Remove category general
article thumbnail

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

Turn the corner into 2019 and we find Citigroup, CapitalOne, Wells Fargo and HSBC Life Insurance among a host of firms hitting the crisis button after their customers’ records turned up on a database of some 24 million financial and banking documents found parked on an Internet-accessible server — without so much as password protection.

Risk 147
article thumbnail

Regulatory Update: NAIC Summer 2021 National Meeting

Data Matters

The National Association of Insurance Commissioners (NAIC) held its Summer 2021 National Meeting (Summer Meeting) August 14-17, 2021. Highlights include, among others, adoption of revised risk-based capital bond factors for life insurers, amendments to SSAP No. NAIC Adopts Revised Risk-Based Capital Bond Factors for Life Insurers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

China’s PIPL has finally arrived, and brings helpful clarification (rather than substantial change) to China’s data privacy framework

DLA Piper Privacy Matters

Express, informed consent must generally be obtained from data subjects for all processing of personal information. The PIPL sets out limited consent exemptions, including (inter alia) in connection with some employee data handling or emergencies , but in practice we doubt organisations will rely on them.

article thumbnail

CCPA In-Depth Series: Draft Attorney General Regulations on Verification, Children’s Privacy and Non-Discrimination

Data Matters

Businesses, consumer advocates, and privacy watchers have thus been eagerly waiting for over a year for the Attorney General to propose the regulations the CCPA requires him to promulgate. As laid out below, the nature and breadth of the Attorney General’s proposed regulations explain why they took so long to produce. HIGHLIGHTS.

Privacy 60
article thumbnail

CCPA In-Depth Series: Draft Attorney General Regulations on Consumer Requests

Data Matters

Businesses, consumer advocates, and privacy watchers have thus been eagerly waiting for over a year for the Attorney General to propose the regulations the CCPA requires him to promulgate. As laid out below, the nature and breadth of the Attorney General’s proposed regulations explain why they took so long to produce. Highlights.

Sales 60
article thumbnail

What Is Encryption? Definition, How it Works, & Examples

eSecurity Planet

This guide will provide a high level overview of encryption and how it fits into IT through the following topics: How Encryption Works To understand how encryption works, we need to understand how it fits into the broader realm of cryptology, how it processes data, common categories, top algorithms, and how encryption fits into IT security.

article thumbnail

The Hacker Mind Podcast: Tales From A Ransomware Negotiator

ForAllSecure

So we we categorize threats into multiple different groups, typically, by their motivations, nation state in a party are generally going to be more motivated by information. And so with ransomware, we would put it in the criminal category, we track over 30 Different ransomware groups. By no means.