article thumbnail

What Is Integrated Risk Management? Definition & Implementation

eSecurity Planet

In the examples above, the clothing brand will use traditional and computer-aided design prototyping and marketing research. For example, the clothing brand faces the risk that someone might steal their designs or destroy their marketing research. Threat Response After detecting a threat, an organization needs to respond to it.

Risk 64
article thumbnail

Time for a new definition of the "composite" insurer?

CGI

Time for a new definition of the "composite" insurer? Composite insurer table. In the UK we rightly take pride in the fact that our ‘local’ propositions have played a significant role in the global development of what we now commonly call ‘Insurance’, but is that all about to change? . p.butler@cgi.com.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Regulatory Update: NAIC Summer 2022 National Meeting

Data Matters

The National Association of Insurance Commissioners (NAIC) held its Summer 2022 National Meeting (Summer Meeting) August 9–13, 2022. The Privacy Working Group has been reviewing state insurance privacy protections regarding the collection, ownership, use, and disclosure of information gathered in connection with insurance transactions.

article thumbnail

Regulatory Update: NAIC Summer 2021 National Meeting

Data Matters

The National Association of Insurance Commissioners (NAIC) held its Summer 2021 National Meeting (Summer Meeting) August 14-17, 2021. Highlights include, among others, adoption of revised risk-based capital bond factors for life insurers, amendments to SSAP No. NAIC Adopts Revised Risk-Based Capital Bond Factors for Life Insurers.

article thumbnail

On Cyber Warranties

Schneier on Security

Interesting article discussing cyber-warranties, and whether they are an effective way to transfer risk (as envisioned by Ackerlof's "market for lemons") or a marketing trick. The conclusion: Warranties must transfer non-negligible amounts of liability to vendors in order to meaningfully overcome the market for lemons.

article thumbnail

California Legislature Passes Bill to Establish the Genetic Information Privacy Act, Pending Governor’s Signature

Hunton Privacy

Not disclosing, subject to specified exceptions, a consumer’s genetic data to certain entities ( e.g. , those responsible for making decisions regarding health insurance, life insurance or employment). The Act also excludes from the definition of genetic data, “deidentified data,” as defined in the Act.

Privacy 85
article thumbnail

Vermont’s Amendments to Data Breach Law and New Student Privacy Law Effective July 1, 2020

Hunton Privacy

The amendments to Vermont’s Security Breach Notice Act include expanding the definition of Personally Identifiable Information (“PII”), expanding the definition of a breach to include login credentials and narrowing the permissible circumstances under which substitute notice may be used.