Remove 2014 Remove Computer and Electronics Remove Meeting Remove Risk
article thumbnail

European Commission proposes reinforcement of EU Cybersecurity rules

DLA Piper Privacy Matters

In the NIS Directive, the obligations that apply to an entity that falls under the scope of the NIS Directive depend on its qualification as ‘operator of essential services’ (“OES”) or ‘digital service provider’ (“DSP”): An OES is defined as a public or private entity of a type referred to in Annex II, which meets certain criteria.

article thumbnail

Snowden Ten Years Later

Schneier on Security

In 2013 and 2014, I wrote extensively about new revelations regarding NSA surveillance based on the documents provided by Edward Snowden. And given that the UK police would raid its offices in July 2014, it had legitimate cause to be worried. So would the FBI breaking into my home and seizing my personal electronics. Definitely.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

EU to Force IoT, Wireless Device Makers to Improve Security

eSecurity Planet

In an amendment to the EU’s 2014 Radio Equipment Directive (RED), the European Commission noted that as wireless devices, from mobile phones to fitness trackers to smart watches, become increasingly embedded into everyday consumer and business life, they also become a greater security risk. million devices being shipped.

IoT 109
article thumbnail

What IG Professionals Should Know About the Internet of Bodies

ARMA International

Another common name for the IoB is embodied computing , where the human body is used as a technology platform. Benefits and Risks. Each type of IoB device brings with it benefits and risks. Wearable technology began as any kind of electronic device designed to be worn on the user’s body. These devices can take many forms.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

This means imaging the “art of the possible” for a new future using a cloud computing model to deliver transformative change. Part 3 will discuss how to manage the various DT risks. This part will also discuss managing CS risks such as ransomware, privacy, change management, and user adoption.

article thumbnail

Part 2: OMG! Not another digital transformation article! Is it about the evolution from RIM to Content Services?

ARMA International

This means imagining the “art of the possible” for a new future using a cloud computing model to deliver transformative change. Part 3 will discuss how to manage the various DT risks. This part will also discuss managing CS risks such as ransomware, privacy, change management, and user adoption.

article thumbnail

2017 eDiscovery Case Law Year in Review, Part 2

eDiscovery Daily

Bennett declined to sanction the parties for issuing boilerplate objections, but strongly warned them that the use of boilerplate objections in the future would place counsel and their clients at risk for significant sanctions. 2014: Part 1 , Part 2 , Part 3 , Part 4. Cummins, Inc. Texas Alcoholic Beverages Commission, et. Ensing, et.