Wed.Jul 04, 2018

article thumbnail

Privacy policies of tech giants 'still not GDPR-compliant'

The Guardian Data Protection

Consumer group says policies of Facebook, Amazon and Google are vague and unclear Privacy policies from companies including Facebook, Google and Amazon don’t fully meet the requirements of GDPR, according to the pan-European consumer group BEUC. An analysis of policies from 14 of the largest internet companies shows they use unclear language, claim “potentially problematic” rights, and provide insufficient information for users to judge what they are agreeing to.

GDPR 89
article thumbnail

UK government cracks down on cyber security

IT Governance

To improve cyber risk governance among public-sector departments and their suppliers, the UK government has issued a series of minimum cyber security standards that will be incorporated into the Government Functional Standard for Security. The first standard to be incorporated, the Minimum Cyber Security Standard (MCSS), comprises ten sections across five broad categories: Identify, Protect, Detect, Respond and Recover.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

OpenText Enterprise World 2018 is almost here!

OpenText Information Management

We’re just one week away from OpenText™ Enterprise World 2018, and we’re so excited to see you in Toronto! Enterprise World 2017 was incredible, and this year’s conference is shaping up to be even better! In a previous blog post, I shared some great reasons why you don’t want to miss this year’s conference, including: … The post OpenText Enterprise World 2018 is almost here!

article thumbnail

Essential resources for implementing ISO 27001

IT Governance

ISO 27001 is the international standard that describes best practice for an information security management system (ISMS). . Barriers to ISO 27001 implementation include insufficient resources and the failure of executive teams to grasp the extent of information security risks. . A successful ISO 27001 ISMS project relies on genuine commitment and support from top management.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Q&A: Mei Dent, VP Engineering at OpenText discusses career paths, mentorship and diversity in the technology industry

OpenText Information Management

Meet Mei Dent, VP of Engineering at OpenText™ and avid supporter of diversity and inclusion in the technology industry. Mei is a prominent leader at OpenText, with over 25 years’ experience in the tech industry, leading the design and delivery of innovative enterprise software. In addition to heading up our Enterprise Information Management (EIM) applications … The post Q&A: Mei Dent, VP Engineering at OpenText discusses career paths, mentorship and diversity in the technology industr

45

More Trending

article thumbnail

Quantum Principles Eyed to Solve Current Limitations in Encryption, Data Protection

The Security Ledger

Quantum principles are set to transform the next generation of Internet security, with new quantum-based technologies on tap to improve encryption and data communication which researchers believe could solve some of the limitations with current technology. Security researchers in the United Kingdom are among those leading the move toward quantum. Read the whole entry. » Related Stories Lasers Eyed as Way Forward for Quantum Encryption of Data, Cryptocurrencies Kaspersky Deems Crypto-jacking

article thumbnail

Enterprise World: Find out how to take the fast track to the connected enterprise – with Digital Process Automation

OpenText Information Management

If your organization is looking for ways to streamline customer-facing activities, improve operational efficiency to reduce costs, and lighten employees’ workloads, then yours is like a lot of others in this high-pressure business environment. What’s different about you, however, is that you’re familiar with OpenText™ solutions – and you’re invited to join us at Enterprise … The post Enterprise World: Find out how to take the fast track to the connected enterprise – with Digital Process Au

article thumbnail

The Sedona Conference Has You Primed to Learn Best Practices for Handling Social Media: eDiscovery Best Practices

eDiscovery Daily

As Tom O’Connor and I discussed in our webcast last month , handling social media in discovery can be challenging. Now, The Sedona Conference® (TSC) has updated a primer to help with social media issues. TSC and its Working Group 1 on Electronic Document Retention & Production (WG1) have announced the publication of the Public Comment Version of The Sedona Conference Primer on Social Media, Second Edition.

article thumbnail

Find out how OpenText’s Triple A’s are supercharging Industry 4.0 at Enterprise World 2018

OpenText Information Management

Industry 4.0. Industrial Internet of Things (IIoT). Call it what you will, but digital transformation is radically changing the manufacturing industries. Business as usual is no longer an option. Your business must become data-centric built around an intelligent information platform. Successful enterprises will be driven by automation, artificial intelligence (AI) and APIs.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Por equivocación destruyen expedientes de Archivo Judicial de Andalucía

Archives Blogs

Destruyen por error cajas con 394 expedientes judiciales del archivo de la Junta de Andalucía. [link]. El Tribunal Superior de Justicia de Andalucía instó al órgano judicial a rehacer los procedimientos, de los que sólo lleva una decena terminados. El Juzgado de Primera Instancia número 1 de Fuengirola tiene un largo camino por delante después de que, por error, se destruyeran 78 cajas de procedimientos judiciales que se encontraban en el archivo que la Junta de Andalucía tiene en una nave del P

20
article thumbnail

Green paper: DSP Toolkit and NIS Regulations: The impact for healthcare organisations

IT Governance

These days, organisations face a range of evolving cyber threats. The healthcare sector has a particularly hard time, as it needs to deal with more risks than most. Not only do OES (operators of essential services) such as NHS organisations and their partners face the same automated attacks as organisations everywhere else but they must also defend themselves against more sophisticated attacks.

Paper 45
article thumbnail

Celebrating the 4th

Archives Blogs

Special Collections & Archives, along with Strozier Library, the Claude Pepper Library and the Heritage Museum are closed in observance of Independence Day. All our spaces will resume normal hours on Thursday, July 5, 2018. We wish you a safe and happy Fourth of July! Front Page of the Florida Flambeau, July 2, 1984 [ read entire issue in DigiNole ].