article thumbnail

Examples of sustainability in business

IBM Big Data Hub

There are various examples of sustainable business practices that companies can adopt to improve their business model. Google, for example, takes first place in purchasing the most renewable energy of any company over the past 10 years. One common corporate sustainability strategy is known as the triple bottom line.

article thumbnail

NYDFS Proposes Updated Second Amendment to Its Cybersecurity Regulation

Hunton Privacy

On June 28, 2023, the New York Department of Financial Services (“NYDFS”) published an updated proposed Second Amendment (“Amendment”) to its Cybersecurity Regulation, 23 NYCRR Part 500. On November 9, 2022, NYDFS published a first draft of the proposed Amendment and received comments from stakeholders over a 60-day period.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Don’t Wanna Pay Ransom Gangs? Test Your Backups.

Krebs on Security

” Wosar said it’s essential that organizations drill their breach response plans in periodic tabletop exercises, and that it is in these exercises that companies can start to refine their plans. “That is still somewhat rare,” Wosar said. “It does happen but it’s more the exception than the rule.

article thumbnail

GDPR Article 17: What Is the Right to Erasure?

IT Governance

These rights can be exercised by first submitting a DSAR (data subject access request). If the individual is unhappy with any of the details provided in this access request, they can exercise one of their data subject rights, including the right to erasure. When does the right to erasure apply? Can you charge a fee?

GDPR 105
article thumbnail

How to Package and Price Embedded Analytics

Just by embedding analytics, application owners can charge 24% more for their product. How much value could you add? This framework explains how application enhancements can extend your product offerings. Brought to you by Logi Analytics.

article thumbnail

From iPhone to NT AUTHORITYSYSTEM – exploit ‘Printconfig’ dll with a real-world example

Security Affairs

From iPhone to NT AUTHORITYSYSTEM – As promised in my previous post , I will show you how to exploit the “Printconfig” dll with a real world example. But what does Apple’s iPhone have to do with it?? Well, keep on reading… ( sorry no ). So the question is, can this operation be exploitable ? You got it, enter “ NATIVE HARDLINKS “ ….

article thumbnail

Considerations on embedding the new standard contractual clauses in IT contracts

DLA Piper Privacy Matters

Before Schrems II, the “old” SCCs were routinely included in IT contracts without actually considering thoroughly the interplay between those old SCCs and the IT agreement as such, for example, in case of suspension or termination of the data transfers, as such suspension or termination did not happen in practice.

IT 119