article thumbnail

FRANCE: A new phase in European privacy law enforcement – CNIL fined Google LLC 50 million euros!

DLA Piper Privacy Matters

The scope of the investigation was the processing of personal data by Android as governed by the privacy policy made available to the user when creating an account to configure its mobile equipment. Lack of transparency and breach of information requirements. Lack of precise information regarding legal basis and retention period.

Privacy 71
article thumbnail

Digitizing the credit management journey

CGI

Instead, they are using real-time data and risk differentiated collections strategies to achieve dramatically better levels of credit management performance—performance that features customer defined modes of contact, 24x7 self-service options, privacy and security, overspending alerts and more. .

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GDPR – The Year in Review

HL Chronicle of Data Protection

Following the one-year anniversary of the coming into effect of the GDPR, Hogan Lovells’ Privacy and Cybersecurity practice has prepared summaries of key GDPR-related developments of the past 12 months. The summaries cover regulatory guidance, enforcement actions, court proceedings, and various reports and materials.

GDPR 40
article thumbnail

Guest Post -- New Global Data  and Privacy Regulations in 2018 and the GDPR

AIIM

Data privacy breaches have been in the news again and again this year, eliciting increased concern from regulators and legislative bodies. But one of the most important data privacy milestones on the horizon in 2018 has its roots far earlier, and has been of utmost concern to multinational organizations. is no longer sufficient.

GDPR 86
article thumbnail

ALL Data as a Service (DaaS/BDaaS) - EAs in a New Role, as DaaS Enablers

Interactive Information Management

The EA scope includes a heavy focus on enterprise "universal" information management and governance, infused (particularly in the Public Sector) with the currently vogue philosophies of SOA, Open Data, Mobility, Privacy-by-Design (PbD) and Cloud Computing.

article thumbnail

Part 2: OMG! Not another digital transformation article! Is it about the evolution from RIM to Content Services?

ARMA International

This part will also discuss managing CS risks such as ransomware, privacy, change management, and user adoption. Since the content has business value, then IG, compliance, security, and privacy are critical considerations when delivering it to business users and customers as a new product or service. Information Architecture (IA).

article thumbnail

Introducing the Information Governance Maturity Model (IGIM)

ARMA International

These include authoritative frameworks, standards, regulations, privacy requirements, risk tolerance, and organizational culture. Capabilities reflect what’s in place to guide information through the organization throughout the information lifecycle. Is your organization’s technology architecture mapped and rationalized?