Remove category enforcement
article thumbnail

Reminder that the FTC is Providing an Opportunity to Comment on COPPA Rule by October 23

HL Chronicle of Data Protection

The FTC will also be hosting a COPPA workshop on October 7, 2019. Are there additional categories of information that should be expressly included in the definition of “Personal information,” such as genetic data, fingerprints, retinal patterns, or other biometric data? Comments are due October 23, 2019. The COPPA Rule.

article thumbnail

CIPL and its GDPR Project Stakeholders Discuss DPOs and Risk under GDPR

Hunton Privacy

In September, the Centre for Information Policy Leadership (“CIPL”) held its second GDPR Workshop in Paris as part of its two-year GDPR Implementation Project. Since the inaugural workshop in March 2016 in Amsterdam, participation in the project has grown significantly. Risk-based Enforcement and Oversight by the DPAs.

GDPR 49
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FTC Privacy Report Emphasizes Privacy by Design, Individual Control and Transparency

Hunton Privacy

The simplified choice principle builds on the preliminary 2010 report which excluded five categories of “commonly accepted” information collection and use practices. On May 30, 2012, convene a workshop to explore how to make privacy disclosures for mobile applications short, effective and accessible. Commissioner J.

Privacy 40
article thumbnail

AI governance is rapidly evolving — Here’s how government agencies must prepare

IBM Big Data Hub

Moreover, the OECD places legally enforceable AI regulations and standards in a separate category from the initiatives mentioned earlier, in which it lists an additional 337 initiatives. Bolster development teams by inviting diverse, multidisciplinary teams to join them in these workshops as they assess ethics and model risk.

article thumbnail

Top Cloud Security Issues: Threats, Risks, Challenges & Solutions

eSecurity Planet

Lower the risk of insider threats by employing these methods: Utilize cloud-native IAM features: Use enhanced identity and access management (IAM) to enforce least privilege access and prevent insider threat vectors. Employ automated configuration management: Use automated technologies to manage and enforce security configurations.

Cloud 67
article thumbnail

Supply Chain Security is the Whole Enchilada, But Who’s Willing to Pay for It?

Krebs on Security

But here’s the thing: Even if you identify which technology vendors are guilty of supply-chain hacks, it can be difficult to enforce their banishment from the procurement chain. A belief formed that China was unlikely to jeopardize its position as workshop to the world by letting its spies meddle in its factories.

article thumbnail

Project Svalbard: The Future of Have I Been Pwned

Troy Hunt

And there are the governments around the world using it to protect their departments , the law enforcement agencies leveraging it for their investigations and all sorts of other use cases I never, ever saw coming (my legitimisation of HIBP post from last year has a heap of other examples). (I’d