Remove tag anonymization
article thumbnail

California Consumer Privacy Act: GDPR-like definition of personal information

Data Protection Report

This is the Data Protection Report’s third blog in a series of blogs that will break down the major elements of the CCPA which will culminate in a webinar on the CCPA in October. This blog focuses on the CCPA’s broad definition of Personal Information.

GDPR 40
article thumbnail

Keep Your Business Data Safe and Secure With Onehub

OneHub

Data security is one of the most important factors to consider when choosing how to store and share your business files. In a 2020 report, IBM revealed that the average cost of a data breach is $3.84 That’s a devastating price tag for many companies. Onehub understands that if your data isn’t safe, nothing else matters.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Understanding Have I Been Pwned's Use of SHA-1 and k-Anonymity

Troy Hunt

Four and a half years ago now, I rolled out version 2 of HIBP's Pwned Passwords that implemented a really cool k-anonymity model courtesy of the brains at Cloudflare. It works beautifully; it's ridiculously fast, efficient and above all, anonymous. It's insecure and deprecated. is the middle one.

Passwords 123
article thumbnail

A Decade of Have I Been Pwned

Troy Hunt

And that's precisely what this 185th blog post tagging HIBP is - the noteworthy things of the years past, including a few things I've never discussed publicly before. ” Anyone can type in an email address into the site to check if their personal data has been compromised in a security breach.

article thumbnail

GDPR personal data explained

Collibra

The General Data Protection Regulation (GDPR), in force since May 25, 2018, requires businesses to protect the personal data and privacy of European Union (EU) citizens, for transactions that occur within EU Member States. The GDPR also regulates the exportation of personal data outside the EU. What is personal data under GDPR?

article thumbnail

How did we do on the Chief Information Governance Officer (CIGO) Summit?

Barclay T Blair

A definite repeat for next year! Tagged: compliance , defensible deletion , E-Discovery , eDiscovery Journal , Information Governance , regulation , unstructured information. Richard Kessler , Head of Group Information Governance, UBS AG. Exactly what separates IGI/Barclay and the Gang from the impersonators. (Ok