article thumbnail

Integrating Long-Term Digital Preservation into Your Information Governance Program: First Steps

Preservica

This reality can be overwhelming, but based on the strength of the response by 83% of respondents that business value is a major driver for long-term preservation and governance, there is no option but to forge ahead to promote the long-view and integrate supporting capabilities in the Information Governance program.

article thumbnail

$8 million penalty to NYDFS – and another case of over-retention

Data Protection Report

On January 3, 2024, the New York Department of Financial Services announced a consent order with GGT, where GGT agreed to pay NYDFS $8 million and to surrender its BitLicense (for cryptocurrency trading), due to alleged violations of NYDFS’ cybersecurity and its virtual currency regulations.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hindsight is 2020. Looking back so we can move forward

Thales Cloud Protection & Licensing

Data security is still a problem. Some of our first customers were in financial services and government agencies, where our technologies were used to create a “need to know” in a system that obeys a strict privilege hierarchy and where “root” owns all things. And as always, what will that mean for us in data security?

Cloud 113
article thumbnail

Summary – “Industry in One: Financial Services”

ARMA International

The scope of a records and information management (RIM) program in financial services can seem overwhelming. Compared to other industries, the complexities of managing records and information in financial services are arguably some of the toughest to solve, primarily because of the intense regulatory scrutiny.

article thumbnail

Record Retention is a Key Component of Your Privacy and Cyber Compliance Program

Data Protection Report

the Federal Trade Commission has long recommended that companies properly and promptly dispose of personal information once it is no longer necessary to retain it for legal or business reasons. How do you build an effective information governance program? Some consider email to be the “third-rail” of information governance.

Privacy 144
article thumbnail

The Privacy Officers’ New Year’s Resolutions

Data Protection Report

Although the AG’s view was that the SCCs are valid, he suggested that those using them would need to examine the national security laws of the data importer’s jurisdiction to determine whether they can in fact comply with the terms of the SCCs. He also raised serious doubts over the validity of the Privacy Shield. In the U.S.,

Privacy 84
article thumbnail

The Privacy Officers’ New Year’s Resolutions

Data Protection Report

Although the AG’s view was that the SCCs are valid, he suggested that those using them would need to examine the national security laws of the data importer’s jurisdiction to determine whether they can in fact comply with the terms of the SCCs. He also raised serious doubts over the validity of the Privacy Shield. In the U.S.,

Privacy 52