Remove 12
Remove 2018 Remove Data Remove Definition Remove Financial Services Remove Government
article thumbnail

The Impact of Data Protection Laws on Your Records Retention Schedule

ARMA International

It is essential that your organization’s records retention schedule is compliant with the data protection requirements in the jurisdictions where your organization operates. Definition and Purpose of a Records Retention Schedule. Introduction to Data Protection Laws. Understanding the Changes.

article thumbnail

Regulatory Update: NAIC Summer 2018 National Meeting

Data Matters

The National Association of Insurance Commissioners (NAIC) held its Summer 2018 National Meeting in Boston, Massachusetts, from August 4 to 7, 2018. NAIC Continues its Evaluation of Insurers’ Use of Big Data . The NAIC is also considering insurers’ use of big data in underwriting life insurance products.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

California Consumer Privacy Act: The Challenge Ahead – The Interplay Between the CCPA and Financial Institutions

HL Chronicle of Data Protection

The California Consumer Privacy Act of 2018 (“CCPA”) exempts information that is collected, processed, sold, or disclosed pursuant to the federal Gramm-Leach-Bliley Act (“GLBA”), and its implementing regulations (the “Privacy Rule”), or the California Financial Information Privacy Act (“CFIPA”). Background.

Privacy 40
article thumbnail

Sibos 2018 – a whirlwind tour of my week down under

CGI

Sibos 2018 – a whirlwind tour of my week down under. Tue, 12/18/2018 - 04:55. This was definitely not your typical ‘one topic’ conference and even when looking at ‘core’ banking subjects such as real-time payments, the conference managed to pull together thinking on some more left field areas.

article thumbnail

The Week in Cyber Security and Data Privacy: 15 – 21 January 2024

IT Governance

At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. The data set is a collection of 1 billion credentials sourced from stealer logs and hosted on the illicit.services website. Data breached: 70,840,771 email addresses.