Remove 10
Remove 2016 Remove Education Remove Marketing Remove Risk
article thumbnail

UK regulators’ strategic approaches to AI: a guide to key regulatory priorities for AI governance professionals

Data Protection Report

The CMA’s work on foundation models has allowed it to investigate how foundation model markets work and the current and possible future implications for competition and consumer protection. The CMA’s publications have included an initial report, update paper, technical update report and its Trends in Digital Markets report.

article thumbnail

Two FTC complaints that over-retention of personal data violates Section 5

Data Protection Report

Federal Trade Commission announced a complaint and proposed consent order with InMarket Media, LLC, a digital marketing platform and data aggregator. On January 18, 2024, the U.S. Less than two weeks later, on February 1, the FTC announced a complaint and proposed consent order with software licensor and data provider Blackbaud, Inc.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Me on the Equifax Breach

Schneier on Security

The Equifax breach was a serious security breach that puts millions of Americans at risk. As a result, all 143 million US victims are at greater risk of identity theft, and will remain at risk for years to come. In May 2016, one of its websites was hacked, resulting in 430,000 people having their personal information stolen.

article thumbnail

A Stitch in Time: Preserving Websites Related to Sustainability in the Fashion Industry

Archive-It

As smaller companies fold and larger firms merge, these websites are at risk of disappearing, therefore, in 2019, we created the first web archiving project related to the ATHM collections. The Textile and Garment Industries Collection currently has 195 sites related to these industries in the United States.

article thumbnail

Tuesday’s Relativity Fest 2019 Sessions: eDiscovery Trends

eDiscovery Daily

11:10 AM – 12:10 PM: Data Subject Access Requests in the Americas and Beyond. 11:10 AM – 1:00 PM: Women in e-Discovery Luncheon: Stellar Women in e-Discovery Panel. Join us for a session examining best practices for dealing with DSARs in the Americas and beyond. This session has been submitted for CLE accreditation.

article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

Here, Part 3 discusses how to manage the various DT risks. This discussion includes methods, tools, and techniques such as using personae and identifying use cases that have high business value, while minimizing project risks. This part also discusses managing CS risks such as ransomware, privacy, change management, and user adoption.

article thumbnail

An Approach to Cybersecurity Risk Oversight for Corporate Directors

Data Matters

More and more, directors are viewing cyber-risk under the broader umbrella of corporate strategy and searching for ways to help mitigate that risk. Despite the plethora of cyber-risk guidance that has surfaced in recent years, however, there is no “silver bullet” for cyber incident response and prevention.