Sat.Sep 16, 2017 - Fri.Sep 22, 2017

article thumbnail

How many audit controls does an organisation need to establish to show that it takes data protection seriously?

Data Protector

Whenever I visit a clinic for a health check, I’m asked a slightly different set of questions. Each clinic is very professionally run, and, until recently I haven’t been unduly concerned that the same questions aren’t always asked. I’ve generally been healthy, so I guess there was never any real need for the medical profession to probe too deeply. So, why should I be worried about different questions being asked about data protection?

GDPR 120
article thumbnail

How to reduce costs during a corporate file move

TAB OnRecord

Along with mergers and acquisitions, corporate moves are one of the biggest challenges a records management team can face. The thought of organizing, packing, and re-shelving entire record collections is one that sends a chill down the spine of most records managers. It's a good thing corporate moves don't come around that often! The silver… Read More.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

It’s one rule for big data, another for its victims | John Naughton

The Guardian Data Protection

The massive – and avoidable – data breach at credit agency Equifax has left millions of consumers at risk, but don’t expect anyone to be held to account Last week, much of the tech world was temporarily unhinged by a circus in Cupertino , where a group of ageing hipster billionaires unveiled some impressive technology while miming the argot of teenage fandom (incredible, amazing, awesome, etc) and pretending that they were changing the world.

article thumbnail

Transforming a city with data and insight

IBM Big Data Hub

For the first time in human experience, there’s the opportunity to transform a city by listening to all of its inhabitants, individually. That’s the mission of the Jakarta Smart City (JSC) project, and it’s a major challenge in a district of some 10 million residents.

IT 84
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Scrutinising the Data Protection Bill: The case for a Keeling Schedule

Data Protector

Parliamentarians who are tasked with scrutinising the Data Protection Bill have an inenviable job. Can there be a less desirable appointment than siting on a Parliamentary Committee, scrutinising text that many seasoned data protection professionals have thrown their arms up in the air in despair over? Given that the Bill is intended to last a generation, (the current Act will have lasted 20 years by the time of its repeal) , surely we deserve something we can more readily understand.

More Trending

article thumbnail

Hurricane Redux: Hurricane Maria Targets Puerto Rico, USVI, and Threatens Mainland U.S.

National Archives Records Express

As Hurricane Maria, now a Category 5 hurricane, bears down on Puerto Rico and U.S. Virgin Islands, before possibly turning northeast and threatening the east coast of the U.S, we again remind Agency Records Officers that NARA posts records emergency information and other useful guidance to pass along to other agency personnel. This information is also still relevant for any Federal agencies that experienced damage to their records as a result of Hurricanes Harvey and Irma.

article thumbnail

IBM Business Intelligence ranks highly. But here's what matters most

IBM Big Data Hub

The most recent BARC Score report ranks business intelligence (BI) vendors, but more notably states your BI platform must be strategic and able to span requirements.

67
article thumbnail

Canada’s Privacy Commissioner Pursues a Stronger Consent Framework and More Proactive Enforcement

Privacy and Cybersecurity Law

On September 21st, 2017, Daniel Therrien, Canada’s Federal Privacy Commissioner, tabled his annual report to Canada’s Parliament today. The report […].

Privacy 52
article thumbnail

Why Your Compliance Team Shouldn’t Leave Customer Journey Mapping to Marketing

Hanzo Learning Center

As a compliance professional, you’re probably too swamped with regulations (like the approaching GDPR deadline) to get involved with what your marketing team does on a daily basis. Of course, you make sure all of your marketing materials meet compliance regulations, then you’re on to the next department. Unfortunately, you might be missing out on protecting your business from noncompliance by not participating in this important marketing activity.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

CNIL Launches Public Consultation on Transparency and International Data Transfers under the GDPR

Hunton Privacy

On September 19, 2017, the French Data Protection Authority (“CNIL”) launched an online public consultation on two topics identified by the Article 29 Working Party (“Working Party”) in its 2017 action plan for the implementation of the EU General Data Protection Regulation (“GDPR”). These two topics are transparency and international data transfers.

GDPR 49
article thumbnail

Data Backups: Types and Methods [Video]

Record Nations

Data backup is an essential process to ensure business stability and security. Any data that isn’t backed up regularly risks being lost, stolen, or accidentally deleted. Below learn about the different strategies and techniques for data backup so you can keep your data safe. Transcript Backup Types: Rule of Three The risk of losing days, […].

Risk 49
article thumbnail

Update: NARA’s Draft Strategic Plan, 2018-2022

National Archives Records Express

The NARA draft strategic plan has been updated and submitted to the Office of Management and Budget (OMB) for their review. We want to offer our sincere thank you to all who provided us with comments and questions. We made a number of changes to this version. The most obvious change is that we added narrative descriptions for each objective. These new narratives better describe the current state and our vision for the future, as well as identify strategies for how we plan to achieve each object

article thumbnail

The Vital Part of Customer Journey Mapping You Might Have Forgotten

Hanzo Learning Center

Your marketing department has probably spent a considerable amount of time analyzing the flow of your website. As a business, it’s incredibly important to make sure that your customer’s experience guides them to interact with your website in a way that drives leads and decisions. While analyzing your U/X is valuable for this reason, mapping your customer’s journey can actually save your company from serious fines and penalties down the road.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

FTC to Host Workshop on Informational Injury

Hunton Privacy

The Federal Trade Commission will host a workshop on informational injury on December 12, 2017. The FTC’s three main goals for hosting the workshop are to: “Better identify the qualitatively different types of injury to consumers and businesses from privacy and data security incidents;”. “Explore frameworks for how the FTC might approach quantitatively measuring such injuries and estimate the risk of their occurrence;” and.

Privacy 49
article thumbnail

What are the Risks of Not Backing Up Data?

Record Nations

We use a lot of data. Currently, the world’s daily data output reaches about 2.5 quintillion bytes—with the U.S. accounting for 2,657,700 gigabytes every minute. There are 3,607,080 Google searches a minute, 456,000 tweets sent per minute, and Amazon rakes in $258,751.90 in sales every minute. Not only is an unfathomably large amount of data […].

Risk 46
article thumbnail

A Change In Context

The Falcon's View

Today marks the end of my first week in a new job. As of this past Monday, I am now a Manager, Security Engineering, with Pearson. I'll be handling a variety of responsibilities, initially mixed between security architecture and team management. I view this opportunity as a chance to reset my career after the myriad challenges experienced over the past decade.

article thumbnail

How the Equifax Breach Impacts Banks and Credit Unions

Rippleshot

The Equifax data breach has created a ripple effect in the financial services ecosystem that’s causing consumers, banks and credit unions to prepare for the storm of fraud likely to occur as a result of the massive breach that’s estimated to impact 143 million consumers and more than 200,000 credit cards. And that’s just one of the breaches. Equifax confirmed earlier this week that the company suffered another hack in March.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Lisa Sotto Selected as Arbitrator for the EU-U.S. Privacy Shield

Hunton Privacy

Hunton & Williams LLP is pleased to announce that Lisa Sotto , chair of the firm’s top-ranked Global Privacy and Cybersecurity practice and managing partner of the firm’s New York office, has been selected as an arbitrator in connection with the EU-U.S. Privacy Shield Framework Binding Arbitration Program. The Program, developed by the U.S. Department of Commerce and European Commission, provides the terms under which Privacy Shield organizations are obligated to arbitrate claims, pursuant t

Privacy 40
article thumbnail

Canada’s Privacy Commissioner Pursues a Stronger Consent Framework and More Proactive Enforcement

Privacy and Cybersecurity Law

On September 21 st , 2017, Daniel Therrien, Canada’s Federal Privacy Commissioner, tabled his annual report to Canada’s Parliament today. The report to Parliament includes results and recommendations with respect to the OPC’s study on consent. In addition, the Commissioner requests Parliament overhaul Canada’s federal private sector legislation – the Personal Information Protection and Electronic Documents Act (PIPEDA).

Privacy 40
article thumbnail

Draft mandatory data breach reporting regulations released for comment in Canada

Data Protection Report

On September 2, 2017, the Government of Canada published proposed new data breach regulations in the Canada Gazette. These regulations set out specifics regarding the mandatory data breach reporting requirements under the Personal Information Protection and Electronic Documents Act. The PIPEDA Amendments were passed in June, 2015 but are not yet in force.

article thumbnail

Focus on Google DeepMind under the GDPR’s Lens

HL Chronicle of Data Protection

The Information Commissioner’s Officer (ICO) ruled, on 3 July 2017, that the Royal Free NHS Foundation Trust (the Trust) had failed to comply with the Data Protection Act 1998 (DPA) when it provided 1.6 million patient details to Google DeepMind as part of a trial diagnosis and detection system for acute kidney injury, and required the Trust to sign an undertaking.

GDPR 40
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Lisa Sotto Invited to Speak at Privacy Shield’s First Annual Joint Review

Hunton Privacy

On September 18, 2017, the European Commission (“Commission”) and U.S. Department of Commerce (“Department”) kicked off their first annual joint review of the EU-U.S. Privacy Shield (“Privacy Shield”). To aid in the review, the Department invited a few industry leaders, including Hunton & Williams’ partner Lisa J. Sotto , who chairs the firm’s Global Privacy and Cybersecurity practice and the U.S.

Privacy 40
article thumbnail

Automating Business Processes Means Productive Workers, Not Fewer Workers

Docuware

There are few topics in the press that generate more heat – and less light – than the role that automation, machine learning, and technology play in either creating or destroying jobs. Fortune magazine notes: “The notion that robots or automation will take on the jobs of millions of people is a nagging source of anxiety for many people … workers ranging from truck drivers—of which there are an estimated 1.8 million in the U.S.— to airline pilots to paralegals to surgeons are already being affect

43
article thumbnail

An Unexplained Death and an Unacceptable System

Archives Blogs

“Power to the People!” Young Lords Puerto Rican activist Julio Roldan chanted from his holding cell in Manhattan’s infamous “Tombs” prison in 1970. A few hours later he was found dead, having hanged himself according to an official investigation, murdered by guards according to his supporters. In this press conference, civil rights attorney William vanden Heuvel answers questions and summarizes the findings of a committee appointed by Mayor Lindsay in the aftermath

article thumbnail

Excited to join Dropbox!

Scary Beasts Security

I’m excited to announce that I’ve joined Dropbox as their new Head of Security. Truth be told, I ’ve been here a little while and I’ve been enjoying on-boarding too much to make the announcement. If you were wondering why my blog has been quiet for a while, now you know why! I exited a fun period of semi-retirement to take up this challenge. What attracted me to Dropbox enough to make the switch?

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Download Our Newest Comprehensive Case Study on Les Schwab

IGI

As part of the IGI’s ongoing work to help professionalize and promote information governance (IG) we have the opportunity to see how hundreds of different organizations approach IG. Although every organization’s IG challenge is unique there are actually more similarities than differences in IG problems and their solutions. By looking at one organization’s experience with IG in detail, we can learn valuable lessons and gain practical insights that will help all IG professionals mature their IG pr

article thumbnail

Customer Spotlight: LGC Hospitality Cuts Submission Time for 50,000 Applicants

Docuware

When a hotel executive needs hospitality staffing for an event within 24-hour’s notice, LGC Hospitality provides an employee with the right experience and certifications to get the job done. LGC fills hospitality positions throughout the U.S. and processes paperwork for more than 50,000 applicants every year. The company issues W-2 forms for more than 24,000 temporary employees as well.

Cloud 20
article thumbnail

Naturalization Ceremony

Archives Blogs

As part of the celebrations for Constitution Day and Citizenship Day, 30 new citizens from 22 nations were sworn in last week as new U.S. citizens in front of the Constitution in the Rotunda of the National Archives Museum in Washington, DC. The new citizens are from Benin, Bangladesh, Cameroon, Canada, Colombia, Cote D’Ivoire, El Salvador, Eritrea, Ethiopia, France, Guyana, India, Italy, Liberia, Mexico, Nigeria, Pakistan, Romania, Senegal, Slovakia, Togo, and Vietnam.