Remove Definition Remove Exercises Remove Information Security Remove Security
article thumbnail

CPPA Board Holds Meeting on Revised Draft Regulations for Risk Assessment and Automated Decisionmaking Technology

Hunton Privacy

ADMT Definition of Automated Decisionmaking Technology Clarify that a technology is an ADMT if it processes personal information and uses computation to execute a decision, replace human decisionmaking or substantially facilitate human decisionmaking. Streamline what must be included in an abridged risk assessment.

Risk 61
article thumbnail

NYDFS Proposes Updated Second Amendment to Its Cybersecurity Regulation

Hunton Privacy

As a result of the initial 60-day comment period, the updated Amendment incorporates a number of changes, including the following: Definitions NYDFS clarified the thresholds for calculating when covered entities qualify as “Class A Companies,” which would be subject to heightened requirements.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

California Legislature Passes Bill to Establish the Genetic Information Privacy Act, Pending Governor’s Signature

Hunton Privacy

The Act also excludes from the definition of genetic data, “deidentified data,” as defined in the Act. Not disclosing, subject to specified exceptions, a consumer’s genetic data to certain entities ( e.g. , those responsible for making decisions regarding health insurance, life insurance or employment).

Privacy 85
article thumbnail

How to become an ISO 27001 lead implementer

IT Governance

It’s an advanced cyber security position that comes with a lot of responsibility. You’ll be given a combination of theoretical study and hands-on work, including group discussions, practical exercises and case studies. We also offer a Live Online version of this course. What is a lead implementer’s salary?

Risk 66
article thumbnail

New Dubai International Financial Centre Data Protection Law Comes into Effect

Hunton Privacy

Data Breach Notification: Controllers are required to notify the Commissioner of Data Protection of any personal data breach that compromises a data subject’s confidentiality, security or privacy. Data subjects also must be notified if the breach is likely to result in a high risk to their security or rights.

article thumbnail

How to implement the General Data Protection Regulation (GDPR)

IBM Big Data Hub

The only processing operations exempt from the GDPR are national security and law enforcement activities and purely personal uses of data. Each EEA state sets its own definition of “child” under the GDPR. Companies must be prepared to comply with these varying definitions.

GDPR 75
article thumbnail

New SEC Cybersecurity Rules Could Affect Private Companies Too

eSecurity Planet

Securities and Exchange Commission (SEC) strongly advised public companies to improve their cybersecurity. While the new security proposals have not yet become law, cybersecurity managers can begin to prepare metrics and audits that will not only help comply with those laws, but can also help create positive change now.