October, 2015

article thumbnail

Written First On Medium. Discuss.

John Battelle's Searchblog

The post Written First On Medium. Discuss. appeared first on John Battelle's Search Blog. Image Credit Arch Cape Inn. So I had a thought about the state of the publishing world, specifically that part of it that we’d call blogging(1). And it struck me. Why haven’t we made our own Medium? No, wait, that doesn’t quite sound right. Medium is awesome, and in fact I am writing this post in ( on ?!

article thumbnail

NIST Releases Final Report on De-Identification of Personal Information

Hunton Privacy

The National Institute of Standards and Technology (“NIST”) recently released the final draft of its report entitled De-Identification of Personal Information. The report stems from a review conducted by NIST of various de-identification techniques for removal of personal information from computerized documents. While de-identification techniques are widely used, there is concern that existing techniques are insufficient to protect personal privacy because certain remaining information can make

Privacy 75
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Introducing AIIM: The Global Community of Information Professionals

JKevinParker

It is no secret that I love AIIM International. I owe a lot to AIIM for my professional development, industry knowledge, and the wonderful network within our industry. I only wish I had learned about AIIM much sooner than I did! So, this post is a very quick introduction to some of the value I see that AIIM offers. Please share it with anyone you think can benefit from AIIM Professional Membership.

ECM 64
article thumbnail

Surviving the eye of the enterprise hype storm

Collaboration 2.0

At the height of conference season it can seem the hi-tech 'tail' is wagging the customer 'dog', despite increasingly sophisticated business needs. As some businesses transform to bring software in house to meet strategic needs, some hi-tech marketing rhetoric stretches reality and credibility.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Cybersecurity: Actions to take for elected officials and agency heads

CGI

Cybersécurité – Mesures à prendre par les représentants élus et les dirigeants d’organismes gouvernementaux. Anonymous. Thu, 10/29/2015 - 07:39. Lorsque les représentants sont élus ou nommés, ils prêtent serment afin de confirmer leur volonté de bien remplir leurs fonctions. Ce serment consiste à jurer qu’ils feront « du mieux qu’ils pourront » pour représenter ceux qui les ont élus ou nommés, et ce, de manière « honorable et intègre ».

More Trending

article thumbnail

Maker, Soylent, Hyperloop, USC: The Places I’ll Visit In LA Next Month

John Battelle's Searchblog

The post Maker, Soylent, Hyperloop, USC: The Places I’ll Visit In LA Next Month appeared first on John Battelle's Search Blog. (cross posted from NewCo ). Picking a schedule for a NewCo festival is an art – it takes a lot more time and thought than your average event. But it’s also fun – each session and company description has been highly curated, and I learn a lot simply by reading through the diversity of experiences that are on offer.

IT 76
article thumbnail

GPEN Launches New Global Consumer Privacy Protection Initiative

Hunton Privacy

On October 26, 2015, the Federal Trade Commission (“FTC”) issued a press release on the Global Privacy Enforcement Network (“GPEN”) Alert , a new multilateral information sharing system that would allow participating agencies to share information relating to an investigation in order to facilitate better cross-border coordination. The FTC, along with agencies from seven other nations, signed a Memorandum of Understanding at the 37th International Conference of Data Protection and Privacy Commiss

Privacy 58
article thumbnail

Finally! A Way to Make SharePoint Useful

JKevinParker

On 8/26/2015, I was the featured speaker for an AIIM Webinar on SharePoint and how to make it useful. View the presentation recording at the AIIM site , or browse the slides below. Finally! A Way to Make SharePoint Useful from AIIM Webinar Description According to a recent AIIM survey, 37% of SharePoint users have failed to achieve their original expectations for the platform.

Cloud 45
article thumbnail

Surviving the eye of the enterprise hype storm

Collaboration 2.0

At the height of conference season it can seem the hi-tech 'tail' is wagging the customer 'dog', despite increasingly sophisticated business needs. As some businesses transform to bring software in house to meet strategic needs, some hi-tech marketing rhetoric stretches reality and credibility.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Security in the finance sector: Whose role is it anyway?

CGI

Security in the finance sector: Whose role is it anyway? Anonymous. Mon, 10/26/2015 - 01:33. Despite increasing regulations across the finance sector globally, fraud and associated risks continue to increase—and at a staggering pace. Thomson Reuters was recently quoted as saying, “Increased regulation isn’t just a temporary challenge for global financial institutions—it’s the new reality.”.

IT 40
article thumbnail

Safe Harbor Decision today!

Privacy and Cybersecurity Law

Today, the Court of Justice of the European Union (CJEU) handed down its ruling in relation to the Schrems case. […].

IT 40
article thumbnail

DB2 for z/OS: Getting a Handle on a CPU-Constrained Environment

Robert's Db2

z/OS systems are famous for their reliability, and part of that story is the ability of z/OS to accommodate surges of application activity: you can pile more and more work onto a z/OS system, and it will keep on trucking, slicing the "pie" of available processing capacity into smaller and smaller slices to keep a workload moving along. That's highly preferable to failing as a result of being overloaded, but there is a point at which applications running on a z/OS system will perform in a sub-opt

IT 48
article thumbnail

Article 29 Working Party Issues Statement on Consequences of Safe Harbor Ruling

Hunton Privacy

On October 16, 2015, the Article 29 Working Party (the “Working Party”) issued a statement on the consequences of the recent ruling of the Court of Justice of the European Union (the “CJEU”) invalidating the European Commission’s Safe Harbor Decision. In its statement, the Working Party called upon the EU Member States and EU institutions to open discussions with U.S. authorities in order to find political, legal and technical solutions enabling transfers to the U.S. that respect EU citizens’ fu

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Secure Your Computer and Avoid Pop-up Scams

JKevinParker

If you get a pop-up while surfing the Web that claims you have a virus or a trojan horse or other security issue, don't believe it, don't call the number, and don't click any links or even their "OK" button. Just close your browser (and all open programs) and run your computer's security scan. I just ran across a pop-up with a toll-free number and a message of doom and gloom in both text and audio, urging me to call their tech support line to get my computer fixed.

article thumbnail

EU Commissioner Announces Further Guidance on the Impact of the Safe Harbor Ruling and an Agreement “In Principle” on a New Safe Harbor Framework

Hunton Privacy

On Monday, October 26, 2015, EU Commissioner for Justice, Consumers and Gender Equality, V?ra Jourová, gave a speech before the European Parliament’s Committee on Civil Liberties, Justice and Home Affairs (“LIBE Committee”) on the recent ruling by the Court of Justice of the European Union (the “CJEU”) that invalidated the European Commission’s Safe Harbor Decision.

article thumbnail

Senate Passes Cybersecurity Information Sharing Act

Hunton Privacy

On October 27, 2015, the U.S. Senate passed S.754 – Cybersecurity Information Sharing Act of 2015 (“CISA”) by a vote of 74 to 21. CISA is intended to facilitate and encourage the sharing of Internet traffic information between and among companies and the federal government to prevent cyber attacks, by giving companies legal immunity from antitrust and privacy lawsuits.

article thumbnail

CJEU Declares the Commission’s U.S. Safe Harbor Decision Invalid

Hunton Privacy

On October 6, 2015, the Court of Justice of the European Union (the “CJEU”) issued its judgment in the Schrems v. Facebook case, following the Opinion of the Advocate General published on September 23, 2015. In its judgment, the CJEU concluded that: The national data protection authorities (“DPAs”) have the power to investigate and suspend international data transfers even where the European Commission (the “Commission”) has adopted a decision finding that a third country affords an adequate lev

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

FCC Cites Lyft Inc. and First National Bank Corp. for TCPA Violations

Hunton Privacy

On September 11, 2015, the Federal Communications Commission (“FCC”) announced that Lyft Inc. (“Lyft”) and First National Bank Corporation (“FNB”) violated the Telephone Consumer Protection Act (“TCPA”) by forcing their users to consent to receive automated text messages as a condition of using their services. The FCC warned that these violations could result in fines if they continue.

article thumbnail

German Parliament Adopts Data Retention Law with Localization Requirement

Hunton Privacy

On October 16, 2015, the German Parliament adopted a new data retention law requiring telecommunications operators and Internet service providers to retain customer Internet and phone usage data, including phone numbers, call times, IP addresses, and the international identifiers of mobile users (if applicable) for 10 weeks. The law requires user location data obtained in connection with mobile phone services to be retained for four weeks.

IT 45
article thumbnail

German DPA Issues Position Paper on Data Transfer Mechanisms in Light of CJEU Safe Harbor Decision

Hunton Privacy

On October 14, 2015, the data protection authority (“DPA”) in the German state of Schleswig-Holstein ( Unabhängiges Landeszentrum für Datenschutz ) issued a position paper (the “Position Paper”) on the Safe Harbor Decision of the Court of Justice of the European Union (the “CJEU”). In the Position Paper, the DPA disagrees with the European Commission’s (the “Commission’s”) opinion that alternative data transfer mechanisms may be used in place of Safe Harbor.

Paper 45
article thumbnail

UK Deputy Information Commissioner on Safe Harbor: “Don’t Panic”

Hunton Privacy

On October 27, 2015, David Smith, the UK Deputy Commissioner of the Information Commissioner’s Office (“ICO”), published a blog post commenting on the ongoing Safe Harbor compliance debate in light of the Schrems v. Facebook decision of the Court of Justice of the European Union. His key message to organizations was, “Don’t panic.”. After engaging in a brief analysis of the implications of the decision, David Smith asked, “Where does this leave businesses that are using the Safe Harbor?

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

German DPAs Issue Joint Position Paper on Alternatives to Safe Harbor

Hunton Privacy

On October 26, 2015, the German federal and state data protection authorities (the “German DPAs”) published a joint position paper on Safe Harbor and potential alternatives for transfers of data to the U.S. (the “Position Paper”). The Position Paper follows the Court of Justice of the European Union’s (the “CJEU’s”) ruling on Safe Harbor and contains 14 statements regarding the ruling, including the following key highlights: In light of the Safe Harbor Decision of the CJEU, the German DPAs call

Paper 40
article thumbnail

Federal Court: Attorney-Client Privilege and Work-Product Doctrine Upheld for Materials Associated with Internal Data Breach Investigation

Hunton Privacy

On October 23, 2015, the United States District Court for the District of Minnesota, in large part, upheld Target’s assertion of the attorney-client privilege and work-product protections for information associated with a privileged, internal investigation of Target’s 2013 data breach. The plaintiffs contended that the challenged information was not protected by the attorney-client privilege or the work-product doctrine because “Target would have had to investigate and fix the data breach regard

article thumbnail

Putative Data Breach Class Action Against Uber Dismissed Without Prejudice

Hunton Privacy

The United States District Court for the Northern District of California recently dismissed?without prejudice?a former Uber driver’s class action complaint. The driver, Sasha Antman, was one of roughly 50,000 drivers whose personal information was exposed during a May 2014 data breach. Uber contended the accessed files contained only the affected individuals’ names and drivers’ license numbers.

article thumbnail

Irish Data Protection Authority to Investigate Facebook’s Data Transfers

Hunton Privacy

On October 20, 2015, at a hearing in the Irish High Court, Irish Data Protection Commissioner Helen Dixon confirmed that she will investigate allegations made by privacy activist Max Schrems concerning Facebook’s transfer of personal data to the U.S. in reliance on Safe Harbor. Dixon welcomed the ruling of the High Court and noted that she would proceed to “investigate the substance of the complaint with all due diligence.” In 2013, Schrems complained to the Irish Data Protection Commissio

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

CIPL Supports Theme of “Privacy Bridges” at 37th International Privacy Conference in Amsterdam

Hunton Privacy

On October 27, 2015, Hunton & Williams LLP’s Centre for Information Policy Leadership (“CIPL”) will conduct a joint workshop with Nymity on Bridging Disparate Privacy Regimes through Organizational Accountability. As a side event to the 37th International Privacy Conference in Amsterdam during the week of October 26, the workshop is specifically designed to support and further explore the theme of global “ Privacy Bridges ” that will be discussed at the International Privacy Conference.

Privacy 40
article thumbnail

FTC Advertising Practices Division Chief of Staff Phyllis Marcus Joins Hunton

Hunton Privacy

Hunton & Williams welcomes Phyllis H. Marcus as counsel to the firm’s privacy and competition teams. Phyllis joins the firm from the Federal Trade Commission, where she held a number of leadership positions, most recently as Chief of Staff of the Division of Advertising Practices. Phyllis led the FTC’s children’s online privacy program, including bringing a number of enforcement actions and overhauling the Children’s Online Privacy Protection Act (“COPPA”) Rule.

Privacy 40
article thumbnail

California Passes New Digital Privacy Law

Hunton Privacy

On October 8, 2015, California Governor Jerry Brown signed into law the California Electronic Communications Privacy Act (“CalECPA”). The law requires police to obtain a warrant before accessing an individual’s private electronic information, such as text messages, emails, GPS data and online documents that are stored in the cloud and on smartphones, tablets, computers and other digital devices.