Remove 10
Remove 2020 Remove Events Remove Privacy Remove Security Remove Video
article thumbnail

China Issues Provisions on the “Scope of Necessary Personal Information Required for Common Types of Mobile Internet Applications”

Hunton Privacy

The Provisions generally are consistent with the draft version previously issued for public comments on December 1, 2020 and include additional details, as well as new provisions relating to ticketing applications ( e.g. , those for purchasing seats at performances).

article thumbnail

Two FTC complaints that over-retention of personal data violates Section 5

Data Protection Report

InMarket also incorporated its SDK into its own apps, which would, for example, offer consumers rewards for completing certain tasks, such as watching videos, walking into stores, etc. Consent Order at ¶ X) Blackbaud Blackbaud had a cyber security event in 2020 where personal information was exfiltrated. Complaint ¶10.)

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Part 2: OMG! Not another digital transformation article! Is it about the evolution from RIM to Content Services?

ARMA International

This part will also discuss managing CS risks such as ransomware, privacy, change management, and user adoption. How will organizations use so-called “vaccine passports” related to employees and customers and how will organizations secure their protected health information (PHI) in response to changing health directives? Introduction.

article thumbnail

If I Go to a Protest, What Kinds of Personal Information Might Police Collect About Me? (important guest post)

Architect Security

But police and sheriffs’ departments who want to surveil protests in their area do have a mind-boggling array of resources at their disposal in the year 2020. They have easy access to social media messages, as well as social media photo and video footage and its associated metadata, and data downloaded from confiscated phones.

article thumbnail

The Hacker Mind Podcast: Learn Competitive Hacking with picoCTF

ForAllSecure

And if you're going for a certification like CISSP Computer Information Systems Security Professional, you'll need to have a breadth of experience across multiple domains. So while you may be particularly skilled in security architecture and engineering. For example, when learning a new subject area. One of the best known starters CTF.

article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

This part also discusses managing CS risks such as ransomware, privacy, change management, and user adoption. Commissioned by organizers to predict worst-case scenarios for the Munich games, [Georg] Sieber came up with a range of possibilities, from explosions to plane crashes, for which security teams should be prepared. 2020, p 6).

article thumbnail

The Hacker Mind Podcast: Ethical Hacking

ForAllSecure

The US Justice Department says it will no longer prosecute good-faith security researchers, but what constitutes good-faith security research? It will no longer prosecute good-faith security research that would have otherwise violated the Computer Fraud and Abuse Act (CFAA). Is hacking a crime? Who is responsible?

IT 52