Remove Definition Remove Government Remove Healthcare Remove Presentation
article thumbnail

European Commission proposes reinforcement of EU Cybersecurity rules

DLA Piper Privacy Matters

On the basis of the size-cap criterium, all medium and large enterprises (as defined by the Commission Recommendation 2003/361/EC concerning the definition of micro, small and medium-sized enterprises) that fall under the definition of ‘essential entities’ would need to comply with the obligations.

article thumbnail

Law and Technology Move Center Stage

Positively RIM

Day 2 of the first ARMA/Sedona Executive Conference on Information Governance turned toward technology and law. Both presenters and attendees agreed: Big Data is ignored at one’s own peril, and it raises a multitude of questions and ethical dilemmas. Repeatedly, presenters emphasized that Big Data is not “more of the same”.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Good, Bad, And The Ugly: Key Takeaways From California’s New Privacy Law

Privacy and Cybersecurity Law

The CCPA’s definition of “consumer” is equally broad. This definition therefore not only encompasses a “consumer” in the traditional sense (i.e., The business community is already lobbying the California legislature to narrow this definition. The CCPA governs how businesses treat “consumer” “personal information.”

Privacy 58
article thumbnail

Regulatory Update: NAIC Summer 2018 National Meeting

Data Matters

The Big Data (EX) Working Group heard a presentation from LIMRA regarding how insurers are utilizing consumer data in underwriting life insurance products. Discussion following the presentation focused on stakeholder concerns regarding such use of big data, including the lack of consumer disclosures and confidentiality concerns.

article thumbnail

Regulatory Update: NAIC Fall 2020 National Meeting

Data Matters

The GCC uses a risk-based capital (RBC) aggregation approach intended to act as an additional group supervisory tool for regulators, in conjunction with the Form F Enterprise Risk Report, Own Risk and Solvency Assessment (ORSA) report, and the Corporate Governance Annual Disclosure. On December 10, 2020, the U.S. Carolyn B.

article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

So there’s a need, a definite need, for information security professionals to have access to industrial control systems -- not virtual, but actual hands on systems -- so they can learn. Kim Zetter’s book, Countdown to Zero Day, is perhaps the definitive book on the subject. And how might we defend ourselves?

article thumbnail

The Hacker Mind Podcast: Hacking Behavioral Biometrics

ForAllSecure

So of course when I saw that some researchers were presenting a talk at SecTor 2021 in Toronto on defeating biometrics with artificial intelligence, well I knew I had to talk to them as well. So, secure facilities like data centers or you get into government facilities that are controlling do DoD type facilities.