Remove Education Remove Personal data Remove Security Remove Video
article thumbnail

Two FTC complaints that over-retention of personal data violates Section 5

Data Protection Report

In both cases, the FTC’s complaint alleged that the companies retained personal data for longer than was necessary, and that conduct violated Section 5 of the Federal Trade Commission Act as an unfair act or practice. Under the proposed consent orders, both companies do not confirm or deny the allegations. Complaint ¶10.)

article thumbnail

2022 Cyber Security Review of the Year

IT Governance

Although there have still been a few surprises, with the death of Queen Elizabeth II and blazing heatwaves across the UK to name but two, it was a familiar year in the cyber security landscape. Cyber criminals continued to wreak havoc, with the likes of Twitter , Uber and Neopets all reporting mammoth data breaches.

Security 132
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What are you doing for Data Privacy Week?

IT Governance

Data privacy is a concept that governs our everyday lives. We’re asked to hand over our personal data for seemingly everything that we do – from browsing the web to high-street shopping. Although many of us are broadly aware of the risks involved when sharing our personal data, it often doesn’t get the attention it deserves.

article thumbnail

Catches of the Month: Phishing Scams for December 2022

IT Governance

Welcome to our December 2022 review of phishing attacks, in which we explore the latest email scams and the tactics that cyber criminals use to trick people into handing over personal data. The video directed viewers to visit a website where they could enter a giveaway to win cryptocurrency. Hello everyone. Hurry up!”.

Phishing 111
article thumbnail

Catches of the Month: Phishing Scams for April 2023

IT Governance

Welcome to our April 2023 review of phishing attacks, in which we explore the latest email scams and the tactics that cyber criminals use to trick people into handing over personal data. The revenue comes through advertising, with YouTube inserting commercials in their videos.

Phishing 114
article thumbnail

List of data breaches and cyber attacks in February 2020 – 623 million records breached

IT Governance

At first glance, February appears to be a big improvement cyber security-wise compared to the start of the year. Preschool services provider Educational Enrichment Systems discloses cyber attack (unknown). Rady’s Children Hospital in San Diego notifying patients whose data was accessed via open port on the Internet (unknown).

article thumbnail

Does your use of CCTV comply with the GDPR?

IT Governance

That includes pictures and videos, which is why you should be careful about the way you use CCTV. Let’s take a look at the steps you should follow to ensure your video surveillance methods are GDPR-compliant. The GDPR requires that personal information should only be accessible to those who need to it complete a function of their job.

GDPR 109