Remove Exercises Remove Information Security Remove Retail Remove Security
article thumbnail

SEC Announces 2022 Examination Priorities: Private Funds, ESG, Retail, Cyber, Digital Assets Top the List

Data Matters

Securities and Exchange Commission (SEC) Division of Enforcement (EXAMS or Division) issued its annual examination priorities. Private Fund, ESG Investing, Retail Investors, Cybersecurity, Fintech, and Digital Assets. Microcap, Municipal, Fixed Income, and Over-the-Counter Securities. On March 30, 2022, the U.S.

Retail 88
article thumbnail

2022 Cyber Security Review of the Year

IT Governance

Although there have still been a few surprises, with the death of Queen Elizabeth II and blazing heatwaves across the UK to name but two, it was a familiar year in the cyber security landscape. Google , Clearview AI , and Meta all receives hefty penalties in 2022, demonstrating the continued important of effective information security.

Security 132
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Does your use of CCTV comply with the GDPR?

IT Governance

You must tell people when you’re collecting their personal information to give them the opportunity to exercise their data subject rights. These rights enable individuals to access the personal data organisations store on them and to challenge the way their information is used. Make sure people know they’re being recorded.

GDPR 110
article thumbnail

How to implement the General Data Protection Regulation (GDPR)

IBM Big Data Hub

Think: an online retailer that stores customers’ email addresses to send order updates. The only processing operations exempt from the GDPR are national security and law enforcement activities and purely personal uses of data. Storage limitation: Organizations should securely dispose of data as soon as its purpose is fulfilled.

GDPR 78
article thumbnail

CCTV and the GDPR – an overview for small businesses

IT Governance

If your business uses CCTV – whether for security or employee monitoring purposes – and you’re unsure about your obligations under the new law and how they differ from those of the DPA (Data Protection Act) 1998, this blog outlines some of the areas you need to consider. Processed securely.

GDPR 102
article thumbnail

A Practical Guide to Cyber Incident Response

IT Governance

About Vanessa Horton Vanessa holds a degree in computer forensics, as well as a number of cyber security and forensics qualifications. Now, she’s part of our cyber incident response team, helping clients with their cyber security requirements. Return to contents Detection – security monitoring and what is ‘normal’?

Risk 118
article thumbnail

GUEST ESSAY: Leveraging best practices and an open standard to protect corporate data

The Last Watchdog

It’s time to rethink your security stack and priorities. Security and privacy are more than just adding on to what you have historically done: It’s a constant re-evaluation of your approach, where nothing is sacred except for the data you are entrusted to protect. You almost certainly need a chief information security officer (CISO).