Remove archives
article thumbnail

EU: EDPB ISSUES GUIDELINES ON PROCESSING OF PERSONAL DATA THROUGH VIDEO DEVICES

DLA Piper Privacy Matters

The European Data Protection Board ( “EDPB” ) has published guidelines on the processing of personal data through video devices (the “ Guidelines “) (currently subject to a public consultation process). technical and organisational measures required for such data processing.

article thumbnail

Two FTC complaints that over-retention of personal data violates Section 5

Data Protection Report

In both cases, the FTC’s complaint alleged that the companies retained personal data for longer than was necessary, and that conduct violated Section 5 of the Federal Trade Commission Act as an unfair act or practice. Under the proposed consent orders, both companies do not confirm or deny the allegations.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CNIL’s New Guidelines on HR Processing

HL Chronicle of Data Protection

The new guidelines are applicable to public and private companies for the processing of their employees’ personal data. The CNIL concludes that consent can be used as a legal basis for processing employee/applicant personal data only in cases where there are no consequences for them. Categories of personal data.

article thumbnail

Romania: Key aspects in the Romanian Data Protection Authority’s annual activity report (2019)

DLA Piper Privacy Matters

On 28 September 2020, the Romanian National Supervisory Authority for the Processing of Personal Data (ANSPDCP) published on its website the annual activity report for 2019. Qualification of the parties involved in personal data processing activities. Video surveillance of employees. Points of view. 5 of Law no.

article thumbnail

Thousands of Humana customers have their medical data leaked online by threat actors

Security Affairs

On July 18, we reached out to Humana to verify that the data belonged to them, but they have not responded yet. One of the forum members who downloaded the database claims that the archive contains information from 2020, and not 2019, as suggested by the leaker. What was leaked? Drug prescription listings).

Insurance 112
article thumbnail

Trend Micro Apps removed from Mac App Store after being caught exfiltrating user data

Security Affairs

The security researcher that handle the Twitter account Privacy First first reported the alleged unethical behavior and published a video that shows how the app harvest users ‘data. And what do you think that might be? If you guessed the history.zip file you would be correct!” ” wrote Wardle.

article thumbnail

How to Tackle the Information Management Challenges of Legacy Applications

AIIM

An ECM system eliminates the need for specialist skills and provides a common platform for storing and accessing all legacy data, with multi-factor authentication and other controls to maintain security and data privacy measures such as redaction of personal data. there will be no further changes to it)?

ECM 167