June, 2016

article thumbnail

Second Reading of China’s Draft of Cybersecurity Law

Hunton Privacy

On June 27, 2016, the Standing Committee of the National People’s Congress of the People’s Republic of China held a second reading of the draft Cybersecurity Law (the “second draft”). The law is aimed at strengthening the protection and security of key information infrastructure and important data in China. As we previously reported , the first draft of the Cybersecurity Law was published for comment almost a year ago, but the National People’s Congress has not published the full second dr

article thumbnail

DB2 for z/OS: Indexes and Foreign Keys

Robert's Db2

The functionality of DB2 for z/OS is enhanced, in ways small and big, on a regular basis. There's plenty to keep up with, and it is understandable that some product improvements could fly under the radar of a database administrator and escape notice. I encountered this situation a few weeks ago. During a presentation on new features and functions of DB2 11, delivered to an audience comprised mostly of DB2 DBAs, I was asked, "When will we see a lifting of the restriction that requires an index on

IT 48
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How google helps 600,000 webmasters re-secure their hacked sites every year

Elie

Every year, close to 600,000 sites are hacked. Given the scale of the problem, notifying users to prevent harm and webmasters so they can clean up their sites is critical to combat hacking. This post looks at the effectiveness of the current warning strategies used by Google and their long-term impact.

article thumbnail

Topic Intelligence Infographic

Attensa

Check out our infographic below and get accustomed to how Attensa topics work and what it can do for organizations. If you haven’t yet, feel free to read our introductory post on Topic Intelligence here which contains a useful explanation video on what topic intelligence is. Enjoy! The post Topic Intelligence Infographic appeared first on Attensa Inc.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The dangers of short-term thinking on digital information

Preservica

We recently hosted a webinar with the Information Governance Initiative (IGI), to explore the risks to digital content and the dangers of short-term thinking when it comes to governing this type of information. Joining Preservica commercial director, Mike Quinn, were three globally recognised expert speakers - Barclay T. Blair and Ann Snyder of the IGI and Jason Baron of Drinker, Biddle & Reath – who between them discussed the risk to records and what can be done to protect them.

More Trending

article thumbnail

Revised Privacy Shield Documents Leaked to Politico

Hunton Privacy

On June 29, 2016, Politico reported that it has obtained updated EU-U.S. Privacy Shield documents following the latest negotiations between U.S. and EU government authorities. Certain aspects of the prior Privacy Shield framework were criticized by the Article 29 Working Party , the European Parliament and the European Data Protection Supervisor. Although there has been no official confirmation that the updated documents reflect the latest iteration of the Privacy Shield framework, the documents

Privacy 56
article thumbnail

Now is the time for your organisation to pilot Robotic Process Automation

CGI

Now is the time for your organisation to pilot Robotic Process Automation. p.butler@cgi.com. Wed, 06/15/2016 - 06:57. Table. Zuboff’s Laws…. “Everything that can be automated will be automated”. "Everything that can be informated will be informated". The benefits of implementing Robotic Process Automation (RPA) to automate business processes that are standardised, rules based, and repetitive but liable to error and variation are well documented. .

article thumbnail

MER Shows IG Advances

Positively RIM

The 24 th annual MER Conference ended May 25 amid solid growth and optimism. That refers to both the attendees and the conference itself. This was a roll-up-your-sleeves-and-get-to-work edition of MER. There was a notable lack of identity-angst, replaced by a prevailing attitude of, “We know why we’re here,”, “We know what needs to be done,” and, “We want to learn the tools, strategies, and tactics that are going to get us where we need to go.

article thumbnail

Topic Intelligence

Attensa

This past year Attensa introduced an entirely new platform. It evolved from our ongoing discussions with customers and mission to create systems that empower people to work smarter and more effectively by leveraging information and knowledge. The common objective that info and knowledge management professionals shared with us was “how can we better utilize the information we have and make sure it gets to the right people?

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

My Latest Columns

John Battelle's Searchblog

The post My Latest Columns appeared first on John Battelle's Search Blog. In meetings with several colleagues over the past few days, many did not know about the column I write each week – I’ve been remiss and not cross posting my writings from NewCo Shift here. It’s been interesting to move my main focus of writing from a personal blog to a publication in-the-making.

IT 40
article thumbnail

AIIM On Air Podcast Interview

JKevinParker

I was interviewed by Kevin Craine for AIIM On Air. Also in this episode is an interview with information management consultant Chris Walker. Listen to the Interview.

40
article thumbnail

The Bavarian DPA Issues Paper on Certifications Under the GDPR

Hunton Privacy

On June 22, 2016, the Bavarian Data Protection Authority (“DPA”) issued a short paper on certifications under Article 42 of the General Data Protection Regulation (“GDPR”). The GDPR will become effective on May 25, 2018. This paper is part of a series of papers that the Bavarian DPA will be issuing periodically on specific topics of the GDPR to inform the public about what topics are being discussed within the DPA.

Paper 56
article thumbnail

Technical debt: public sector at the forefront

CGI

Technical debt: public sector at the forefront. narmada.devarajan. Wed, 06/08/2016 - 02:48. Representing up to 40% of information systems volume, unused lines of source code, also known as “technical debt,” create higher operating costs for IT departments. The public sector in particular is struggling with this problem. Technical debt is an increasing burden on the IT systems of all organizations, regardless of size.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

What does BREXIT mean for data protection?

Privacy and Cybersecurity Law

On 23 June 2016, the UK is holding a referendum as to whether to stay in the European Union or […].

40
article thumbnail

memcpy (and friends) with NULL pointers

Imperial Violet

The C standard (ISO/IEC 9899:2011) has a sane-seeming definition of memcpy (section 7.24.2.1): The memcpy function copies n characters from the object pointed to by s2 into the object pointed to by s1. Apart from a prohibition on passing overlapping objects, I think every C programmer understands that. However, the standard also says (section 7.1.4): If an argument to a function has an invalid value (such as a value outside the domain of the function, or a pointer outside the address space of th

Libraries 135
article thumbnail

Slack + Attensa

Attensa

Slack is a powerful tool that has changed the way we communicate. Internally within an organization or publicly, people are able to leverage the power of channels (#) in the workplace. Now if you couple Slack with Attensa RSS publishing, you have something even better. You have the ability to inform people tuning in to your channel with information managed by Attensa topics.

Sales 40
article thumbnail

CNIL Launches Public Consultation on EU General Data Protection Regulation

Hunton Privacy

On June 16, 2016, the French Data Protection Authority (“CNIL”) launched a public consultation on the four priority topics identified by the Article 29 Working Party (“Working Party”) in its February 2016 action plan for the implementation of the EU General Data Protection Regulation (“GDPR”). One of these priorities is to issue guidance to help data controllers and data processors prepare for the GDPR.

GDPR 56
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Belgian Court of Cassation Rules on Right to Be Forgotten

Hunton Privacy

In a recently published decision, the Belgian Court of Cassation confirmed the broad interpretation given to the “right to be forgotten” by a Belgian Court of Appeal ( i.e. , Cour d’Appel de Liège, 2013/RG/393, September 25, 2014). The judgment was rendered in a case initiated by an individual against a Belgian newspaper for not complying with a request to remove from its online archives an article from 1994 regarding a car accident causing the death of two persons in which the individual was in

article thumbnail

Draft Released in the Philippines Implementing Rules for the Data Privacy Act

Hunton Privacy

This post has been updated. . On June 17, 2016, the National Privacy Commission (the “Commission”) of the Philippines released draft guidelines entitled, Implementing Rules and Regulations of the Data Privacy Act of 2012 (“IRR”), for public consultation. Under the IRR, the processing of personal data has to adhere to the principles of transparency, legitimate purpose and proportionality.

article thumbnail

European Commission Could Approve Privacy Shield in Early July

Hunton Privacy

According to Bloomberg BNA , the EU-U.S. Privacy Shield framework could be approved by the European Commission in early July. The Privacy Shield is a successor framework to the Safe Harbor, which was invalidated by the European Court of Justice in October 2015. Certain provisions of the Privacy Shield documents, previously released by the European Commission on February 29, 2016, have been subjected to criticism by the Article 29 Working Party , the European Parliament and the European Data Prot

Privacy 53
article thumbnail

Ad Network to Pay Nearly 1 Million in Civil Penalties to Settle FTC Charges That It Geo-Tracked Consumers Without Permission

Hunton Privacy

On June 22, 2016, the Federal Trade Commission announced a settlement with Singaporean-based mobile advertising network, InMobi, resolving charges that the company deceptively tracked hundreds of millions of consumers’ locations, including children, without their knowledge or consent. Among other requirements, the settlement orders the company to pay $950,000 in civil penalties. .

IT 49
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Lisa Sotto Interviewed: Are Law Firms Soft Targets for Hackers?

Hunton Privacy

In a recent video published by Mimesis Law, Lisa Sotto , chair of the firm’s Global Privacy and Cybersecurity practice , was interviewed during Mimesis Law’s Cy-Pher Executive Roundtable in New York. Sotto, along with several other privacy professionals, discussed the risks that law firms face in protecting their clients’ confidential information, as well as their own data.

Privacy 49
article thumbnail

New Do-Not-Call List Launched in France

Hunton Privacy

On June 1, 2016, a new do-not-call list (the “BLOCTEL list”) was implemented in France. French residents who do not wish to receive marketing phone calls may register their landline or mobile phone number online at www.bloctel.gouv.fr. The BLOCTEL list was created by French Consumer Law No. 2014-344 of March 17, 2014. This law prohibits companies from (1) making marketing calls to a consumer registered on the BLOCTEL list, except if the consumer is an existing customer of that company, and (2) s

article thumbnail

Complete Our GDPR Readiness Survey

Hunton Privacy

With the EU General Data Protection Regulation (“GDPR”) enacted and due to come into force in May 2018, the Centre for Information Policy Leadership at Hunton & Williams and AvePoint have launched a global survey to enable organizations to benchmark their readiness for the GDPR. The survey focuses on the key areas of impact and change for organizations under the GDPR, such as consent, legitimate interest, data portability, profiling, privacy impact assessments, DPOs, data transfers and priva

GDPR 45
article thumbnail

DHS and DOJ Issue Final Guidance on the Cybersecurity Information Sharing Act of 2015

Hunton Privacy

On June 15, 2016, the U.S. Department of Homeland Security (“DHS”) and U.S. Department of Justice (“DOJ”) jointly issued final guidance on the Cybersecurity Information Sharing Act of 2015 (“CISA”). Enacted in December 2015, CISA includes a variety of measures designed to strengthen private and public sector cybersecurity. In particular, CISA provides protections from civil liability, regulatory action and disclosure under the Freedom of Information Act (“FOIA”) and other open government laws fo

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

U.S. Government Seeks to Join Schrems Case

Hunton Privacy

On June 13, 2016, the U.S. government expressed its wish to join the legal proceedings brought by Max Schrems concerning the validity of international data transfers under EU Standard Contractual Clauses. Along with the U.S. government, the Irish Business and Employers Confederation and the Business Software Alliance, an industry trade group, also informed Ireland’s High Court of their desire to be added to the case as amici curiae , or “friends of the court.” Each party will now hav

article thumbnail

EU and U.S. Sign Umbrella Agreement

Hunton Privacy

On June 2, 2016, the European Union and the U.S. signed an Umbrella Agreement , which will implement a comprehensive data protection framework for criminal law enforcement cooperation. The agreement is not yet in effect and additional procedural steps are needed to finalize the agreement. The European Council will adopt a decision on the Umbrella Agreement after obtaining consent from the European Parliament.

article thumbnail

EDPS Releases Opinion on the EU-U.S. Privacy Shield

Hunton Privacy

On May 30, 2016, the European Data Protection Supervisor (“EDPS”) released its Opinion (the “Opinion”) on the EU-U.S. Privacy Shield (the “Privacy Shield”) draft adequacy decision. The Privacy Shield was created to replace the previous Safe Harbor framework invalidated by the Court of Justice of the European Union (“CJEU”) in the Schrems decision. Similar to the conclusion drawn from the Article 29 Working Party’s Opinion and the Resolution of the European Parliament, the Opinion recognizes the

Privacy 45