Remove 04
Remove 2020 Remove Data Remove GDPR Remove Security
article thumbnail

Germany: Bonn Regional Court overrules GDPR Fining Guidelines by German Data Protection Authorities

DLA Piper Privacy Matters

Background: How to calculate GDPR fines? How to properly calculate administrative fines for non-compliance with the EU General Data Protection Regulation (‘ GDPR ’) is one of the most important questions when applying the GDPR on practical level, e.g. : What is actually meant by the reference to “undertaking” in Article 83 (4) to (6) GDPR?

GDPR 75
article thumbnail

Win the connected and autonomous car race while protecting data privacy

Thales Cloud Protection & Licensing

Win the connected and autonomous car race while protecting data privacy. Tue, 03/01/2022 - 04:49. According to ABI Research 41% of vehicles sold in 2020 are considered “connected,” and the number goes to 91% in the United States. More data in more places means more risks. These vehicles are also more connected than ever.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to protect healthcare and life-sciences data from a cyber attack pandemic

Thales Cloud Protection & Licensing

How to protect healthcare and life-sciences data from a cyber attack pandemic. Tue, 04/26/2022 - 05:19. 2020 was also the year when “ransomware” became a household name around the world, especially by the frequent attacks on healthcare facilities and the dire effects on critical care. Data security.

article thumbnail

What is digital sovereignty and how can you achieve it in the cloud?

Thales Cloud Protection & Licensing

Tue, 03/22/2022 - 04:42. According to the world economic forum , digital sovereignty refers “to the ability to have control over your own digital destiny – the data, hardware and software that you rely on and create”. What is digital sovereignty and how can you achieve it in the cloud? Trillion in yearly transatlantic trade.

Cloud 71
article thumbnail

Zero Trust 2.0: NIST’s identity-centric architecture

Thales Cloud Protection & Licensing

Fri, 12/04/2020 - 05:15. In August, the National Institute of Standards and Technology (NIST) released its blueprint for establishing a Zero Trust security architecture, NIST SP 800-207. In traditional perimeter security, everything inside the corporate network is considered reliable and anything outside is deemed unreliable.

Cloud 62