Remove Data Remove GDPR Remove Government Remove Mining
article thumbnail

Using Data De-Identification to Protect Companies

Data Matters

Many companies hope to benefit from amassing large amounts of data by mining it for market insights, creating internal business models, and supporting strategic, data-driven decisions. One way that businesses can mitigate these risks is to de-identify the data they collect and store. litigation discovery obligations.

Mining 74
article thumbnail

The Week in Cyber Security and Data Privacy: 1 – 7 January 2024

IT Governance

At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. Publicly disclosed data breaches and cyber attacks: in the spotlight Hathaway breached, 41.5 The compromised data allegedly includes names, email addresses and phone numbers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Weekly podcast: ICO GDPR campaign, Gwent Police, Binance and MediaGet

IT Governance

This week, we discuss the ICO’s new GDPR campaign for micro businesses, a potential data breach at Gwent Police, a US$250,000 reward from Binance and Windows Defender stops a massive malware campaign. Hello and welcome to the IT Governance podcast for Friday, 16 March 2018. Here are this week’s stories.

GDPR 63
article thumbnail

Uxpected Impacts of Europe’s GDPR on US Companies Both Over and Under Stated

Info Source

Today he practices in the areas of regulatory litigation, including cybersecurity and data breaches, privacy and telecommunications, civil and criminal enforcement proceedings and international Regulatory Compliance. He outlines some common misconceptions related to GDPR. The biggest risk: overstating who you share your data with.

GDPR 40
article thumbnail

Top 10 Governance, Risk and Compliance (GRC) Vendors

eSecurity Planet

Governance, risk, and compliance (GRC) software helps businesses manage all of the necessary documentation and processes for ensuring maximum productivity and preparedness. Third-party governance. Like other competitive GRC solutions, it speeds the process of aggregating and mining data, building reports, and managing files.

article thumbnail

FRANCE: CNIL publishes initial analysis on Blockchain and GDPR

DLA Piper Privacy Matters

Many questions surround the Blockchain’s compatibility with EU General Data Protection Regulation (GDPR). The CNIL is one of the first EU data protection supervisory authorities to provide guidance on the compliance of Blockchain with GDPR. What solutions for a responsible use of Blockchain involving personal data?

article thumbnail

Weekly podcast: Reports galore and more cryptojacking

IT Governance

This week, we discuss new reports from Cisco, McAfee and the CSIS, and Big Brother Watch, and hear more about malicious Monero mining. Hello and welcome to the IT Governance podcast for Friday, 23 February 2018. Yet, 56% of councils who failed to protect data from cyber security threats did not even report the incidents.”.

Mining 66