Remove 10
article thumbnail

The Impact of Data Protection Laws on Your Records Retention Schedule

ARMA International

Certain sectors, such as banking, financial services, health, and insurance have their own data protection and privacy requirements. A data subject request is an action by an individual to exercise that right, and the organization has an obligation to respond to that request 10 11. resumes, personnel files, video/call recordings).

article thumbnail

Zoom Settles with FTC Over Deceptive Security Claims

Hunton Privacy

On November 9, 2020, the Federal Trade Commission announced it had entered into an consent agreement (the “Proposed Settlement”) with Zoom Video Communications, Inc. Zoom also is prohibited from misrepresenting its privacy and security practices, and must obtain biennial assessments of its security program by an independent third party.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Vulnerability Recap 4/1/24: Cisco, Fortinet & Windows Server Updates

eSecurity Planet

The fix: Apply the emergency fixes issued by Microsoft for: Windows Server 2022 Windows Server 2019 Windows Server 2016 Windows Server 2012 R2 Attackers Actively Exploit Fortinet Enterprise Management Server SQLi Flaw Type of vulnerability: SQL injection (SQLi) flaw. out of 10), and calls it Shadow Ray.

Libraries 109
article thumbnail

Two FTC complaints that over-retention of personal data violates Section 5

Data Protection Report

The FTC’s complaint states: “From 2016 to the present, about 100 million unique devices sent Respondent location data each year.” (Complaint ¶ 5 (emphasis in original)) InMarket would share advertising revenue with developers that incorporated the InMarket SDK into their apps. Complaint ¶10.)

article thumbnail

2020 in review: January to June

IT Governance

The top story from February was the long-awaited conclusion to a series of data breaches that Yahoo experienced between 2012 and 2016. In December 2019, the video conferencing software had 10 million daily users. You can see more incidents from January in our list of data breaches and cyber attacks. There was also Zoom.

article thumbnail

2019 end-of-year review part 2: July to December

IT Governance

The second half of the year began with major data privacy news: the UK’s data protection authority, the ICO (Information Commissioner’s Office), announced its intention to fine British Airways and Marriott International a combined £282.6 million at the time) fine for violating the US Children’s Online Privacy Protection Act in February.

article thumbnail

Part 2: OMG! Not another digital transformation article! Is it about the evolution from RIM to Content Services?

ARMA International

This part will also discuss managing CS risks such as ransomware, privacy, change management, and user adoption. Implied herein is a cloud computing model that ARMA (2016) defines as “A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., Introduction.