Remove Document Remove Examples Remove Exercises Remove Retail
article thumbnail

Data Subject Access Requests – High Court dismisses claim where DSAR regime abused

DLA Piper Privacy Matters

Data Subject Access Requests – no unqualified right to documents. A collateral purpose of the requestor wanting the material to assist in litigation is not an absolute exemption to the DSAR obligations [2] , but it is a relevant factor in the exercise of the court’s discretion.

Access 122
article thumbnail

Application modernization overview

IBM Big Data Hub

Many are addressing this via building accelerators that could be customized for enterprise consumption that helps accelerate specific areas of modernization and one such example from IBM is IBM Consulting Cloud Accelerators. We will explore key areas of acceleration with an example in this article.

Cloud 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Does your use of CCTV comply with the GDPR?

IT Governance

You must tell people when you’re collecting their personal information to give them the opportunity to exercise their data subject rights. Vital interests : for example, when processing data will protect someone’s physical integrity or life (either the data subject’s or someone else’s). Make sure people know they’re being recorded.

GDPR 110
article thumbnail

How to implement the General Data Protection Regulation (GDPR)

IBM Big Data Hub

Think: an online retailer that stores customers’ email addresses to send order updates. For example, a business that collects user health data needs stronger protections than one that collects only email addresses. Organizations must document the legal basis for every processing operation before beginning.

GDPR 83
article thumbnail

Processing of riders’ personal data ? The Italian Data Protection Authority sanctions a food delivery company

Privacy and Cybersecurity Law

It is worth noting that, among other things, the Garante pointed out that the information notice was not dated and that the personal data processed were listed only on a ‘by way of example’ basis. For example, geolocation data was used to exclude some riders from work opportunities. Retention period. Lawfulness of the processing.

article thumbnail

Regulatory Update: NAIC Summer 2020 National Meeting

Data Matters

Annuity Suitability Working Group Drafting FAQ Document to Facilitate Uniformity in State Adoption of Revised Suitability in Annuity Transactions Model Regulation. A draft of the FAQ document was exposed for a 30-day comment period to seek feedback regarding whether additional topics should be included in the document.

article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

There's a smart IoT enabled toothbrush for example, I mean, a toothbrush is a stick with bristles. Vamosi: The book Practical IoT Hacking is full of useful examples. Vamosi: For example, let's say you're a large retail organization with a number of physical locations. And then there's this other example.

IoT 52