Remove links-resources
article thumbnail

Colorado AG Publishes Draft Colorado Privacy Act Rules

Hunton Privacy

Below are key examples of topics addressed by the proposed regulations. Right to Request to Exercise Personal Data Rights (Rule 4.02 – Rule 4.07; 6.11). of the proposed regulation requires “controllers” to establish “reasonable methods” to authenticate consumers who submit data rights requests.

Privacy 78
article thumbnail

Multinational ICICI Bank leaks passports and credit card numbers

Security Affairs

Among the leaked data were bank account details, bank statements, credit card numbers, full names, dates of birth, home addresses, phone numbers, emails, personal identification documents, and employees’ and candidates’ CVs. Cybernews contacted ICICI Bank and CERT-IN, and the company fixed the issue.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Catches of the Month: Phishing Scams for July 2023

IT Governance

Welcome to our July 2023 catches of the month feature, in which we explore the latest phishing scams and the tactics that cyber criminals use to trick people into handing over personal data. Whereas traditional attacks feature poisoned attachments or bogus links, quishing uses QR codes that direct victims to their fraudulent website.

article thumbnail

The Global Privacy Assembly Approves Data Sharing to Fight Coronavirus Pandemic

Hunton Privacy

On March 17, 2020, the Executive Committee of the Global Privacy Assembly (“GPA”) issued a statement giving their support to the sharing of personal data by organizations and governments for the purposes of fighting the spread of the COVID-19 pandemic.

Privacy 90
article thumbnail

Expert Insight: Adam Seamons on Zero-Trust Architecture

IT Governance

Networks have moved from self-contained, on-site setups to multiple Cloud services that are accessed remotely by staff and resources. These problems are compounded by a lack of resources – from a funding perspective, but also in terms of skills shortages. Maybe they need access to employee records, but not payroll data, for example.

Cloud 119
article thumbnail

The Impact of Data Protection Laws on Your Records Retention Schedule

ARMA International

By doing this, an organization retains necessary business information while saving money and resources by disposing of unnecessary information that would otherwise drive up the cost of storage, data migration, and litigation. Introduction to Data Protection Laws. resumes, personnel files, video/call recordings).

article thumbnail

EDPB Publishes Draft Guidelines on the Concepts of Controller and Processor under the GDPR

Data Matters

The first part seeks to further clarify the meaning of these concepts—which are crucial in determining compliance responsibilities under the GDPR—by reference to various examples. The Draft Guidelines provide further examples of what such essential and non-essential processing may entail. The Draft Guidelines consist of two parts.

GDPR 97