Remove category health-privacy
Remove Financial Services Remove Government Remove Industry Remove Security
article thumbnail

Security Compliance & Data Privacy Regulations

eSecurity Planet

Regulatory compliance and data privacy issues have long been an IT security nightmare. GDPR, the EU’s flagship data privacy and “right to be forgotten” regulation, has made the stakes of a data breach higher than ever. GDPR-style data privacy laws came to the U.S. GDPR-style data privacy laws came to the U.S.

article thumbnail

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

Late last year, Atrium Health disclosed it lost sensitive data for some 2.65 Related: Atrium Health breach highlights third-party risks. One might assume top-tier financial services firms and healthcare vendors would have solved third-party cyber exposures by now. Advancing best practices.

Risk 147
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

China’s PIPL has finally arrived, and brings helpful clarification (rather than substantial change) to China’s data privacy framework

DLA Piper Privacy Matters

Rather than bringing substantial changes to the existing China data privacy framework, the PIPL helpfully consolidates and clarifies obligations on processing of personal information at a national law level. To be clear, this is not China’s own GDPR.

article thumbnail

Understanding China’s Data Regulatory Regime: What Are Important Data? And Can They Be Transferred Outside Of China?

Data Matters

The Cyber Security Law (2017) (the CSL ) prohibits operators of critical information infrastructures ( CIIs ) from transferring their “important data” and personal information outside of China. Network Data Security Regulation. The concept of “important data” is a cornerstone of China’s data regulatory regime.

article thumbnail

6 Best Threat Intelligence Feeds to Use in 2023

eSecurity Planet

As a bonus, many of these tools are free to access and have specialized feeds that focus on different industries and sectors. Differentiator APIs/Integrations Pricing AlienVault Open Threat Exchange Best for community-driven threat feeds Yes Free FBI Infragard Best for critical infrastructure security Limited Free abuse.ch

article thumbnail

An Approach to Cybersecurity Risk Oversight for Corporate Directors

Data Matters

Recent guidance from the Securities and Exchange Commission (SEC) on disclosure and enforcement actions by the Federal Trade Commission (FTC) make clear that cybersecurity is no longer a niche topic, but a concern significant enough to warrant the oversight of corporate boards of directors.

article thumbnail

Regulatory Update: NAIC Fall 2020 National Meeting

Data Matters

The GCC uses a risk-based capital (RBC) aggregation approach intended to act as an additional group supervisory tool for regulators, in conjunction with the Form F Enterprise Risk Report, Own Risk and Solvency Assessment (ORSA) report, and the Corporate Governance Annual Disclosure. 43R —Loan-Backed and Structured Securities.