Remove 12
Remove 2012 Remove Data Remove GDPR Remove Government
article thumbnail

UK: Personal liability for PECR regulatory fines proposed in Government consultation

DLA Piper Privacy Matters

PECR sits alongside the Data Protection Act 2018 and the GDPR and provide data subjects with specific privacy rights in relation to electronic communications. customer privacy as regards traffic and location data, itemised billing, line identification, and directory listings. Background. Proposals for change.

article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

What follows below is an edited version of the debate in the House of Lords of the Second Reading of the Data Protection Bill, held on 10 October. Data is not just a resource for better marketing, better service and delivery. Data is used to build products themselves. It has become a cliché that data is the new oil.

GDPR 120
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Wednesday LTNY 2018 Sessions: eDiscovery Trends

eDiscovery Daily

ESI sources: now that we routinely deal with email, text messages and mobile discovery, what is happening with data sources like Bluetooth connections, wearables, medical devices or smart home video? Will we see lawyers subpoena the connected car for its sensor data? Tired of looking at Enron data?

article thumbnail

The Burden of Privacy In Discovery

Data Matters

Most of that focus has centered on data collection, storage, sharing, and, in particular, third-party transactions in which customer information is harnessed for advertising purposes. Could a party, for instance, decline to produce, review, or even collect certain types of data due to privacy concerns? But what about other contexts?

Privacy 94
article thumbnail

Top Cybersecurity Startups to Watch in 2022

eSecurity Planet

Investors, business clients, and more continue to look for secure application access for remote workers , provide real-time visibility into cyberattacks, and protect data as it travels from the cloud to edge networks and end-users and back. It uses this data to show a complete narrative of an attack in real-time. Open Raven.