Remove 2015 Remove 2018 Remove Examples Remove Exercises Remove Security
article thumbnail

CNIL Publishes Six Step Methodology and Tools to Prepare for GDPR

Hunton Privacy

On March 15, 2017, the French data protection authority (the “CNIL”) published a six step methodology and tools for businesses to prepare for the EU General Data Protection Regulation (“GDPR”) that will become applicable on May 25, 2018. verifying the data security measures implemented. The six steps are summarized below.

GDPR 75
article thumbnail

11th Circuit Vacates LabMD Enforcement Order; Casts Doubt on Decades of FTC Cybersecurity Enforcement Practices

Data Matters

In recent years, the Federal Trade Commission has increasingly exercised its enforcement authority to target deceptive and unfair information security practices. Until last week, that is. Wyndham Worldwide Corp., 3d 236 (3d Cir.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity Standards for the Insurance Sector – A New Patchwork Quilt in the US?

HL Chronicle of Data Protection

Of particular concern to state-level policymakers and enforcement authorities are business practices that in their view may contribute to security incidents. The insurance industry has not been immune from such scrutiny, and the imposition of business practice requirements intended to enhance cybersecurity sector-wide.

article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

It seems everything smart is hackable, with IoT startups sometimes repeating security mistakes first made decades ago. How then does one start securing it? Welcome to the hacker by original podcast from for all secure, it's about challenging our expectations about the people who hack for a living.

IoT 52
article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

It seems everything smart is hackable, with IoT startups sometimes repeating security mistakes first made decades ago. How then does one start securing it? Welcome to the hacker by original podcast from for all secure, it's about challenging our expectations about the people who hack for a living.

IoT 52
article thumbnail

The Burden of Privacy In Discovery

Data Matters

The 2015 amendments to Rule 26(b)(1), however, were meant to resolve any doubt, returning the proportionality factors to their original place as part of the very definition of what is discoverable. The principle of proportionality in civil discovery is hardly new.4 5 In keeping with that aim, the scope of discovery has always been cabined.

Privacy 95
article thumbnail

EU: What’s left of the GDPR’s one-stop-shop? CJEU clarifies the competences of non-lead data protection authorities

DLA Piper Privacy Matters

In 2015, the Belgian DPA initiated proceedings against Facebook Inc., However, to exercise this general competence, a DPA must be competent “with respect to a particular instance of data processing.” The case however originates from the pre-GDPR era. One-stop-shop as the general rule. Other relevant considerations.

GDPR 98