August, 2015

article thumbnail

The (discrete) search for the new Information Commissioner

Data Protector

The (discrete) search to appoint a successor to David Smith, soon-to-retire Deputy Information Commissioner and Director of Data Protection is over. Shortly, the successful candidate will be unveiled. Don't worry, it’s not me. And a (discrete) search will commence to find a suitable replacement for Chris Graham, soon-to-be outgoing Commissioner. How secret should this process be, and when is it appropriate to extend the selection process?

article thumbnail

Branch Deepviews: Routing Around The Damage of Apps and App Stores

John Battelle's Searchblog

The post Branch Deepviews: Routing Around The Damage of Apps and App Stores appeared first on John Battelle's Search Blog. But it’s also the year a better one will be born. 2015 is the year the old internet finally died [link]. — John Battelle (@johnbattelle) August 7, 2015. Over and over again, the press and pundits are declaring the death of the “web we once knew.” And despite having solid proof to the contrary, I’ve always responded that the web will never die, th

IT 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Third Circuit Upholds FTC’s Authority to Regulate Companies’ Data Security Practices

Hunton Privacy

On August 24, 2015, the United States Court of Appeals for the Third Circuit issued its opinion in Federal Trade Commission v. Wyndham Worldwide Corporation (“Wyndham”), affirming a district court holding that the Federal Trade Commission has the authority to regulate companies’ data security practices. As we previously reported , the case stems from Wyndham’s challenge to the FTC’s authority to bring a 2012 suit against Wyndham, in which the FTC alleged that the company’s failure to maintain re

article thumbnail

DB2 for z/OS: Which Buffer Pools Should You Page-Fix?

Robert's Db2

A few days ago, I delivered a presentation on DB2 for z/OS performance monitoring and tuning for the DBA team at a large financial institution. At one point during the session, an attendee asked this question: "Which of our buffer pools should we page-fix?" Because that's a good question, and because it's a question to which the answer has changed over the years, I decided to make it the subject of this blog entry.

IT 48
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

How phishing works

Elie

Phishing is a social-engineering attack where the attacker entice his victims to give-up their credentials for a given website by impersonating it. Believe it or not phishing campaigns are well organized and follow a very strict playbook. This post aim at shedding some light on how phishing campaign works under the hood, showcase which infrastructure phishers use to steal users credentials and provide advice on how to defend against it.

More Trending

article thumbnail

Do privacy laws prevent police forces from naming suspects?

Data Protector

I was asked this question at 6.15 am today. And, if I knew the answer, was I available for a BBC radio interview immediately after the 7.00 am news? No and Yes were my answers – so I subsequently had a chat with BBC Radio’s Adrian Goldberg. The question arose because the Birmingham Mail had asked West Midlands Police to disclose the names and images of ten suspects it had been hunting for at least a decade for crimes including rape and murder.

Privacy 136
article thumbnail

Information Transparency & The “True Cost” Calculator

John Battelle's Searchblog

The post Information Transparency & The “True Cost” Calculator appeared first on John Battelle's Search Blog. The view from Bolinas. It’s been so long since I’ve written here, and I’ve missed it terribly. As startups tend to do, NewCo has taken over most of my waking hours. So I thought I’d just sit and write for a spell, even if what comes out isn’t fully baked.

article thumbnail

FTC Reaches Settlement with Thirteen Companies over Safe Harbor Misrepresentations

Hunton Privacy

On August 17, 2015, the Federal Trade Commission announced proposed settlements with 13 companies over allegations that they misled consumers by falsely claiming to be Safe Harbor certified when their certifications had lapsed or they had never been certified at all. Seven companies, including Golf Connect, LLC, Contract Logix, LLC and Forensics Consulting Solutions, LLC, allegedly claimed to have a current certification in one or both of the U.S.

Privacy 49
article thumbnail

What Does a DB2 for z/OS System Look Like When You Have Memory to Burn?

Robert's Db2

I've long been an advocate of Big Memory (meaning, lots of real storage) for DB2 for z/OS systems. For years, I was disappointed at seeing one production DB2 subsystem after another running in a z/OS LPAR with 16 GB, 20 GB, maybe 40 GB of memory -- enough real storage to run decently, but not enough to let DB2 do its thing with maximum performance. It was like seeing a thoroughbred racehorse in a small coral.

Sales 48
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Best value procurement recognizes vendors as experts

CGI

Best value procurement recognizes vendors as experts. narmada.devarajan. Wed, 08/26/2015 - 03:15. As the failure of large information and communications technology (ICT) projects has become a matter of public discussion in several countries, the Best Value Procurement (BVP) approach is gaining rapid ground. BVP is a common sense procurement method that focuses on finding and empowering the best experts and removing barriers to project success, such as non-expert interference and restrictive proc

article thumbnail

Discussing the Chief Information Governance Officer with AHIMA

Barclay T Blair

Good article from Mary Butler over at AHIMA that does a nice job of describing both my enthusiasm and wariness on the CIGO role: Blair, however, has been among the most outspoken IG experts to advocate for the widespread adoption of the role chief information governance officer (CIGO), which would, ideally, put IG in the C-suite of an organization.

article thumbnail

In praise of David Smith

Data Protector

As Deputy Commissioner David Smith completes his last lap of the data protection conference circuit, various speakers are extending their hastily-prepared remarks to include a short homily on his contribution to data protection over the decades. Yes, he really has been at the ICO for decades. It's a convention that public servants are never presented with anything other than small tokens of appreciation from grateful hosts.

IT 120
article thumbnail

This Is How We Pick A NewCo

John Battelle's Searchblog

The post This Is How We Pick A NewCo appeared first on John Battelle's Search Blog. Over on the NewCo site , I’ve updated our explanation of how we chose NewCos around the world (1,100 or so so far). Here’s that post for those readers at Searchblog who might be interested. . Since we launched NewCo’s festivals in late 2012, tens of thousands of people have experienced the unique NewCo model of “getting out to get in.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

CIPL Comments on the Indonesian Draft Data Protection Regulation with New White Paper on Cross-Border Data Transfers Mechanism

Hunton Privacy

On August 20, 2015, the Centre for Information Policy Leadership at Hunton & Williams (“CIPL”) filed comments to the Indonesian Draft Regulation proposed by the Minister of Communication and Information (RPM) of the Protection of Personal Data in Electronic Systems. The comments were limited to the issue of cross-border data transfers and were submitted in the form of a new CIPL white paper entitled Cross-Border Data Transfer Mechanisms.

Paper 40
article thumbnail

IT Life: The Never Ending Story

Preservica

Jon Tilbury has recently been profiled in TechWeek Europe. In IT life: The Never Ending Story, Jon takes readers through his career in technology, and also includes a few predictions and thoughts on the greatest challenges IT departments are facing today. Click here to read the full article.

IT 40
article thumbnail

Monetizing data: New ways to grow the value of data assets

CGI

Monetizing data: New ways to grow the value of data assets. ravi.kumarv@cgi.com. Wed, 08/19/2015 - 00:22. If getting insights from data analysis is good for an organization’s internal purposes, it’s even better when insights are shared with outside stakeholders, such as customers and partners. Sometimes the term “monetizing data” is used to describe this concept, but it may be a bit misleading.

article thumbnail

The slow death of EU forum shopping

Privacy and Cybersecurity Law

Forum shopping (i.e. where businesses pick and choose the most privacy-friendly EU state to set up shop) has always been […].

Privacy 40
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Not a lot of news from Big Brother Watch today

Data Protector

What are we to make of today’s Big Brother Watch report which claims that local authorities commit 4 data breaches every day? In the words of TV magician Paul Daniels: “Not a lot.” At first glance, it looks impressive. It’s almost 200 pages long. But, and this is a big but, there are only a few pages of analysis – once you get past page 12, a series of annexes contain the responses from each local authority, revealing how minor the vast majority of the reported incidents (occurring between April

article thumbnail

Spanning SF and Oakland: The First Ever NewCo Bay Bridge Festival Lineup Is Out!

John Battelle's Searchblog

The post Spanning SF and Oakland: The First Ever NewCo Bay Bridge Festival Lineup Is Out! appeared first on John Battelle's Search Blog. While NewCo has been celebrating unique San Francisco companies for three years, 2015 is the first year we’ve produced our hometown festival with a fully staffed and funded team. And it shows: We’re adding Oakland as a companion city to San Francisco this year, and more than 200 companies will be opening their doors for a four-day festival this

article thumbnail

German DPA Fines Two Companies for the Unlawful Transfer of Customer Data as Part of an Asset Deal

Hunton Privacy

On July 30, 2015, the Bavarian Data Protection Authority (“DPA”) issued a press release stating that it imposed a significant fine on both the seller and purchaser in an asset deal for unlawfully transferring customer personal data as part of the deal. In the press release, the DPA stated that customer data often have significant economic value to businesses, particularly with respect to delivering personalized advertising.

article thumbnail

How effective is the Telephone Preference Service?

Data Protector

I don't know, either. The TPS’s website provides individuals with an easy way to register their objection to receiving unsolicited direct marketing calls, but no information on how effective it is at stamping out these practices. There’s no information on the volume of complaints it receives, and how these are trending over time. There’s no information on the work it does to investigate these complaints, before handing them to the Information Commissioner’s Office.

Marketing 120
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Why are so many privacy professionals driven to despair?

Data Protector

Why are so many privacy professionals driven to despair? Don’t worry. It’s not that unusual for privacy professionals to be driven to despair by the demands of their job. It’s just a mindset that most of them go through when business “requirements” and legal “restrictions” continually clash. As Tom Fletcher, the UK’s former Ambassador to the Lebanon recently put it : “You think you’re reached rock bottom – then you hear a noise from below.

Privacy 120
article thumbnail

Surveillance after Snowden

Data Protector

Students of surveillance and counter terrorism have another (81 page) report to add to their summer reading list. The Henry Jackson Society has recently published " SurveillanceAfter Snowden: Effective Espionage in an Age of Transparency. " The report, written by Robin Simcox, looks at the ways the actions of Edward Snowden have impacted the US and the UK, particularly with regards to safeguarding national security.

article thumbnail

Online Trust Alliance Releases Privacy and Data Security Framework for Internet of Things

Hunton Privacy

On August 11, 2015, the Online Trust Alliance, a nonprofit group whose goal is to increase online trust and promote the vitality of the Internet, released a framework (the “Framework”) for best practices in privacy and data security for the Internet of Things. The Framework was developed by the Internet of Things Trustworthy Working Group, which the Online Trust Alliance created in January 2015 to address “the mounting concerns and collective impact of connected devices.”.

Privacy 40
article thumbnail

Delaware Governor Signs Set of Online Privacy Bills

Hunton Privacy

On August 7, 2015, Delaware Governor Jack Markell signed four bills into law concerning online privacy. The bills, drafted by the Delaware Attorney General, focus on protecting the privacy of website and mobile app users, children, students and crime victims. 1. The Delaware Online and Personal Privacy Protection Act. The Delaware Online and Personal Privacy Protection Act (S.B. 68) will require operators of commercial internet services such as websites and mobile apps to make a privacy policy c

Privacy 40
article thumbnail

How Top Tech CFOs Solve Annual Planning’s Biggest Challenges

Gearing up for 2025 annual planning? Our latest eBook from the Operators Guild is your ultimate guide. Discover real-world solutions and best practices shared by top CFOs, drawn directly from discussions within OG’s vibrant online community. Learn from senior executives at high-growth tech startups as they outline financial planning strategies, align CEO and board goals, and coordinate budgets across departments.

article thumbnail

Cyber dashboards demonstrate value to executives

CGI

Cyber dashboards demonstrate value to executives. shobana.lv@cgi.com. Tue, 08/11/2015 - 08:00. Organizations can spend a lot of money on cybersecurity, where the people, processes and tools all need to work together. Cyber threats are constantly changing, which means toolsets are changing as well, and cyber professionals need constant training. They also need ample time to participate in cyber communities where information about ever-more sophisticated threats is shared.

article thumbnail

Neiman Marcus Seeks En Banc Review

Hunton Privacy

On August 3, 2015, Neiman Marcus requested en banc review of the Seventh Circuit’s recent decision in Remijas v. Neiman Marcus Group, LLC , No. 14-3122. As we previously reported , the Seventh Circuit found that members of a putative class alleged sufficient facts to establish standing to sue Neiman Marcus following a 2013 data breach. During that breach, hackers gained access to customers’ credit and debit card information.

article thumbnail

Google Granted Permission to Appeal to the UK Supreme Court

Hunton Privacy

On July 28, 2015, the UK Supreme Court announced its decision to grant permission in part for Google Inc. (“Google”) to appeal the England and Wales Court of Appeal’s decision in Google Inc. v Vidal-Hall and Others. As we reported previously , the claimants in this case were users of Apple’s Safari browser who argued that during certain months in 2011 and 2012, Google collected information about their browsing habits via cookies placed on their devices without their consent and in breach of Goog

Privacy 40