article thumbnail

Knock, Knock; Who’s There? – IoT Device Identification & Data Integrity Is No Joke

Thales Cloud Protection & Licensing

In this blog, and in one by my colleague Julie Lassabliere from Safelayer Secure Communications , we explore the need for trusted device identification and data integrity in the IoT. I will focus on how to ensure the devices connected to your network are legitimate and who they say they are.

IoT 72
article thumbnail

China’s PIPL has finally arrived, and brings helpful clarification (rather than substantial change) to China’s data privacy framework

DLA Piper Privacy Matters

This aligns with other recent guidance putting clearer parameters around use of biometric data in China). Purposes/Restrictions on Use Collection and processing of data must be directly related to the purpose of processing specified in the privacy notice. Excessive data collection must be avoided.