Remove category
Remove Information Security Remove Insurance Remove Meeting Remove Risk
article thumbnail

Cybersecurity: Managing Risks With Third Party Companies

Cyber Info Veritas

This article will focus on some strategies that organizations should consider implementing in order to mitigate their cybersecurity risk as far as third-party service providers are concerned. Failure to assess your risks means that you will not be able to properly manage them and your company will be susceptible to cyber threats.

Risk 40
article thumbnail

ICO issue fine of £4.4 to Interserve for security failings

DLA Piper Privacy Matters

The databases also held special category personal data including ethnic origin; religion; details of disabilities; sexual orientation, and health information relevant to ill-heath retirement applications. On the face of it, this is a sizeable fine issued to a non household name controller for perceived failings in information security.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SEC Chair: Sweeping New Cybersecurity Rules Are Coming Soon

Data Matters

Securities and Exchange Commission (SEC), announced that he has asked SEC staff to provide sweeping rulemaking recommendations to modernize and expand the agency’s rules relating to cybersecurity.

article thumbnail

How to Develop an Incident Response Plan

eSecurity Planet

We make IT, security, or any business decision by weighing the risks and the rewards. Or as is often the case with security, what costs can we skip and still escape big penalties later? Be in-line with insurance policies. Be in-line with insurance policies. Document contingencies. Incorporate stakeholder feedback.

Insurance 125
article thumbnail

U.S. states pass data protection laws on the heels of the GDPR

Data Protection Report

Virgin Islands, have enacted breach notification laws that require businesses to notify consumers if their personal information is compromised. These new and amended state data breach laws expand the definition of personal information and specifically mandate that certain information security requirements are implemented.

GDPR 40
article thumbnail

China Publishes Draft Regulations on Protecting the Security of Key Information Infrastructure

Hunton Privacy

On July 10, 2017, the Cyberspace Administration of China published a new draft of its Regulations on Protecting the Security of Key Information Infrastructure (the “Draft Regulations”), and invited comment from the general public. They must conduct this inspection and evaluation at least once a year.

article thumbnail

GDPR is upon us: are you ready for what comes next?

Data Protection Report

For many organizations that are based outside the EU and took the “wait and see” approach, our checklist may come in handy, which gives an illustrative overview of the requirements likely to impact most types of businesses and the practical steps that organizations need to take to meet those requirements. Did we mention big data?

GDPR 40