Remove tag law-enforcement
article thumbnail

Data privacy examples

IBM Big Data Hub

An online retailer always gets users’ explicit consent before sharing customer data with its partners. A navigation app anonymizes activity data before analyzing it for travel trends. One cannot overstate the importance of data privacy for businesses today. The app heavily encrypts all user financial data.

article thumbnail

The Week in Cyber Security and Data Privacy: 26 February – 3 March 2024

IT Governance

At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. Data breached: 183,754,481 records. EasyPark data breach: 21.1 million data records belonging to EasyPark have been listed for sale on a hacking forum.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Historic Charges: First Enforcement Action Filed by New York Department of Financial Services Under Cybersecurity Regulation

Data Matters

On July 21, 2020, the New York State Department of Financial Services (NYDFS or the Department) issued a statement of charges and notice of hearing (the Statement) against First American Title Insurance Company (First American) for violations of the Department’s Cybersecurity Requirements for Financial Services Companies, 23 N.Y.C.R.R.

article thumbnail

SEC Proposes New Cybersecurity Rules for Investment Managers

Hunton Privacy

Whether the incident is covered under a cybersecurity insurance policy. For registered funds, the proposed amendments would require a description of any significant fund cybersecurity incidents that have occurred in the last two fiscal years in a fund’s registration statements, tagged in a structured data language.

article thumbnail

Is It Time for Your Employees to De-Dox Their Timelines?

Adam Levin

If you know anyone who maintains social media accounts and works in law enforcement, and they don’t use an alias, send them this article. Doxing predates social media, having long been used by law enforcement to track down suspects (mostly minus the publication part with the exception of wanted posters and the like).

IT 40