Remove 2013 Remove Computer and Electronics Remove GDPR Remove Government
article thumbnail

Weekly podcast: Yahoo hacker sentenced, acoustic DoS attack and GDPR compliance fails

IT Governance

This week, we discuss the sentencing of one of the perpetrators of the 2013 Yahoo breach, a new type of denial-of-service attack that can crash computers just using sound and how not to email your customers. Hello and welcome to the IT Governance podcast for Friday, 1 June 2018. Here are this week’s stories.

GDPR 51
article thumbnail

MY TAKE: COVID-19’s silver lining could turn out to be more rapid, wide adoption of cyber hygiene

The Last Watchdog

And they inform the EU’s detailed General Data Privacy Regulation (GDPR), as well as the prescriptive cybersecurity regulations pioneered by the Middle East. A few months later the UAE stood up its National Electronic Security Authority (NESA) which proceeded to do much the same thing. states, for instance.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Understanding eDiscovery in Criminal Cases, Part Four: eDiscovery Best Practices

eDiscovery Daily

Tom also wrote a terrific four part informational overview on Europe’s General Data Protection Regulation (GDPR) titled eDiscovery and the GDPR: Ready or Not, Here it Comes. So, it is no surprise that one of the growing electronic aspects of criminal law is social media as evidence. 433 (2013).by State , 113 A.3d

article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

When we do the weekly supermarket shop online, we should be able to move our shopping list electronically. Perhaps the Government could respond on that point. When a consumer wants to move to a new energy supplier, they should be able to take their usage history with them rather than guess and pay over the odds.

GDPR 120
article thumbnail

The Burden of Privacy In Discovery

Data Matters

To pick just two recent examples of the latter, the EU’s General Data Protection Regulation1 (GDPR) and the California Consumer Privacy Act2 (CCPA) both impose sweeping requirements on businesses with the aim of increasing consumers’ privacy and control over how their personal data is used. any designated tangible things.”36

Privacy 94
article thumbnail

The Hacker Mind Podcast: EP 69 Self-Healing Operating Systems

ForAllSecure

And, and that did that for 13 years and because of my involvement in critical infrastructure, I was asked by the White House to assist in developing the NIST cybersecurity framework in 2013. You know, we're all familiar with GDPR and the concept of the right to be forgotten. We have about 23 sponsors for that.