Remove category
Remove Examples Remove Exercises Remove Government Remove Information Security Remove Privacy
article thumbnail

How to implement the General Data Protection Regulation (GDPR)

IBM Big Data Hub

The General Data Protection Regulation (GDPR), the European Union’s landmark data privacy law, took effect in 2018. For example, a business that collects user health data needs stronger protections than one that collects only email addresses. Even the world’s biggest businesses are not free from GDPR woes.

GDPR 77
article thumbnail

California Consumer Privacy Act Signed, Introduces Key Privacy Requirements for Businesses

Hunton Privacy

On June 28, 2018, the Governor of California signed AB 375 , the California Consumer Privacy Act of 2018 (the “Act”). The Act introduces key privacy requirements for businesses, and was passed quickly by California lawmakers in an effort to remove a ballot initiative of the same name from the November 6, 2018, statewide ballot.

Privacy 55
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5 learnings from the “Meeting the CCPA Challenge” webinar

Collibra

Collibra recently partnered with Kelle O’Neal, CEO of First San Francisco Partners (FSFP), to host a joint webinar “ Meeting the CCPA Challenge ” about the complexities of the California Consumer Protection Act (CCPA) for the International Association of Privacy Professionals (IAPP). Competition is fierce. Right to access.

article thumbnail

France: The CNIL publishes a practical guide on Data Protection Officers

DLA Piper Privacy Matters

The DPO must be invited to strategic meetings and requested to provide advice on all processing where his/her intervention or presence must be systematic, notably in case of evolution of processing, conduct of a data protection impact assessment(“DPIA”), revision of existing privacy policies or drafting of new policies, data breaches etc.

GDPR 116
article thumbnail

GDPR Compliance Obligations: The relationship between Data Controllers and Third-Party Processors

AIIM

This is the 11th post in a series on privacy by Andrew Pery. Data Privacy and Open Data: Secondary Uses under GDPR. Mitigate Data Privacy and Security Risks with Machine Learning. The Privacy and Security Dichotomy. Privacy by Design: The Intersection of Law and Technology.

GDPR 83
article thumbnail

Network Security Architecture: Best Practices & Tools

eSecurity Planet

Services Security Services security applies to specialized controls for the system services within the network. Examples of services security include: AD security : Adds layers of security to Active Directory to eliminate unneeded access or permission levels, detect unauthorized changes, and block other attacks on AD.

Security 117
article thumbnail

New SEC Cybersecurity Rules Could Affect Private Companies Too

eSecurity Planet

Also read: Security Compliance & Data Privacy Regulations. For example, in the Enron financial fraud, executives and board members claimed ignorance or that they could not understand the financial maneuvering of Enron’s CFO (chief financial officer). See the top Governance, Risk & Compliance (GRC) tools.