article thumbnail

Libraries: don't mess with trust

CILIP

Libraries: don't mess with trust. Libraries: don't mess with trust. Jeni Tennison, CEO of the ODI discusses how libraries could fit into it without damaging themselves. Operational uses such as using data to support the day-to-day running of a library. where the libraries are for example. ?Most Jeni asks. ?Should

article thumbnail

GDPR Compliance Obligations: The relationship between Data Controllers and Third-Party Processors

AIIM

You might also be interested in: The Re-Permissioning Dilemma Under GDPR. Data Privacy and Open Data: Secondary Uses under GDPR. Three Critical Steps for GDPR Compliance. GDPR and Cross Border Data Flows between the EU and the US: Current State of the Law. What Do the GDPR and new Privacy Laws Mean for U.S.

GDPR 83
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Weekly podcast: 2018 end-of-year roundup

IT Governance

As is now traditional, I’ve installed myself in the porter’s chair next to the fire in the library, ready to recap some of the year’s more newsworthy information security events. And, of course, on 25 May the GDPR came into effect. Hello and welcome to the final IT Governance podcast of 2018. million payment cards and 1.2

article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

It will ensure that libraries can continue to archive material, that journalists can continue to enjoy the freedoms that we cherish in this country, and that the criminal justice system can continue to keep us safe. Of course, as new rights like this are created, the Bill will ensure that they cannot be taken too far.

GDPR 120
article thumbnail

A Practical Guide to Cyber Incident Response

IT Governance

It’s how I convince them that they really need that cyber incident response plan , to do tabletop exercises , to train their staff , and so on. Tabletop exercises are important – they tell you whether your plans are working as intended. For example, take the ransomware attack on the British Library last year.

Risk 118
article thumbnail

Security Affairs newsletter Round 298

Security Affairs

Critical flaws in Orbit Fox WordPress plugin allows site takeover EMA said that hackers manipulated stolen documents before leaking them Security Affairs newsletter Round 297 500K+ records of C-level people from Capital Economics leaked online Apple paid a $50,000 bounty to two bug bounty hunters for hacking its hosts German laptop retailer fined €10.4m (..)

article thumbnail

The Hacker Mind Podcast: Going Passwordless

ForAllSecure

So by that, I mean, if your developer libraries are available, it's easy to do. In most cases, this regards the European Union’s General Data Protection Regulation or GDPR, and in the UK that law continues as the UK GDPR. And I think it is an exercise, pretty fun to look at those credentials. Look what they've done.