January, 2017

article thumbnail

What (currently ignored) privacy area might result in early enforcement action when the GDPR is in force?

Data Protector

We have 480 days to go before the General Data Protection Regulation is “in force”. And then what? That's the question I’m being increasingly asked these days. Does it really mean that in 481 days, European privacy regulators will be heralding the first megafine for non-compliance with one of the GDPR’s more obscure requirements? I think not. But it will undoubtedly lead to greater unease amongst the audit committees of many firms, particularly those in the (regulated) financial services sector,

GDPR 136
article thumbnail

Debate Over “Content Services vs. ECM” Misses the Point

Weissman's World

“ECM is dead.” “Content Services are the next generation.” “I’ve got a brand-new pair of roller skates.” If you think that last quote is a non sequitur, you’re right! But so, I’d argue, are the other two, because neither speaks directly to what both really are all about: Improving the “care and feeding” of your […]. The post Debate Over “Content Services vs.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The startup studio: A new model for driving innovation

CGI

The startup studio: A new model for driving innovation. shobana.lv@cgi.com. Tue, 01/31/2017 - 05:34. What benefits can a large company derive from an innovation strategy? Is it a fad, an opportunity or a necessity? And, what do we really mean by innovation? Digital has changed everything. At the dawn of the third industrial revolution as described by Jeremy Rifkin [1] , we can observe how digitalization is changing everything based on two key trends: Increasing emergence of new digital technolog

article thumbnail

CFI directives in assembly files

Imperial Violet

(This post uses x86-64 for illustration throughout. The fundamentals are similar for other platforms but will need some translation that I don't cover here.). Despite compilers getting better over time, it's still the case that hand-written assembly can be worthwhile for certain hot-spots. Sometimes there are special CPU instructions for the thing that you're trying to do, sometimes you need detailed control of the resulting code and, to some extent, it remains possible for some people to out-op

IT 62
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Article 29 Working Party Releases GDPR Action Plan for 2017

Hunton Privacy

On January 16, 2017, the Article 29 Working Party (“Working Party”) published further information about its Action Plan for 2017 , which sets forth the Working Party’s priorities and objectives in the context of implementation of the EU General Data Protection Regulation (“GDPR”) for the year ahead. The Action Plan closely follows earlier GDPR guidance relating to Data Portability, the appointment of Data Protection Officers and the concept of the Lead Supervisory Authority, which were published

GDPR 60

More Trending

article thumbnail

When does the General Data Protection Regulation not require firms to appoint a Data Protection Officer?

Data Protector

I’m increasingly asked whether particular firms actually need to appoint a Data Protection Officer in order to comply with the requirements of the GDPR. Given that the potential fine for non-compliance (with Article 37) is €10 million Euros or up to 2% of the total worldwide annual turnover, companies quite understandably don't want to get such a basic issue wrong.

B2B 136
article thumbnail

Configuring GMail to check ISP Mail

Roger's Information Security

My primary email address assigned by my ISP can’t be changed. It gets a lot of spam In the past that wasn’t really a problem because I rarely used it for anything, but a few years ago I foolishly began using it on resumes. Its format is first initial + lastname @ ISP so its relatively professional. Unfortunately there are other people in the world who think that is their email address.

article thumbnail

Using a hybrid IT model to enable modernization

CGI

Using a hybrid IT model to enable modernization. shobana.lv@cgi.com. Mon, 01/30/2017 - 07:00. Modernized information technology is a fundamental prerequisite to taking advantage of new and emerging capabilities to improve mission delivery in the digital age. Yet, legacy systems continue to create challenges and roadblocks for commercial and government organizations, including our U.S. federal agency clients.

IT 53
article thumbnail

Are You Using System Profile Monitoring to Manage Your DB2 for z/OS DDF Workload? Perhaps You Should

Robert's Db2

Here's a scenario that might sound familiar to you: you have a particular transaction, which I'll call TRNX, that is the source of quite a lot of deadlock activity in a DB2 for z/OS system. It seems that whenever more than one instance of TRNX is executing at the same time, a deadlock situation is highly likely. You went with row-level locking for the table spaces accessed by TRNX, but the trouble persisted.

IT 48
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

NIST Releases Proposed Updates to Cybersecurity Framework

Hunton Privacy

On January 10, 2017, the National Institute of Standards and Technology (“NIST”) released proposed updates to the Framework for Improving Critical Infrastructure Cybersecurity (the “Cybersecurity Framework”). The proposed updates, which are found in Version 1.1 of the Cybersecurity Framework, are derived from feedback received by NIST regarding the first version, including from responses to a December 2015 request for information and discussions at a workshop held in April 2016.

article thumbnail

Measuring transformation

MIKE 2.0

We live in times of rapid change when businesses that assume they have a secure market are suddenly having their world turned upside down. With the most substantive impact coming from technology, many have assumed that large investments in IT and digital would act as a protection. In fact, many of the businesses who have made the largest investments, such as some retailers, are actually the ones experiencing the greatest disruption to their operations.

Retail 40
article thumbnail

NCS Blog: DevOps and Separation of Duties

The Falcon's View

From my NCS blog post : Despite the rapid growth of DevOps practices throughout various industries, there still seems to be a fair amount of trepidation, particularly among security practitioners and auditors. One of the first concerns that pops up is a blurted out "You can't do DevOps here! It violates separation of duties!" Interestingly, this assertion is generally incorrect and derives from a general misunderstanding about DevOps, automation, and the continuous integration/deployment (CI/CD)

article thumbnail

Speaking Opportunity?

JKevinParker

Do you need a speaker for your Information Management or Technology event? Contact me with your opportunity.

40
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Sanctions compliance: Addressing modern compliance challenges (Part 1)

CGI

Sanctions compliance: Addressing modern compliance challenges (Part 1). shobana.lv@cgi.com. Fri, 01/27/2017 - 01:13. As the legal requirements for combatting money laundering and terrorist financing continue to increase, financial institutions are facing mounting compliance challenges. The number of global watch lists and sanctioned activities is on the rise, and watch list data can change daily.

article thumbnail

Seven Risks in the Beneficent Cloud

Positively RIM

Today’s Blog is sponsored by MER 2017, Cohasset Associates’ 25 th annual educational conference on electronic records management, in Chicago, May 8-10. U ser beware: amid the security and budgetary advantages of the Cloud, risks lurk, ready to sabotage the unprepared or unsuspecting. Make sure you are not caught unaware. Records Management in the Cloud cries for Information Governance (IG).

Cloud 40
article thumbnail

Swiss-U.S. Privacy Shield Announced

Hunton Privacy

On January 11, 2017, the Swiss Federal Data Protection and Information Commissioner announced that it has reached an agreement with the U.S. Department of Commerce on a new Swiss-U.S. Privacy Shield framework (the “Swiss Privacy Shield”), which will allow companies to legally transfer Swiss personal data to the U.S. The Swiss Privacy Shield will replace the U.S.

Privacy 53
article thumbnail

Preparing for GDPR – Let’s Get Started

Managing Your Information

I couldn’t help but smile over the Christmas break when the other half was playing with their latest gadget, a well-known Voice Service speaker. Having started to become familiar with how it operated, the requests were getting shorter and shorter. It would appear that manners are included for free – when the commands were eventually reduced to a single word, the speaker responded with “that wasn’t a very nice way to ask” and the request had to be rephrased before being actioned!

GDPR 28
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

NCS Blog: "Minimum Viable" MUST Include Security

The Falcon's View

"If you're a startup trying to get a product off the ground, you've probably been told to build an "MVP" - a minimum viable product - as promoted by the Lean Startup methodology. This translates into products being rapidly developed with the least number of features necessary to make an initial sale or two. Oftentimes, security is not one of the features that makes it into the product, and then it gets quickly forgotten about down the road.".

article thumbnail

We Must Fix This F **g Mess

John Battelle's Searchblog

The post We Must Fix This F **g Mess appeared first on John Battelle's Search Blog. Here are the caveats for the rant I am about to write. The fact that I am writing this on Medium will cause many of you to dismiss me for hypocrisy. Don’t. Read to the end. I will be saying the word “F*CK” a lot. If that bothers you, time to depart for calmer waters.

article thumbnail

A consumer perspective on FinTech disruption (part 2)

CGI

A consumer perspective on FinTech disruption (part 2). shobana.lv@cgi.com. Fri, 01/13/2017 - 00:36. As first mentioned in part 1 of this three-part blog series, the rise in financial technology (FinTech) firms is having a disruptive impact on today’s banks, threatening their customer base and revenue through the launch of new digital services. CGI conducted a survey in 2016 to help gauge this impact, reaching out to bank consumers to explore their expectations and assess how banks can better com

article thumbnail

European Commission Announces Final “Digital Single Market” Strategy for Europe

Hunton Privacy

On January 10, 2017, the European Commission announced the final elements of its long-awaited “digital single market” strategy for Europe. The announcement includes two new proposed EU regulations as well as a European Commission Communication, as described below. The first proposed EU regulation released is the new e-Privacy Regulation, which is intended to replace the existing e-Privacy Directive and align requirements with those found in the EU General Data Protection Regulation (“GDPR”).

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

OMB Publishes Memorandum on Responding to Data Breaches

Hunton Privacy

On January 3, 2017, the Office of Management and Budget (“OMB”) issued a memorandum (the “Breach Memorandum”) advising federal agencies on how to prepare for and respond to a breach of personally identifiable information (“PII”). The Breach Memorandum, which is intended for each agency’s Senior Agency Official for Privacy (“SAOP”), updates OMB’s breach notification policies and guidelines in accordance with the Federal Information Security Modernization Act of 2014 (“FISMA”).

article thumbnail

UK Prime Minister Seeking to Trigger Brexit Process Sooner than Expected?

Hunton Privacy

On January 31, 2017, the Times of London reported that UK Prime Minister Theresa May plans to invoke Article 50 of the Treaty on European Union on March 9, 2017, meaning that formal Brexit negotiations with the EU could begin thereafter. This coincides with a two-day European Council summit in Malta which the leaders of all 28 EU Member States will be attending.

GDPR 49
article thumbnail

CIPL Submits Comments to Article 29 Working Party’s Proposed DPO Guidelines

Hunton Privacy

On January 25, 2017, the Centre for Information Policy Leadership (“CIPL”) at Hunton & Williams LLP submitted formal comments to the Article 29 Working Party’s (“Working Party’s”) Guidelines on Data Protection Officers (DPOs) (“DPO Guidelines”) that were adopted on December 13, 2016. CIPL’s comments follow its November 2016 white paper on Ensuring the Effectiveness and Strategic Role of the Data Protection Officer under the General Data Protection Regulation , which CIPL submitted as formal

GDPR 49
article thumbnail

FTC Issues Report on Cross-Device Tracking

Hunton Privacy

On January 23, 2017, the FTC released a Staff Report (the “Report”) on cross-device tracking technology that can link multiple Internet-connected devices to the same person and track that person’s activity across those devices. The Report follows a November 2015 workshop on the same subject and is based on information and comments gathered during that workshop.

Privacy 49
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

DHS Issues Updated National Cyber Incident Response Plan

Hunton Privacy

On January 18, 2017, the Department of Homeland Security (“DHS”) issued an updated National Cyber Incident Response Plan (the “Plan”) as directed by Obama’s Presidential Policy Directive 41 , issued this past summer, and the National Cybersecurity Protection Act of 2014. The Plan applies to cyber incidents, and particularly focuses on significant cyber incidents that are likely to result in demonstrable harm to the United States’ national security interests, foreign relations or economy, or to t

article thumbnail

Email Privacy Act Reintroduced in Congress

Hunton Privacy

On January 9, 2017, Representatives Kevin Yoder (R-KS) and Jared Polis (D-CO) reintroduced the Email Privacy Act, which would amend the Electronic Communications Privacy Act (“ECPA”) of 1986. In particular, the legislation would require government entities to obtain a warrant, based on probable cause, before accessing the content of any emails or electronic communications stored with third-party service providers, regardless of how long the communications have been held in electronic storage by

Privacy 49
article thumbnail

NIST Releases Privacy Engineering and Risk Management Guidance for Federal Agencies

Hunton Privacy

On January 4, 2017, the National Institute of Standards and Technology (“NIST”) announced the final release of NISTIR 8062, An Introduction to Privacy Engineering and Risk Management in Federal Systems. NISTIR 8062 describes the concept of applying systems engineering practices to privacy and sets forth a model for conducting privacy risk assessments on federal systems.

Privacy 49