Sat.Jun 11, 2016 - Fri.Jun 17, 2016

article thumbnail

CNIL Launches Public Consultation on EU General Data Protection Regulation

Hunton Privacy

On June 16, 2016, the French Data Protection Authority (“CNIL”) launched a public consultation on the four priority topics identified by the Article 29 Working Party (“Working Party”) in its February 2016 action plan for the implementation of the EU General Data Protection Regulation (“GDPR”). One of these priorities is to issue guidance to help data controllers and data processors prepare for the GDPR.

GDPR 56
article thumbnail

Topic Intelligence

Attensa

This past year Attensa introduced an entirely new platform. It evolved from our ongoing discussions with customers and mission to create systems that empower people to work smarter and more effectively by leveraging information and knowledge. The common objective that info and knowledge management professionals shared with us was “how can we better utilize the information we have and make sure it gets to the right people?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Now is the time for your organisation to pilot Robotic Process Automation

CGI

Now is the time for your organisation to pilot Robotic Process Automation. p.butler@cgi.com. Wed, 06/15/2016 - 06:57. Table. Zuboff’s Laws…. “Everything that can be automated will be automated”. "Everything that can be informated will be informated". The benefits of implementing Robotic Process Automation (RPA) to automate business processes that are standardised, rules based, and repetitive but liable to error and variation are well documented. .

article thumbnail

What does BREXIT mean for data protection?

Privacy and Cybersecurity Law

On 23 June 2016, the UK is holding a referendum as to whether to stay in the European Union or […].

40
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

European Commission Could Approve Privacy Shield in Early July

Hunton Privacy

According to Bloomberg BNA , the EU-U.S. Privacy Shield framework could be approved by the European Commission in early July. The Privacy Shield is a successor framework to the Safe Harbor, which was invalidated by the European Court of Justice in October 2015. Certain provisions of the Privacy Shield documents, previously released by the European Commission on February 29, 2016, have been subjected to criticism by the Article 29 Working Party , the European Parliament and the European Data Prot

Privacy 53

More Trending

article thumbnail

U.S. Government Seeks to Join Schrems Case

Hunton Privacy

On June 13, 2016, the U.S. government expressed its wish to join the legal proceedings brought by Max Schrems concerning the validity of international data transfers under EU Standard Contractual Clauses. Along with the U.S. government, the Irish Business and Employers Confederation and the Business Software Alliance, an industry trade group, also informed Ireland’s High Court of their desire to be added to the case as amici curiae , or “friends of the court.” Each party will now hav

article thumbnail

Belgian Privacy Commission Releases 2015 Annual Activity Report

Hunton Privacy

On June 9, 2016, the Belgian Privacy Commission (the “Belgian DPA”) published its Annual Activity Report for 2015 (the “Annual Report”) highlighting its main accomplishments. During the year 2015, the Belgian DPA focused on the following topics: Cookies. The Belgian DPA issued a series of recommendations on the communication of information and direct marketing practices.

Privacy 40
article thumbnail

FTC Settles Charges of Misleading Consumers with Electronic Health Records Company

Hunton Privacy

On June 8, 2016, the Federal Trade Commission announced that Practice Fusion, an electronic health records company, agreed to settle FTC charges that the company misled consumers about the privacy of doctor reviews submitted to the company. According to the FTC’s complaint , Practice Fusion operated a website, Patient Fusion, which enabled patients to view and download their health records and transmit them to health care providers.

Privacy 40
article thumbnail

Lisa Sotto Interviewed: What Do You Do with a Hacked Law Firm? (Part 2)

Hunton Privacy

In a recent video segment , “What Do You Do with a Hacked Law Firm?”, from Mimesis Law’s Cy-Pher Executive Roundtable held in May, Lisa Sotto , chair of the firm’s Global Privacy and Cybersecurity practice , and other privacy professionals discussed the Federal Trade Commission’s jurisdiction in bringing enforcement actions against law firms in a breach event.

Privacy 40
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Cybersecurity in the boardroom: 7 steps to improve cyber governance

CGI

Cybersecurity in the boardroom: 7 steps to improve cyber governance. Anonymous. Wed, 06/15/2016 - 08:45. While cybersecurity isn’t new, what is new is the rapidly growing business dependence on networked systems and the Internet, coupled with the rapidly evolving cybersecurity threat landscape and the value that is at stake for companies in today’s digital-first world.

article thumbnail

Cybersecurity in the boardroom: 7 steps to improve cyber governance

CGI

Cybersecurity in the boardroom: 7 steps to improve cyber governance. kathy.jacquay@…. Tue, 06/14/2016 - 08:00. While cybersecurity isn’t new, what is new is the rapidly growing business dependence on networked systems and the Internet, coupled with the rapidly evolving cybersecurity threat landscape and the value that is at stake for companies in today’s digital-first world.