February, 2017

article thumbnail

Stuck in the Middle (of Information Management) With You

Weissman's World

If you’re reading this, you already know how valuable it can be to better manage your organization’s business-critical information, and improve the business processes that make that information available to those who need it, when they need it. (Information governance to the rescue!) If you’ve tried doing this, then you probably also know how hard […].

article thumbnail

Moonshots

MIKE 2.0

In business, we tend to focus on the incremental changes we are dealing with every day. The big opportunities always seem too far away to build into our monthly, quarterly or even annual plans. These opportunities, though, are the “moonshots” that completely change the world and generate growth for years to come. The big changes can come from unexpected places.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Wanna Get Away – Generals Password

Roger's Information Security

I see this was posted 3 months ago to Youtube, but its new to me. This being blogging, lets over-analyze. The General’s password is ihatemyjob1. Not a bad password. Using a passphrase is easy to remember. Easy to type. No doubt he should have capitalized the “I” Most systems can handle spaces, which would add some length. Putting in a “@” in for a and a “0” in for o would add some complexity.

article thumbnail

China Publishes Draft Measures for Security Review of Network Products and Services

Hunton Privacy

On February 4, 2017, the Cyberspace Administration of China published a draft of its proposed Measures for the Security Review of Network Products and Services (the “Draft”). Under the Cybersecurity Law of China , if an operator of key information infrastructure purchases network products and services that may affect national security, a security review is required.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Insurers’ digital focus is looking through the wrong ‘lens’

CGI

Insurers’ digital focus is looking through the wrong ‘lens’. harini.kottees…. Tue, 02/28/2017 - 03:52. Read any article on digital insurance and it seems to me that it is all about the insurers! Big data, fraud reduction, improved risk ratios, cross product customer engagement are common themes in the trade and advisor “blogsphere”. Whilst these are undoubtedly areas where the insurance operating model can be improved and indeed transformed by the use of new technology, they all seem to miss the

More Trending

article thumbnail

Are Your Records Home by Curfew?

Positively RIM

Today’s Blog is sponsored by MER 2017, Cohasset Associates’ 25 th annual educational conference on electronic records management, in Chicago, May 8-10. Sorry to be the one to tell you, but “secure information” is an illusion. No records are really 100 percent secure. We protect our information, but we only create improvement, not assurance. If you think you can totally protect your information, forget it.

article thumbnail

DB2 for z/OS: the PGSTEAL and PGFIX Options of -ALTER BUFFERPOOL

Robert's Db2

Recently, a DB2 for z/OS professional I’ve known for some years sent to me a question about the relationship between the PGSTEAL and PGFIX options of the DB2 command -ALTER BUFFERPOOL. It took a few iterations of question and answer to get things straightened out, and I thought, “Hmm. If this person, who has lots of DB2 for z/OS experience and knowledge, needed a little help in getting PGSTEAL and PGFIX straightened out in his mind, it's likely that other DB2 people are in the same boat.

IT 48
article thumbnail

Introspection on a Recent Downward Spiral

The Falcon's View

Alrighty. now that my RSA summary post is out of the way, let's get into a deeply personal post about how absolutely horrible of a week I had at RSA. Actually, that's not fair. The first half of the week was ok, but some truly horrible human beings targeted me (on social media) on Wednesday of that week, and it drove me straight down into a major depressive crash that left me reeling for days (well, frankly, through to today still).

IT 58
article thumbnail

House of Representatives Passes Email Privacy Act

Hunton Privacy

On February 6, 2017, the House of Representatives suspended its rules and passed by voice vote H.R 387 , the Email Privacy Act. As we previously reported , the Email Privacy Act amends the Electronic Communications Privacy Act (“ECPA”) of 1986. In particular, the legislation would require government entities to obtain a warrant, based on probable cause, before accessing the content of any emails or electronic communications stored with third-party service providers, regardless of how long the co

Privacy 53
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Digital Transformation in UK General Insurance: Where do MGAs fit in?

CGI

Digital Transformation in UK General Insurance: Where do MGAs fit in? harini.kottees…. Tue, 02/28/2017 - 04:15. A lot of attention has been drawn to the digital developments that are being undertaken by insurers in the direct marketplace, but whilst direct is an important market, transformation of the indirect channel is also deserving of more attention.

article thumbnail

The Functions of #eDiscovery

Information is Currency

In today’s information age Information Governance is essential to be prepared for eDiscovery. People are hungry for information and submit Freedom of Information Act (FOIA) request at a startling pace. We live in a very litigious age and the only way to be prepared for eDiscovery request whether via FOIA or a lawsuit is by having a strong Information Governance foundation.

FOIA 40
article thumbnail

We’re Launching An Entire Event Around Employer Branding in Brooklyn

IT Governance

A spin through LinkedIn’s recently-released 2017 Annual Global Recruiting Trends report confirms that employer branding is one of the hottest topics – if not the hottest topic – in the industry. LinkedIn surveys some 4,000 HR pros each year and, just like the 2016 edition, employer branding features prominently in the report. It’s listed as one of the top five takeaways in the entire 32-page read.

IT 63
article thumbnail

UK Government Quizzed on GDPR Implementation and Post-Brexit Data Protection

Hunton Privacy

On February 1, 2017, Matt Hancock, the UK Government Minister responsible for data protection, was questioned by the House of Lords committee on the UK’s implementation plan of the EU General Data Protection Regulation (“GDPR”) in the context of the UK’s looming exit from the EU. In responding to the questioning, Hancock revealed further details into the UK Government’s position on implementing the GDPR into UK law.

GDPR 53
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

CNIL Launches New Public Consultation on the GDPR

Hunton Privacy

On February 23, 2017, the French Data Protection Authority (“CNIL”) launched an online public consultation on three topics identified by the Article 29 Working Party (“Working Party”) in its 2017 action plan for the implementation of the EU General Data Protection Regulation (“GDPR”). The three topics are consent, profiling and data breach notification.

GDPR 49
article thumbnail

DPA of Argentina Issues Draft Data Protection Bill

Hunton Privacy

As previously published on the Data Privacy Laws blog, Pablo A. Palazzi, partner at Buenos Aires law firm Allende & Brea, provides the following report. Earlier this month, the Argentine Data Protection Agency (“DPA”) posted the first draft of a new data protection bill (the “Draft Bill”) on its website. Argentina’s current data protection bill was enacted in December 2000.

GDPR 49
article thumbnail

Article 29 Working Party Clarifies Process for Resolving Privacy Shield Complaints

Hunton Privacy

On February 20, 2017, the Article 29 Working Party (“Working Party”) issued a template complaint form and Rules of Procedure that clarify the role of the EU Data Protection Authorities (“DPAs”) in resolving EU-U.S. Privacy Shield -related (“Privacy Shield”) complaints. The Working Party’s template complaint form indicates that it is intended for use by EU individuals who wish to have their commercial-related complaints associated with Privacy Shield-certified organizations resolved by their nati

Privacy 45
article thumbnail

FTC Announces Settlements with Three Companies Accused of Deceiving Consumers About Participating in APEC CBPR Program

Hunton Privacy

On February 22, 2017, the Federal Trade Commission announced that it had reached settlement agreements (“the Proposed Agreements”) with three U.S. companies charged with deceiving consumers about their participation in the Asia-Pacific Economic Cooperation Cross-Border Privacy Rules (“APEC CBPR”) system. The three companies are Sentinel Labs, Inc. (which provides endpoint protection software), SpyChatter, Inc.

Privacy 45
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Health Insurer Reaches Privacy Settlement with New Jersey Division of Consumer Affairs

Hunton Privacy

On February 17, 2017, Horizon Blue Cross Blue Shield of New Jersey (“Horizon”) agreed to pay $1.1 million as part of a settlement with the New Jersey Division of Consumer Affairs (the “Division”) regarding allegations that Horizon did not adequately protect the privacy of nearly 690,000 policyholders. The settlement stemmed from the theft of two laptops stolen from Horizon headquarters in November 2013, when personnel from outside vendors performing renovations and moving services at Horizon’s N

article thumbnail

Australia Enacts New Data Breach Notification Law

Hunton Privacy

On February 13, 2017, the Parliament of Australia passed legislation that amends the Privacy Act of 1988 (the “Privacy Act”) and requires companies with revenue over $3 million AUD ($2.3 million USD) to notify affected Australian residents and the Australian Information Commissioner (the “Commissioner”) in the event of an “eligible data breach.”. The Privacy Act defines “personal information” to include “information or an opinion about an identified individual, or an individual who is reasonably

article thumbnail

UK Government Releases Plan for Exiting the EU

Hunton Privacy

On February 2, 2017, the UK government published a white paper entitled The United Kingdom’s exit from and new partnership with the European Union (the “white paper”). The white paper strikes a conciliatory tone, making it clear that the UK intends to maintain close ties with the European Union and its 27 remaining Member States after Brexit. A large portion of the white paper is devoted to discussing the issues at the heart of the 2016 Brexit referendum, such as immigration controls, continuing

article thumbnail

Protecting the bank in a digital world

CGI

Protecting the bank in a digital world. shobana.lv@cgi.com. Wed, 02/22/2017 - 01:58. Today's digital world of multi-dimensional, organized criminal threats ruthlessly exposes the weak points in any financial institutions anti-financial crime (AFC) defences. Criminals are long gone usually before you even realize you are a victim. The challenge is how to more proactively defend against these new threats.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

CIPL Submits Comments to Article 29 Working Party’s Proposed Guidelines

Hunton Privacy

On February 15, 2017, the Centre for Information Policy Leadership (“CIPL”) at Hunton & Williams LLP submitted two sets of formal comments to the Article 29 Working Party (the “Working Party”). CIPL commented on the Guidelines for identifying a controller or processor’s lead supervisory authority (“Lead Authority Guidelines”), and on the Guidelines on the right to data portability (“Data Portability Guidelines”).

GDPR 40
article thumbnail

Optimizing healthcare value with prescriptive analytics – Part 2

CGI

Optimizing healthcare value with prescriptive analytics – Part 2. shobana.lv@cgi.com. Mon, 02/20/2017 - 08:00. Moving from “what if” to “what’s best”. In my previous blog on this topic , I discussed the need to shift analytics from monitoring and reporting of what has happened, to using analytics to make decisions. More specifically, to achieve continuous improvements in terms of quality of care, access to care and cost of care, our decisions need to be informed by data and directed by prescript

article thumbnail

10 measures for good IT security governance

CGI

10 measures for good IT security governance. harini.kottees…. Wed, 02/15/2017 - 01:58. The sophistication and persistence of cyber-attacks are driven by the attractiveness of an organization’s role and assets. Often they are conducted by highly skilled international organized crime groups or foreign nation states that aim their attacks not just at government entities, but also at corporations, including those with large-scale financial and credit card assets and foreign investments, and those in

article thumbnail

OCR Issues Penalty for Noncompliance with HIPAA Privacy and Security Rules

Hunton Privacy

On February 1, 2017, the U.S. Department of Health and Human Services’ Office for Civil Rights (“OCR”) announced a $3.2 million civil monetary penalty against Children’s Medical Center of Dallas (“Children’s”) for alleged ongoing violations of the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Privacy and Security Rules, following two consecutive breaches of patient electronic protected health information (“ePHI”).

Privacy 40
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Seizing the opportunities of digital transformation

CGI

Seizing the opportunities of digital transformation. shobana.lv@cgi.com. Thu, 02/02/2017 - 06:22. Digital transformation is having a huge impact on all organizations—large and small, private and public. Competition from new market players, fast-changing consumer and citizen demands, and the proliferation of new business models is disrupting the status quo.

article thumbnail

European Data Protection Supervisor Publishes Priorities for 2017

Hunton Privacy

On February 15, 2017, the European Data Protection Supervisor (“EDPS”) published its Priorities for 2017 (the “EDPS Priorities”). The EDPS Priorities consist of a note listing the strategic priorities and a color-coded table listing the European Commission’s proposals that require the EDPS’ attention, sorted by level of priority. In line with the EDPS Strategy 2015-2019 and pursuant to the Commission Work Programme 2017 , the EDPS will set its focus on the following areas of strategic importance

Privacy 60
article thumbnail

RSA USA 2017 In Review

The Falcon's View

Now that I've had a week to recover from the annual infosec circus event to end all circus events, I figured it's a good time to attempt being reflective and proffer my thoughts on the event, themes, what I saw, etc, etc, etc. For starters, holy moly, 43,000+ people?!?!?!?!?! I mean. good grief. the event was about a quarter of that a decade ago. If you've never been to RSA, or if you only started attending in the last couple years, then it's really hard to describe to you how dramatic the chang