Remove category general
article thumbnail

Is your organisation ready for the DSP Toolkit compliance deadline?

IT Governance

Each year, certain healthcare organisations must complete a self-assessment via the DSP (Data Security and Protection) Toolkit to demonstrate their data security and information governance compliance. The compliance requirements differ depending on which of four categories your organisation falls into.

article thumbnail

The Privacy Officers’ New Year’s Resolutions

Data Protection Report

The Court of Justice of the European Union (CJEU) will determine the validity of the EU Standard Contractual Clauses (SCCs) ( Data Protection Commissioner v Facebook Ireland Limited, Maximillan Schrems ) whilst the General Court of the EU will consider the future of Privacy Shield (La Quadrature du Net v Commission).

Privacy 85
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Privacy Officers’ New Year’s Resolutions

Data Protection Report

The Court of Justice of the European Union (CJEU) will determine the validity of the EU Standard Contractual Clauses (SCCs) ( Data Protection Commissioner v Facebook Ireland Limited, Maximillan Schrems ) whilst the General Court of the EU will consider the future of Privacy Shield (La Quadrature du Net v Commission).

Privacy 52
article thumbnail

GDPR Compliance Obligations: The relationship between Data Controllers and Third-Party Processors

AIIM

Mitigate Data Privacy and Security Risks with Machine Learning. The Privacy and Security Dichotomy. The EU General Data Protection Regulation is a game changer , particularly enforcement of obligations to safeguard privacy rights. You might also be interested in: The Re-Permissioning Dilemma Under GDPR.

GDPR 83
article thumbnail

4 Steps in Streamlining Open Records Requests

Gimmal

These steps fall under the information governance umbrella. Information governance (IG) is a set of interdisciplinary policies and procedures used to regulate an organization’s data from creation to disposal.

FOIA 52
article thumbnail

Snapshot: College and University Retention Schedules

Brandeis Records Manager

Higher Ed is an industry that generally encourages sharing of open information, in this case providing a view of retention schedules in the aggregate. For example, we found that no CU retained applications from prospective students who never attended (“non-matrics”) for more than 7 years. Record Categories.

article thumbnail

Types of Malware & Best Malware Protection Practices

eSecurity Planet

This article dives into the lexicon of malware, offering descriptions, protections, and examples of each. Rogue security software. In general, here are some of the most frequent best practices to protect against malware: Update all network, application, and device software promptly. Examples of Adware Malware Attacks.

Phishing 104