Remove category
Remove Events Remove GDPR Remove Marketing Remove Security Remove Video
article thumbnail

EU: EDPB ISSUES GUIDELINES ON PROCESSING OF PERSONAL DATA THROUGH VIDEO DEVICES

DLA Piper Privacy Matters

The European Data Protection Board ( “EDPB” ) has published guidelines on the processing of personal data through video devices (the “ Guidelines “) (currently subject to a public consultation process). 1. Application of the GDPR.

article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

Data is not just a resource for better marketing, better service and delivery. The new right to be forgotten will allow children to enjoy their childhood without having every personal event, achievement, failure, antic or prank that they posted online to be digitally recorded for ever more. Data is used to build products themselves.

GDPR 120
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

Thus, common tools and techniques are risk matrices, risk registers, risk logs, risk breakdown structures, risk categories, Monte Carlo simulations, and sensitivity analyses. Latson 2014) Unfortunately, the events unfolded almost exactly like the scenario in Situation Number 21. Therefore, the risk did not seem to matter.

article thumbnail

How to build a successful hybrid cloud strategy

IBM Big Data Hub

Cloud computing services and management products fall into three primary categories: Software-as-a-Service (SaaS) offers applications hosted on a cloud server and distributed to end-users over the public internet. Common SaaS product examples include Zoom (for video conferencing) and Google Drive (for file management).

Cloud 95
article thumbnail

Top Cybersecurity Companies for 2021

eSecurity Planet

As the demand for robust security defense grows by the day, the market for cybersecurity technology has exploded, as well as the number of available solutions. Syxsense Secure. Stop breaches with one endpoint security solution. Pre-built templates keep organizations secure without needing large teams and specialists.