Remove 11
Remove 2015 Remove Examples Remove Exercises Remove Personal data Remove Security
article thumbnail

SCHREMS 2.0 – the demise of Standard Contractual Clauses and Privacy Shield?

DLA Piper Privacy Matters

If this happens, many organisations will be left without any practical solution to legitimise the international transfer of personal data outside the EEA and exposure to the threat of GDPR revenue based fines, regulatory sanctions including injunctions and third party claims for compensation.

Privacy 94
article thumbnail

Singapore proposes changes to cybersecurity and data protection regimes

Data Protection Report

In a bid to keep pace with advancements in the technological landscape, the Singapore Government has in recent months embarked on public consultations on its draft Cybersecurity Bill (the Cyber Bill) and its proposed amendments to Singapore’s Personal Data Protection Act (PDPA) to update the country’s data protection regime.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity Standards for the Insurance Sector – A New Patchwork Quilt in the US?

HL Chronicle of Data Protection

Of particular concern to state-level policymakers and enforcement authorities are business practices that in their view may contribute to security incidents. The insurance industry has not been immune from such scrutiny, and the imposition of business practice requirements intended to enhance cybersecurity sector-wide.

article thumbnail

The Burden of Privacy In Discovery

Data Matters

The 2015 amendments to Rule 26(b)(1), however, were meant to resolve any doubt, returning the proportionality factors to their original place as part of the very definition of what is discoverable. The principle of proportionality in civil discovery is hardly new.4 5 In keeping with that aim, the scope of discovery has always been cabined.

Privacy 97
article thumbnail

How to Track Your Kids (and Other People's Kids) With the TicTocTrack Watch

Troy Hunt

For example, there was VTech back in 2015 who leaked millions of kids' info after they registered with "smart" tablets. Mobiispy leaked data. The Gator3 watch turned out to have even more serious security flaws, storing parents and kids’ voice messages on an openly available webserver. We'll come back to that later.

Passwords 111