February, 2017

article thumbnail

Stuck in the Middle (of Information Management) With You

Weissman's World

If you’re reading this, you already know how valuable it can be to better manage your organization’s business-critical information, and improve the business processes that make that information available to those who need it, when they need it. (Information governance to the rescue!) If you’ve tried doing this, then you probably also know how hard […].

article thumbnail

Moonshots

MIKE 2.0

In business, we tend to focus on the incremental changes we are dealing with every day. The big opportunities always seem too far away to build into our monthly, quarterly or even annual plans. These opportunities, though, are the “moonshots” that completely change the world and generate growth for years to come. The big changes can come from unexpected places.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Wanna Get Away – Generals Password

Roger's Information Security

I see this was posted 3 months ago to Youtube, but its new to me. This being blogging, lets over-analyze. The General’s password is ihatemyjob1. Not a bad password. Using a passphrase is easy to remember. Easy to type. No doubt he should have capitalized the “I” Most systems can handle spaces, which would add some length. Putting in a “@” in for a and a “0” in for o would add some complexity.

article thumbnail

China Publishes Draft Measures for Security Review of Network Products and Services

Hunton Privacy

On February 4, 2017, the Cyberspace Administration of China published a draft of its proposed Measures for the Security Review of Network Products and Services (the “Draft”). Under the Cybersecurity Law of China , if an operator of key information infrastructure purchases network products and services that may affect national security, a security review is required.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Introspection on a Recent Downward Spiral

The Falcon's View

Alrighty. now that my RSA summary post is out of the way, let's get into a deeply personal post about how absolutely horrible of a week I had at RSA. Actually, that's not fair. The first half of the week was ok, but some truly horrible human beings targeted me (on social media) on Wednesday of that week, and it drove me straight down into a major depressive crash that left me reeling for days (well, frankly, through to today still).

IT 58

More Trending

article thumbnail

Insurers’ digital focus is looking through the wrong ‘lens’

CGI

Insurers’ digital focus is looking through the wrong ‘lens’. harini.kottees…. Tue, 02/28/2017 - 03:52. Read any article on digital insurance and it seems to me that it is all about the insurers! Big data, fraud reduction, improved risk ratios, cross product customer engagement are common themes in the trade and advisor “blogsphere”. Whilst these are undoubtedly areas where the insurance operating model can be improved and indeed transformed by the use of new technology, they all seem to miss the

article thumbnail

#InfoGov Links Of The Week 02-24-2017

Information is Currency

Why Technology Won’t Solve Your Business Process Problem. When I talk with folks about workflow issues, the focus of discussion typically turns to technology or the potential use of it. Until we understand the underlying reasons for the issue, technology alone will not resolve it completely and, in fact, has amplified the issue in some cases. My point is that in order to address workflow issues, organizations need to be aware of and embrace the concept that process management and automatio

ECM 40
article thumbnail

Are Your Records Home by Curfew?

Positively RIM

Today’s Blog is sponsored by MER 2017, Cohasset Associates’ 25 th annual educational conference on electronic records management, in Chicago, May 8-10. Sorry to be the one to tell you, but “secure information” is an illusion. No records are really 100 percent secure. We protect our information, but we only create improvement, not assurance. If you think you can totally protect your information, forget it.

article thumbnail

House of Representatives Passes Email Privacy Act

Hunton Privacy

On February 6, 2017, the House of Representatives suspended its rules and passed by voice vote H.R 387 , the Email Privacy Act. As we previously reported , the Email Privacy Act amends the Electronic Communications Privacy Act (“ECPA”) of 1986. In particular, the legislation would require government entities to obtain a warrant, based on probable cause, before accessing the content of any emails or electronic communications stored with third-party service providers, regardless of how long the co

Privacy 53
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

RSA USA 2017 In Review

The Falcon's View

Now that I've had a week to recover from the annual infosec circus event to end all circus events, I figured it's a good time to attempt being reflective and proffer my thoughts on the event, themes, what I saw, etc, etc, etc. For starters, holy moly, 43,000+ people?!?!?!?!?! I mean. good grief. the event was about a quarter of that a decade ago. If you've never been to RSA, or if you only started attending in the last couple years, then it's really hard to describe to you how dramatic the chang

article thumbnail

We’re Launching An Entire Event Around Employer Branding in Brooklyn

IT Governance

A spin through LinkedIn’s recently-released 2017 Annual Global Recruiting Trends report confirms that employer branding is one of the hottest topics – if not the hottest topic – in the industry. LinkedIn surveys some 4,000 HR pros each year and, just like the 2016 edition, employer branding features prominently in the report. It’s listed as one of the top five takeaways in the entire 32-page read.

IT 48
article thumbnail

Digital Transformation in UK General Insurance: Where do MGAs fit in?

CGI

Digital Transformation in UK General Insurance: Where do MGAs fit in? harini.kottees…. Tue, 02/28/2017 - 04:15. A lot of attention has been drawn to the digital developments that are being undertaken by insurers in the direct marketplace, but whilst direct is an important market, transformation of the indirect channel is also deserving of more attention.

article thumbnail

#InfoGov Links Of The Week 02-17-2017

Information is Currency

Yesterday I passed two parts of the ICRM exam. The lead up to it caused me to delay links of the day. Sorry for the delay. Please read, enjoy, share and do your part to mature the InfoGov community. Companies Still Struggle With Information Governance, Survey Finds. Despite years of talking about information governance and compliance, less than half of companies surveyed have a compliance culture — and many companies apparently have no governance strategy at all.

MDM 40
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

UK Government Quizzed on GDPR Implementation and Post-Brexit Data Protection

Hunton Privacy

On February 1, 2017, Matt Hancock, the UK Government Minister responsible for data protection, was questioned by the House of Lords committee on the UK’s implementation plan of the EU General Data Protection Regulation (“GDPR”) in the context of the UK’s looming exit from the EU. In responding to the questioning, Hancock revealed further details into the UK Government’s position on implementing the GDPR into UK law.

GDPR 53
article thumbnail

CNIL Launches New Public Consultation on the GDPR

Hunton Privacy

On February 23, 2017, the French Data Protection Authority (“CNIL”) launched an online public consultation on three topics identified by the Article 29 Working Party (“Working Party”) in its 2017 action plan for the implementation of the EU General Data Protection Regulation (“GDPR”). The three topics are consent, profiling and data breach notification.

GDPR 49
article thumbnail

CIPL to Hold Next GDPR Implementation Workshop in Madrid

Hunton Privacy

On March 6 and 7, 2017, the Centre for Information Policy Leadership (“CIPL”) at Hunton & Williams LLP and over 100 public and private sector participants in CIPL’s GDPR Implementation Project will convene in Madrid, Spain, for CIPL’s third major GDPR implementation workshop. The all-day workshop on March 7, titled “GDPR Implementation: Status, Key Challenges, and Understanding the Core Principles of Transparency, Consent and Legitimate Interest,” will be co-hosted by the Spanish Data Protec

GDPR 49
article thumbnail

DPA of Argentina Issues Draft Data Protection Bill

Hunton Privacy

As previously published on the Data Privacy Laws blog, Pablo A. Palazzi, partner at Buenos Aires law firm Allende & Brea, provides the following report. Earlier this month, the Argentine Data Protection Agency (“DPA”) posted the first draft of a new data protection bill (the “Draft Bill”) on its website. Argentina’s current data protection bill was enacted in December 2000.

GDPR 49
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Article 29 Working Party Clarifies Process for Resolving Privacy Shield Complaints

Hunton Privacy

On February 20, 2017, the Article 29 Working Party (“Working Party”) issued a template complaint form and Rules of Procedure that clarify the role of the EU Data Protection Authorities (“DPAs”) in resolving EU-U.S. Privacy Shield -related (“Privacy Shield”) complaints. The Working Party’s template complaint form indicates that it is intended for use by EU individuals who wish to have their commercial-related complaints associated with Privacy Shield-certified organizations resolved by their nati

Privacy 45
article thumbnail

FTC Announces Settlements with Three Companies Accused of Deceiving Consumers About Participating in APEC CBPR Program

Hunton Privacy

On February 22, 2017, the Federal Trade Commission announced that it had reached settlement agreements (“the Proposed Agreements”) with three U.S. companies charged with deceiving consumers about their participation in the Asia-Pacific Economic Cooperation Cross-Border Privacy Rules (“APEC CBPR”) system. The three companies are Sentinel Labs, Inc. (which provides endpoint protection software), SpyChatter, Inc.

Privacy 45
article thumbnail

Health Insurer Reaches Privacy Settlement with New Jersey Division of Consumer Affairs

Hunton Privacy

On February 17, 2017, Horizon Blue Cross Blue Shield of New Jersey (“Horizon”) agreed to pay $1.1 million as part of a settlement with the New Jersey Division of Consumer Affairs (the “Division”) regarding allegations that Horizon did not adequately protect the privacy of nearly 690,000 policyholders. The settlement stemmed from the theft of two laptops stolen from Horizon headquarters in November 2013, when personnel from outside vendors performing renovations and moving services at Horizon’s N

article thumbnail

Australia Enacts New Data Breach Notification Law

Hunton Privacy

On February 13, 2017, the Parliament of Australia passed legislation that amends the Privacy Act of 1988 (the “Privacy Act”) and requires companies with revenue over $3 million AUD ($2.3 million USD) to notify affected Australian residents and the Australian Information Commissioner (the “Commissioner”) in the event of an “eligible data breach.”. The Privacy Act defines “personal information” to include “information or an opinion about an identified individual, or an individual who is reasonably

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

UK Government Releases Plan for Exiting the EU

Hunton Privacy

On February 2, 2017, the UK government published a white paper entitled The United Kingdom’s exit from and new partnership with the European Union (the “white paper”). The white paper strikes a conciliatory tone, making it clear that the UK intends to maintain close ties with the European Union and its 27 remaining Member States after Brexit. A large portion of the white paper is devoted to discussing the issues at the heart of the 2016 Brexit referendum, such as immigration controls, continuing

article thumbnail

OCR Settlement Emphasizes Importance of Audit Controls

Hunton Privacy

On February 16, 2017, the U.S. Department of Health and Human Services’ Office for Civil Rights (“OCR”) entered into a resolution agreement with Memorial Healthcare System (“Memorial”) that emphasized the importance of audit controls in preventing breaches of protected health information (“PHI”). The $5.5 million settlement with Memorial is the fourth enforcement action taken by OCR in 2017, and matches the largest civil monetary ever imposed against a single covered entity.

article thumbnail

Protecting the bank in a digital world

CGI

Protecting the bank in a digital world. shobana.lv@cgi.com. Wed, 02/22/2017 - 01:58. Today's digital world of multi-dimensional, organized criminal threats ruthlessly exposes the weak points in any financial institutions anti-financial crime (AFC) defences. Criminals are long gone usually before you even realize you are a victim. The challenge is how to more proactively defend against these new threats.

article thumbnail

CIPL Submits Comments to Article 29 Working Party’s Proposed Guidelines

Hunton Privacy

On February 15, 2017, the Centre for Information Policy Leadership (“CIPL”) at Hunton & Williams LLP submitted two sets of formal comments to the Article 29 Working Party (the “Working Party”). CIPL commented on the Guidelines for identifying a controller or processor’s lead supervisory authority (“Lead Authority Guidelines”), and on the Guidelines on the right to data portability (“Data Portability Guidelines”).

GDPR 40
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

10 measures for good IT security governance

CGI

10 measures for good IT security governance. harini.kottees…. Wed, 02/15/2017 - 01:58. The sophistication and persistence of cyber-attacks are driven by the attractiveness of an organization’s role and assets. Often they are conducted by highly skilled international organized crime groups or foreign nation states that aim their attacks not just at government entities, but also at corporations, including those with large-scale financial and credit card assets and foreign investments, and those in

article thumbnail

The Functions of #eDiscovery

Information is Currency

In today’s information age Information Governance is essential to be prepared for eDiscovery. People are hungry for information and submit Freedom of Information Act (FOIA) request at a startling pace. We live in a very litigious age and the only way to be prepared for eDiscovery request whether via FOIA or a lawsuit is by having a strong Information Governance foundation.

FOIA 40
article thumbnail

OCR Issues Penalty for Noncompliance with HIPAA Privacy and Security Rules

Hunton Privacy

On February 1, 2017, the U.S. Department of Health and Human Services’ Office for Civil Rights (“OCR”) announced a $3.2 million civil monetary penalty against Children’s Medical Center of Dallas (“Children’s”) for alleged ongoing violations of the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Privacy and Security Rules, following two consecutive breaches of patient electronic protected health information (“ePHI”).

Privacy 40