Remove tag internet-of-things
article thumbnail

US: The CCPA ‘Moving Target’ One Month Before Privacy Enforcement Begins

DLA Piper Privacy Matters

And even after the final regulations are approved by OAL, Appendix E to the Final Statement of Reasons states: To the extent that the regulations require incremental compliance, the OAG may exercise prosecutorial discretion if warranted, depending on the particular facts at issue.

Privacy 84
article thumbnail

A Decade of Have I Been Pwned

Troy Hunt

Search for your account across multiple breaches [link] — Have I Been Pwned (@haveibeenpwned) December 4, 2013 And then, as they say, things kinda escalated quickly. That was certainly part of it, but another part of the name choice was simply that I honestly didn't expect this thing to go anywhere.

article thumbnail

I'm Open Sourcing the Have I Been Pwned Code Base

Troy Hunt

Every single byte of data that's been loaded into the system in recent years has come from someone who freely offered it in order to improve the security landscape for everyone. The very second blog post on that tag was about how I used Azure Table Storage to make it so fast and so cheap. Let me explain why and how.

Passwords 145