August, 2015

article thumbnail

The (discrete) search for the new Information Commissioner

Data Protector

The (discrete) search to appoint a successor to David Smith, soon-to-retire Deputy Information Commissioner and Director of Data Protection is over. Shortly, the successful candidate will be unveiled. Don't worry, it’s not me. And a (discrete) search will commence to find a suitable replacement for Chris Graham, soon-to-be outgoing Commissioner. How secret should this process be, and when is it appropriate to extend the selection process?

article thumbnail

Branch Deepviews: Routing Around The Damage of Apps and App Stores

John Battelle's Searchblog

The post Branch Deepviews: Routing Around The Damage of Apps and App Stores appeared first on John Battelle's Search Blog. But it’s also the year a better one will be born. 2015 is the year the old internet finally died [link]. — John Battelle (@johnbattelle) August 7, 2015. Over and over again, the press and pundits are declaring the death of the “web we once knew.” And despite having solid proof to the contrary, I’ve always responded that the web will never die, th

IT 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Third Circuit Upholds FTC’s Authority to Regulate Companies’ Data Security Practices

Hunton Privacy

On August 24, 2015, the United States Court of Appeals for the Third Circuit issued its opinion in Federal Trade Commission v. Wyndham Worldwide Corporation (“Wyndham”), affirming a district court holding that the Federal Trade Commission has the authority to regulate companies’ data security practices. As we previously reported , the case stems from Wyndham’s challenge to the FTC’s authority to bring a 2012 suit against Wyndham, in which the FTC alleged that the company’s failure to maintain re

article thumbnail

How phishing works

Elie

Phishing is a social-engineering attack where the attacker entice his victims to give-up their credentials for a given website by impersonating it. Believe it or not phishing campaigns are well organized and follow a very strict playbook. This post aim at shedding some light on how phishing campaign works under the hood, showcase which infrastructure phishers use to steal users credentials and provide advice on how to defend against it.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

EU close to doing a deal on Safe Harbor

Privacy and Cybersecurity Law

It has been reported today by the Reuters news agency that the European Commission is working with the US on […].

IT 52

More Trending

article thumbnail

Do privacy laws prevent police forces from naming suspects?

Data Protector

I was asked this question at 6.15 am today. And, if I knew the answer, was I available for a BBC radio interview immediately after the 7.00 am news? No and Yes were my answers – so I subsequently had a chat with BBC Radio’s Adrian Goldberg. The question arose because the Birmingham Mail had asked West Midlands Police to disclose the names and images of ten suspects it had been hunting for at least a decade for crimes including rape and murder.

Privacy 136
article thumbnail

This Is How We Pick A NewCo

John Battelle's Searchblog

The post This Is How We Pick A NewCo appeared first on John Battelle's Search Blog. Over on the NewCo site , I’ve updated our explanation of how we chose NewCos around the world (1,100 or so so far). Here’s that post for those readers at Searchblog who might be interested. . Since we launched NewCo’s festivals in late 2012, tens of thousands of people have experienced the unique NewCo model of “getting out to get in.

article thumbnail

FTC Reaches Settlement with Thirteen Companies over Safe Harbor Misrepresentations

Hunton Privacy

On August 17, 2015, the Federal Trade Commission announced proposed settlements with 13 companies over allegations that they misled consumers by falsely claiming to be Safe Harbor certified when their certifications had lapsed or they had never been certified at all. Seven companies, including Golf Connect, LLC, Contract Logix, LLC and Forensics Consulting Solutions, LLC, allegedly claimed to have a current certification in one or both of the U.S.

Privacy 49
article thumbnail

Discussing the Chief Information Governance Officer with AHIMA

Barclay T Blair

Good article from Mary Butler over at AHIMA that does a nice job of describing both my enthusiasm and wariness on the CIGO role: Blair, however, has been among the most outspoken IG experts to advocate for the widespread adoption of the role chief information governance officer (CIGO), which would, ideally, put IG in the C-suite of an organization.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

IT Life: The Never Ending Story

Preservica

Jon Tilbury has recently been profiled in TechWeek Europe. In IT life: The Never Ending Story, Jon takes readers through his career in technology, and also includes a few predictions and thoughts on the greatest challenges IT departments are facing today. Click here to read the full article.

IT 40
article thumbnail

Monetizing data: New ways to grow the value of data assets

CGI

Monetizing data: New ways to grow the value of data assets. ravi.kumarv@cgi.com. Wed, 08/19/2015 - 00:22. If getting insights from data analysis is good for an organization’s internal purposes, it’s even better when insights are shared with outside stakeholders, such as customers and partners. Sometimes the term “monetizing data” is used to describe this concept, but it may be a bit misleading.

article thumbnail

In praise of David Smith

Data Protector

As Deputy Commissioner David Smith completes his last lap of the data protection conference circuit, various speakers are extending their hastily-prepared remarks to include a short homily on his contribution to data protection over the decades. Yes, he really has been at the ICO for decades. It's a convention that public servants are never presented with anything other than small tokens of appreciation from grateful hosts.

IT 120
article thumbnail

Spanning SF and Oakland: The First Ever NewCo Bay Bridge Festival Lineup Is Out!

John Battelle's Searchblog

The post Spanning SF and Oakland: The First Ever NewCo Bay Bridge Festival Lineup Is Out! appeared first on John Battelle's Search Blog. While NewCo has been celebrating unique San Francisco companies for three years, 2015 is the first year we’ve produced our hometown festival with a fully staffed and funded team. And it shows: We’re adding Oakland as a companion city to San Francisco this year, and more than 200 companies will be opening their doors for a four-day festival this

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

CIPL Comments on the Indonesian Draft Data Protection Regulation with New White Paper on Cross-Border Data Transfers Mechanism

Hunton Privacy

On August 20, 2015, the Centre for Information Policy Leadership at Hunton & Williams (“CIPL”) filed comments to the Indonesian Draft Regulation proposed by the Minister of Communication and Information (RPM) of the Protection of Personal Data in Electronic Systems. The comments were limited to the issue of cross-border data transfers and were submitted in the form of a new CIPL white paper entitled Cross-Border Data Transfer Mechanisms.

Paper 40
article thumbnail

The slow death of EU forum shopping

Privacy and Cybersecurity Law

Forum shopping (i.e. where businesses pick and choose the most privacy-friendly EU state to set up shop) has always been […].

Privacy 40
article thumbnail

What Does a DB2 for z/OS System Look Like When You Have Memory to Burn?

Robert's Db2

I've long been an advocate of Big Memory (meaning, lots of real storage) for DB2 for z/OS systems. For years, I was disappointed at seeing one production DB2 subsystem after another running in a z/OS LPAR with 16 GB, 20 GB, maybe 40 GB of memory -- enough real storage to run decently, but not enough to let DB2 do its thing with maximum performance. It was like seeing a thoroughbred racehorse in a small coral.

Sales 48
article thumbnail

Cyber dashboards demonstrate value to executives

CGI

Cyber dashboards demonstrate value to executives. shobana.lv@cgi.com. Tue, 08/11/2015 - 08:00. Organizations can spend a lot of money on cybersecurity, where the people, processes and tools all need to work together. Cyber threats are constantly changing, which means toolsets are changing as well, and cyber professionals need constant training. They also need ample time to participate in cyber communities where information about ever-more sophisticated threats is shared.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

How effective is the Telephone Preference Service?

Data Protector

I don't know, either. The TPS’s website provides individuals with an easy way to register their objection to receiving unsolicited direct marketing calls, but no information on how effective it is at stamping out these practices. There’s no information on the volume of complaints it receives, and how these are trending over time. There’s no information on the work it does to investigate these complaints, before handing them to the Information Commissioner’s Office.

Marketing 120
article thumbnail

Information Transparency & The “True Cost” Calculator

John Battelle's Searchblog

The post Information Transparency & The “True Cost” Calculator appeared first on John Battelle's Search Blog. The view from Bolinas. It’s been so long since I’ve written here, and I’ve missed it terribly. As startups tend to do, NewCo has taken over most of my waking hours. So I thought I’d just sit and write for a spell, even if what comes out isn’t fully baked.

article thumbnail

German DPA Fines Two Companies for the Unlawful Transfer of Customer Data as Part of an Asset Deal

Hunton Privacy

On July 30, 2015, the Bavarian Data Protection Authority (“DPA”) issued a press release stating that it imposed a significant fine on both the seller and purchaser in an asset deal for unlawfully transferring customer personal data as part of the deal. In the press release, the DPA stated that customer data often have significant economic value to businesses, particularly with respect to delivering personalized advertising.

article thumbnail

Subject Access Request risk: limits in sight?

Privacy and Cybersecurity Law

A recent High Court case took a very robust stance on the issue of DSARs (Data Subject Access Requests) being […].

Access 40
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

DB2 for z/OS: Which Buffer Pools Should You Page-Fix?

Robert's Db2

A few days ago, I delivered a presentation on DB2 for z/OS performance monitoring and tuning for the DBA team at a large financial institution. At one point during the session, an attendee asked this question: "Which of our buffer pools should we page-fix?" Because that's a good question, and because it's a question to which the answer has changed over the years, I decided to make it the subject of this blog entry.

IT 48
article thumbnail

Why are so many privacy professionals driven to despair?

Data Protector

Why are so many privacy professionals driven to despair? Don’t worry. It’s not that unusual for privacy professionals to be driven to despair by the demands of their job. It’s just a mindset that most of them go through when business “requirements” and legal “restrictions” continually clash. As Tom Fletcher, the UK’s former Ambassador to the Lebanon recently put it : “You think you’re reached rock bottom – then you hear a noise from below.

Privacy 120
article thumbnail

Surveillance after Snowden

Data Protector

Students of surveillance and counter terrorism have another (81 page) report to add to their summer reading list. The Henry Jackson Society has recently published " SurveillanceAfter Snowden: Effective Espionage in an Age of Transparency. " The report, written by Robin Simcox, looks at the ways the actions of Edward Snowden have impacted the US and the UK, particularly with regards to safeguarding national security.

article thumbnail

Online Trust Alliance Releases Privacy and Data Security Framework for Internet of Things

Hunton Privacy

On August 11, 2015, the Online Trust Alliance, a nonprofit group whose goal is to increase online trust and promote the vitality of the Internet, released a framework (the “Framework”) for best practices in privacy and data security for the Internet of Things. The Framework was developed by the Internet of Things Trustworthy Working Group, which the Online Trust Alliance created in January 2015 to address “the mounting concerns and collective impact of connected devices.”.

Privacy 40
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Delaware Governor Signs Set of Online Privacy Bills

Hunton Privacy

On August 7, 2015, Delaware Governor Jack Markell signed four bills into law concerning online privacy. The bills, drafted by the Delaware Attorney General, focus on protecting the privacy of website and mobile app users, children, students and crime victims. 1. The Delaware Online and Personal Privacy Protection Act. The Delaware Online and Personal Privacy Protection Act (S.B. 68) will require operators of commercial internet services such as websites and mobile apps to make a privacy policy c

Privacy 40
article thumbnail

Privacy by Design Certification offered by Ryerson University

Hunton Privacy

On May 25, 2015, the Privacy and Big Data Institute at Ryerson University in Canada announced that it is offering a Privacy by Design Certification. Privacy by Design is a “framework that seeks to proactively embed privacy into the design specifications of information technologies” to obtain the most secure data protection possible. Organizations that attain the certification will be permitted to post a “Certification Shield” “to demonstrate to consumers that they have withstood the scrutiny of

Privacy 40
article thumbnail

Neiman Marcus Seeks En Banc Review

Hunton Privacy

On August 3, 2015, Neiman Marcus requested en banc review of the Seventh Circuit’s recent decision in Remijas v. Neiman Marcus Group, LLC , No. 14-3122. As we previously reported , the Seventh Circuit found that members of a putative class alleged sufficient facts to establish standing to sue Neiman Marcus following a 2013 data breach. During that breach, hackers gained access to customers’ credit and debit card information.