December, 2014

article thumbnail

What Will Search Look Like In Mobile? A Visit With Jack

John Battelle's Searchblog

'The post What Will Search Look Like In Mobile? A Visit With Jack appeared first on John Battelle's Search Blog. I’ve come across any number of interesting startups in my ongoing grok of the mobile world (related posts: 1 , 2 , 3 ). And the pace has quickened as founders have begun to reach out to me to share their work. As you might expect, there’s a large group of folks building ambitious stuff – services that assume the current hegemony in mobile won’t stand for

article thumbnail

DB2 for z/OS: Time to go Bold and Big with System z Memory

Robert's Db2

With 2015 right around the corner, many people are probably starting to ponder their new year's resolutions -- the things they aim to do with a fresh set of twelve months. To the usual line-up of action items ("I will get in shape," "I will read more," "I will eat more fruits and vegetables," etc.), I would suggest that you add the following: "I will be bold in using memory for the production DB2 for z/OS systems I support.

Access 48
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Poland Amends Its Personal Data Protection Act

Hunton Privacy

On November 24, 2014, the Polish President Bronis?aw Komorowski signed into law a bill that was passed by Polish Parliament on November 7, 2014, which amends, among other laws, certain provisions of the Personal Data Protection Act 1997. As a result of the amendments, data controllers will be able to transfer personal data to jurisdictions that do not provide an “adequate level” of data protection without obtaining the prior approval of the Polish Data Protection Authority ( Generalny Inspektor

article thumbnail

Digital Product Personalisation – how long before it is the norm across all markets?

CGI

Digital Product Personalisation – how long before it is the norm across all markets? p.butler@cgi.com. Fri, 12/12/2014 - 04:00. In the retail world, personalisation has been with us for many years. Car manufacturers allow you to select from a wide range of options, plus the ability to choose any paint colour you wish, meaning in today’s market, very few cars have the same specification.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

New EU Guidelines on “Google Spain”: Right to be Forgotten

Privacy and Cybersecurity Law

The Article 29 Working Party published new Guidelines on the Right to be Forgotten on 26 November 2014. This is […].

40

More Trending

article thumbnail

German DPA Imposes 1.3 Million EUR Fine on Insurance Group for Violation of Data Protection Law

Hunton Privacy

On December 29, 2014, the Commissioner for Data Protection and Freedom of Information of the German state Rhineland-Palatinate issued a press release stating that it imposed a fine of €1,300,000 on the insurance group Debeka. According to the Commissioner, Debeka was fined due to its lack of internal controls and its violations of data protection law.

article thumbnail

FTC Warns Foreign-Based App Developer of Potential COPPA Violations

Hunton Privacy

On December 22, 2014, the Federal Trade Commission announced that it notified China-based BabyBus (Fujian) Network Technology Co., Ltd., (“BabyBus”) that several of the company’s mobile applications (“apps”) appear to be in violation of the Children’s Online Privacy Protection Rule (the “COPPA Rule”). In a letter dated December 17, 2014, the FTC warned BabyBus of potential COPPA violations stemming from allegations that the company has failed to obtain verifiable parental consent prior to its ap

Privacy 40
article thumbnail

FinCEN Assesses Penalty Against Former MoneyGram Compliance Officer

Hunton Privacy

On December 18, 2014, the Financial Crimes Enforcement Network (“FinCEN”) issued a $1 million civil penalty against Thomas E. Haider, the former Chief Compliance Officer of MoneyGram International, Inc. (“MoneyGram”). In a press release announcing the assessment, FinCEN alleged that during Haider’s oversight of compliance for MoneyGram, he failed to adequately respond to thousands of customer complaints regarding schemes that utilized MoneyGram to defraud consumers.

article thumbnail

Industry, Privacy Advocates Join Microsoft to Protect Customer Emails in Foreign Servers

Hunton Privacy

On December 15, 2014, Microsoft reported the filing of 10 amicus briefs in the 2nd Circuit Court of Appeals signed by 28 leading technology and media companies, 35 leading computer scientists, and 23 trade associations and advocacy organizations, in support of Microsoft’s litigation to resist a U.S. Government’s search warrant purporting to compel the production of Microsoft customer emails that are stored in Ireland.

Privacy 40
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

FTC Announces Settlement with T-Mobile in Mobile Cramming Case

Hunton Privacy

On December 19, 2014, the Federal Trade Commission announced a settlement of at least $90 million with mobile phone carrier T-Mobile USA, Inc. (“T-Mobile”) stemming from allegations related to mobile cramming. This settlement amount will primarily be used to provide refunds to affected customers who were charged by T-Mobile for unauthorized third party charges.

article thumbnail

EU and U.S. Privacy Experts Meet to Develop Transatlantic Privacy “Bridges”

Hunton Privacy

On December 14, 2014, the University of Amsterdam and the Massachusetts Institute of Technology issued a press release about two recent meetings of the EU-U.S. Privacy Bridges Project in Washington, D.C. (held September 22-23, 2014) and Brussels (held December 9-10, 2014). The Privacy Bridges Project is a group of approximately 20 privacy experts from the EU and U.S. convened by Jacob Kohnstamm, Chairman of the Dutch Data Protection Authority and former Chairman of the Article 29 Working Party,

Privacy 40
article thumbnail

NLRB Reverses Register Guard; Grants Workers Right to Use Employer Email System for Section 7 Purposes

Hunton Privacy

As reported in the Hunton Employment & Labor Perspectives Blog : In Purple Communications, Inc., a divided National Labor Relations Board (“NLRB”) held that employees have the right to use their employers’ email systems for statutorily protected communications, including self-organization and other terms and conditions of employment, during non-working time.

article thumbnail

Centre for Information Policy Leadership Discusses Privacy Risk Management at the OECD Working Party on Security and Privacy in the Digital Economy

Hunton Privacy

Former UK Information Commissioner and Centre for Information Policy Leadership (the “Centre”) Global Strategy Advisor Richard Thomas was invited to make a presentation at a roundtable on Privacy Risk Management and Next Steps at the Organization for Economic Cooperation and Development’s (“OECD’s”) 37th meeting of the Working Party on Security and Privacy in the Digital Economy (“Working Party”).

Privacy 40
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Centre for Information Policy Leadership Points to New ISO Cloud Privacy Standard as “Accountability” Milestone

Hunton Privacy

In an article entitled The Rise of Accountability from Policy to Practice and Into the Cloud published by the International Association of Privacy Professinals , Bojana Bellamy , President of the Centre for Information Policy Leadership at Hunton & Williams (the “Centre”), outlines the rapid global uptake of “accountability” as a cornerstone of effective data protection and points to the recent ISO 27018 data privacy cloud standard as one of the latest examples.

Cloud 40
article thumbnail

Privacy Authorities Call on App Marketplaces to Require Privacy Policies

Hunton Privacy

On December 9, 2014, a coalition of 23 global privacy authorities sent a letter to the operators of mobile application (“app”) marketplaces urging them to require privacy policies for all apps that collect personal information. Although the letter was addressed to seven specific app marketplaces, the letter notes that it is intended to apply to all companies that operate app marketplaces.

Privacy 40
article thumbnail

HHS Reaches Settlement with Health Care Company Over Malware Breach

Hunton Privacy

The Department of Health and Human Services (“HHS”) recently announced a resolution agreement and $150,000 settlement with Anchorage Community Mental Health Services, Inc. (“ACHMS”) in connection with a data breach caused by malware. ACHMS, which provides nonprofit behavioral health care services in Alaska, experienced a breach in March 2012 that affected the electronic protected health information (“ePHI”) of 2,743 individuals.

article thumbnail

CJEU Adopts a Strict Approach to the Use of CCTV

Hunton Privacy

On December 11, 2014, in response to a request for a preliminary ruling from the Supreme Administrative Court of the Czech Republic, the Court of Justice of the European Union (“CJEU”) ruled that the use of CCTV in the EU should be strictly limited, and that the exemption for “personal or household activity” does not permit the use of a home CCTV camera that also films any public space.

Privacy 40
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

In a Surprising Move, Congress Passes Four Cybersecurity Bills

Hunton Privacy

In a flurry of activity on cybersecurity in the waning days of the 113th Congress, Congress unexpectedly approved, largely without debate and by voice vote, four cybersecurity bills that: (1) clarify the role of the Department of Homeland Security (“DHS”) in private-sector information sharing, (2) codify the National Institute of Standards and Technology’s (“NIST”) cybersecurity framework, (3) reform oversight of federal information systems, and (4) enhance the cybersecurity workforce.

article thumbnail

New York Banking Regulator Announces New Cybersecurity Assessment Process

Hunton Privacy

On December 10, 2014, the New York State Department of Financial Services (the “Department”) announced that it issued an industry guidance letter to all Department-regulated banking institutions that formally introduces the Department’s new cybersecurity preparedness assessment process. The letter announces the Department’s plans to expand its information technology examination procedures to increase focus on cybersecurity, which will become a regular, ongoing part of the Department’s bank exami

article thumbnail

A case study on the use of iBeacon technology at a major theme park

CGI

A case study on the use of iBeacon technology at a major theme park. narmada.devarajan. Wed, 12/10/2014 - 02:05. In my last blog , I shared the potential value of Apple’s iBeacon technology in transforming the passenger experience and transport operations. As I noted, there are already many real-life examples of its application in other industries such as retail.

article thumbnail

Article 29 Working Party Publishes Working Document on Surveillance

Hunton Privacy

On December 5, 2014, the Article 29 Working Party (the “Working Party”) published a Working Document on surveillance, electronic communications and national security. The Working Party (which is comprised of the national data protection authorities (“DPAs”) of each of the 28 EU Member States) regularly publishes guidance on the application and interpretation of EU data protection law.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Article 29 Working Party Issues Joint Statement on European Values and Actions for an Ethical European Data Protection Framework

Hunton Privacy

On December 8, 2014, the Article 29 Working Party (the “ Working Party”) and the French Data Protection Authority (the “CNIL”) organized the European Data Governance Forum, an international conference centered around the theme of privacy, innovation and surveillance in Europe. The conference concluded with the presentation of a Joint Statement adopted by the Working Party during its plenary meeting on November 25, 2014.

article thumbnail

Centre for Information Policy Leadership Publishes White Paper on “The Role of Risk in Data Protection”

Hunton Privacy

The Centre for Information Policy Leadership at Hunton & Williams (the “Centre”) has published a second white paper in its multi-year Privacy Risk Framework Project entitled The Role of Risk in Data Protection. This paper follows the earlier white paper from June 2014 entitled A Risk-based Approach to Privacy: Improving Effectiveness in Practice.

Paper 40
article thumbnail

NIST Releases Update on Implementation of Cybersecurity Framework

Hunton Privacy

On December 5, 2014, the National Institute of Standards and Technology (“NIST”) released an update on the implementation of the Framework for Improving Critical Infrastructure Cybersecurity (“Framework”). NIST issued the Framework earlier this year in February 2014 at the direction of President Obama’s February 2013 Critical Infrastructure Executive Order.

article thumbnail

Article 29 Working Party Issues Working Document Proposing Cooperation Procedure for Issuing Common Opinions on Contractual Clauses

Hunton Privacy

On November 26, 2014, the Article 29 Working Party (the “Working Party”) released a Working Document providing a cooperation procedure for issuing common opinions on whether “contractual clauses” comply with the European Commission’s Model Clauses (the “Working Document”). The Working Document creates a cooperation procedure that enables companies who utilize contractual clauses, or the amended European Commission-approved Model Clauses (the “Company’s Clauses”), in different EU Member States to

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Improving the passenger journey through iBeacon technology

CGI

Improving the passenger journey through iBeacon technology. ravi.kumarv@cgi.com. Wed, 12/03/2014 - 06:51. About a year ago, Apple launched a new technology called iBeacon. This technology makes it possible for a smart device (phone or tablet) to perform an action when it comes in proximity to an iBeacon, which is a type of low-cost transmitter. The possibilities of iBeacons seem limitless, and they have the potential to create value across many industries.

article thumbnail

Centre Discusses the Risk-Based Approach to Privacy and APEC-EU Interoperability at IAPP Brussels

Hunton Privacy

At the International Association of Privacy Professionals’ (“IAPP’s”) recent Europe Data Protection Congress in Brussels, the Centre for Information Policy Leadership at Hunton & Williams (the “Centre”) led two panels on the risk-based approach to privacy as a tool for implementing existing privacy principles more effectively and on codes of conduct as a means for creating interoperability between different privacy regimes.

Risk 40
article thumbnail

Article 29 Working Party Issues Opinion on the Implementation of the CJEU Ruling in Costeja

Hunton Privacy

On November 26, 2014, the Article 29 Working Party (the “Working Party”) published an Opinion (the “Opinion”) on the Guidelines on the Implementation of the Court of Justice of the European Union Judgment on “Google Spain and Google Inc. v. Agencia Española de Protección de Datos (AEPD) and Mario Costeja González” C-131/12 (the “Judgment” or “Costeja”).