Sat.May 20, 2017 - Fri.May 26, 2017

article thumbnail

China Releases Revised Draft on Measures for Implementation of the New Cybersecurity Law

Hunton Privacy

On May 19, 2017, the Cyberspace Administration of China (“CAC”) issued a revised draft (the “Revised Draft”) of its Measures for the Security Assessment of Outbound Transmission of Personal Information and Critical Data. The original draft was issued in April 2017, and similar to the original draft, the Revised Draft does not have the impact of law; it does, however, provide an indication of how the CAC’s views on the Cybersecurity Law have evolved since the publication of the original draft.

article thumbnail

Should You Be Worried About Apps Tracking Personal Data?

Productivity Bytes

For years now, maybe even decades, we’ve been living in a digital age. Anything and everything we do is quantified as data. The products we buy and prefer. The websites, apps, and media we consume. The places we go. All this information and more is being parsed into digital files, and it gets fed back … + Read More. The post Should You Be Worried About Apps Tracking Personal Data?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

One Year and Counting – a GDPR Checklist

Managing Your Information

With just one year to go until the GDPR applies, now is the time for action. With one year to go, it must be time for a GDPR checklist! It is essential to make a start on preparations for compliance with the GDPR as there is lots to do. The list below provides high level tasks that should be in your preparation programme and references the part of the GDPR that applies.

GDPR 31
article thumbnail

Revising a Retention Schedule: Lessons Learned

The Schedule

This spring, Michigan State University completed the first phase of a multi-year records retention schedule project by revising the Human Resources Records Retention Schedule. The new schedule , which is the first major revision since 1990, aligns with regulations and best practices, is easier to read, and clearly identifies a number of active and legacy business systems as well as offices of record for each record series.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Bavarian DPA Tests GDPR Implementation of 150 Companies

Hunton Privacy

On May 24, 2017, the Bavarian Data Protection Authority (“DPA”) published a questionnaire to help companies assess their level of implementation of the EU General Data Protection Regulation (“GDPR”). . The DPA announced that it has sent the questionnaire to 150 randomly selected Bavarian companies. The questionnaire examines the following topics: procedures relating to the GDPR and the Data Protection Officer’s responsibilities; data processing activities, inventories and privacy by design; onb

GDPR 56

More Trending

article thumbnail

One Year and Counting – a GDPR Checklist

Managing Your Information

With just one year to go until the GDPR applies, now is the time for action. With one year to go, it must be time for a GDPR checklist! It is essential to make a start on preparations for compliance with the GDPR as there is lots to do. The list below provides high level tasks that should be in your preparation programme and references the part of the GDPR that applies.

GDPR 28
article thumbnail

DB2 for z/OS and Data-as-a-Service and Database-as-a-Service

Robert's Db2

-as-a-service is all the rage in IT these days, and understandably so -- the "service-ization" of information technology capabilities and interfaces will be transformational; indeed, transformations have already occurred or are underway at many organizations and within many application development and deployment environments. In this blog entry I want to highlight a couple of -as-a-service concepts, data-as-a-service (aka DaaS) and database-as-a-service (aka DBaaS), and examine their relevance t

Cloud 48
article thumbnail

New York AG Settles with Wireless Lock Maker Over Security Flaws

Hunton Privacy

On May 22, 2017, New York Attorney General Eric T. Schneiderman announced that the AG’s office has reached a settlement (the “Settlement”) with Safetech Products LLC (“Safetech”) regarding the company’s sale of insecure Bluetooth-enabled wireless doors and padlocks. In a press release, Schneiderman indicated that this “marks the first time an attorneys general’s office has taken legal action against a wireless security company for failing to protect their [customers’] personal and private inform

article thumbnail

President Trump’s Budget Requests $1.5B For Homeland Security Cyber Unit

Privacy and Cybersecurity Law

President Trump’s new budget includes a request to increase cybersecurity personnel and funding across several federal departments, including $1.5 billion for the Department […].

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Target and State Attorneys General Resolve Investigation with Largest Multi-State Breach Settlement to Date

Hunton Privacy

On May 23, 2017, various attorneys general of 47 states and the District of Columbia announced that they had reached an $18.5 million settlement with Target regarding the states’ investigation of the company’s 2013 data breach. This represents the largest multi-state data breach settlement achieved to date. Connecticut Attorney General George Jepsen and Illinois Attorney General Lisa Madigan led the investigation, which found that hackers used credentials stolen from a third-party vendor to acce

article thumbnail

President Trump’s Budget Requests $1.5B For Homeland Security Cyber Unit

Privacy and Cybersecurity Law

President Trump’s new budget includes a request to increase cybersecurity personnel and funding across several federal departments, including $1.5 billion for the Department of Homeland Security’s (DHS) National Protection and Programs Directorate (NPPD). The NPPD is a DHS unit responsible for protecting US infrastructure from cyber threats.