Remove tag personal-information
article thumbnail

$10,000,000 civil penalty for disclosing personal data without consent

Data Protection Report

The claims related to the company’s sharing personal data without consumer consent and making it very difficult for consumers to cancel their subscriptions to this telehealth service. The order also requires that the company destroy personal data for which it had not received consent and to create a document retention and destruction policy.

article thumbnail

API Security 101 for Developers: How to Easily Secure Your APIs

ForAllSecure

However, as with any software component, APIs are also prone to security vulnerabilities that can be exploited by attackers. API security is an ongoing process that demands continual attention and effort from everyone on the development team. API Basics: What Is an API and How Do APIs Work?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Data Governance Protects Sensitive Data

erwin

How can companies protect their enterprise data assets, while also ensuring their availability to stewards and consumers while minimizing costs and meeting data privacy requirements? Data Security Starts with Data Governance. Lack of a solid data governance foundation increases the risk of data-security incidents.

article thumbnail

Choosing to Store, Scan, or Shred Your Documents: A Comprehensive Guide

Armstrong Archives

In the fast-paced business world, information flows in many directions at lightning speed. This reality has made data security increasingly important, requiring a sea change in the way companies handle their documents. The decisions you make have financial, operational, and security implications.

article thumbnail

Historic Charges: First Enforcement Action Filed by New York Department of Financial Services Under Cybersecurity Regulation

Data Matters

2 Because First American’s violations included the exposure of millions of documents containing nonpublic information (NPI), the total penalty potentially could be substantial. limit user access privileges to information systems that provide access to NPI (23 NYCRR § 500.07). The NYDFS Cybersecurity Regulation. e) and 500.01(g),

article thumbnail

Top 7 Cloud Storage Security Issues & Risks (+ Mitigations)

eSecurity Planet

Cloud storage security issues refer to the operational and functional challenges that organizations and consumers encounter when storing data in the cloud. Cloud storage risks involve potential external threats and vulnerabilities that jeopardize the security of stored data.

Cloud 124
article thumbnail

Top IoT Security Solutions of 2021

eSecurity Planet

IoT security is where endpoint detection and response ( EDR ) and enterprise mobility management ( EMM ) meet the challenges of a rapidly expanding edge computing infrastructure. Enterprise organizations recognize this shift and need to invest in device management and endpoint security capabilities.

IoT 140