Sat.May 27, 2017 - Fri.Jun 02, 2017

article thumbnail

Washington Becomes Third State to Enact Biometric Privacy Law

Hunton Privacy

On May 16, 2017, the Governor of the State of Washington, Jay Inslee, signed into law House Bill 1493 (“H.B. 1493”), which sets forth requirements for businesses who collect and use biometric identifiers for commercial purposes. The law will become effective on July 23, 2017. With the enactment of H.B. 1493, Washington becomes the third state to pass legislation regulating the commercial use of biometric identifiers.

Privacy 87
article thumbnail

Is Humanity Obsolete?

John Battelle's Searchblog

The post Is Humanity Obsolete? appeared first on John Battelle's Search Blog. image. Upon finishing Yuval Harari’s Homo Deus , I found an unwelcome kink in my otherwise comfortably adjusted frame of reference. It brought with it the slight nausea of a hangover, a lingering whiff of jet exhaust from a hard night, possibly involving rough psychedelics.

Cloud 55
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

OT-IT convergence brings opportunities and risk

CGI

OT-IT convergence brings opportunities and risk. shobana.lv@cgi.com. Thu, 06/01/2017 - 07:40. Operational technology (OT) or industrial control systems (ICS) are responsible for keeping the power on and water and gas flowing to support essential services for consumers, industry and governments. As technology advances, utilities are introducing Internet connections (IT) to their OT networks to improve operational efficiency.

Risk 40
article thumbnail

Information age delivers new space race

MIKE 2.0

At the height of the race for the moon, everyone imagined that by now we would be living in a space age. Instead we got the information age which has given us access to unparalleled global connections and almost the sum of human knowledge at our fingertips. Stanley Kubrick’s “2001: A Space Odyssey” assumed the information revolution would happen alongside the move into space, in fact it seems they had to be sequential.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Cybersecurity Law Goes Into Effect in China

Hunton Privacy

On June 1, 2017, the new Cybersecurity Law went into effect in China. This post takes stock of (1) which measures have been passed so far, (2) which ones go into effect on June 1 and (3) which ones are in progress but have yet to be promulgated. A draft implementing regulation and a draft technical guidance document on the treatment of cross-border transfers of personal information have been circulated, but at this time only the Cybersecurity Law itself and a relatively specific regulation (appl

More Trending

article thumbnail

The impact of a cyber breach on public sector organisations

CGI

The impact of a cyber breach on public sector organisations. harini.kottees…. Wed, 05/31/2017 - 05:09. Recently CGI commissioned research from Oxford Economics to explore the link between a cyber incident and company value. Specifically, we wanted to develop an analytical methodology to examine share-price movements in companies that had experienced publicly disclosed cyber breaches.

Sales 40
article thumbnail

Maybe Skip SHA-3

Imperial Violet

In 2005 and 2006, a series of significant results were published against SHA-1 [ 1 ][ 2 ][ 3 ]. These repeated break-throughs caused something of a crisis of faith as cryptographers questioned whether we knew how to build hash functions at all. After all, many hash functions from the 1990's had not aged well [ 1 ][ 2 ]. In the wake of this, NIST announced ( PDF ) a competition to develop SHA-3 in order to hedge the risk of SHA-2 falling.

IT 111
article thumbnail

Chipotle Payment Card Data Breach: Financial Institutions File Leapfrog Suit

Hunton Privacy

On May 26, 2017, Alcoa Community Federal Credit Union (“Alcoa”), on behalf of itself, credit unions, banks and other financial institutions, filed a nationwide class action against Chipotle Mexican Grill, Inc. (“Chipotle”). The case arises from a breach of customer payment card data. The putative class consists of all such financial institutions that issued payment cards, or were involved with card-issuing services, for customers who made purchases at Chipotle from March 1, 2017, to the present.

article thumbnail

Preparing for GDPR – Is the Way You Process Information Compliant with Data Protection Laws?

Managing Your Information

I attended a seminar last year where an organisation presented a new database that they had been developing. In my view, it was great. Genuine issues recognised by both the organisation and the sector involved would be addressed and the tool, without doubt, would facilitate better management of those issues. As the presentation went on, however, it became clear that nobody seemed to have considered compliance with data protection legislation.

GDPR 28
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

UK ICO Stresses Importance of Preparing for the GDPR and Addresses the ICO’s Role Post-Brexit

Hunton Privacy

With just under one year to go before the EU General Data Protection Regulation (“GDPR”) becomes law across the European Union, the UK Information Commissioner’s Office (“ICO”) has continued its efforts to help businesses prepare for the new law. The ICO also has taken steps to address its own role post-Brexit. In a YouTube video published on May 25, 2017, Information Commissioner Elizabeth Denham stressed the importance of preparing for the GDPR, warning that companies risk enforcement action –

GDPR 49
article thumbnail

Colorado Publishes Cybersecurity Regulations for Financial Institutions

Hunton Privacy

Recently, the Colorado Division of Securities (the “Division”) published cybersecurity regulations for broker-dealers and investment advisers regulated by the Division. Colorado’s cybersecurity regulations follow similar regulations enacted in New York that apply to certain state-regulated financial institutions. The regulations obligate covered broker-dealers and investment advisers to establish and maintain written cybersecurity procedures designed to protect “confidential personal information

article thumbnail

Privacy Shield First Annual Joint Review to Take Place in September 2017

Hunton Privacy

On May 29, 2017, a high-level EU Commission official and Politico reported that the primary objective of the first annual joint review of the EU-U.S. Privacy Shield (“Privacy Shield”) is not to obtain more concessions from the U.S. regarding Europeans’ privacy safeguards, but rather to monitor the current U.S. administration’s work and steer U.S. privacy debates to prevent privacy safeguards from deteriorating.

Privacy 49
article thumbnail

CIPL Submits Comments to the Working Party’s Proposed GDPR DPIA Guidelines

Hunton Privacy

The Centre for Information Policy Leadership (“CIPL”) at Hunton & Williams LLP recently submitted formal comments (“Comments”) to the Article 29 Working Party’s (“Working Party’s”) Guidelines on Data Protection Impact Assessment (DPIA) and determining whether processing is “likely to result in a high risk” for the purposes of Regulation 2016/679 (“DPIA Guidelines”) that were adopted on April 4, 2017.

GDPR 45
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Amended Oregon Law Reinforces Importance of Adhering to Privacy Policies

Hunton Privacy

On May 25, 2017, Oregon Governor Kate Brown signed into law H.B. 2090 , which updates Oregon’s Unlawful Trade Practices Act by holding companies liable for making misrepresentations on their websites ( e.g. , in privacy policies) or in their consumer agreements about how they will use, disclose, collect, maintain, delete or dispose of consumer information.

Privacy 45
article thumbnail

Belgian Privacy Commission Releases 2016 Annual Activity Report

Hunton Privacy

On May 26, 2017, the Belgian Privacy Commission (the “Belgian DPA”) published its Annual Activity Report for 2016 (the “Annual Report”) highlighting its main accomplishments from the past year. In 2016, the Belgian DPA focused on the following topics: EU General Data Protection Regulation (“GDPR”). The GDPR was enacted in May 2016 and will come into force in May 2018.

Privacy 45