article thumbnail

Data privacy examples

IBM Big Data Hub

A navigation app anonymizes activity data before analyzing it for travel trends. These are just some examples of how organizations support data privacy , the principle that people should have control of their personal data, including who can see it, who can collect it, and how it can be used.

article thumbnail

What Is Data Minimisation? Definition & Examples

IT Governance

Data minimisation requires organisations to process personal data only if it serves a specific purpose, and to retain it for only as long as it’s needed to meet that purpose. This is because the answer will depend on the specific circumstances for processing and using the personal data.

GDPR 132
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

India Passes Digital Personal Data Protection Act

Hunton Privacy

reports that in early August 2023, the Indian Parliament passed the Digital Personal Data Protection Act (the “Act”), bringing to a close a 5-year process to enact an omnibus data privacy law in India. Grounds for Collection and Processing Consent continues to be the primary legal ground for the processing of personal data.

article thumbnail

SINGAPORE: Proposed Guidelines on Use of Personal Data in AI Systems

DLA Piper Privacy Matters

On 18 July 2023, Singapore’s Personal Data Protection Commission (“ PDPC ”) issued for public consultation a set of proposed guidelines for the use of personal data in AI recommendation and decision systems (“ Proposed Guidelines ”). The public consultation is open until 31 August 2023.

article thumbnail

When are schools required to report personal data breaches?

IT Governance

Under the GDPR (General Data Protection Regulation) , all personal data breaches must be recorded by the organisation and there should be a clear and defined process for doing so. In this blog, we take a look at the scenarios in which data protection breaches in schools must be reported. When must breaches be reported?

article thumbnail

What Is an Insider Threat? Definition, Types, and Examples

IT Governance

Financially motivated malicious insiders Security experts often say that ‘personal data is the new currency’. That’s a slight exaggeration (good luck trying to pay rent with your email address), but the point remains: legitimate organisations and cyber criminals alike are trying to get their hands on personal data.

article thumbnail

SINGAPORE: Right of private action under the Personal Data Protection Act 2012 – scope explained

DLA Piper Privacy Matters

The Singapore Court of Appeal has recently clarified that ‘emotional distress’ is an actionable loss and damage under the existing right of private action of Personal Data Protection Act 2012 (“ PDPA “). For example, the Court observed that loss of control of personal data would not constitute loss or damage under the PDPA.