Remove category general
article thumbnail

What Can We Learn About the IG Profession from the ARMA InfoCon 2020 Taxonomy

ARMA International

Now, many of the terms in our taxonomy represent common themes you’d expect to see at an ARMA conference, terms like “records management,” “information governance,” and “information management.” Information Governance Implementation Model: Our IG model was launched earlier this year; a few sessions are specifically adapted to the model.

ROT 65
article thumbnail

France: The CNIL publishes a practical guide on Data Protection Officers

DLA Piper Privacy Matters

While the DPO is not responsible for maintaining the record of processing activities, in practice, such maintenance is generally part of his or her effective missions. The Guide notably specifies that the CNIL will not respond to requests for advice sent by organizations that have not first consulted with their DPO on that specific question.

GDPR 116
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CIPL and its GDPR Project Stakeholders Discuss DPOs and Risk under GDPR

Hunton Privacy

In September, the Centre for Information Policy Leadership (“CIPL”) held its second GDPR Workshop in Paris as part of its two-year GDPR Implementation Project. Since the inaugural workshop in March 2016 in Amsterdam, participation in the project has grown significantly. Instead, we saw concentrated energy and commitment from all sides.

GDPR 49
article thumbnail

What is the Future of the Legal Technology Conference?, Part Three

eDiscovery Daily

The leader in that category is the ABA TechShow. There is, however, another category of conference which has become increasingly predominant as traditional conferences fall off. These are user conferences, which fall into two distinct types, general user group meetings and product specific user meetings. Her recommendations?

article thumbnail

NIST Releases Final Cybersecurity Framework

Hunton Privacy

The Framework, which includes standards, procedures and processes for reducing cyber risks to critical infrastructure, reflects changes based on input received during a widely-attended public workshop held last November in North Carolina and comments submitted with respect to a preliminary version of the Framework that was issued in October 2013.

article thumbnail

GDPR: lawful bases for processing, with examples

IT Governance

Like the Data Protection Act 1998 (DPA 1998) that it superseded, the General Data Protection Regulation (GDPR) sets out six lawful bases for processing personal data. Do you always need individuals’ consent to process their data? What exactly are ‘legitimate interests’? For the purposes of legitimate interests pursued by the data controller.

GDPR 70
article thumbnail

The Hacker Mind Podcast: The Gentle Art of Lockpicking

ForAllSecure

There’s obviously more to it, but you get the general idea and maybe on some rainy Sunday afternoon, you can puzzle out these long lost combinations and reclaim a few combination locks for reuse. To start, challenges, and workshop tables. They’re all in great condition -- except I forgot their original combinations.

IT 52