Remove 2011 Remove Data collection Remove Education Remove Government
article thumbnail

New Chinese Legislation Includes Provisions Protecting Personal Information

Hunton Privacy

On September 23, 2011, the Standing Committee of the Jiangsu Provincial People’s Congress issued the Regulation of Information Technology of Jiangsu Province (the “Regulation”), which will take effect as of January 1, 2012. Regulation of Information Technology of Jiangsu Province.

article thumbnail

Judging Facebook's Privacy Shift

Schneier on Security

It even collects what it calls " shadow profiles " -- data about you even if you're not a Facebook user. This data is combined with other surveillance data the company buys, including health and financial data. Collecting and saving less of this data would be a strong indicator of a new direction for the company.

Privacy 93
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

California Enacts Broad Privacy Laws Modeled on GDPR

Data Matters

geolocation data. education information. Publicly available” is narrowly defined in AB 375 to mean essentially only records of federal, state or local government that is used in a manner compatible with the purpose for which the records are maintained. Specific categories defined as personal information include. Regulations.

GDPR 79
article thumbnail

California Enacts Broad Privacy Protections Modeled on GDPR

Data Matters

geolocation data. education information. Publicly available” is narrowly defined in AB 375 to mean essentially only records of federal, state or local government that is used in a manner compatible with the purpose for which the records are maintained. Specific categories defined as personal information include. Regulations.

GDPR 60
article thumbnail

An Approach to Cybersecurity Risk Oversight for Corporate Directors

Data Matters

Increasingly, thought leaders, professional organizations, and government agencies are beginning to provide answers. Creating an enterprise-wide governance structure. Creating an Enterprise-Wide Governance Structure. Aligning cyber risk with corporate strategy.