Remove 12
Remove 2013 Remove Document Remove GDPR Remove Security
article thumbnail

Belgium: Digital fingerprints on ID cards – no violation of the right to privacy according to the Belgian Constitutional Court

DLA Piper Privacy Matters

These are the reinforcement of security, the facilitation of the free movement of EU citizens and their family members and the reduction of the risk of ID fraud and must be regarded as objectives of general interests recognized by the European Union.

Privacy 98
article thumbnail

Five reasons why law firms should adopt ISO 27001

IT Governance

Robust information security practices are critical to the legal sector – yet there is a notable gabetween the risks that firms face and their ability to mitigate them. Every law firm faces information security risks. However, as the bill is yet to be enacted, we refer to the GDPR.).

GDPR 70
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Weekly podcast: A recap of the top stories of 2017 and a look ahead to 2018

IT Governance

This week, we look back at the big news from last year, and consider what the next 12 months have in store. As it’s the first one, let’s have a brief recap of some of last year’s biggest stories, and then look ahead to what we can expect from the next 12 months. Hello and welcome to the first IT Governance podcast of 2018.

article thumbnail

The Burden of Privacy In Discovery

Data Matters

To pick just two recent examples of the latter, the EU’s General Data Protection Regulation1 (GDPR) and the California Consumer Privacy Act2 (CCPA) both impose sweeping requirements on businesses with the aim of increasing consumers’ privacy and control over how their personal data is used. 72 Indeed, Comment 2.b

Privacy 97
article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

Where the Information Commissioner gives notices to data controllers, she can now secure compliance, with the power to issue substantial administrative penalties of up to 4% of global turnover. How then will we secure adequacy without adhering to the charter? Where she finds criminality, she can prosecute.

GDPR 120
article thumbnail

Weekly podcast: 2018 end-of-year roundup

IT Governance

This week, in our last podcast of the year, we revisit some of the biggest information security stories from the past 12 months. As is now traditional, I’ve installed myself in the porter’s chair next to the fire in the library, ready to recap some of the year’s more newsworthy information security events.

article thumbnail

A Decade of Have I Been Pwned

Troy Hunt

Search for your account across multiple breaches [link] — Have I Been Pwned (@haveibeenpwned) December 4, 2013 And then, as they say, things kinda escalated quickly. ” Anyone can type in an email address into the site to check if their personal data has been compromised in a security breach. "Have I been pwned?"