Remove Definition Remove Military Remove Risk
article thumbnail

Connecticut Tightens its Data Breach Notification Laws

Data Protection Report

The amendment: Expands the definition of “personal information”; Shortens the notification deadline after discovery of a breach from 90 to 60 days; Removes the requirement to consult with law enforcement as part of a risk assessment; Deems compliant any person subject to and in compliance with HIPAA and HITECH; and.

article thumbnail

U.S. Commerce Department Proposes Expansion of Information and Communications Technology and Services Review Process

Data Matters

The amendment would also include risk factors related to connected software applications as part of Commerce’s evaluation as to whether a transaction involving connected software applications poses an undue or unacceptable risk to U.S. First, the Proposed Rule would add “connected software applications” to the definition of ICTS.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Vulnerabilities in US Weapons Systems

Schneier on Security

From the summary: Automation and connectivity are fundamental enablers of DOD's modern military capabilities. Although GAO and others have warned of cyber risks for decades, until recently, DOD did not prioritize weapon systems cybersecurity. It is definitely easier, and cheaper, to ignore the problem or pretend it isn't a big deal.

article thumbnail

EU bodies agree on new EU export rules for dual-use technology

Security Affairs

The term “ dual-use ” refers to technology that can be used for both peaceful and military aims. The new rules oblige European companies to apply for government licenses to export surveillance solutions demonstrating that the sale doesn’t pose a risk to human rights. ” states the Asspciated Press.

Sales 103
article thumbnail

The U.S. FCC considers Huawei and ZTE as national security threats

Security Affairs

The FCC confirms its efforts to protect the national communications networks from security risks posed by the use of Chinese equipment. The FCC’s move definitively bans U.S. In April 2018, the UK GCHQ intelligence agency warned UK telcos firms of the risks of using ZTE equipment and services for their infrastructure.

article thumbnail

The EU’s AI Act: the position is agreed

Data Protection Report

Definitions and scope The final text will define AI with reference to the OECD definition. It does not apply systems used for purely military or defence purposes. Minimal risk applications The Commission has emphasised that minimal risk applications will benefit from “a free pass and absence of obligations”.

article thumbnail

Understanding China’s Data Regulatory Regime: What Are Important Data? And Can They Be Transferred Outside Of China?

Data Matters

The CSL does not provide a definition for “important data”. other data that may affect the security of national politics, territory, military affairs, economy, culture, society, science and technology, ecology, resources, nuclear facilities, overseas interests, biology, outer space, polar regions, deep sea etc. The CSL and the DSL.