Remove tag personally-identifiable-information
article thumbnail

Newly Proposed SEC Cybersecurity Risk Management and Governance Rules and Amendments for Public Companies

Data Matters

Securities and Exchange Commission (SEC) proposed new cybersecurity rules to enhance and standardize disclosures regarding cybersecurity risk management, strategy, governance, and incident reporting by public companies. The SEC proposal would continue to ratchet up cybersecurity as an increasingly critical dimension of corporate governance.

article thumbnail

My Experience at the Washington DC Masters Conference

eDiscovery Daily

The challenges presented ranged from missing attachments/link attachments, quality control in data processing for review, collection considerations on devices, especially around privacy, and deriving context from a variety of data existing in a case. The main takeaways were: AI in Data Privacy, Where to Begin?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Best Facial Recognition Software for Enterprises In 2022

eSecurity Planet

It compares this code with its existing database, which will be used to determine if an individual will be granted or denied access to a piece of information or structure. Another concern is that of false negatives in identification, which can deny the right person access. However, there are a few noteworthy concerns.

article thumbnail

Historic Charges: First Enforcement Action Filed by New York Department of Financial Services Under Cybersecurity Regulation

Data Matters

2 Because First American’s violations included the exposure of millions of documents containing nonpublic information (NPI), the total penalty potentially could be substantial. limit user access privileges to information systems that provide access to NPI (23 NYCRR § 500.07). The NYDFS Cybersecurity Regulation. e) and 500.01(g),

article thumbnail

What Can We Learn About the IG Profession from the ARMA InfoCon 2020 Taxonomy

ARMA International

We’ve found our ongoing taxonomy development to be incredibly intriguing and informative. Now, many of the terms in our taxonomy represent common themes you’d expect to see at an ARMA conference, terms like “records management,” “information governance,” and “information management.”

ROT 65
article thumbnail

I'm Open Sourcing the Have I Been Pwned Code Base

Troy Hunt

Let me explain: HIBP Has Always Been Open in Spirit I've already written extensively about the architecture of the system across many of the 128 previous blog posts tagged as Have I Been Pwned. The very second blog post on that tag was about how I used Azure Table Storage to make it so fast and so cheap. I've taken shortcuts.

Passwords 145
article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

Humans have used technology to transform their societies from prehistoric times up to the present. Now information technologies and the information revolution are again transforming society. This part will also discuss managing CS risks such as ransomware, privacy, change management, and user adoption. Introduction.