Remove tag personal-information
article thumbnail

Data privacy examples

IBM Big Data Hub

A navigation app anonymizes activity data before analyzing it for travel trends. A school asks parents to verify their identities before giving out student information. One cannot overstate the importance of data privacy for businesses today. The user can accept or reject each use of their data individually.

article thumbnail

$10,000,000 civil penalty for disclosing personal data without consent

Data Protection Report

The claims related to the company’s sharing personal data without consumer consent and making it very difficult for consumers to cancel their subscriptions to this telehealth service. As indicated in the paragraph quoted above, the company collected some very sensitive personal information.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CHINA: uncertainties helpfully clarified on various key data compliance activities

DLA Piper Privacy Matters

For example: Automated Decision-Making: where a data controller uses personal data to conduct any automated decision making, it must proactively inform data subjects in advance the types of data processed and the potential impact of the automated decision making.

article thumbnail

China: Navigating China episode 16: New data lifecycle guidelines for financial institutions in China – detailed assessments, additional security measures and some data localisation introduced

DLA Piper Privacy Matters

Important new guidelines outlining how personal and other types of financial information should be handled by financial institutions throughout the data lifecycle have just come into force in China, including a new data localisation obligation. The “Financial Data Lifecycle Guidelines” (????????????)

article thumbnail

How Machine Learning Can Accelerate and Improve the Accuracy of Sensitive Data Classification

Thales Cloud Protection & Licensing

In a recent study , IDC predicted the global datasphere will more than double in size from 2022 to 2026, and that 80% of that data will be unstructured. Traditional approaches to data classification use manual tagging which is labor-intensive, error-prone, and not easily scalable.

article thumbnail

How Data Governance Protects Sensitive Data

erwin

An assessment of the data breaches that crop up like weeds each year supports the conclusion that companies, absent data governance, wind up building security architectures strictly from a technical perspective. When an organization knows what data it has, it can define that data’s business purpose.

article thumbnail

Newly Proposed SEC Cybersecurity Risk Management and Governance Rules and Amendments for Public Companies

Data Matters

Form 8-K would request information such as when the incident was discovered, a description of the incident, the impact on data, the effect of the incident on the registrant’s operations, and the status of remediation. an incident in which a malicious actor has demanded payment to restore company data that was stolen or altered.