article thumbnail

The Week in Cyber Security and Data Privacy: 1 – 7 January 2024

IT Governance

Enforcement 19 people charged after cyber crime investigation into xDedic Marketplace An investigation into the xDedic Marketplace, a website on the dark web that illegally sold login credentials and personal data to criminals until it was shut down by the US Attorney’s Office in 2019, has resulted in 19 people being charged.

article thumbnail

Data protection laws are great. Shame they are not being enforced | John Naughton

The Guardian Data Protection

In essence, the GDPR is a set of rules designed to give EU citizens more control over their personal data. It was a gold mine for legal and data-protection consultants. On the face of it, the GDPR looks like a formidable legal instrument.

GDPR 68
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Guest Post: France’s Digital Republic Act Strengthens Privacy Safeguards

IGI

Businesses must now notify customers how long their personal data will be held. Customers can also request that businesses delete personal data collected when they were minors. In addition, the law enumerates the right to privacy protections after a citizen passes away through a new instrument called a personal data will.

Privacy 20
article thumbnail

The Week in Cyber Security and Data Privacy: 4 – 10 December 2023

IT Governance

At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. Compromised information includes patients’ personal data, health and medical records, financial data, internal emails and software source code. Data breached: 5 TB.

article thumbnail

MY TAKE: Here’s why the Internet Society’s new Privacy Code of Conduct deserves wide adoption

The Last Watchdog

What if companies stopped treating consumers as wellsprings of behavioral datadata to be voraciously mined and then sold to the highest bidder? 28 earmarked as Data Privacy Day — an annual international privacy awareness campaign — these are reasonable questions to ask. Be accountable.

Privacy 113
article thumbnail

Data Breach Misattribution, Acxiom & Live Ramp

Troy Hunt

Let's assume there's no further context given, it's just your legitimate personal data and it also includes your phone number, email address. and over 400 other fields of data. I searched through the csv to see if anything matched the data in the email (member number, confirmation number), but nothing matched.

article thumbnail

How to Tackle the Information Management Challenges of Legacy Applications

AIIM

An ECM system eliminates the need for specialist skills and provides a common platform for storing and accessing all legacy data, with multi-factor authentication and other controls to maintain security and data privacy measures such as redaction of personal data.

ECM 167