Remove Definition Remove Government Remove Military Remove Risk
article thumbnail

Connecticut Tightens its Data Breach Notification Laws

Data Protection Report

The amendment: Expands the definition of “personal information”; Shortens the notification deadline after discovery of a breach from 90 to 60 days; Removes the requirement to consult with law enforcement as part of a risk assessment; Deems compliant any person subject to and in compliance with HIPAA and HITECH; and.

article thumbnail

EU bodies agree on new EU export rules for dual-use technology

Security Affairs

EU lawmakers and the European Council aim to update controls for the sale of dual-use solutions such as surveillance spyware, facial recognition systems and drones to prevent authoritarian government abusing them for censorship and to persecute political opponents and dissidents violating human rights.

Sales 101
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The U.S. FCC considers Huawei and ZTE as national security threats

Security Affairs

Last week China accused the US government of “oppressing Chinese companies” after U.S. The Federal Communications Commission blocked the Chinese companies from receiving subsidies from a government fund. “We The FCC’s move definitively bans U.S. regulators declared Huawei and ZTE to be national security threats.

article thumbnail

U.S. Commerce Department Proposes Expansion of Information and Communications Technology and Services Review Process

Data Matters

The amendment would also include risk factors related to connected software applications as part of Commerce’s evaluation as to whether a transaction involving connected software applications poses an undue or unacceptable risk to U.S. First, the Proposed Rule would add “connected software applications” to the definition of ICTS.

article thumbnail

Security Vulnerabilities in US Weapons Systems

Schneier on Security

The US Government Accounting Office just published a new report: " Weapons Systems Cyber Security: DOD Just Beginning to Grapple with Scale of Vulnerabilities " (summary here ). From the summary: Automation and connectivity are fundamental enablers of DOD's modern military capabilities. But that's probably a mistake in the long run.

article thumbnail

The EU’s AI Act: the position is agreed

Data Protection Report

Definitions and scope The final text will define AI with reference to the OECD definition. It does not apply systems used for purely military or defence purposes. Minimal risk applications The Commission has emphasised that minimal risk applications will benefit from “a free pass and absence of obligations”.

article thumbnail

Snowden Ten Years Later

Schneier on Security

This was before David Miranda, Greenwald’s partner, was detained at Heathrow airport by the UK authorities; but even without that, I knew there was a risk. It definitely had an effect on me. Neither were any of the algorithm names I knew, not even algorithms I knew that the US government used. Definitely.