Remove category
Remove Document Remove Marketing Remove Privacy Remove Security
article thumbnail

GUEST ESSAY: Addressing data leaks and other privacy, security exposures attendant to M&As

The Last Watchdog

Such consolidation across markets is good news for customers and vendors alike in terms of market growth and maximizing security investments. Going through an M&A is highly risky business due in large part to the potential impact on the market, valuation, shareholders, business partners, etc. Post-Close Risks.

Privacy 265
article thumbnail

SHARED INTEL: The expect impacts of Pres. Biden’s imminent National Cybersecurity Strategy

The Last Watchdog

Despite lacking an official published document, some industry professionals have already seen a draft copy of the strategic plan and weighed in with their thoughts. Until now, people have primarily relied on market forces rather than regulatory authority. The United States will soon get some long-awaited cybersecurity updates.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cloud Security Fundamentals: Understanding the Basics

eSecurity Planet

Cloud security fundamentals are the core requirements that ensure data protection, regulatory compliance, and access management in a cloud environment. Understanding cloud security challenges and knowing the cloud security tools available in the market significantly contribute to enhanced cloud security.

Cloud 117
article thumbnail

UK: ICO issues new guidance on special category data

DLA Piper Privacy Matters

On 14 th November, the Information Commissioner’s Office (“ ICO ”) published an update to its guidance on the processing of special category data (“ Guidance ”). Key takeaways – What qualifies as special category data? When does personal data become special category data? Background. Genetic and biometric data.

article thumbnail

Is the SEC Coming for Your Texts? SEC’s New Enforcement Director Telegraphs a Warning to Registrants About Improper Use of Personal Devices for Business-Related Communications

Data Matters

Securities and Exchange Commission (SEC) Division of Enforcement is stepping up investigative efforts looking at registered firms’ use of personal devices for business communications, which can implicate their recordkeeping obligations and result in failure to retain and produce responsive business-related communications in SEC investigations.

article thumbnail

What Is Data Minimisation? Definition & Examples

IT Governance

Data minimisation is a key part of information security and the GDPR (General Data Protection Regulation) in particular. Its principles are at the heart of effective data protection practices, and are intended to prevent privacy breaches and minimise the damage when security incidents occur. What is data minimisation?

GDPR 132
article thumbnail

GDPR compliance checklist

IBM Big Data Hub

The law outlines a set of data privacy rights for users and a series of principles for the processing of personal data. The only data processing activities exempt from the GDPR are national security or law enforcement activities and purely personal uses of data. Say a company collects phone numbers to send marketing messages via SMS.

GDPR 83