Remove 2002 Remove Manufacturing Remove Risk
article thumbnail

Estonia sues Gemalto for 152M euros over flaws in citizen ID cards issued by the company

Security Affairs

.” In November 2017, Estonia announced that it would suspend security digital certificates for up to 760,000 state-issued electronic ID-cards that are using the buggy chips to mitigate the risk of identity theft. The Estonian electronic ID cards have been manufactured by the Swiss company Trub AG and its successor Gemalto AG since 2001.

article thumbnail

Webinar on the SAFETY Act and Cybersecurity: Protecting Your Reputation and Reducing Liability Risk

Hunton Privacy

In 2002, Congress enacted the Supporting Anti-Terrorism by Fostering Effective Technologies Act (“the SAFETY Act”) to limit the liabilities that energy, financial, manufacturing and other critical infrastructure companies face in the event of a serious cyber or physical security attack.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FTC Investigating Privacy Risks to Data Stored on Digital Copiers

Hunton Privacy

Federal Trade Commission Chairman Jon Leibowitz recently sent a letter to Congressman Edward Markey, Co-Chairman of the bipartisan Congressional Privacy Caucus, announcing that the FTC will address the privacy risks associated with the use of digital copiers.

Privacy 40
article thumbnail

States Attempt to Address Privacy Risks Associated with Digital Copiers and Electronic Waste

Hunton Privacy

The program must include convenient methods for consumers to return electronic waste to the manufacturer and instructions on how consumers can destroy data on the devices before recycling or disposing of them. These bills reflect an enhanced focus on the privacy risks associated with digital office equipment.

Privacy 40
article thumbnail

Sandboxing: Advanced Malware Analysis in 2021

eSecurity Planet

A sandbox is an isolated environment where users can safely test suspicious code without risk to the device or network. A number of computer manufacturers and cloud service providers have deployed sandboxes for regular use by clients. Also Read: 3 Facts about Sandbox-based Gateway Appliances. What is a sandbox? Why sandboxing?

article thumbnail

Congress Passes Cyber Incident Reporting for Critical Infrastructure Act of 2022

Data Matters

The reporting requirements will cover multiple sectors of the economy, including chemical industry entities, commercial facilities, communications sector entities, critical manufacturing, dams, financial services entities, food and agriculture sector entities, healthcare entities, information technology, energy, and transportation.

article thumbnail

Article 29 Working Party Opines on Mobile Apps

Hunton Privacy

The Opinion identifies the key data protection risks associated with mobile apps and clarifies the legal framework and obligations applicable to the various parties involved in the development and distribution of mobile apps, including app stores, app developers, operating system and device manufacturers and advertisers.