Remove tag health-data
Remove Data Remove Information Security Remove Security
article thumbnail

$10,000,000 civil penalty for disclosing personal data without consent

Data Protection Report

The claims related to the company’s sharing personal data without consumer consent and making it very difficult for consumers to cancel their subscriptions to this telehealth service. The order also requires that the company destroy personal data for which it had not received consent and to create a document retention and destruction policy.

article thumbnail

SBOMs: Securing the Software Supply Chain

eSecurity Planet

This article looks at software bills of materials, file data, existing standards, benefits, use cases, and what SBOMs mean for cybersecurity. The SBOM framework is about the units of software identified by developers and suppliers known as components and associated data known as attributes. What’s in a SBOM File?

Security 135
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Affairs newsletter Round 431 by Pierluigi Paganini – International edition

Security Affairs

Every week the best security articles from Security Affairs are free for you in your email box. A new round of the weekly SecurityAffairs newsletter arrived! Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. It’s Testing U.S.

article thumbnail

China: Navigating China Episode 19: China’s new Data Security Law: what multinational businesses need to know

DLA Piper Privacy Matters

China’s Data Security Law (“ DSL ”) has come into force and takes effect on 1 September 2021. The DSL applies to data in general, and forms part of the broader China data framework. The DSL confirms – rather than changes – data localisation requirements. Authors: Carolyn Bigg , Venus Cheung, Fangfang Song.

article thumbnail

Mar 13- Mar 19 Ukraine – Russia the silent cyber conflict

Security Affairs

This post provides a timeline of the events related to the Russia invasion of Ukraine from the cyber security perspective. Google’s TAG team revealed that China-linked APT groups are targeting Ukraine ’s government for intelligence purposes. March 15 – CaddyWiper, a new data wiper hits Ukraine. Pierluigi Paganini.

Cloud 94
article thumbnail

Historic Charges: First Enforcement Action Filed by New York Department of Financial Services Under Cybersecurity Regulation

Data Matters

The Regulation requires that Covered Entities establish and maintain a cybersecurity program designed to protect the confidentiality, integrity, and availability of its information systems and its customers’ NPI as defined in 23 NYCRR §§ 500.01(e) e) and 500.01(g), g), respectively. In May 2019, FAST contained over 850 million documents.

article thumbnail

The CyberWire Daily Podcast EP. 389 With Guest Speaker David Brumley

ForAllSecure

The CyberWire Daily podcast delivers the day's cyber security news into a concise format. Dave Bittner: [00:00:03] A contractor for Russia's FSB security agency was apparently breached. Dave Bittner: [00:00:03] A contractor for Russia's FSB security agency was apparently breached. It's time to build your security the same way.

Cloud 52