Remove Blockchain Remove Data collection Remove How To Remove Insurance
article thumbnail

Regulatory Update: NAIC Spring 2019 National Meeting

Data Matters

The National Association of Insurance Commissioners (NAIC) held its Spring 2019 National Meeting (Spring Meeting) in Orlando, Florida, from April 6 to 9, 2019. ceding insurer could be eligible for the same reduced collateral requirements that would apply to qualifying EU reinsurers under the revised CFR Model Laws.

article thumbnail

California Enacts Broad Privacy Laws Modeled on GDPR

Data Matters

In addition, the business must ensure that all individuals responsible for handling requests and compliance with AB 375 are educated about relevant aspects of the bill and how to direct consumers to exercise their rights under these sections. A consumer may request this information twice in a 12-month period.

GDPR 79
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

California Enacts Broad Privacy Protections Modeled on GDPR

Data Matters

In addition, the business must ensure that all individuals responsible for handling requests and compliance with AB 375 are educated about relevant aspects of the bill and how to direct consumers to exercise their rights under these sections. A consumer may request this information twice in a 12-month period.

GDPR 60
article thumbnail

Our Data Governance Is Broken. Let’s Reinvent It.

John Battelle's Searchblog

That’s Aristotle, often credited with originating the scientific method , which is based on considered thesis formation, rigorous observation, comprehensive data collection, healthy skepticism, and sharing/transparency. And the scientific method – the pursuit of truth and progress – all that turns on the data. (Don’t

article thumbnail

An Approach to Cybersecurity Risk Oversight for Corporate Directors

Data Matters

Board-management discussions about cyber risk should include identification of which risks to avoid, which to accept, and which to mitigate or transfer through insurance, as well as specific plans associated with each approach. Encrypting Critical Data Assets. Principle 5.

article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

How Do VC Firms Work? How to Land a Round of Funding Securing Data and Infrastructure is Hot. Also read : Written IT Security Policies: Why You Need Them & How to Create Them. Read more : How Hackers Use Reconnaissance – and How to Protect Against It. Also read : Top Cyber Insurance Companies.