article thumbnail

Mobile Collection: It’s Not Just for iPhones Anymore, Part Two

eDiscovery Daily

Additionally, it offered several advantages in Craig’s mind to an iCloud backup, primarily that it took less time and you could choose not to encrypt the backup. Although it did not preserve email, content from iTunes or iBooks, some data stored in iCloud and data from Apple Pay, Activity, Health or Keychain.

article thumbnail

How to prepare for the California Consumer Privacy Act

Thales Cloud Protection & Licensing

When you boil these down for your organization into technology and process requirements, you’ll find that encryption, tokenization, strong key management, and access controls can satisfy many of the privacy requirements to protect your organization from breach notification actions. (4) Personal Information excluded by the CCPA.

Privacy 92
article thumbnail

An Approach to Cybersecurity Risk Oversight for Corporate Directors

Data Matters

Encrypting critical data assets. The NACD Handbook, in this respect, suggests steps such as nominating a cyber-expert to the board itself, creating a cross-departmental cyber committee that reports directly to the board, or implementing formal director-education training. Encrypting Critical Data Assets.