Sat.Feb 27, 2016 - Fri.Mar 04, 2016

article thumbnail

European Commission Presents EU-U.S. Privacy Shield

Hunton Privacy

On February 29, 2016, the European Commission issued the legal texts that will implement the EU-U.S. Privacy Shield. These texts include a draft adequacy decision from the European Commission, Frequently Asked Questions and a Communication summarizing the steps that have been taken in the last few years to restore trust in transatlantic data flows. The agreement in support of the new EU-U.S. transatlantic data transfer framework, known as the EU-U.S.

Privacy 56
article thumbnail

Growth Is Hard

John Battelle's Searchblog

The post Growth Is Hard appeared first on John Battelle's Search Blog. The business story of the decade is one of insurgency: Every sector of our economy has spawned a cohort of software-driven companies “moving fast and breaking things,” “asking for forgiveness, not permission,” and “blitzscaling” their way to “eating the world.” For years we’ve collectively marveled as new kinds of companies have stormed traditional markets, garnering winner-take-all valuations and delivering extraordinar

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Internet of Things (IoT) – Living Happily Ever After?

CGI

Internet of Things (IoT) – Living Happily Ever After? p.butler@cgi.com. Thu, 03/03/2016 - 04:02. table. Part of the pleasure of watching familiar characters in a movie or on a TV show is the anticipation that we experience when we can guess the final outcome, but are intrigued as to how it will happen this time around. The happy ending for the star crossed lovers in a Disney film or the romantic twist in a Bond movie are examples of this genre of entertainment. .

IoT 40
article thumbnail

New German Consumer Action risk; now in force

Privacy and Cybersecurity Law

With the entry into force of the new Unterlassungsklagengesetz (UKlaG) [otherwise known as the “Gesetz zur Verbesserung der zivilrechtlichen Durchsetzung […].

Risk 52
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

JIPDEC Named Accountability Agent for APEC Cross-Border Privacy System

Hunton Privacy

On February 25, 2016, the Asia-Pacific Economic Cooperation (“APEC”) issued a press release announcing the decision by the Joint Oversight Panel of the APEC Electronic Commerce Steering Group to approve the Japan Institute for Promotion of Digital Economy and Community (“JIPDEC”) as a new “Accountability Agent” under the APEC Cross-Border Privacy Rules (“CBPR”) system.

Privacy 53

More Trending

article thumbnail

The Internet of Things (IoT) – a game changer in product development

CGI

The Internet of Things (IoT) – a game changer in product development. p.butler@cgi.com. Tue, 03/01/2016 - 04:01. “Who should ultimately design the product? The customer, of course.” – Philip Kotler. table. I saw this quote recently, and thought ‘well isn’t that obvious’. However it didn’t take long for me to recollect a number of examples where it wasn’t obvious enough…remember ‘new Coke’ in 1985.

IoT 40
article thumbnail

The new Polish Surveillance Act – back door for law enforcement

Privacy and Cybersecurity Law

While US mass surveillance is heavily debated across Europe, the new Polish government swiftly moved to adopt a new set […].

article thumbnail

Consumer Financial Protection Bureau Imposes First Ever Data Security Fine

Hunton Privacy

On March 2, 2016, the Consumer Financial Protection Bureau (“CFPB”) reached a settlement with Dwolla, Inc. (“Dwolla”), an online payment system company, to resolve claims that the company made false representations regarding its data security practices in violation of the Consumer Financial Protection Act. Among other things, the consent order imposes a $100,000 fine on Dwolla.

article thumbnail

HHS Releases Guidance on Health Apps and HIPAA Security Rule Crosswalk

Hunton Privacy

Recently, the U.S. Department of Health and Human Services Office for Civil Rights (“OCR”) published two guidance documents related to HIPAA compliance. To help mobile app developers understand HIPAA compliance obligations, OCR published guidance on the use of mobile health apps (the “Health App Guidance”). OCR also released a crosswalk (the “Crosswalk”) that maps the National Institute of Standards and Technology (“NIST”) Framework for Improving Critical Infrastructure Cybersecurity Framework (

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

How to Safeguard Privacy and Data Security in Corporate Transactions

Hunton Privacy

Personal information about consumers is the lifeblood of many organizations. Because of the potential value of the information, companies are increasingly focused on privacy and data security issues that arise in the context of mergers, acquisitions, divestitures and related transactions. In many corporate transactions, data is a critical asset that should be addressed as a key deal point.

Privacy 45