article thumbnail

Vermont’s Amendments to Data Breach Law and New Student Privacy Law Effective July 1, 2020

Hunton Privacy

The amendments to Vermont’s Security Breach Notice Act include expanding the definition of Personally Identifiable Information (“PII”), expanding the definition of a breach to include login credentials and narrowing the permissible circumstances under which substitute notice may be used.

article thumbnail

The EU’s AI Act: the position is agreed

Data Protection Report

Definitions and scope The final text will define AI with reference to the OECD definition. The AI Act will apply to providers placing an AI system on the market or putting it into service in the EU, regardless of the provider’s location. It does not apply systems used for purely military or defence purposes.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cyber is Cyber is Cyber

Lenny Zeltser

This might be because the industry continues to embrace the lexicon used in government and military circles, where cyber reigns supreme. ” In line with Danny’s initial negative reaction to the word cyber , I’ve perceived cybersecurity as a term associated with heavy-handed marketing practices.

article thumbnail

Executive Order on access to Americans’ bulk sensitive data and Attorney General proposed regulations – Part 2

Data Protection Report

The proposed definition of “listed identifier” is Full or truncated government identification or account number (such as a Social Security Number, driver’s license or state identification number, passport number, or Alien Registration Number) [Note that this definition apparently includes truncated Social Security Numbers.]

Access 59
article thumbnail

IoT - Haven’t we been here before?

CGI

Arguably, machine to machine (M2M) communication started in the 1950s in military projects , where IBM developed the real time operating system concepts required to handle a number of complex applications, including the first missile tracking systems. Secondly , markets are unlikely to change until a disruption appears to force them to.

IoT 40
article thumbnail

New Leak Shows Business Side of China’s APT Menace

Krebs on Security

A marketing slide deck promoting i-SOON’s Advanced Persistent Threat (APT) capabilities. Security experts who reviewed the leaked data say they believe the information is legitimate, and that i-SOON works closely with China’s Ministry of State Security and the military.

article thumbnail

#ModernDataMasters: Carl Smith, PZ Cussons

Reltio

My dad was a military man – now retired – and a very practical, adaptable person. “I There’s an interesting dynamic between the Chief Data Officer and Chief Marketing Officer and also the other CDO – the Chief Digital Officer. I’m also a bit of a film buff – a bit of a Trekkie – anything that makes you think of space is definitely me.