Remove tag health-information
article thumbnail

Data privacy examples

IBM Big Data Hub

A school asks parents to verify their identities before giving out student information. Far-reaching regulations like Europe’s GDPR levy steep fines on organizations that fail to safeguard sensitive information. An online retailer always gets users’ explicit consent before sharing customer data with its partners.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

Now information technologies and the information revolution are again transforming society. Part 2 will discuss the critical factors for a successful DT journey, because organizations need to do a “mind-shift” from traditional records and information management (RIM) practices to content services (CS).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

6 Best Threat Intelligence Feeds to Use in 2023

eSecurity Planet

Threat intelligence feeds are continually updated streams of data that inform users of different cybersecurity threats, their sources, and any infrastructure impacted or at risk of being impacted by those threats. As a bonus, many of these tools are free to access and have specialized feeds that focus on different industries and sectors.

article thumbnail

10 everyday machine learning use cases

IBM Big Data Hub

Machine learning in marketing and sales According to Forbes , marketing and sales teams prioritize AI and ML more than any other enterprise department. Marketers use ML for lead generation, data analytics, online searches and search engine optimization (SEO). Then, it can tailor marketing materials to match those interests.

article thumbnail

Google TAG report Q1 details about nation-state hacking and disinformation

Security Affairs

Google Threat Analysis Group (TAG) has published today its first TAG quarterly report that analyzes rising trends in nation-state and financially motivated attacks. The Google Threat Analysis Group (TAG) is a group inside the Google’s security team that tracks operations conducted by nation-state actors and cybercrime groups.

article thumbnail

The Week in Cyber Security and Data Privacy: 26 February – 3 March 2024

IT Governance

At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. Data apparently includes users’ full names, phone numbers, addresses, email addresses and partial payment card information. The claim is yet to be verified. EasyPark data breach: 21.1

article thumbnail

The EU’s Corporate Sustainability Reporting Directive explained

IBM Big Data Hub

CSRD values sustainability metrics alongside environmental performance, paying particular attention to the “S” in ESG, such as employee health, human rights, bribery, anti-corruption and diversity. This move aims to achieve more complete and transparent sustainability reporting across the region.

Risk 43