Sat.Jun 25, 2016 - Fri.Jul 01, 2016

article thumbnail

Second Reading of China’s Draft of Cybersecurity Law

Hunton Privacy

On June 27, 2016, the Standing Committee of the National People’s Congress of the People’s Republic of China held a second reading of the draft Cybersecurity Law (the “second draft”). The law is aimed at strengthening the protection and security of key information infrastructure and important data in China. As we previously reported , the first draft of the Cybersecurity Law was published for comment almost a year ago, but the National People’s Congress has not published the full second dr

article thumbnail

DB2 for z/OS: Indexes and Foreign Keys

Robert's Db2

The functionality of DB2 for z/OS is enhanced, in ways small and big, on a regular basis. There's plenty to keep up with, and it is understandable that some product improvements could fly under the radar of a database administrator and escape notice. I encountered this situation a few weeks ago. During a presentation on new features and functions of DB2 11, delivered to an audience comprised mostly of DB2 DBAs, I was asked, "When will we see a lifting of the restriction that requires an index on

IT 48
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Topic Intelligence Infographic

Attensa

Check out our infographic below and get accustomed to how Attensa topics work and what it can do for organizations. If you haven’t yet, feel free to read our introductory post on Topic Intelligence here which contains a useful explanation video on what topic intelligence is. Enjoy! The post Topic Intelligence Infographic appeared first on Attensa Inc.

article thumbnail

The dangers of short-term thinking on digital information

Preservica

We recently hosted a webinar with the Information Governance Initiative (IGI), to explore the risks to digital content and the dangers of short-term thinking when it comes to governing this type of information. Joining Preservica commercial director, Mike Quinn, were three globally recognised expert speakers - Barclay T. Blair and Ann Snyder of the IGI and Jason Baron of Drinker, Biddle & Reath – who between them discussed the risk to records and what can be done to protect them.

article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Revised Privacy Shield Documents Leaked to Politico

Hunton Privacy

On June 29, 2016, Politico reported that it has obtained updated EU-U.S. Privacy Shield documents following the latest negotiations between U.S. and EU government authorities. Certain aspects of the prior Privacy Shield framework were criticized by the Article 29 Working Party , the European Parliament and the European Data Protection Supervisor. Although there has been no official confirmation that the updated documents reflect the latest iteration of the Privacy Shield framework, the documents

Privacy 56

More Trending

article thumbnail

memcpy (and friends) with NULL pointers

Imperial Violet

The C standard (ISO/IEC 9899:2011) has a sane-seeming definition of memcpy (section 7.24.2.1): The memcpy function copies n characters from the object pointed to by s2 into the object pointed to by s1. Apart from a prohibition on passing overlapping objects, I think every C programmer understands that. However, the standard also says (section 7.1.4): If an argument to a function has an invalid value (such as a value outside the domain of the function, or a pointer outside the address space of th

Libraries 135
article thumbnail

French Parliament Rejects Data Localization Amendment

Hunton Privacy

On June 30, 2016, a joint committee composed of representatives from both chambers of the French Parliament (“Joint Committee”) reached a common position on the French ‘Digital Republic’ Bill that rejects the data localization amendment previously approved by the French Senate, but significantly amends other aspects of the French Data Protection Act.

GDPR 53
article thumbnail

Draft Released in the Philippines Implementing Rules for the Data Privacy Act

Hunton Privacy

This post has been updated. . On June 17, 2016, the National Privacy Commission (the “Commission”) of the Philippines released draft guidelines entitled, Implementing Rules and Regulations of the Data Privacy Act of 2012 (“IRR”), for public consultation. Under the IRR, the processing of personal data has to adhere to the principles of transparency, legitimate purpose and proportionality.

article thumbnail

Complete Our GDPR Readiness Survey

Hunton Privacy

With the EU General Data Protection Regulation (“GDPR”) enacted and due to come into force in May 2018, the Centre for Information Policy Leadership at Hunton & Williams and AvePoint have launched a global survey to enable organizations to benchmark their readiness for the GDPR. The survey focuses on the key areas of impact and change for organizations under the GDPR, such as consent, legitimate interest, data portability, profiling, privacy impact assessments, DPOs, data transfers and priva

GDPR 45
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

China Publishes First Regulation Expressly Regulating Mobile Apps

Hunton Privacy

On June 28, 2016, the State Internet Information Office of the People’s Republic of China published the Administrative Provisions on Information Services for Mobile Internet Applications (the “App Administrative Provisions”). This is the first regulation that expressly regulates mobile apps in the People’s Republic of China. Before the App Administrative Provisions were published, the P.R.C.

article thumbnail

FTC Increases Maximum Fines for Violations of Certain Sections of the FTC Act

Hunton Privacy

On June 29, 2016, the Federal Trade Commission announced that, to account for inflation, it is increasing the civil penalty maximums for certain violations of the FTC Act effective August 1, 2016. The FTC’s authority for issuing these adjustments comes from the Federal Civil Penalties Inflation Adjustment Act Improvements Act of 2015. The Federal Register Notice indicates which sections of the FTC Act the adjustments will apply to, and the corresponding increases.

IT 40
article thumbnail

China Publishes Provision to Regulate Internet Search Services

Hunton Privacy

On June 25, 2016, the Cyberspace Administration of China published its new Administrative Provisions on Internet Information Search Services (the “Provisions”). The Provisions will come into effect on August 1, 2016. Under the Provisions, Internet information search service providers (“service providers”), which include operators of search engines, are required to adopt information security management systems, such as systems enabling the review of information, real-time inspection of public inf