Remove category
Remove Cybersecurity Remove Encryption Remove Manufacturing Remove Privacy
article thumbnail

EUROPE: New privacy rules for connected vehicles in Europe?

DLA Piper Privacy Matters

Main takeaways from the EDBP guidelines are: Connected vehicles raise various privacy and data protection concerns, such as the lack of control and information asymmetry, the risk of excessive data collection; the risk of unlawful further processing of personal data; Most data associated with connected vehicles are considered as personal data (e.g.

Privacy 69
article thumbnail

NIST Cybersecurity Framework: IoT and PKI Security

Thales Cloud Protection & Licensing

Cybersecurity is no different. President Obama and now President Trump have issued executive orders supporting The National Institute of Standards and Technology’s (NIST) Cybersecurity Framework. There are really four categories of threats introduced into organizations with IoT use. Used as a bot/remote control.

IoT 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

European Commission proposes reinforcement of EU Cybersecurity rules

DLA Piper Privacy Matters

On 16 December 2020, the European Commission adopted a proposal for a Directive on measures for a high common level of cybersecurity across the Union (“NIS II Directive”) that revises the current Directive on Security of Network and Information Systems (“NIS Directive”). Cybersecurity risk management and reporting obligations.

article thumbnail

What Is Cloud Security Management? Types & Strategies

eSecurity Planet

Next, the IT team sets up access controls and data encryption methods, followed by network security configuration and cloud activities monitoring. Data encryption : Ensure that your data is safe in transit and at rest to prevent unauthorized access. To protect data, it uses encryption, access controls, monitoring, and audits.

Cloud 60
article thumbnail

China Publishes Draft Regulations on Protecting the Security of Key Information Infrastructure

Hunton Privacy

The Cybersecurity Law of China establishes a new category of information infrastructure, called “key [or critical] information infrastructure,” and imposes certain cybersecurity obligations on enterprises that operate such infrastructure. The Draft Regulations will remain open for comment through August 10, 2017.