Sat.Mar 11, 2017 - Fri.Mar 17, 2017

article thumbnail

CNIL Publishes Six Step Methodology and Tools to Prepare for GDPR

Hunton Privacy

On March 15, 2017, the French data protection authority (the “CNIL”) published a six step methodology and tools for businesses to prepare for the EU General Data Protection Regulation (“GDPR”) that will become applicable on May 25, 2018. The six steps are summarized below. Step 1: Appointing a Data Protection Officer (“DPO”) or “Pilot”. The CNIL’s methodology first stresses the need for organizations to appoint a leader to pilot governance of data protection within their structure.

GDPR 75
article thumbnail

Making instant payments pay

CGI

Making instant payments pay. harini.kottees…. Fri, 03/17/2017 - 08:00. In the UK, instant payments went live on May 27, 2008, some nine years ago. As a service brought about by regulation and the government’s desire to improve the efficiency of the country’s payment systems, little attention was paid to its potential uses and impact on the market. Standing orders (a UK payment instruction to make regular fixed transfers to a beneficiary) were converted at launch, but overall take up was gradual,

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

We have your data: how to fight ransomware

Andrew Hay

Of all the cybersecurity threats out there, one consistently strikes a nerve: ransomware. Maybe it’s because being held for ransom is so personal, or perhaps it’s the fact that you’re totally frozen out of your … The post We have your data: how to fight ransomware appeared first on DataGravity Blog.

article thumbnail

“You’re My New Best Friend, Counselor”

Positively RIM

Today’s Blog is sponsored by MER 2017, Cohasset Associates’ 25 th annual educational conference on electronic records management, in Chicago, May 8-10. Few records managers work solo. Nor should they. Today’s RIM requires expertise and contributions from a variety of disciplines beyond the scope and/or capabilities of any one person. Not many RIMmers are technologically super-savvy, and few techies understand RIM.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Hunton Releases ‘Seeking Solutions,’ a Report on the Attributes of Effective DPAs

Hunton Privacy

Hunton & Williams LLP, in coordination with the U.S. Chamber of Commerce, recently issued a series of recommendations to enhance the effectiveness of data privacy regulators. The report, Seeking Solutions: Attributes of Effective Data Protection Authorities , identifies seven key attributes of data protection authorities (“DPAs”) that contribute to effective data protection governance.

More Trending

article thumbnail

Weekend reading: Friday, March 17, 2017

Andrew Hay

We’re back with this week’s edition of “Weekend Reading.” Below are some of the data stories from this week that you just can’t miss. I know that I found each of them beneficial (and equally … The post Weekend reading: Friday, March 17, 2017 appeared first on DataGravity Blog.

article thumbnail

When IoT means Internet of Threats

CGI

When IoT means Internet of Threats. shobana.lv@cgi.com. Wed, 03/15/2017 - 07:00. Advances in digital technology are delivering new applications at a rapid pace. The use of sensors and wireless communications is enabling information to be captured, transmitted and processed to solve problems and create opportunities in healthcare, utilities, manufacturing, insurance, transportation and many other sectors.

IoT 40
article thumbnail

FTC Study Recommends Wider Implementation of DMARC to Combat Phishing Attacks

Hunton Privacy

On March 3, 2017, the FTC announced the results of a study about online businesses’ use of proper email authentication technology to prevent phishing attacks. The study’s sample included 569 large online businesses with strong ties to the U.S. The FTC found that 86 percent of those businesses use Sender Policy Framework—an email authentication technology that enables Internet Service Providers (“ISPs”) to determine whether an email is from a legitimate source ( e.g. , whether an email that claim

article thumbnail

AIIM Conference 2017 In Progress

JKevinParker

The AIIM Conference is about to kick off officially at 2:00pm in Orlando, Florida! I have already been here for two days, as I taught the preconference Electronic Records Management Specialist course all day yesterday. This morning I attended the AIIM Chapter Leaders Breakfast and had some great discussions there. I really love AIIM Conferences! One of the very best parts is hanging out with friends in the information management world from all over.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

My Latest Article Published at Document Strategy Magazine

Getting Information Done

Creating a Culture of Information Management Excellence Last year, I wrote an article titled, “ What Does Culture Have to Do with Information Management? ” which made the case for addressing culture as a part of any successful information management implementation project. Today, I wanted to offer some practical advice on how to create or install a culture of information management excellence.

40
article thumbnail

Emerging business models in the utilities industry

CGI

Emerging business models in the utilities industry. Anonymous. Mon, 03/13/2017 - 09:00. Across industries, digitalization is changing the way organizations do business. In the utilities industry, new business models are emerging, many of which are closely linked to the pressing need to embrace a low carbon economy. This shift is driving changes in demand, caused by increased electrification, and in production, with more renewable energy generation.

article thumbnail

ICO Publishes Guidance on Consent under the EU GDPR

Hunton Privacy

On March 2, 2017, the UK Information Commissioner’s Office (“ICO”) published draft guidance regarding the consent requirements of the EU General Data Protection Regulation (“GDPR”). The guidance sets forth how the ICO interprets the GDPR’s consent requirements, and its recommended approach to compliance and good practice. The ICO guidance precedes the Article 29 Working Party’s guidance on consent, which is expected in 2017.

GDPR 40
article thumbnail

InfoGov Links Of The Week 03-17-2017

Information is Currency

Forces of Change In Content Management – Keynote from John Mancini at AIIM17. Slide 11 has several questions on these forces of change, the most pertinent one being, “What Does The Business Want? Enhanced Customer Experience.” This makes me ask the question of how am I empowering employees to have access and insight information to enhance the customer experience so we can get the highest ROI from records and information and not waste time wading through junk looking for the ri

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

My Blog Post on Personal Development Featured by John C. Maxwell

Getting Information Done

The Leading Edge: Develop Yourself Like a Naval Aviator This post originally appeared on the John Maxwell Team blog. When I started my career as a Naval Aviator after graduating from college, my training and development continued for many years. First, there was flight training for 18 months culminating in earning my “wings.” Then, onto another six months learning to operate the P-3C Orion aircraft, I would fly operationally in the fleet.

40
article thumbnail

Webinar Recording Available on the NYDFS Regulations

Hunton Privacy

On March 9, 2017, AllClear ID hosted a webinar with Hunton & Williams partner and chair of the Global Privacy and Cybersecurity practice Lisa J. Sotto on the new cybersecurity regulations from the New York State Department of Financial Services (“NYDFS”). The NYDFS regulations impose significant cybersecurity requirements on impacted businesses that will dictate how they plan for, respond to and recover from data security events.

article thumbnail

Cybersecurity Panel Discussion: A Live Cyber Attack Tabletop Exercise

Hunton Privacy

On March 21, 2017, Hunton & Williams is pleased to host an in-person seminar in its London office featuring seasoned cybersecurity practitioners. Drawing from deep experience in their respective fields, the panel members will discuss the implications of the EU General Data Protection Regulation’s breach notification obligations in the context of a state-of-the-art cyber attack simulation.