Sat.May 23, 2015 - Fri.May 29, 2015

article thumbnail

DB2 11 for z/OS: Setting Aside Space for Updates

Robert's Db2

A DB2 table space is well-organized when rows are physically located where they should be per the clustering index of the associated table. Because a high degree of "clustered-ness" is a desirable quality of a table space (mostly for performance reasons), a DB2 DBA will often take steps to preserve row sequencing between REORGs. One such step that is very commonly executed is the setting aside of space in a table space's pages to accommodate inserts of new rows (relevant for a table that is clus

IT 48
article thumbnail

French Data Protection Authority Reveals 2015 Inspection Program

Hunton Privacy

On May 25, 2015, the French Data Protection Authority (“CNIL”) released its long-awaited annual inspection program for 2015. Under French data protection law, the CNIL may conduct four types of inspections: (1) on-site inspections ( i.e. , the CNIL may visit a company’s facilities and access anything that stores personal data); (2) document reviews ( i.e. , the CNIL may require an entity to send documents or files upon written request); (3) hearings ( i.e. , the CNIL may summon representatives o

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

HIPAA Breach: Who You Gonna Call?

HIPAA

Everyone knows that you call a plumber for a leaking pipe, a mason for a cracked stonewall, and an electrician to fix faulty wiring. However, when faced with an actual or suspected HIPAA data breach, many folks struggle with determining whom to call. Failure to have contacts lined up ahead of time may pose more than an inconvenience–any delay in bringing in experienced advisors to assist with breach investigation, response and mitigation may result in significant financial and legal consequences

article thumbnail

Establishing Records Management at Brandeis—The First Eighteen Months

Brandeis Records Manager

George Despres, University Records Manager, Brandeis University. (The content in this blog reflects the opinions of the author, and not of Brandeis University.). What a year and a half it has been! The Brandeis University Records Management (URM) program has much in front of it, but some solid foundational accomplishments behind it. As we know, developing and growing a records program is challenging: most people don’t get our objectives despite the fact that records, their mismanagement, and ass

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Managing the insider threat is a critical part of enterprise security

CGI

Managing the insider threat is a critical part of enterprise security. shobana.lv@cgi.com. Wed, 05/27/2015 - 01:00. Most security-minded professionals think of a cybersecurity threat as originating outside the organization. But one of the most potentially damaging threats to your organization comes from insiders: people you trust. Insiders have authorized access to many of the corporate (or government) crown jewels.

More Trending

article thumbnail

Privacy law and anti-spam: Guidance from the Office of the Privacy Commissioner of Canada

Privacy and Cybersecurity Law

Recent enforcement under Canada’s anti-spam legislation (CASL) by the Canadian Radio-Television and Telecommunications Commission (CRTC) is keeping the spotlight on […].

Privacy 40
article thumbnail

HIPAA Breach: Who You Gonna Call?

HIPAA

Everyone knows that you call a plumber for a leaking pipe, a mason for a cracked stonewall, and an electrician to fix faulty wiring. However, when faced with an actual or suspected HIPAA data breach, many folks struggle with determining whom to call. Failure to have contacts lined up ahead of time may pose more than an inconvenience–any delay in bringing in experienced advisors to assist with breach investigation, response and mitigation may result in significant financial and legal consequences

article thumbnail

FCC Advises Broadband Providers to Take Steps to Protect Consumer Privacy

Hunton Privacy

On May 20, 2015, the Federal Communications Commission (“FCC”) released an Enforcement Advisory announcing that its previously-released Open Internet Order “applies the core customer privacy protections of Section 222 of the Communications Act to providers of broadband Internet access service” and that the statutory provisions of Section 222, which historically have been used to protect Consumer Proprietary Network Information on telephone networks, will apply to broadband providers when the Ope

Privacy 45
article thumbnail

HIPAA Breach: Who You Gonna Call?

HIPAA

Everyone knows that you call a plumber for a leaking pipe, a mason for a cracked stonewall, and an electrician to fix faulty wiring. However, when faced with an actual or suspected HIPAA data breach, many folks struggle with determining whom to call. Failure to have contacts lined up ahead of time may pose more than an inconvenience–any delay in bringing in experienced advisors to assist with breach investigation, response and mitigation may result in significant financial and legal consequences

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.