Remove category international
article thumbnail

US: Virginia passes comprehensive consumer data protection law

DLA Piper Privacy Matters

The VCDPA does not apply to the following types of entities: Virginia state agencies; financial institutions or data subject to Title V of GLBA; covered entities or business associates governed by HHS’s HIPAA and HITECH rules; nonprofits; or higher education institutions. Key provisions.

article thumbnail

France: The CNIL publishes a practical guide on Data Protection Officers

DLA Piper Privacy Matters

The CNIL thus recommends that the DPO’s mission letter clearly states that maintenance of such record should be within the DPO missions, and in particular, based on the information relating to each processing activity that will be communicated to him/her by the internal stakeholders in charge of such processing activity.

GDPR 116
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5 learnings from the “Meeting the CCPA Challenge” webinar

Collibra

Collibra recently partnered with Kelle O’Neal, CEO of First San Francisco Partners (FSFP), to host a joint webinar “ Meeting the CCPA Challenge ” about the complexities of the California Consumer Protection Act (CCPA) for the International Association of Privacy Professionals (IAPP). Competition is fierce. Right to access.

article thumbnail

Europe: EDPB issues Recommendations on Supplementary Measures and European Essential Guarantees for surveillance measures following Schrems II

DLA Piper Privacy Matters

certain data categories may fall within the scope of specific legislation in the third country); whether the data will be stored in the third country or whether there is only remote access to data stored within the EU/EEA; the format of the data to be transferred (i.e. in plain text/ pseudonymised or encrypted etc.); Supplementary Measures.

Paper 98
article thumbnail

Best Incident Response Tools and Services for 2021

eSecurity Planet

But these core functions are present in most products: Ability to instantly deploy and gain visibility across the environment, including Windows, Mac and Linux operating systems. Analysis of both internal and external traffic. The functions contained within incident response tools and services vary widely from vendor to vendor.

Analytics 117
article thumbnail

Cloud Security Fundamentals: Understanding the Basics

eSecurity Planet

10 Fundamentals of Cloud Security 5 Common Cloud Security Challenges 5 Common Cloud Security Solutions Bottom Line: Develop a Strong Cloud Security Fundamental Strategy ICP Plugin - body top3 - Category: Country: US --> How Secure Is the Cloud? Collaboration with managed security service providers (MSSPs) to supplement internal skills.

Cloud 117
article thumbnail

How to write a business continuity plan: the easy way

IT Governance

Most disruptions that you will experience fall into one of these categories: Natural disasters. Your main concern in this category should be events that damage or disrupt transport routes, like car accidents and train crashes. This stage focuses on internal and external communications. Table-top exercise. Human error.