Sat.Dec 10, 2016 - Fri.Dec 16, 2016

article thumbnail

Article 29 Working Party Releases GDPR Implementation Guidance and Announces Privacy Shield Developments

Hunton Privacy

On December 15, 2016, the Article 29 Working Party (“Working Party”) issued a press release announcing its December 13, 2016, adoption and release of three sets of guidelines and FAQs on key implementation issues under the EU General Data Protection Regulation (“GDPR”): Guidelines and FAQs on the Right to Data Portability; Guidelines and FAQs on Data Protection Officers (DPO); and.

GDPR 68
article thumbnail

Riding the blockchain wave in trade finance

CGI

Riding the blockchain wave in trade finance. ravi.kumarv@cgi.com. Mon, 12/12/2016 - 22:35. Trade finance, whether conducted on a domestic or international basis, can be a paper-intensive, costly and risk-laden proposition, involving not just companies importing and exporting goods and services but also their banks, insurers and others. The trading process can be time-consuming, error prone, vulnerable to fraud and susceptible to hacking.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Seeing the Big Picture

Adam Shostack

This quote from Bob Iger, head of Disney, is quite interesting for his perspective as a leader of a big company: There is a human side to it that I try to apply and consider. [But] the harder thing is to balance with the reality that not everything is perfect. In the normal course of running a company this big, you’re going to see, every day, things that are not as great as you would have hoped or wanted them to be.

article thumbnail

Featured in Tech Leaders Today Podcast Episode

JKevinParker

I recently was interviewed for the new Tech Leaders Today podcast. In this episode, I talk with host Cassie Crossley about information strategy, architecture, and governance as the real requirements for IT solutions. We also discuss recruiting and developing talented people for Government Information Technology engagements. "Technology isn't the Real Solution with Kevin Parker" Listen to the podcast below, or check it out on the Tech Leaders Today website.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

FTC Settles with Operators of AshleyMadison.com Over Security and Privacy Practices

Hunton Privacy

On December 14, 2016, the FTC announced that the operating companies of the AshleyMadison.com website (collectively, the “Operators”) have settled with the FTC and a coalition of state regulators over charges that the Operators deceived consumers and failed to protect users’ personal information. The FTC worked with a coalition of 13 states, the Office of the Privacy Commissioner of Canada and the Office of the Australian Information Commissioner to resolve this matter, which was initiated in th

Privacy 45

More Trending

article thumbnail

Redux: compromising Linux using. SNES Ricoh 5A22 processor opcodes?!

Scary Beasts Security

Overview TL;DR: full reliable 0day drive-by exploit against Fedora 25 + Google Chrome, by breaking out of Super Nintendo Entertainment System emulation via cascading side effects from a subtle and interesting emulation error. Very full details follow. [ UPDATE 13 Dec 2016 -- a couple of competent readers inform me that I've named the wrong processor!

IT 34
article thumbnail

Yahoo! Yippee? What to Do?

Adam Shostack

[Dec 20 update: The first draft of this post ended up with both consumer and enterprise advice, which made it complex. The enterprise half is now on the IANS blog: Never Waste a Good Crisis: Yahoo Edition.]. Yesterday, Yahoo disclosed that attackers broke into Yahoo in 2013 and stole details on a billion accounts. Brian Krebs summarizes what was taken, and also has a more general FAQ.

article thumbnail

European Commission Plans to Upgrade e-Privacy Directive to a Regulation

Hunton Privacy

On December 12, 2016, Politico reported that the European Commission intends to replace the e-Privacy Directive with a Regulation. The planned shift from a Directive to a Regulation has important legal consequences under EU law, as it means that instead of creating a floor upon which EU Member States may base the creation of their own versions of the law, a Regulation will create a harmonized set of requirements at the EU level that are directly applicable in the Member States.

Privacy 45
article thumbnail

Hunton Privacy Team Publishes Several Chapters in “Getting the Deal Through”

Hunton Privacy

The Privacy team at Hunton & Williams has authored several chapters of the recently published 2017 guide to data protection and privacy for Getting the Deal Through. The publication covers data privacy and data protection laws in 26 jurisdictions across the globe. Wim Nauwelaerts, Privacy team partner in the firm’s Brussels office, served as the contributing editor of the guide and co-authored the Belgium chapter and the EU overview.

Privacy 40
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.