Remove category enforcement
article thumbnail

Understanding China’s Data Regulatory Regime: What Are Important Data? And Can They Be Transferred Outside Of China?

Data Matters

The CSL does not provide a definition for “important data”. other data that may affect the security of national politics, territory, military affairs, economy, culture, society, science and technology, ecology, resources, nuclear facilities, overseas interests, biology, outer space, polar regions, deep sea etc. The CSL and the DSL.

article thumbnail

Nine States Pass New And Expanded Data Breach Notification Laws

Data Protection Report

Illinois, Maine, Maryland, Massachusetts, New Jersey, New York, Oregon, Texas, and Washington have all amended their breach notification laws to either expand their definitions of personal information, or to include new reporting requirements. Texas ( HB 4390 ) – Texas adds definitive notification timeline and establishes an advisory council.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ForAllSecure Launches The Hacker Mind Podcast

ForAllSecure

In the inaugural episode, The Hacker Mind looks at why the West Point Military Academy, and other organizations within the DoD, is training its young cadets to hack. Or maybe, just maybe back in 2014, West Point and other military service academies, are on to something really important. The military has these massive computer networks.

article thumbnail

ForAllSecure Launches The Hacker Mind Podcast

ForAllSecure

In the inaugural episode, The Hacker Mind looks at why the West Point Military Academy, and other organizations within the DoD, is training its young cadets to hack. Or maybe, just maybe back in 2014, West Point and other military service academies, are on to something really important. The military has these massive computer networks.

article thumbnail

ForAllSecure Launches The Hacker Mind Podcast

ForAllSecure

In the inaugural episode, The Hacker Mind looks at why the West Point Military Academy, and other organizations within the DoD, is training its young cadets to hack. Or maybe, just maybe back in 2014, West Point and other military service academies, are on to something really important. The military has these massive computer networks.

article thumbnail

New European Union Dual-Use Regulation Enters Into Force

Data Matters

Dual-use items are sensitive goods, services, software, and technology that can be used for both civil and military purposes. At an initial stage, businesses therefore need to self-assess whether their items may fall within the definition. Revised definitions of exporter and broker. New controls on technical assistance.

article thumbnail

What is personal information under the CCPA?

Collibra

The CCPA maintains a broad definition of “personal information” or PI, referring to it as “information that identifies, relates to, describes, is capable of being associated with, or could reasonably be linked, directly or indirectly, with a particular consumer or household.”. What is personal information? Biometric information.

Privacy 59