Remove category international
article thumbnail

France: The CNIL publishes a practical guide on Data Protection Officers

DLA Piper Privacy Matters

Among the organizations that have designated a DPO, the most represented sectors are, unsurprisingly, the public administration, education and health sectors. Such figures evidence the success of “mutualized” DPOs designated by two or more organizations. The Guide is composed of four main Parts : I. Provide information and advice.

GDPR 116
article thumbnail

What is the Future of the Legal Technology Conference?, Part Three

eDiscovery Daily

Are we left, then, with no true educational conferences? Not entirely, as the Georgetown Law Advanced EDiscovery Institute offers a great value of 2 days of intense educational sessions every fall, albeit in one narrow field only and Prex makes a similar strong educational showing.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Reminder that the FTC is Providing an Opportunity to Comment on COPPA Rule by October 23

HL Chronicle of Data Protection

The FTC will also be hosting a COPPA workshop on October 7, 2019. Are there additional categories of information that should be expressly included in the definition of “Personal information,” such as genetic data, fingerprints, retinal patterns, or other biometric data? Comments are due October 23, 2019. The COPPA Rule.

article thumbnail

The Hacker Mind Podcast: Learn Competitive Hacking with picoCTF

ForAllSecure

PPP wanted to give their past high school selves the infosec education they didn’t have. It seems that preparing for, or even playing a game of capture the flag, might be a great way to expose any educational gaps, if not generally improve and deepen the security skills, you might already possess. But what about the basics?

article thumbnail

AI governance is rapidly evolving — Here’s how government agencies must prepare

IBM Big Data Hub

Moreover, the OECD places legally enforceable AI regulations and standards in a separate category from the initiatives mentioned earlier, in which it lists an additional 337 initiatives. Therefore, we see national and international guidelines address these overlapping and intersecting definitions in a variety of ways.

article thumbnail

Top Cloud Security Issues: Threats, Risks, Challenges & Solutions

eSecurity Planet

Apply network segmentation: Separate internal and external networks and isolate essential systems to mitigate the impact of assaults. When you actively defend cloud assets, you’re protecting them from unintentional or intentional threats that use weaknesses to destroy or steal data.

Cloud 67
article thumbnail

The Hacker Mind Podcast: The Gentle Art of Lockpicking

ForAllSecure

To start, challenges, and workshop tables. They’re all in great condition -- except I forgot their original combinations. Then, a several years ago, I discovered a website that steps you through the process of hacking combination locks. It’s actually pretty easy. When you feel that, write down the numer.

IT 52