May, 2016

article thumbnail

750 days to go before the new data protection rules bite

Data Protector

How often do organisations get 750 days’ notice of new rules that may require them to make huge changes to comply? Well, it’s happened. The European Commission has just announced that the General Data Protection Regulation, a mighty piece of legislation that took over 4 years to negotiate, will come into force on 25 May 2918. What will it mean to most organisations?

article thumbnail

European Parliament Calls on European Commission to Renegotiate Privacy Shield

Hunton Privacy

On May 26, 2016, the European Parliament approved a resolution calling for the European Commission to reopen negotiations with U.S. authorities on the EU-U.S. Privacy Shield (“Privacy Shield”), and to implement the recommendations of the Article 29 Working Party (“Working Party”) on the draft Privacy Shield adequacy decision. The Working Party had previously published its recommendations in an Opinion regarding the draft decision issued by the European Commission on adequacy of the protection pr

Privacy 70
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

It's an ?IoT world: The big shift to intelligent devices

Collaboration 2.0

Next week's 'IoTworld' conference promises to be the new hot spot in Silicon Valley, revitalizing an 'app' culture that has mostly run out of steam.

IoT 75
article thumbnail

Lessons Learned Playing With Pricing

PerezBox

When we first started, our pricing by all accounts was absurdly low. In my last post I chronicled the details of our pricing journey at Sucuri. Developers were finding that the. Read More. The post Lessons Learned Playing With Pricing appeared first on PerezBox.

Sales 61
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The Strategic, the Tactical, and Agile Records Management

Brandeis Records Manager

George Despres, CRM. Program Director for University Records Management, Brandeis University. (The content in this blog reflects the opinions of the author, and not of Brandeis University.). I’ve been asked in the past to provide budget estimates for five years into the future. My response is internal laughter, and tears. Understood, this is a typical practice, but the provision of a high-quality estimate for five years out, unless you are a quant evaluating special, massaged, projection data (a

More Trending

article thumbnail

Preservica, IRMS and ARA digital preservation training a great success!

Preservica

Over the course of 2015/16 the Preservica team has been pairing up with the Information and Records Management Society (IRMS) and ARA (UK) to deliver a series of practical workshops and webinars on digital preservation. Visiting seven cities across the UK, from London, to Edinburgh, to Dublin, over 200 IRMS and Archives and Records Association (ARA) members attended the workshop sessions, with a further 250 joining for the six ‘how to’ webinars.

article thumbnail

Advocate General Advises EU’s Highest Court that IP Addresses are Personal Data

Hunton Privacy

On May 12, 2016, the Advocate General (“AG”) of the Court of Justice of the European Union (“CJEU”) issued an opinion stating that Internet Protocol (“IP”) addresses are personal data and data protection law should apply to IP addresses. Specifically, the AG urged the CJEU to rule that a dynamic IP address is personal data to the extent that an Internet access provider has additional data that in combination with the IP address would allow for the re-identification of the user.

article thumbnail

[AIIM16] Don't Make Us Think: Getting SharePoint to be Useful, Usable, and Used

JKevinParker

I was a speaker at the 2016 AIIM Conference in New Orleans. AIIM has posted my presentation slides on SlideShare. [AIIM16] Don't Make Us Think: Getting SharePoint to Be Useful, Usable, and Used from AIIM.

article thumbnail

Office of the Privacy Commissioner announces first investigation under the address harvesting provisions

Privacy and Cybersecurity Law

Today, the Office of the Privacy Commissioner (OPC) announced its report of findings against Compu-Finder, a Quebec-based company that offers […].

Privacy 40
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Cryptographic Agility

Imperial Violet

( These are notes that I wrote up from a talk that I gave at the National Academies Forum on Cyber Resilience. You can tell that it was in Washington, DC because of the “cyber”. I wasn't quite sure how technical to pitch this talk so it's relatively introductory; regular readers probably know all this. This isn't a transcript of what I said, but I try to hit the main points in my notes. ).

IT 108
article thumbnail

Do you really know how your customers will behave?

CGI

Do you really know how your customers will behave? shobana.lv@cgi.com. Fri, 05/27/2016 - 00:51. As technology changes, so do customer behaviors, and so must our business processes. (I use the term customer loosely here to represent the larger set of consumers, employees, citizens and other stakeholders that may be among your target audiences.). When the majority of your customers have decided that digital is their preferred way to interact with your organization, the tipping point for digital tr

article thumbnail

Live Streaming Security Games

ForAllSecure

Aside from our cool research , ForAllSecure also works on creating fun and engaging games to promote computer security. Just about every employee in our company has been involved in Capture the Flag exercises for the past several years, and we have been hosting these online events for our customers for about 3 years now. One of our big dreams is to see these types of contests gain in popularity, similar to how e-sports grew.

article thumbnail

EU Council Adopts the Network and Information Security Directive

Hunton Privacy

On May 17, 2016, the European Council adopted its position at first reading of the Network and Information Security Directive (the “NIS Directive”). The NIS Directive was proposed by the European Commission on February 7, 2013, as part of its cybersecurity strategy for the European Union, and is designed to increase cooperation between EU Member States on cybersecurity issues.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Reflections on the 2016 AIIM Conference

JKevinParker

AIIM16 in New Orleans is over, and I must say it was a fantastic experience. I loved being an attendee, I enjoyed speaking, and I was honored to receive the 2016 AIIM Leadership Award for Social Buzz. Read my full reflections on LinkedIn Pulse: Reflections on the 2016 AIIM Conference.

IT 40
article thumbnail

DB2 for z/OS: When Did You Last Check Your Checkpoint Frequency?

Robert's Db2

I have written in this blog a few entries about various DB2 for z/OS ZPARM parameters, including a post on DSMAX and another on EDM_SKELETON_POOL. Time for another such entry, this time focused on the parameters that determine when a DB2 subsystem will perform checkpoint processing. Checkpointing is an availability-enhancing mechanism that is related to DB2's deferred write functionality.

IT 48
article thumbnail

Supreme Court Finds Consumers Must Prove Injury in Class Actions

Hunton Privacy

On May 16, 2016, the United States Supreme Court issued a decision in Spokeo Inc. v. Thomas Robins , holding 6-2 that the Ninth Circuit’s ruling applied an incomplete analysis when it failed to consider both aspects of the injury-in-fact requirement under Article III. Writing for the Court, Justice Samuel Alito found that a consumer could not sue Spokeo, Inc., an alleged consumer reporting agency that operates a “people search engine,” for a mere statutory violation without alleging actual injur

Risk 53
article thumbnail

Irish DPA Expected to Question EU Standard Contractual Clauses before Irish Courts

Hunton Privacy

On May 25, 2016, Max Schrems stated that the Irish Data Protection Commissioner (the “DPC”) is expected to bring legal proceedings before the Irish courts concerning international data transfers under EU Standard Contractual Clauses. In an unofficial statement to the Irish press, a representative of the DPC confirmed the DPC’s intention to seek declaratory relief in the Irish High Court and to recommend that the case be referred to the Court of Justice of the European Union (“CJEU”) for a prelim

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

FTC Orders Mobile Device Manufacturers to Provide Information about Security Updates for Study

Hunton Privacy

On May 9, 2016, the Federal Trade Commission announced it had issued Orders to File a Special Report (“Orders”) to eight mobile device manufacturers requiring them to, for purposes of the FTC’s ongoing study of the mobile ecosystem, provide the FTC with “information about how [the companies] issue security updates to address vulnerabilities in smartphones, tablets, and other mobile devices.

article thumbnail

FTC Announces First APEC Cross-Border Privacy Rules Enforcement Action

Hunton Privacy

On May 4, 2016, the Federal Trade Commission issued a press release announcing its recent settlement with the hand-held vaporizers manufacturer, Very Incognito Technologies, Inc. (“Vipvape”). The FTC had charged Vipvape with falsely claiming that it was a certified company under the Asia-Pacific Economic Cooperation (“APEC”) Cross-Border Privacy Rules (“CBPR”) framework.

Privacy 45
article thumbnail

EU General Data Protection Regulation Published in the EU Official Journal

Hunton Privacy

On May 4, 2016, the EU General Data Protection Regulation (“GDPR”) was published in the Official Journal of the European Union. Following the European Parliament’s vote to adopt the GDPR on April 14, 2016, and the signing of the final draft on April 27, 2016, the GDPR will enter into force 20 days following its publication in the Official Journal of the European Union.

GDPR 45
article thumbnail

CII Issues Investor-Engagement Guide on Cyber Risk

Hunton Privacy

Recently, the Council of Institutional Investors (“CII”) issued a guide to shareholder engagement on cyber risk. The guide is intended to enable shareholders to ask appropriate questions of boards to gauge whether companies are taking proper steps to mitigate cyber risk. The guide poses the following five questions: How are the company’s cyber risks communicated to the board, by whom and with what frequency?

Risk 45
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Time and tide waits for no man – IoT in Insurance

CGI

Time and tide waits for no man – IoT in Insurance. p.butler@cgi.com. Fri, 05/27/2016 - 07:25. Table. Time and tide waits for no man. This old saying could also be applied for what is happening in the insurance market with IoT and that given the drive behind IoT in both the consumer and business markets. Given what IoT enables both customers and insurers to understand about themselves and the things they interact with (in near real time) the impact will be huge and it's more likely to be a case

article thumbnail

European Data Protection Supervisor Publishes 2015 Annual Report

Hunton Privacy

On May 24, 2016, the European Data Protection Supervisor (“EDPS”) presented its Annual Report for 2015. The annual report provides an overview of the EDPS’ primary activities in 2015 and sets forth key priorities and challenges for 2016. During 2015, the EDPS focused on ensuring the adoption of a new and effective data protection framework, providing recommendations for the adoption of the General Data Protection Regulation (“GDPR”).

GDPR 40
article thumbnail

The Internet of Things (IoT) – creating a whole new ‘place’ in marketing

CGI

The Internet of Things (IoT) – creating a whole new ‘place’ in marketing. p.butler@cgi.com. Thu, 05/26/2016 - 04:36. Table. “The traditional model we all grew up with is obsolete”. Jim Stengel, global marketing officer, P&G. My mobile phone finally gave up last week. I’ve had it for ages. For such a ‘simple’ lifestyle device, the options are many. Sim-only or contract?

IoT 40
article thumbnail

Will Spokeo Undermine CAFA?

Hunton Privacy

As we previously reported , the Supreme Court’s decision in Spokeo v. Robins has been nearly universally lauded by defense counsel as a new bulwark against class actions alleging technical violations of federal statutes. It may be that. But Spokeo also poses a significant threat to defendants by defeating their ability to remove exactly the types of cases that defendants most want in federal court.

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

UK ICO Issues Priorities for GDPR Preparation

Hunton Privacy

On May 24, 2016, the UK Information Commissioner’s Office (“ICO”) published priorities for preparing for the EU General Data Protection Regulation (“GDPR”). The ICO’s priorities for issuing guidance to assist organizations with GDPR preparation are split into three phases. Phase 1 – Familiarization and Key Building Blocks. This phase focuses on issuing guidance to help organizations understand the key differences between the EU Data Protection Directive and the GDPR.

GDPR 40
article thumbnail

NTIA Releases Drone Privacy Best Practices

Hunton Privacy

On May 19, 2016, the U.S. Department of Commerce’s National Telecommunications and Information Administration (“NTIA”) announced that its multistakeholder process to develop best practices to address privacy, transparency and accountability issues related to private and commercial use of unmanned aircraft systems (“UAS”) had concluded with the group reaching a consensus on a best practices document.

Privacy 40
article thumbnail

Parking Spaces and the Sharing Economy

CGI

Parking Spaces and the Sharing Economy. p.butler@cgi.com. Thu, 05/19/2016 - 07:28. The media abounds with new phrases which seek to define emerging trends - the sharing economy is one such trend. Danny Wootton in his blog, The Collaborative Economy – A Constant Through the Ages explains the idea behind the sharing (or collaborative) economy. Taking examples from the work of Jeremiah Owyang to show how consumer trends are moving away from traditional service or product purchase to sharing asset o

IoT 40