Remove 11
article thumbnail

The Week in Cyber Security and Data Privacy: 16–22 October 2023

IT Governance

Incident details: The company found that data on its network had been encrypted without its knowledge. It turned out that an unauthorised party had accessed and downloaded its business records, including files containing personal data. It’s unclear whether personal data has been breached. Records breached: Unknown.

article thumbnail

The Burden of Privacy In Discovery

Data Matters

The 2015 amendments to Rule 26(b)(1), however, were meant to resolve any doubt, returning the proportionality factors to their original place as part of the very definition of what is discoverable. 26 Even with the rise of stipulated protective orders, invasive discovery remained the norm, and protection of personal privacy the exception.27.

Privacy 97
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Singapore proposes changes to cybersecurity and data protection regimes

Data Protection Report

A key thrust of the Cyber Bill is the identification of 11 critical sectors as providing “essential services” and the ability of the CSA to designate as Critical Information Infrastructure (CII) any computer or computer system necessary for the continuous delivery of essential services. The 11 critical sectors identified are: Energy.

article thumbnail

Top Cybersecurity Startups to Watch in 2022

eSecurity Planet

Ethyca is compliance -focused as regulatory enforcement becomes an essential part of data privacy. With Ethyca, clients get a bundle of tools for privacy by design in the development process. Evervault is on a mission to make encrypting sensitive data seamless with its security toolkit for developers. Cape Privacy.