May, 2015

article thumbnail

Get Out, And Get Into Silicon Valley: SurveyMonkey, Google, GoPro, FlipBoard, & So Many More

John Battelle's Searchblog

The post Get Out, And Get Into Silicon Valley: SurveyMonkey, Google, GoPro, FlipBoard, & So Many More appeared first on John Battelle's Search Blog. Brian and I on SurveyMonkey’s rooftop last year. New York is in the can (what a great event!) and next up, for those of us in the US anyway, is NewCo Silicon Valley. I won’t be able to actually attend NewCo SV, as I’ll be on the road visiting NewCo Amsterdam and NewCo Istanbul.

IT 82
article thumbnail

The enterprise conference circus is in town

Collaboration 2.0

A very busy week for tech conferences sees much repositioning of ERP providers as customer transaction experts. But do prospects want their IT vendors giving them marketing advice?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Justice Department Releases Guidance on Best Practices for Cyber Incident Preparedness

Hunton Privacy

Last week, the Cybersecurity Unit of the U.S. Department of Justice (the “Justice Department”) released a guidance document, entitled Best Practices for Victim Response and Reporting of Cyber Incidents (“Guidance”), discussing best practices for cyber incident response preparedness based on lessons learned by federal prosecutors while handling cyber investigations and prosecutions.

article thumbnail

DB2 11 for z/OS: Setting Aside Space for Updates

Robert's Db2

A DB2 table space is well-organized when rows are physically located where they should be per the clustering index of the associated table. Because a high degree of "clustered-ness" is a desirable quality of a table space (mostly for performance reasons), a DB2 DBA will often take steps to preserve row sequencing between REORGs. One such step that is very commonly executed is the setting aside of space in a table space's pages to accommodate inserts of new rows (relevant for a table that is clus

IT 48
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

HIPAA Breach: Who You Gonna Call?

HIPAA

Everyone knows that you call a plumber for a leaking pipe, a mason for a cracked stonewall, and an electrician to fix faulty wiring. However, when faced with an actual or suspected HIPAA data breach, many folks struggle with determining whom to call. Failure to have contacts lined up ahead of time may pose more than an inconvenience–any delay in bringing in experienced advisors to assist with breach investigation, response and mitigation may result in significant financial and legal consequences

More Trending

article thumbnail

Managing the insider threat is a critical part of enterprise security

CGI

Managing the insider threat is a critical part of enterprise security. shobana.lv@cgi.com. Wed, 05/27/2015 - 01:00. Most security-minded professionals think of a cybersecurity threat as originating outside the organization. But one of the most potentially damaging threats to your organization comes from insiders: people you trust. Insiders have authorized access to many of the corporate (or government) crown jewels.

article thumbnail

The enterprise conference circus is in town!

Collaboration 2.0

A very busy week for tech conferences sees much repositioning of ERP providers as customer transaction experts, but do their prospects want their IT vendors giving them marketing advice?

article thumbnail

Hunton Releases Guide to the Proposed EU General Data Protection Regulation

Hunton Privacy

Hunton & Williams’ EU Privacy and Cybersecurity practice lawyers recently authored The Proposed EU General Data Protection Regulation – A guide for in-house lawyers (the “Guide”), addressing the key impacts of the forthcoming changes to EU data protection law. Current EU data protection law is based on the EU Data Protection Directive 95/46/EC (the “Directive”), which was introduced in 1995.

article thumbnail

Privacy law and anti-spam: Guidance from the Office of the Privacy Commissioner of Canada

Privacy and Cybersecurity Law

Recent enforcement under Canada’s anti-spam legislation (CASL) by the Canadian Radio-Television and Telecommunications Commission (CRTC) is keeping the spotlight on […].

Privacy 40
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Can I Be Sued for a HIPAA Violation?

HIPAA

I am asked that question almost weekly. While the answer has traditionally been “no,” the legal landscape is shifting and the risk of being sued continues to increase. Let’s first start with some background. As some of you may know, HIPAA does not include a “private right of action.” This means that an individual may not file a claim against a covered entity or a business associate in order to enforce HIPAA or seek damages in response to a HIPAA violation.

article thumbnail

What Should Businesses Do With Their Existing Paper Records?

Shoreline Records Management

Now that the panic has subsided from the Brooklyn CitiStorage document warehouse fire (even though it shouldn’t) everyone is back in the out of sight, out of mind thinking as it relates to records management. Businesses need to consider what steps to take to create efficiency with their unique records process, and prevent a crisis like this from happening again.

Paper 28
article thumbnail

Health policy and implementation challenges to achieving big data outcomes - Part 2

CGI

Produire des résultats à partir des données massives : politiques de santé et défis liés à la mise en œuvre – 2e partie. shobana.lv@cgi.com. Tue, 05/12/2015 - 05:00. Dans la première partie de ce billet, j’ai décrit quelques-unes des façons dont les outils de données massives peuvent être utilisés dans le secteur de la santé et j’ai souligné l’ironie de la situation avec laquelle nous devons composer : la qualité et l’efficacité de certaines méthodes d’utilisation des données sont couvertes à la

article thumbnail

For a Large DB2 for z/OS Table, Should You Go With Partition-by-Range or Partition-by-Growth?

Robert's Db2

There are several aspects to this question: What do I mean by "large?" Is the table in question new, or does it exist already? What is the nature of the data in the table, and how will that data be accessed and maintained? I'll try to cover these various angles in this blog entry, and I hope that you will find the information provided to be useful. What is a "large" table?

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Florida Passes Drone Surveillance Bill Requiring Individual Consent

Hunton Privacy

On April 28, 2015, the Florida House of Representatives passed a bill ( SB 766 ) that prohibits businesses and government agencies from using drones to conduct surveillance by capturing images of private real property or individuals on such property without valid written consent under circumstances where a reasonable expectation of privacy exists. The bill expands Florida’s Freedom from Unwarranted Surveillance Act to prohibit the “use [of] a drone equipped with an imaging device to record an im

Privacy 53
article thumbnail

Consent to Disclose Information in Response to a Consumer Complaint – Guidance from Canada

Privacy and Cybersecurity Law

Not infrequently, customers may resort to consumer affairs columnists and other third parties, such as consumer advocacy groups, in order […].

Privacy 40
article thumbnail

HIPAA Breach: Who You Gonna Call?

HIPAA

Everyone knows that you call a plumber for a leaking pipe, a mason for a cracked stonewall, and an electrician to fix faulty wiring. However, when faced with an actual or suspected HIPAA data breach, many folks struggle with determining whom to call. Failure to have contacts lined up ahead of time may pose more than an inconvenience–any delay in bringing in experienced advisors to assist with breach investigation, response and mitigation may result in significant financial and legal consequences

article thumbnail

What Should Businesses Do With Their Existing Paper Records?

Shoreline Records Management

Now that the panic has subsided from the Brooklyn CitiStorage document warehouse fire (even though it shouldn’t) everyone is back in the out of sight, out of mind thinking as it relates to records management. Businesses need to consider what steps to take to create efficiency with their unique records process, and prevent a crisis like this from happening again.

Paper 20
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

A pragmatic solution to the cyber talent shortage: Co-sourcing

CGI

A pragmatic solution to the cyber talent shortage: Co-sourcing. Anonymous. Mon, 05/11/2015 - 02:21. CGI recently partnered with Pierre Audoin Consultants (PAC) to study cybersecurity trends in the United Kingdom. A key question asked was this: “Is cybersecurity now too hard for enterprises?” Of more than 230 respondents from companies with 1,000 employees or more, just 21% reported they do all of their cyber work internally.

article thumbnail

IG: The Whole Is More Than the Sum of Its Parts

Positively RIM

The following article appears -- in slightly different form -- as the lead contribution to a larger work on Information Governance published online by the International Legal Technology Association. Find it at [link] Written with assistance from Ronke' Ekwensi The whole is more than the sum of its parts: That’s Information Governance. Like a jigsaw puzzle, the pieces are fragmentary, but they combine to create a whole, and sometimes beautiful, picture.

IT 40
article thumbnail

Enforcement of the Self-Regulatory Principles for Online Behavioral Advertising in the Mobile Environment to Begin on September 1, 2015

Hunton Privacy

On May 7, 2015, the Digital Advertising Alliance (“DAA”) announced that, as of September 1, 2015, the Council of Better Business Bureaus and the Direct Marketing Association will begin to enforce the DAA Self-Regulatory Principles for Online Behavioral Advertising and the Multi-Site Data Principles (collectively, the “Self-Regulatory Principles”) in the mobile environment.

article thumbnail

Driver’s Licence Information and Test Drives: Guidance from the Alberta Office of the Information Privacy Commissioner

Privacy and Cybersecurity Law

What personal information is reasonable for a motor vehicle dealer to collect from individuals participating in test drives? It has been […].

Privacy 40
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Can I Be Sued for a HIPAA Violation?

HIPAA

I am asked that question almost weekly. While the answer has traditionally been “no,” the legal landscape is shifting and the risk of being sued continues to increase. Let’s first start with some background. As some of you may know, HIPAA does not include a “private right of action.” This means that an individual may not file a claim against a covered entity or a business associate in order to enforce HIPAA or seek damages in response to a HIPAA violation.

article thumbnail

French Data Protection Authority Reveals 2015 Inspection Program

Hunton Privacy

On May 25, 2015, the French Data Protection Authority (“CNIL”) released its long-awaited annual inspection program for 2015. Under French data protection law, the CNIL may conduct four types of inspections: (1) on-site inspections ( i.e. , the CNIL may visit a company’s facilities and access anything that stores personal data); (2) document reviews ( i.e. , the CNIL may require an entity to send documents or files upon written request); (3) hearings ( i.e. , the CNIL may summon representatives o

article thumbnail

Cyber Insurance: Addressing Your Risks and Liabilities

Hunton Privacy

After a number of high-profile data breaches, corporate cybersecurity is facing increased scrutiny and attention from consumers, the government and the public. In a webinar, entitled Cyber Insurance: Addressing Your Risks and Liabilities , hosted by Hunton & Williams LLP and CT , Hunton & Williams partners Lon A. Berk and Lisa J. Sotto provide a background into the current cyber threats and educate companies and their counsel on how to take full advantage of their existing insurance prog

article thumbnail

FCC Advises Broadband Providers to Take Steps to Protect Consumer Privacy

Hunton Privacy

On May 20, 2015, the Federal Communications Commission (“FCC”) released an Enforcement Advisory announcing that its previously-released Open Internet Order “applies the core customer privacy protections of Section 222 of the Communications Act to providers of broadband Internet access service” and that the statutory provisions of Section 222, which historically have been used to protect Consumer Proprietary Network Information on telephone networks, will apply to broadband providers when the Ope

Privacy 45
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

CNIL, ICO and GPEN Review Websites Aimed at Children During Internet Sweep

Hunton Privacy

On May 11, 2015, the French Data Protection Authority (“CNIL”) and the UK Information Commissioner’s Office (”ICO”) announced that they will participate in a coordinated online audit to assess whether websites and apps that are directed toward children, and those that are frequently used by or popular among children, comply with global privacy laws.

Privacy 45
article thumbnail

Centre for Information Policy Leadership Comments on Brazil’s Draft Privacy Law

Hunton Privacy

On May 5, 2015, the Centre for Information Policy Leadership at Hunton & Williams (“CIPL”) filed comments in English and Portuguese on Brazil’s draft law “on the processing of personal data to protect the personality and dignity of natural persons” (the “Draft Law”). CIPL’s comments on the Draft Law focus on several key issues that are particularly important in the context of global privacy policy and practice, including alternatives to consent to legitimize data processing, the use of organ

Privacy 45
article thumbnail

Belgian Data Protection Authority Issues Recommendation on Facebook’s User Tracking

Hunton Privacy

On May 13, 2015, the Belgian Data Protection Authority (the “DPA”) published a recommendation addressing the use of social plug-ins associated with Facebook and its services (the “Recommendation”). The Recommendation stems from the recent discussions between the DPA and Facebook regarding Facebook’s privacy policy and the tracking of individuals’ Internet activities.

Privacy 40