Remove 10
article thumbnail

French Data Protection Authority Unveils 2013 Annual Activity Report

Hunton Privacy

On May 19, 2014, the French Data Protection Authority (the “CNIL”) published its Annual Activity Report for 2013 (the “Report”) highlighting its main accomplishments in 2013 and outlining some of its priorities for the upcoming year. More than 130 of these inspections were related to video surveillance systems (CCTV systems).

article thumbnail

Brazilian Data Protection Law Update – Delayed Enforcement, Lack of Administrative Structure, and Market Unreadiness

Data Matters

Indeed, the comprehensive law has been viewed as a necessary measure for the country to join a select but growing group of nations in the systematic protection of individuals’ personal data. Undoubtedly, the LGPD’s requirements impose a myriad of compliance measures to be undertaken by companies that process individuals’ personal data.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Is India's Aadhaar System Really "Hack-Proof"? Assessing a Publicly Observable Security Posture

Troy Hunt

billion locals' data. It's operating in an era of increasingly large repositories of personal data held by both private companies and governments alike. Here, Motherboard talks about personal data being sold for less than $10 a pop in a case that sounds eerily similar to the previously mentioned Medicare one.

Security 111
article thumbnail

List of data breaches and cyber attacks in May 2020 – 8.8 billion records breached

IT Governance

Entertainment law firm GSM&S hacked, exposing celebrities’ personal info (unknown). US Marshals Service says personal data of current and former prisoners was stolen (387,000). Palm Beach County School District red-faced after being hacked by a 10-year-old (unknown). Malicious insiders and miscellaneous incidents.

article thumbnail

Cyber Blackmail: More Than Just Ransomware

The Texas Record

Unsavory parties are stealing data, then turning around and attempting to blackmail companies and wealthy individuals into paying. Examples include Sony’s breach in 2014, which was financially (and potentially politically) motivated, with hackers threatening to release company secrets if Sony didn’t pay a ransom. [5] 4] Contenta, S.