article thumbnail

Staying Ahead of the Curve: 6 Top Legal Tech Trends to Watch in 2023

ARMA International

These include artificial intelligence (AI), hybrid and remote work collaboration, cloud, workflow automation and customization, mail processing and digitization, and security and data privacy. Are their levels of security and privacy protocols leaving them vulnerable to breaches and cyberattacks?

article thumbnail

Securing AI Deployments: Striking the Balance

OpenText Information Management

At the same time, we must also protect sensitive information and deliver accurate information to the user. OpenText is widely recognized for bringing trusted and secure information governance to customer processes and increasing customers’ security posture.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

European rulings on the use of Google Analytics and how it may affect your business

Data Protection Report

Netdokter’s Austrian publishing company and Google, however, argued that the data provided to Google, which included IP addresses, other user identifiers, and browser parameters did not qualify as personal data and, even if it did, sufficient supplemental measures were put in place to safeguard the personal data.

Analytics 128
article thumbnail

GDPR Compliance Obligations: The relationship between Data Controllers and Third-Party Processors

AIIM

This is the 11th post in a series on privacy by Andrew Pery. Data Privacy and Open Data: Secondary Uses under GDPR. Mitigate Data Privacy and Security Risks with Machine Learning. The Privacy and Security Dichotomy. GDPR and Cross Border Data Flows between the EU and the US: Current State of the Law.

GDPR 83
article thumbnail

Korean Privacy Law Updated

Hunton Privacy

According to Tae Uk Kang, partner at Bae, Kim & Lee and author of the alert, these amendments to PIPA and the IT Network Act “reflect the general trend concerning the Korean data privacy policy, which is intended to achieve more stringent regulation (and sanctions) of processing personal information.”. encryption of RRNs.

Privacy 40
article thumbnail

Hello. Goodbye… Goodbye. Hello

ARMA International

Bear in mind that however this appraisal process is conducted, it’s worth structuring it in systems that are as user-friendly as possible for the lawyers and information governance staff doing the review. Electronic material needs to be encrypted and uploaded to a place where it can be securely downloaded by the onboarding firm.

article thumbnail

Hong Kong: Data Security Measures Guidance published by the PCPD

Data Protection Report

Data processor management Under the PDPO, a data user must adopt contractual or other means to prevent unauthorized or accidental access, processing, erasure, loss or use of the personal data transferred to its data processors for processing.