Remove Data collection Remove Insurance Remove Military
article thumbnail

Driving Conversations Around Careers In Telematics

Information Governance Perspectives

Wireless telematics devices and “black box” technologies collect and transmit data on vehicle use, maintenance requirements, and automotive servicing. John Danenberger, CPCU, is Corporate Counsel at State Farm Insurance and specializes in addressing emerging issues around telematics. What’s it like to work in this field?

article thumbnail

Connecticut Tightens its Data Breach Notification Laws

Data Protection Report

biometric information consisting of data generated by electronic measurements of an individual’s unique physical characteristics used to authenticate or ascertain the individual’s identity, such as a fingerprint, voice print, retina or iris image.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Happy 13th Birthday, KrebsOnSecurity!

Krebs on Security

Internal Revenue Service website for months: Anyone seeking to create an account to view their tax records online would soon be required to provide biometric data to a private company in Virginia — ID.me. The data is published after Medibank reportedly declines to pay a US$10 million ransom demand.

Passwords 249
article thumbnail

The Hacker Mind Podcast: The Internet As A Pen Test

ForAllSecure

Chris Gray of Deep Watch talks about the view from the inside of a virtual SOC, the ability to see threats against a large number of SMB organizations, and the changes to cyber insurance we’re seeing as a result. VAMOSI: Cybersecurity insurance. cyber insurance as a whole was changing heavily. And why is that?

article thumbnail

An Approach to Cybersecurity Risk Oversight for Corporate Directors

Data Matters

Board-management discussions about cyber risk should include identification of which risks to avoid, which to accept, and which to mitigate or transfer through insurance, as well as specific plans associated with each approach. Principle 5. Mandatory Access Control. Role-Based Access Control.