Sat.Apr 15, 2017 - Fri.Apr 21, 2017

article thumbnail

Reimagining Information Governance with Blockchain

Weissman's World

A Discussion Paper Authors: Alan Pelz-Sharpe (Deep Analysis) & Steve Weissman (Holly Group) Statement of Purpose This discussion paper provides an overview of how future information governance (IG) platforms may be envisaged and built utilizing blockchain – perhaps the key point being that all the technologies necessary to do so are already available.

article thumbnail

German DPA Publishes English Translation of Standard Data Protection Model

Hunton Privacy

On April 13, 2017, the North Rhine-Westphalia State Commissioner for Data Protection and Freedom of Information published an English translation of the draft Standard Data Protection Model (“SDM”). The SDM was adopted in November 2016 at the Conference of the Federal and State Data Protection Commissioners. . German data protection authorities (“DPAs”) are currently reviewing the SDM, and the final version is expected to be published later this year.

GDPR 65
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why Cybersecurity Pros Should Care About Governance

Getting Information Done

Cybersecurity is a strategic priority for most organizations. With recent high-profile breach incidents, including Home Depot, Target, and Sony, many companies are asking themselves, “Will I be next?” The answer is “yes,” based on the number of widespread and increasingly advanced attacks. Some of these data breaches are not only a result of internal malicious acts but also unintentional mistakes by employees.

article thumbnail

Battery Backup PSA

Roger's Information Security

One of the better things you can do to protect your money spent on electronics devices is have a good surge protector and battery backup. If you’re like me, you only buy the kind where you can disable the audible alarms. The problem with this is now you might not get any warning if the battery goes bad. In some cases you’ll have the battery backup connected to a computer via USB and receive notices that way.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

CIPL Issues Discussion Paper on GDPR Certifications

Hunton Privacy

On April 12, 2017, the Centre for Information Policy Leadership (“CIPL”) at Hunton & Williams LLP issued a discussion paper on Certifications, Seals and Marks under the GDPR and Their Roles as Accountability Tools and Cross-Border Data Transfer Mechanisms (the “Discussion Paper”). The Discussion Paper sets forth recommendations concerning the implementation of the EU General Data Protection Regulation’s (“GDPR’s”) provisions on the development and use of certification mechanisms.

Paper 60

More Trending

article thumbnail

New Mexico Enacts Data Breach Notification Law

Hunton Privacy

On April 6, 2017, New Mexico became the 48th state to enact a data breach notification law, leaving Alabama and South Dakota as the two remaining states without such requirements. The Data Breach Notification Act (H.B. 15) goes into effect on June 16, 2017. Key Provisions of New Mexico’s Data Breach Notification Act: The definition of “personal identifying information” includes biometric data , defined as an individual’s “fingerprints, voice print, iris or retina patterns, facial characteristics

article thumbnail

FTC Seeks Comment on Proposed Changes to TRUSTe’s COPPA Safe Harbor Program

Hunton Privacy

On April 19, 2017, the FTC announced that it is seeking public comment on proposed changes to TRUSTe, Inc.’s safe harbor program under the Children’s Online Privacy Protection Rule (the “Proposed Changes”). As we previously reported , New York Attorney General Eric T. Schneiderman announced that TRUSTe agreed to settle allegations that it failed to properly verify that customer websites aimed at children did not run third-party software to track users.

article thumbnail

OCR Settlement Underscores Importance of Risk Analysis and Risk Management

Hunton Privacy

On April 12, 2017, the U.S. Department of Health and Human Services’ Office for Civil Rights (“OCR”) entered into a resolution agreement with Metro Community Provider Network (“MCPN”) that stemmed from MCPN’s lack of a risk analysis and risk management plan that addressed risks and vulnerabilities to protected health information (“PHI”). In January 2012, MCPN submitted a breach report to OCR indicating that it had suffered a breach following a phishing incident that affected 3,200 patients.

Risk 45