Remove eBook Remove GDPR Remove Information Security Remove Risk
article thumbnail

The Re-Permissioning Dilemma Under GDPR

AIIM

Now that the EU General Data Protection Regulation (GDPR) is in force organizations are ramping up their efforts to re-fresh data subject consent obtained prior to GDPR and under the EU Data Protection Directive 95/46/EC by virtue of which opt-out, or implied consent was permissible. Furthermore, the.

GDPR 108
article thumbnail

Guest Post -- GDPR Compliance starts with Data Discovery

AIIM

You might also be interested in: Mitigate Data Privacy and Security Risks with Machine Learning. The Privacy and Security Dichotomy. GDPR and Cross Border Data Flows between the EU and the US: Current State of the Law. What Do the GDPR and new Privacy Laws Mean for U.S. 50% of organizations not ready for GDPR.

GDPR 102
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Spotlight Podcast: Rethinking Your Third Party Cyber Risk Strategy

The Security Ledger

Third party cyber risk is growing. In this Spotlight Podcast, a companion to our new eBook, Rethinking Third Party Cyber Risk Management, we go deep on the topic of building a mature third party cyber risk program with Dave Stapleton the Director of Assessment. » Related Stories Third Party Cyber Risk is growing.

Risk 40
article thumbnail

Free Expert Insights

IT Governance

Here are all our Q&As to date, grouped by broad topic: AI Cyber attacks and data breaches Cyber Essentials Cyber resilience Cyber security Data privacy DORA Incident response ISO 27001 PCI DSS PECR Security testing Training Miscellaneous To get new expert insights straight to your inbox, sign up to our weekly newsletter, the Security Spotlight.

article thumbnail

Navigating the EU-US Data Protection Framework

Thales Cloud Protection & Licensing

As stated by the International Association of Privacy Professional ( IAPP ) critical sectors such as financial services are therefore conspicuously excluded, leaving organizations without a clear pathway to data protection compliance and potentially exposing them to significant risks.

article thumbnail

Weekly discussion podcast #11: Security in the Digital World

IT Governance

.” Learn how to: Keep your information secure; Apply the necessary controls to your home network; Protect your family from cyber crime; Prevent identity theft when shopping online or using contactless payment; and. Competition: For your chance to WIN a copy of this new eBook , simply answer the following question….

article thumbnail

Lions and Tigers and Facebook – Oh My!

AIIM

In order to take protective measures, you must read – and I know everyone reads every word of every agreement – before you agree to the terms and use the security features available within those apps to minimize the potential risk. For more information about security, check out this FREE eBook.