Sat.Jan 07, 2017 - Fri.Jan 13, 2017

article thumbnail

NIST Releases Proposed Updates to Cybersecurity Framework

Hunton Privacy

On January 10, 2017, the National Institute of Standards and Technology (“NIST”) released proposed updates to the Framework for Improving Critical Infrastructure Cybersecurity (the “Cybersecurity Framework”). The proposed updates, which are found in Version 1.1 of the Cybersecurity Framework, are derived from feedback received by NIST regarding the first version, including from responses to a December 2015 request for information and discussions at a workshop held in April 2016.

article thumbnail

A consumer perspective on FinTech disruption (part 2)

CGI

A consumer perspective on FinTech disruption (part 2). shobana.lv@cgi.com. Fri, 01/13/2017 - 00:36. As first mentioned in part 1 of this three-part blog series, the rise in financial technology (FinTech) firms is having a disruptive impact on today’s banks, threatening their customer base and revenue through the launch of new digital services. CGI conducted a survey in 2016 to help gauge this impact, reaching out to bank consumers to explore their expectations and assess how banks can better com

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

When does the General Data Protection Regulation not require firms to appoint a Data Protection Officer?

Data Protector

I’m increasingly asked whether particular firms actually need to appoint a Data Protection Officer in order to comply with the requirements of the GDPR. Given that the potential fine for non-compliance (with Article 37) is €10 million Euros or up to 2% of the total worldwide annual turnover, companies quite understandably don't want to get such a basic issue wrong.

B2B 136
article thumbnail

Configuring GMail to check ISP Mail

Roger's Information Security

My primary email address assigned by my ISP can’t be changed. It gets a lot of spam In the past that wasn’t really a problem because I rarely used it for anything, but a few years ago I foolishly began using it on resumes. Its format is first initial + lastname @ ISP so its relatively professional. Unfortunately there are other people in the world who think that is their email address.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Swiss-U.S. Privacy Shield Announced

Hunton Privacy

On January 11, 2017, the Swiss Federal Data Protection and Information Commissioner announced that it has reached an agreement with the U.S. Department of Commerce on a new Swiss-U.S. Privacy Shield framework (the “Swiss Privacy Shield”), which will allow companies to legally transfer Swiss personal data to the U.S. The Swiss Privacy Shield will replace the U.S.

Privacy 53

More Trending

article thumbnail

We Must Fix This F **g Mess

John Battelle's Searchblog

The post We Must Fix This F **g Mess appeared first on John Battelle's Search Blog. Here are the caveats for the rant I am about to write. The fact that I am writing this on Medium will cause many of you to dismiss me for hypocrisy. Don’t. Read to the end. I will be saying the word “F*CK” a lot. If that bothers you, time to depart for calmer waters.

article thumbnail

Email Privacy Act Reintroduced in Congress

Hunton Privacy

On January 9, 2017, Representatives Kevin Yoder (R-KS) and Jared Polis (D-CO) reintroduced the Email Privacy Act, which would amend the Electronic Communications Privacy Act (“ECPA”) of 1986. In particular, the legislation would require government entities to obtain a warrant, based on probable cause, before accessing the content of any emails or electronic communications stored with third-party service providers, regardless of how long the communications have been held in electronic storage by

Privacy 49
article thumbnail

OCR Settles First Enforcement Action for Untimely Reporting of a Breach

Hunton Privacy

On January 7, 2017, the U.S. Department of Health and Human Services’ Office for Civil Rights (“OCR”) entered into a resolution agreement with Presence Health stemming from the entity’s failure to notify affected individuals, the media and OCR within 60 days of discovering a breach. This marks the first OCR settlement of 2017 and the first enforcement action relating to untimely breach reporting by a HIPAA covered entity.

article thumbnail

Draft of E-Commerce Law Published for Comment in China

Hunton Privacy

Last month, the Standing Committee of the National People’s Congress of China published a full draft of the E-commerce Law (the “Draft”) and is giving the general public an opportunity to comment on the draft through January 26, 2017. The Draft applies to (1) e-commerce activities within China or (2) e-commerce activities involving either domestic enterprises that operate an e-commerce business or customers located in China.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Federal Energy Regulatory Commission Publishes Final CEII Regulations

Hunton Privacy

Last month, the Federal Energy Regulatory Commission (“FERC”) published its final Regulations Implementing FAST Act Section 61003-Critical Electric Infrastructure Security and Amending Critical Energy Infrastructure Information (the “CEII Regulations”). The CEII Regulations, which differ little from the notice of proposed rulemaking that FERC issued in June 2016, were approved unanimously on November 17, 2016, by FERC’s three sitting Commissioners (recent retirements have left the two other FERC

article thumbnail

Digitalization opens new paths for transport, future cities

CGI

Digitalization opens new paths for transport, future cities. shobana.lv@cgi.com. Wed, 01/11/2017 - 23:35. The transportation sector is facing its greatest change since the invention of the car. Forces of change include increasingly strict emissions policies, the growing number of cars, and the possibilities for many new services enabled by digitalization and the sharing economy.

article thumbnail

Key attributes of an effective hybrid IT and cloud management solution

CGI

Key attributes of an effective hybrid IT and cloud management solution. harini.kottees…. Wed, 01/11/2017 - 00:59. As an enabler of digital transformation, cloud computing continues to accelerate, leading to hybrid environments that combine cloud and traditional IT delivery models. These complex environments can be challenging to manage, but offer a number of competitive advantages that drive significant value, especially in today’s increasingly digital world.

Cloud 40
article thumbnail

EU Commission Publishes Communications on Data Transfers and the EU Data Economy

Hunton Privacy

On January 10, 2017, the European Commission published a communication addressed to the European Parliament and European Council on Exchanging and Protecting Personal Data in a Globalized World (the “Communication”). The Communication aims to facilitate commercial data flows and foster law enforcement cooperation. In the Communication, the European Commission states that it will: Prioritize discussions on possible adequacy decisions with “key trading partners,” starting with (1) Japan and South

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

European Commission Announces Final “Digital Single Market” Strategy for Europe

Hunton Privacy

On January 10, 2017, the European Commission announced the final elements of its long-awaited “digital single market” strategy for Europe. The announcement includes two new proposed EU regulations as well as a European Commission Communication, as described below. The first proposed EU regulation released is the new e-Privacy Regulation, which is intended to replace the existing e-Privacy Directive and align requirements with those found in the EU General Data Protection Regulation (“GDPR”).