Remove tag internet
article thumbnail

Guest Post -- GDPR Compliance starts with Data Discovery

AIIM

This is the seventh post in a series on privacy by Andrew Pery. You might also be interested in: Mitigate Data Privacy and Security Risks with Machine Learning. The Privacy and Security Dichotomy. GDPR and Cross Border Data Flows between the EU and the US: Current State of the Law.

GDPR 102
article thumbnail

President’s Council of Advisors on Science and Technology Release Health IT Report

Hunton Privacy

“…the best way to manage and store data for advanced data-analytical techniques is to break data down into the smallest individual pieces that make sense to exchange or aggregate. And the Institute of Medicine also clearly recognizes the limits of choice as a tool for protecting privacy.

IT 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Week in Cyber Security and Data Privacy: 26 February – 3 March 2024

IT Governance

Italian data protection authority fines Enel €79 million Italy’s data protection regulator, the Garante per la Protezione dei Dati Personali, has fined the country’s largest utility company, Enel, more than €79 million for misusing customer data for telemarketing. Other news NIST releases version 2.0

article thumbnail

Guest Post -- New Global Data  and Privacy Regulations in 2018 and the GDPR

AIIM

Data privacy breaches have been in the news again and again this year, eliciting increased concern from regulators and legislative bodies. But one of the most important data privacy milestones on the horizon in 2018 has its roots far earlier, and has been of utmost concern to multinational organizations.

GDPR 86
article thumbnail

Best Facial Recognition Software for Enterprises In 2022

eSecurity Planet

With all the gathered data on facial recognition technology, it indeed offers significant potential for the security aspects of enterprises. Another concern is that of false negatives in identification, which can deny the right person access. However, there are a few noteworthy concerns.