Archive for the ‘Security and privacy Law’ Category

3 steps to meeting data privacy regulation compliance through identity programs

Lesson 1: Take stock of identities and lock them down When it comes to data protection, security and compliance, organizations must keep the potential technology risk within acceptable limits, which means mobilizing efforts to identify data lakes and applications where personally identifiable information (PII) and other sensitive information is stored. Organizations should then use digital […]

Leave a Comment

America, Your Privacy Settings Are All Wrong

Americans have become inured to the relentless collection of their personal information online. Imagine, for example, if getting your suit pressed at the dry cleaner’s automatically and permanently signed you up to have scores of inferences about you — measurements, gender, race, language, fabric preferences, credit card type — shared with retailers, cleaning product advertisers […]

Leave a Comment

What are the best books on data privacy?

Luke Irwin Looking for affordable ways to keep your data secure? Sometimes the simplest solutions are the best – and nothing beats the simplicity of a book. With books, you get expert advice at your fingertips. You can study whenever is convenient and the information is always there for you to reference. So, which books […]

Leave a Comment

How to stay safe while remote working this Data Privacy Day

OneLogin’s recent research into remote working practices shows it is proving to be fertile ground for hackers – Here’s how to stay safe How to stay secure Another key step to keep your business safe from breaches is to ensure that your employees are following security best practices. To celebrate Data Privacy Day, we’ve provided some […]

Leave a Comment

California Consumer Privacy Act (CCPA) Foundation Self-Paced Online Training Course

Training course outline The CCPA (California Consumer Privacy Act) is a California data protection law that came into effect on January 1, 2020. Following the passing of Prop 24, the CPRA (California Privacy Rights Act) will take effect officially on January 1, 2023 and replace the CCPA. The CPRA is widely viewed as California’s version of the EU’s […]

Leave a Comment

Court documents show FBI could use a tool to access private Signal messages on iPhones

Court documents related to a recent gun-trafficking case in New York and obtained by Forbes revealed that the FBI may have a tool to access private Signal messages. The documents revealed that encrypted messages can be intercepted from iPhone devices when they are in “partial AFU (after first unlock)” mode. “The clues came via Seamus Hughes at […]

Leave a Comment

5 key privacy trends for 2021

Source: 5 key privacy trends for 2021 As organisations become increasingly reliant on the use of personal data, the risks they face grow exponentially. We saw last year a record number of data breachesand a surge in penalties for regulatory violations, but 2021 is set to be even more perilous as the public demand for data privacy […]

Leave a Comment

iOS 14 default app settings automatically reset to Mail and Safari after reboot – 9to5Mac

One of the new features in iOS 14 is the ability to change the default email or browser app to a third-party alternative such as Chrome, Edge, or Outlook. A bug in the first public release of iOS 14, however, causes your default browser or mail app setting to reset to Mail or Safari when […]

Leave a Comment

What is ‘privacy by design’?

What is ‘privacy by design’?  By Annabelle Graham   Privacy by design is a voluntary approach to projects that promotes privacy and data protection compliance, and helps you comply with the Data Protection Act 1998 (DPA). The Information Commissioner’s Office (ICO) encourages organisations to seriously consider privacy and data protection throughout a project lifecycle, including when: Building new […]

Leave a Comment

International law firms see ISO 27001 certification as competitive differentiator

International law firms see ISO 27001 certification as competitive differentiator by Melanie Watson ISO 27001 has long been regarded as the information security standard to protect a company’s sensitive information, but more recently law firms have been viewing it as a key competitive differentiator in their field. Key selling point Shook, Hardy & Bacon achieved […]

Leave a Comment

The Protection of Personal Information Act (POPI) in South Africa – Benefits and Challenges

by Ilenia Vidili In South Africa the Protection of Personal information Act (POPI) aims to regulate how companies secure the integrity and confidentiality of their data assets by taking technical and organisational measures to prevent the loss of, and damage and unauthorised access to, personal information. POPI was signed into law on 26th November 2013 […]

Leave a Comment

Unreasonable searches and drone killings

Peter Scheer @ SFChronicle.com on June 12, 2013 – Open Forum on NSA’s snooping First came news accounts of the government’s use of armed drones in the targeted killing of terrorists abroad. Then came the revelations about government surveillance programs, breathtaking in their scale, tapping into data on phone calls, e-mails, Internet searches and more. […]

Comments (1)

New California Data Breach Notification Law

Information Security Law: The Emerging Standard for Corporate Compliance At the beginning of September, there was an addition to the Data Breach Notification laws of California. S.B. 24 was signed into law and will take effect the first day of 2012. This law will require specific actions be taken in the event of a data […]

Leave a Comment

Court Ruling on “Due Diligence” Online Banking Security

The ruling in the Patco Construction vs. People’s United Bank case set precedence, because the judge basically ruled that the bank’s below par security was sufficient for small business — and Patco (small business) was held liable for paying for the fraud that was a result of an average bank security. To know more details […]

Comments (4)

Privacy and Law

Your personal info is manageable and controlable most of the time as far as privacy is concern , until you have to use it for commercial use (to apply cxredit card, to apply for bank account or to apply for a job). then it depends on these commercial entities how they are goning to use, […]

Leave a Comment