article thumbnail

CPPA Board Holds Meeting on Revised Draft Regulations for Risk Assessment and Automated Decisionmaking Technology

Hunton Privacy

ADMT Definition of Automated Decisionmaking Technology Clarify that a technology is an ADMT if it processes personal information and uses computation to execute a decision, replace human decisionmaking or substantially facilitate human decisionmaking. Recognize an exception from access requests for using ADMT solely for training purposes.

Risk 61
article thumbnail

Phish Leads to Breach at Calif. State Controller

Krebs on Security

The employee said that until very recently California was using one such company to help them conduct regular employee training on phishing. Which suggests plenty of people who definitely should get phish tested along with everyone else won’t get the same ongoing training.

Phishing 270
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Records Vs. Non-Records

AIIM

In fact, many items that people keep, or file, are definitely not records. Now let’s test your knowledge with this sample exercise from AIIM’s training : Which of these is most likely to need to be managed as a record? Typical Examples of Records: Financial documents. Pop Quiz Time. A signed and fully executed contract.

article thumbnail

How to become an ISO 27001 lead implementer

IT Governance

It is much more cost-effective to enrol on an ISO 27001 lead implementer training course that includes the exam in its programme rather than pay for the two separately. IT Governance’s ISO27001 Certified ISMS Lead Implementer training course costs £1,795, and includes three days of training followed by the exam.

Risk 66
article thumbnail

NYDFS Amends Cybersecurity Rules for Financial Services Companies

Hunton Privacy

Revised Definition of Class A Companies. The proposed amendments now require a Covered Entity to provide relevant training on its incident response plan and its business continuity and disaster recovery plan to all employees necessary to implement such plans. Incident Response and Business Continuity and Disaster Recovery Plan.

article thumbnail

UAE: Federal level data protection law enacted

DLA Piper Privacy Matters

The requirements regarding keeping data secure, and new data breach obligations, will definitely up the ante for businesses in the UAE to take cyber security seriously. Definitions. Fortunately the definitions of personal data, processing, data subject, data controller and data processor, have been kept relatively generic.

article thumbnail

Simplifying the path to Data Intelligence: A perspective from Roberto Maranca at Schneider Electric

Collibra

For instance, to satisfy the II principle (Standardization) the Data Management Discipline would expect you to have a repository of data definitions that everyone contributes to (anything that comes to mind?). Yammer), or grabbing internal learning opportunities with webinars and training sessions. .