Remove 10
Remove 2019 Remove Encryption Remove Government Remove Meeting
article thumbnail

$10,000,000 civil penalty for disclosing personal data without consent

Data Protection Report

As part of the order, the company agreed to post “clearly and conspicuously” on its websites and apps for the next two years: Between October 2019 and [date], we shared the personal of information of consumers visiting our website and apps with other companies without their permission. million consumers between October 2019 and March 2023.

article thumbnail

Regulatory Update: NAIC Spring 2019 National Meeting

Data Matters

The National Association of Insurance Commissioners (NAIC) held its Spring 2019 National Meeting (Spring Meeting) in Orlando, Florida, from April 6 to 9, 2019. This post summarizes the highlights from this meeting. Group Capital Calculation (GCC), with voluntary field testing expected to begin in early May 2019.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Historic Charges: First Enforcement Action Filed by New York Department of Financial Services Under Cybersecurity Regulation

Data Matters

The NYDFS Cybersecurity Regulation became effective in March 2017 and, beginning on February 15, 2019, required all NYDFS-regulated entities (Covered Entities), including First American, to annually certify compliance with the Regulation. The First American hearing is scheduled to occur on October 26, 2020, at the NYDFS. e) and 500.01(g),

article thumbnail

After Springhill: Assessing the Impact of Ransomware Lawsuits

eSecurity Planet

The legal complaint [PDF] notes that on July 9, 2019, the day it was hit by a ransomware attack, Springhill Memorial Hospital contended that the event had “not affected patient care.” ” Crockett said unofficial numbers indicate that only about 10 percent of such cyber insurance claims are paid out.

article thumbnail

Types of Encryption, Methods & Use Cases

eSecurity Planet

Encryption scrambles data to make it unreadable to those without decryption keys. Proper use of encryption preserves secrecy and radically lowers the potential damage of a successful cybersecurity attack. Encryption algorithm types will provide an overview of the mathematical algorithms used to encrypt data (AES, RSA, etc.),

article thumbnail

Consultation paper published on Hong Kong’s data protection law

Data Protection Report

The Paper was released as part of an agenda for the upcoming Panel meeting which will be held on Monday, 20 th January 2020, and follows proposals by the Privacy Commissioner for Personal Data (the Commissioner ) to the government to amend the PDPO. These changes are the first changes to the PDPO to be proposed in over 10 years.

Paper 56
article thumbnail

Consultation paper published on Hong Kong’s data protection law

Data Protection Report

The Paper was released as part of an agenda for the upcoming Panel meeting which will be held on Monday, 20 th January 2020, and follows proposals by the Privacy Commissioner for Personal Data (the Commissioner ) to the government to amend the PDPO. These changes are the first changes to the PDPO to be proposed in over 10 years.

Paper 40