Remove 12
article thumbnail

The Impact of Data Protection Laws on Your Records Retention Schedule

ARMA International

Introduction to Data Protection Laws. Data protection laws, regulations, and rules control the collection, use, transfer, and storage of personal and sensitive information. Personal data protection requirements may be issued by federal, state (provincial), or local governments.

article thumbnail

2020 in review: January to June

IT Governance

To close out the year, we’ve gathered some of the most notable stories from the past 12 months. The top story from February was the long-awaited conclusion to a series of data breaches that Yahoo experienced between 2012 and 2016. Lawyers are the real winners in the Yahoo data breach compensation case.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CIPL and its GDPR Project Stakeholders Discuss DPOs and Risk under GDPR

Hunton Privacy

Since the inaugural workshop in March 2016 in Amsterdam, participation in the project has grown significantly. Also, the Working Party is on the verge of publishing the report from its first GDPR “FabLab” meeting in July 2016. Subsequently, the Working Party plans to release guidance on risk, DPIAs and certifications.

GDPR 49
article thumbnail

A Decade of Have I Been Pwned

Troy Hunt

” Anyone can type in an email address into the site to check if their personal data has been compromised in a security breach. Press is great for raising awareness of the project, but it has also quite literally DDoS'd the service with the Martin Lewis Money Show in the UK knocking it offline in 2016.

article thumbnail

What’s new in OpenText Axcelerate

OpenText Information Management

Other recent Axcelerate enhancements include: End-to-end eDiscovery support for audio and video (AV) files – Get the most efficient review of voluminous AV content. Now supports 2016 and 2019 Outlook versions. To mitigate risk to the organization, swift and accurate identification of personal data is critical.