article thumbnail

The Week in Cyber Security and Data Privacy: 30 October – 5 November 2023

IT Governance

Library branches remain open, Wi-Fi is still available and materials can still be borrowed. Records breached: According to the library’s 4 November update , there is “no evidence that the personal information of our staff or customers has been compromised”. According to Advarra, “a limited amount of company data”.

article thumbnail

[Podcast] The Changing Landscape of Data Privacy and Workflow

AIIM

Click here to access our full library of episodes. Also, on this episode, best-selling author and BPM thought-leader, Nathaniel Palmer will talk about how a new generation of workflow tools enables improved synergy and cooperation between business units and IT. Want more episodes like this?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

[Podcast] Exploring The Challenges of the Modern Business Ecosystem

AIIM

Protecting it All – Perhaps one of the biggest new challenges is data privacy and security. With stricter regulations like GDPR, CCPA, and more, what's the best way to make sure your business is clear of the data breach headlines? Click here to access our full library of episodes. How do we address these new challenges?

Libraries 161
article thumbnail

Analyzing IP Addresses to Prevent Fraud for Enterprises

Security Affairs

They can use a coffee shop or library for free WiFi. He holds a degree of Computer Science from Iqra University and specializes in Information Security & Data Privacy. Trackers find it challenging to identify fraudsters across multiple domains uniquely. The Onion Router (Tor) is another option for fraudsters.

Privacy 357
article thumbnail

[Podcast] Strategic Considerations for Information Governance Audits

AIIM

There are a few different scenarios for auditing your data. Audits can be performed to assess data quality, identify data liabilities, ensure data privacy, uncover data leaks, and so on. Click here to access our full library of episodes. Want more episodes like this?

article thumbnail

GDPR Compliance Obligations: The relationship between Data Controllers and Third-Party Processors

AIIM

This is the 11th post in a series on privacy by Andrew Pery. Data Privacy and Open Data: Secondary Uses under GDPR. Mitigate Data Privacy and Security Risks with Machine Learning. The Privacy and Security Dichotomy. GDPR and Cross Border Data Flows between the EU and the US: Current State of the Law.

GDPR 123
article thumbnail

The Week in Cyber Security and Data Privacy: 1 – 7 January 2024

IT Governance

The post The Week in Cyber Security and Data Privacy: 1 – 7 January 2024 appeared first on IT Governance UK Blog. We’ll be back next week with the biggest and most interesting news stories, all rounded up in one place. In the meantime, if you missed it, check out last week’s round-up. Alternatively, you can view our full archive.