Remove category european-union
article thumbnail

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

Late last year, Atrium Health disclosed it lost sensitive data for some 2.65 The culprit: lax practices of a third-party data and analytics contractor. Related: Atrium Health breach highlights third-party risks. There is impetus for change – beyond the fear of sustaining a major data breach. Uphill battle.

Risk 147
article thumbnail

Top 7 Data Governance Blog Posts of 2018

erwin

The driving factors behind data governance adoption vary. Whether implemented as preventative measures (risk management and regulation) or proactive endeavors (value creation and ROI), the benefits of a data governance initiative is becoming more apparent. Defining Data Governance. www.erwin.com/blog/defining-data-governance/.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Impact of Data Protection Laws on Your Records Retention Schedule

ARMA International

It is essential that your organization’s records retention schedule is compliant with the data protection requirements in the jurisdictions where your organization operates. Introduction to Data Protection Laws. Personal data protection requirements may be issued by federal, state (provincial), or local governments.

article thumbnail

The Privacy Officers’ New Year’s Resolutions

Data Protection Report

2020 could well be a year of data export turmoil – so brace yourself! Although the AG’s view was that the SCCs are valid, he suggested that those using them would need to examine the national security laws of the data importer’s jurisdiction to determine whether they can in fact comply with the terms of the SCCs.

Privacy 85
article thumbnail

The Privacy Officers’ New Year’s Resolutions

Data Protection Report

2020 could well be a year of data export turmoil – so brace yourself! Although the AG’s view was that the SCCs are valid, he suggested that those using them would need to examine the national security laws of the data importer’s jurisdiction to determine whether they can in fact comply with the terms of the SCCs.

Privacy 52