Remove category international
article thumbnail

US: Virginia passes comprehensive consumer data protection law

DLA Piper Privacy Matters

The VCDPA does not apply to the following types of entities: Virginia state agencies; financial institutions or data subject to Title V of GLBA; covered entities or business associates governed by HHS’s HIPAA and HITECH rules; nonprofits; or higher education institutions. Key provisions. Enforcement.

article thumbnail

France: The CNIL publishes a practical guide on Data Protection Officers

DLA Piper Privacy Matters

Among the organizations that have designated a DPO, the most represented sectors are, unsurprisingly, the public administration, education and health sectors. Such figures evidence the success of “mutualized” DPOs designated by two or more organizations. The Guide is composed of four main Parts : I. Provide information and advice.

GDPR 116
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ICYMI – Late December in privacy and cybersecurity

Data Protection Report

Colorado’s privacy law does not have any “data localization” or “international data transfer” requirements. The list appears in proposed rule 6.04.A. 2. b. Profiling is not prohibited for purposes of granting credit. The list appears in proposed rule 9.03.A. 3.

Privacy 115
article thumbnail

New SEC Cybersecurity Rules Could Affect Private Companies Too

eSecurity Planet

Technical managers that can clearly communicate internally to their own executives and board members may discover additional opportunities opening up after the SEC rules become finalized. Therefore, we should examine each category and consider what the rules fundamentally request.

article thumbnail

What is a Managed Security Service Provider? MSSPs Explained

eSecurity Planet

Even the largest organizations with the most robust internal security teams will engage with MSSPs for specialty projects, penetration tests, and other specific needs. Other MSPs offer a full range of internally provided security services, while others subcontract to dedicated MSSPs for white-labeled security services.

article thumbnail

Network Security Architecture: Best Practices & Tools

eSecurity Planet

Traditionally, this technology implicitly distrusts external traffic and implicitly trusts internal traffic. Internet of Things (IoT) security: Encompasses a variety of tools and techniques to secure IoT, operations technology (OT), and other similar categories of endpoints.

Security 117
article thumbnail

California Enacts Broad Privacy Laws Modeled on GDPR

Data Matters

Specific categories defined as personal information include. education information. Specific categories defined as personal information include. education information. Additionally, there is a category of personal information that includes profiles created from inferences derived from other types of personal information.

GDPR 79