article thumbnail

India Passes Digital Personal Data Protection Act

Hunton Privacy

reports that in early August 2023, the Indian Parliament passed the Digital Personal Data Protection Act (the “Act”), bringing to a close a 5-year process to enact an omnibus data privacy law in India. Grounds for Collection and Processing Consent continues to be the primary legal ground for the processing of personal data.

article thumbnail

Cybercriminals launched “Leaksmas” event in the Dark Web exposing massive volumes of leaked PII and compromised data

Security Affairs

Mitigating this damage is particularly challenging due to the intricate interconnection between personal data and digital identity. This widespread geographical distribution of “Free Leaksmas” event highlights the extensive global reach and severe impact of these cybercriminal activities.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

When are schools required to report personal data breaches?

IT Governance

Under the GDPR (General Data Protection Regulation) , all personal data breaches must be recorded by the organisation and there should be a clear and defined process for doing so. In this blog, we take a look at the scenarios in which data protection breaches in schools must be reported. When must breaches be reported?

article thumbnail

Thailand Personal Data Protection Law

Data Protection Report

The Personal Data Protection Act B.E. However, most of the operational provisions, including provisions relating to the rights of a data subject, the obligations of a data controller and the penalties for non-compliance, will become effective on 27 May 2020, 1 year after the PDPA is published. Definition of Personal Data.

article thumbnail

Two FTC complaints that over-retention of personal data violates Section 5

Data Protection Report

In both cases, the FTC’s complaint alleged that the companies retained personal data for longer than was necessary, and that conduct violated Section 5 of the Federal Trade Commission Act as an unfair act or practice. Under the proposed consent orders, both companies do not confirm or deny the allegations. Complaint ¶10.)

article thumbnail

How to write a GDPR-compliant personal data breach notification procedure

IT Governance

An integral part of your EU General Data Protection Regulation (GDPR) compliance project is producing appropriate documentation, which includes a personal data breach notification procedure. What is a personal data breach? Loss of availability of personal data.

article thumbnail

MY TAKE: What NortonLifeLock’s $8 billion buyout of Avast portends for consumer security

The Last Watchdog

Meanwhile, native security is increasingly being built into popular operating systems, and there’s a trend toward beefing up application security, as well. They seem to be attempting to address the consumer security market more holistically, while also expanding their customer base and geographical regions. Mellen: Absolutely.

Security 223