Definitive Health acquires HIMSS Analytics’ data business

Information Management Resources

Definitive Healthcare has purchased the vendor data services business line of HIMSS Analytics, which includes its product lines and customized research capabilities. M&A Business intelligence Healthcare analytics HIMSS

GDPR: How the definition of personal data has changed

IT Governance

With the Regulation expanding the definition of personal data, many organisations were uncertain as to what the new definition includes. The GDPR’s definition of personal data is also much broader than under the DPA 1998. This blog has been updated to reflect industry updates.

Business Process Modeling Use Cases and Definition

erwin

The post Business Process Modeling Use Cases and Definition appeared first on erwin, Inc. What is business process modeling (BPM)? A visual representation of what your business does and how it does it. Why is having this picture important?

Redaction: Definition, Process, and When to Use It

Record Nations

The post Redaction: Definition, Process, and When to Use It appeared first on Record Nations. Sometimes called “document sanitizing,” redaction is the process of removing sensitive information from a document.

Crunch Time in California – CCPA Amendments Hotly Debated and (Some) Defeated – Employee Data Is Back, Reasonable Definition of Personal Information Is Gone (For Now), and More!

Data Matters

AB 873 – Definitions of Deidentified Data and Personal Information. The bill that would have changed the definitions of “deidentified” data and “personal information” did not pass on a tie-vote, but will be reconsidered by the committee. The post Crunch Time in California – CCPA Amendments Hotly Debated and (Some) Defeated – Employee Data Is Back, Reasonable Definition of Personal Information Is Gone (For Now), and More!

HR’s culture shift: Tackling workplace sexual harassment while navigating legal definitions

Information Management Resources

Human resources professionals are looking to fight bad behavior driven by upper management. Sexual harassment in the professional workplace PH sexual harassment Sexual harassment Workforce management Employee relations Workplace culture Workplace safety and security

New Case Sheds Further Light on the Definition of Autodialer under the TCPA

Data Matters

The FCC had said in orders in 2003 and 2008 that the TCPA’s definition of auto-dialer was broad enough to cover predictive dialers. Unconstrained by the underbrush of the FCC’s earlier rulings, the court went on to interpret the statutory definition of auto-dialers. The post New Case Sheds Further Light on the Definition of Autodialer under the TCPA appeared first on Data Matters Privacy Blog. Ever since the D.C.

Nevada Expands Definition of Personal Information

Hunton Privacy

179 (the “Bill”), which expands the definition of “personal information” in the state’s data security law. lawfully made available to the general public” from the definition of personal information, the Bill narrows the scope of that exclusion, limiting it to information available “from federal, state or local governmental records.”. On May 13, 2015, Nevada Governor Brian Sandoval (R-NV) signed into law A.B.

Time for a new definition of the "composite" insurer?

CGI

Time for a new definition of the "composite" insurer? So could this operating model become the new definition of a ‘composite insurer’? p.butler@cgi.com. Wed, 04/25/2018 - 09:26. Composite insurer table.

Searching for definition | ZDNet

Collaboration 2.0

Searching for definition By Oliver Marks | June 15, 2008, 10:51pm PDT Summary A recurring theme for me at the Enterprise 2.0 ′ in 2006, called on attendees to log on to Wikipedia and edit its definition.

Enterprise Architect: A Role That Keeps Evolving

erwin

Enterprise architect is a common job title within IT organizations at large companies, but the term lacks any standard definition. That’s one of the reasons the enterprise architect role has no standard definition.

FTC Issues Interim Final Rule Amending Red Flags Rule “Creditor” Definition

Hunton Privacy

On November 30, 2012, the Federal Trade Commission announced the issuance of an interim final rule (“Interim Final Rule”) that makes the definition of “creditor” in the FTC’s Identity Theft Red Flags Rule (“Red Flags Rule”) consistent with the definition contained in the Red Flag Program Clarification Act of 2010.

The Principles of Recordkeeping Primer: Accountability

The Schedule

Definitions of Accountability. ” DefinitionA primer is a small, introductory book on a given subject. They used to be part of every child’s education. The New England Primer (ca. 1690), was the first to be printed in North America.

Capital One's Breach May Be a Server Side Request Forgery

Data Breach Today

A definitive post mortem is likely months away. SSRF Appears to Fit Scenario, But Details Are Slim Capital One's enormous data breach is a subject of intense scrutiny as well as fear. But security professionals have ideas as to how the breach was achieved and the weaknesses that led to it

This is the old ChiefTech blog.: Matt's Knowledge Management definition

ChiefTech

Wednesday, 27 June 2007 Matt's Knowledge Management definition Everyone has their own definition of Knowledge Management. This is the old ChiefTech blog. Nice of you to drop in and visit. However, you need to come over and see my new blog at chieftech.com.au. ©2005-2009. ©2005-2009. Disclaimer: Information on this blog is of a general nature and represents my own independent opinion. Please seek advice for specific circumstances.

Now Available: Webinar – Operationalizing the California Consumer Privacy Act – Key Decisions and Compliance Strategies

HL Chronicle of Data Protection

On June 20, 2019, Hogan Lovells partners Mark Brennan and Bret Cohen discussed in great detail the impact of the law, explained key definitions, and offered practical guidance on how to navigate it during the webinar, “Operationalizing the California Consumer Privacy Act.” Bret Cohen.

House Bill to Limit Scope of Red Flags Rule with Amended “Creditor” Definition

Hunton Privacy

6420 would add a more narrow definition of “creditor” to Section 615(e) of the FCRA, which currently defines creditor as “any person who regularly extends, renews, or continues credit; any person who regularly arranges for the extension, renewal, or continuation of credit; or any assignee of an original creditor who participates in the decision to extend, renew, or continue credit.”

Article 29 Working Party Proposes a Definition and Provision on Profiling Within the Proposed EU General Data Protection Regulation

Hunton Privacy

The Advice Paper sets forth the Working Party’s position that the Proposed Regulation should include a clear definition on profiling as “any form of automated processing of personal data, intended to analyse or predict the personality or certain personal aspects relating to a natural person, in particular the analysis and prediction of the person’s health, economic situation, performance at work, personal preferences or interests, reliability or behaviour, location or movements.”.

Paper 40

The Infrastructure Mess Causing Countless Internet Outages

WIRED Threat Level

You may not have heard of the Border Gateway Protocol, but you definitely know when it goes wrong. Security Security / Security News

4 things to consider when setting your fast data strategy

IBM Big Data Hub

In the study, the definition of fast data starts with the technical characteristics mentioned in our last article, but there’s more to that definition

California Consumer Privacy Act: The Challenge Ahead – Four Key Considerations for Health and Life Sciences Companies

HL Chronicle of Data Protection

As a starting point, determine whether the company qualifies as a business under the CCPA’s definition or if it may be subject to the CCPA by its relationships with for-profit businesses. The CCPA’s definition for “deidentified” data differs from traditional standards.

California Consumer Privacy Act: The Challenge Ahead – Four Key Considerations for Health and Life Sciences Companies

HL Chronicle of Data Protection

As a starting point, determine whether the company qualifies as a business under the CCPA’s definition or if it may be subject to the CCPA by its relationships with for-profit businesses. The CCPA’s definition for “deidentified” data differs from traditional standards.

California Consumer Privacy Act: The Challenge Ahead – Four Key Considerations for Health and Life Sciences Companies

HL Chronicle of Data Protection

As a starting point, determine whether the company qualifies as a business under the CCPA’s definition or if it may be subject to the CCPA by its relationships with for-profit businesses. The CCPA’s definition for “deidentified” data differs from traditional standards.

California Consumer Privacy Act: The Challenge Ahead — Key Terms in the CCPA

HL Chronicle of Data Protection

We thus focus here on detailing some of the CCPA’s key definitional terms, organized into topical categories. As we describe below, the CCPA’s definition of “consumer” is limited to California residents.

Sales 52

Who’s spreading the news?

InfoGovNuggets

Data quality Information Governance Definition Controls Third parties Internal controls Culture Compliance Oversight Duty Accuracy Compliance (General “Egypt Send Actress to Jail for ‘Fake News,'” The Wall Street Journal , October 1, 2018 A9. Woman posting video on Facebook claiming sexual harassment posted on Facebook sentenced to two years in jail. Publishing fake news with intent of toppling regime. Egypt has some problems with sexual harassment. Appeal expected.

Video 28

Who Is the Chief Security Officer, and Why You Should Know Them?

InfoGoTo

This is definitely one relationship that needs to be cultivated. For information governance (IG) professionals, the chief security officer (CSO) can be a key partner and advocate.

NTT Security and WhiteHat Security Describe Deal

Data Breach Today

NTT's Khiro Mishra and WhiteHat's Craig Hinkley on Application Security NTT Security has signed a definitive agreement to acquire WhiteHat Security.

Management of change

InfoGovNuggets

Information Governance Communications Definition Controls Compliance Oversight Compliance (General How do you make sure that your policies are keeping pace with law and society? “Google Changes Harassment Rule,” The Wall Street Journal , November 9, 2018 B4. Following an employee walkout over how the company handles/handled sexual harassment claims, Google will no longer require that such claims be subject to arbitration.

Actionable Threat Intel in the IoT Era

Data Breach Today

And as a result, the definition of threat intelligence is changing, says Vishak Raman of Cisco Vishak Raman of Cisco on Coping With the Expanding Attack Surface The advent of IoT devices and IT/operational technology integration have dramatically expanded the attack surface.

IoT 186

Cheaters

InfoGovNuggets

Data quality Information Governance Definition Duty of Care Controls Compliance Oversight Duty Employees Accuracy Corporation Compliance (General “Market Cheats Get Caught More Often,” The Wall Street Journal , November 1, 2018 B10. Traders manipulating prices by spoofing real futures trades are getting caught and prosecuted for criminal violations. Exchanges cooperating with enforcement authorities. If accurate information is worth X, what is inaccurate information worth?

Information economy

InfoGovNuggets

Data quality Information Value Definition Use Collection Analytics Access“Alternative Data Is Valued on Wall Street,” The Wall Street Journal , November 2, 2018 B1. Companies mine different types of available information to help traders. Is information is worth so much, won’t someone start a business to provide it? Apparently. What should you be monitoring to understand how your customers make their purchasing decisions, or what your competitors are doing?

When is a record no longer a record?

InfoGovNuggets

I guess there may be multiple definitions of “record,” one of which is documentation of a business activity or decision, and the other of which is a conviction. Access Accuracy Controls Definition Information Records Management Third parties ValueIf you are looking to invest, it would be nice to know if the broker who has been recommended to you has a history of complaints by his/her customers or employers.

Loose Lips, Volume III

InfoGovNuggets

Information Governance Communications Definition Controls Compliance Duty Employees Corporation Compliance (General “Egypt Passes Media Law Targeting ‘Fake News,'” The Wall Street Journal , July 17, 2018 A18. Traditional media and larger social media outlets now subject to penalties for spreading fake news, defaming, or inciting hatred. Think how quiet the TV would be in the US if there was a similar law here. Oh, wait. We still have the First Amendment.

Location information

InfoGovNuggets

Information Ownership Value Definition Controls Access Duty Corporation TechnologyApparently, if you’re on Verizon, 75 companies know where your phone is. Is that worth anything to anybody? Who owns that information and who can sell/rent it? “Third Parties Know Exactly Where You Are,” The Wall Street Journal , July 16, 2018 B4. Well, I like to have Uber and Google Maps know where I am. And FindMyPhone. Who else? Do I control that?

IT 28

Privacy

InfoGovNuggets

Security Privacy Information Ownership Governance Policy Definition Duty of Care Controls Third parties Internal controls Access Duty Corporation Technology“Alphabet, Apple Prodded On Privacy,” The Wall Street Journal , July 10, 2018 A3. Congress asks how Google and Apple use “your” information, such as what you say and write and where you are. Which is more interesting, the questions or the answers?

Labels

InfoGovNuggets

Data quality Information Definition Analytics“Senator Releases DNA Test Results,” The Wall Street Journal , October 16, 2018 A4. Senator Elizabeth Warren released DNA results about her ancestry. Facts are facts. And labels are labels, and not necessarily facts. How much of a certain DNA do you need to have to be a minority, entitled to affirmative action? So, the blood results are information. But who has the power to decide who is and who is not a Native American?

Hackers look to make money

InfoGovNuggets

So now a denial is Information, by definition. Access Communications Compliance Compliance (General) Controls Corporation Culture Definition Directors Duty Duty of Care Employees Governance Information Interconnections Internal controls Investor relations IT Oversight Ownership Privacy Protect assets Security Technology Third parties Who is in charge That’s a catchy headline.

Information delayed

InfoGovNuggets

So, either (a) the definition of Information includes information you don’t disclose or (b) the value of information can include the value of not disclosing it. Accuracy Communications Compliance Compliance (General) Controls Corporation Culture Data quality Definition Directors Duty Duty of Care Employees Governance Information Internal controls Oversight Reliance Supervision Technology To report Value

Video 28

Is it live or is it Memorex?

InfoGovNuggets

Compliance Compliance (General) Controls Definition Duty Governance Information Internal controls Ownership Protect assets Technology Third partiesWhat impact has technology had on the flow of information in your industry, including the flow of information to and from competitors? Are your controls keeping pace? “Fashion Industry Gossip Was Once Whispered. Now It’s on Instagram.,” ” The Wall Street Journal, December 2, 2018 (online).

What you say is information, too

InfoGovNuggets

Communications Compliance (General) Content Controls Definition Duty Governance Information Internal controls Legal“Mueller Accuses Paul Manafort of Lying to FBI After Plea Agreement, The Wall Street Journal , November 26, 2018 (online). Did Manafort lie after he reached a plea deal? Information is not limited to what you write in a document or an email. It includes verbal utterances.