June, 2016

article thumbnail

memcpy (and friends) with NULL pointers

Imperial Violet

The C standard (ISO/IEC 9899:2011) has a sane-seeming definition of memcpy (section 7.24.2.1): The memcpy function copies n characters from the object pointed to by s2 into the object pointed to by s1. Apart from a prohibition on passing overlapping objects, I think every C programmer understands that. However, the standard also says (section 7.1.4): If an argument to a function has an invalid value (such as a value outside the domain of the function, or a pointer outside the address space of th

Libraries 135
article thumbnail

UK Votes to Leave the EU: Data Protection Standards Unlikely to Be Affected

Hunton Privacy

On June 23, 2016, the UK held a referendum to decide upon its continued membership in the European Union. The outcome has resulted in the decision for the UK to withdraw its membership from the European Union. Despite the result, data protection standards are unlikely to be affected. The full details of how and when the UK will negotiate its exit from the EU is still unclear.

GDPR 68
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DB2 for z/OS: Indexes and Foreign Keys

Robert's Db2

The functionality of DB2 for z/OS is enhanced, in ways small and big, on a regular basis. There's plenty to keep up with, and it is understandable that some product improvements could fly under the radar of a database administrator and escape notice. I encountered this situation a few weeks ago. During a presentation on new features and functions of DB2 11, delivered to an audience comprised mostly of DB2 DBAs, I was asked, "When will we see a lifting of the restriction that requires an index on

IT 48
article thumbnail

How google helps 600,000 webmasters re-secure their hacked sites every year

Elie

Every year, close to 600,000 sites are hacked. Given the scale of the problem, notifying users to prevent harm and webmasters so they can clean up their sites is critical to combat hacking. This post looks at the effectiveness of the current warning strategies used by Google and their long-term impact.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

AIIM On Air Podcast Interview

JKevinParker

I was interviewed by Kevin Craine for AIIM On Air. Also in this episode is an interview with information management consultant Chris Walker. Listen to the Interview.

40

More Trending

article thumbnail

Topic Intelligence Infographic

Attensa

Check out our infographic below and get accustomed to how Attensa topics work and what it can do for organizations. If you haven’t yet, feel free to read our introductory post on Topic Intelligence here which contains a useful explanation video on what topic intelligence is. Enjoy! The post Topic Intelligence Infographic appeared first on Attensa Inc.

article thumbnail

Second Reading of China’s Draft of Cybersecurity Law

Hunton Privacy

On June 27, 2016, the Standing Committee of the National People’s Congress of the People’s Republic of China held a second reading of the draft Cybersecurity Law (the “second draft”). The law is aimed at strengthening the protection and security of key information infrastructure and important data in China. As we previously reported , the first draft of the Cybersecurity Law was published for comment almost a year ago, but the National People’s Congress has not published the full second dr

article thumbnail

What does BREXIT mean for data protection?

Privacy and Cybersecurity Law

On 23 June 2016, the UK is holding a referendum as to whether to stay in the European Union or […].

40
article thumbnail

Now is the time for your organisation to pilot Robotic Process Automation

CGI

Now is the time for your organisation to pilot Robotic Process Automation. p.butler@cgi.com. Wed, 06/15/2016 - 06:57. Table. Zuboff’s Laws…. “Everything that can be automated will be automated”. "Everything that can be informated will be informated". The benefits of implementing Robotic Process Automation (RPA) to automate business processes that are standardised, rules based, and repetitive but liable to error and variation are well documented. .

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Speaking at InfoGovCon 2016

JKevinParker

I'm very excited to be speaking at this year's InfoGovCon in Providence, RI. The conference is October 11-12. The lineup of speakers is excellent. This is the first year I get to go to InfoGovCon and I have the honor of presenting. Make plans to attend. You won't be disappointed. Learn more about InfoGovCon here.

article thumbnail

MER Shows IG Advances

Positively RIM

The 24 th annual MER Conference ended May 25 amid solid growth and optimism. That refers to both the attendees and the conference itself. This was a roll-up-your-sleeves-and-get-to-work edition of MER. There was a notable lack of identity-angst, replaced by a prevailing attitude of, “We know why we’re here,”, “We know what needs to be done,” and, “We want to learn the tools, strategies, and tactics that are going to get us where we need to go.

article thumbnail

Slack + Attensa

Attensa

Slack is a powerful tool that has changed the way we communicate. Internally within an organization or publicly, people are able to leverage the power of channels (#) in the workplace. Now if you couple Slack with Attensa RSS publishing, you have something even better. You have the ability to inform people tuning in to your channel with information managed by Attensa topics.

Sales 40
article thumbnail

Revised Privacy Shield Documents Leaked to Politico

Hunton Privacy

On June 29, 2016, Politico reported that it has obtained updated EU-U.S. Privacy Shield documents following the latest negotiations between U.S. and EU government authorities. Certain aspects of the prior Privacy Shield framework were criticized by the Article 29 Working Party , the European Parliament and the European Data Protection Supervisor. Although there has been no official confirmation that the updated documents reflect the latest iteration of the Privacy Shield framework, the documents

Privacy 56
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

My Latest Columns

John Battelle's Searchblog

The post My Latest Columns appeared first on John Battelle's Search Blog. In meetings with several colleagues over the past few days, many did not know about the column I write each week – I’ve been remiss and not cross posting my writings from NewCo Shift here. It’s been interesting to move my main focus of writing from a personal blog to a publication in-the-making.

IT 40
article thumbnail

Cybersecurity in the boardroom: 7 steps to improve cyber governance

CGI

Cybersecurity in the boardroom: 7 steps to improve cyber governance. Anonymous. Wed, 06/15/2016 - 08:45. While cybersecurity isn’t new, what is new is the rapidly growing business dependence on networked systems and the Internet, coupled with the rapidly evolving cybersecurity threat landscape and the value that is at stake for companies in today’s digital-first world.

article thumbnail

The Bavarian DPA Issues Paper on Certifications Under the GDPR

Hunton Privacy

On June 22, 2016, the Bavarian Data Protection Authority (“DPA”) issued a short paper on certifications under Article 42 of the General Data Protection Regulation (“GDPR”). The GDPR will become effective on May 25, 2018. This paper is part of a series of papers that the Bavarian DPA will be issuing periodically on specific topics of the GDPR to inform the public about what topics are being discussed within the DPA.

Paper 56
article thumbnail

CNIL Launches Public Consultation on EU General Data Protection Regulation

Hunton Privacy

On June 16, 2016, the French Data Protection Authority (“CNIL”) launched a public consultation on the four priority topics identified by the Article 29 Working Party (“Working Party”) in its February 2016 action plan for the implementation of the EU General Data Protection Regulation (“GDPR”). One of these priorities is to issue guidance to help data controllers and data processors prepare for the GDPR.

GDPR 56
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Belgian Court of Cassation Rules on Right to Be Forgotten

Hunton Privacy

In a recently published decision, the Belgian Court of Cassation confirmed the broad interpretation given to the “right to be forgotten” by a Belgian Court of Appeal ( i.e. , Cour d’Appel de Liège, 2013/RG/393, September 25, 2014). The judgment was rendered in a case initiated by an individual against a Belgian newspaper for not complying with a request to remove from its online archives an article from 1994 regarding a car accident causing the death of two persons in which the individual was in

article thumbnail

Draft Released in the Philippines Implementing Rules for the Data Privacy Act

Hunton Privacy

This post has been updated. . On June 17, 2016, the National Privacy Commission (the “Commission”) of the Philippines released draft guidelines entitled, Implementing Rules and Regulations of the Data Privacy Act of 2012 (“IRR”), for public consultation. Under the IRR, the processing of personal data has to adhere to the principles of transparency, legitimate purpose and proportionality.

article thumbnail

European Commission Could Approve Privacy Shield in Early July

Hunton Privacy

According to Bloomberg BNA , the EU-U.S. Privacy Shield framework could be approved by the European Commission in early July. The Privacy Shield is a successor framework to the Safe Harbor, which was invalidated by the European Court of Justice in October 2015. Certain provisions of the Privacy Shield documents, previously released by the European Commission on February 29, 2016, have been subjected to criticism by the Article 29 Working Party , the European Parliament and the European Data Prot

Privacy 53
article thumbnail

Ad Network to Pay Nearly 1 Million in Civil Penalties to Settle FTC Charges That It Geo-Tracked Consumers Without Permission

Hunton Privacy

On June 22, 2016, the Federal Trade Commission announced a settlement with Singaporean-based mobile advertising network, InMobi, resolving charges that the company deceptively tracked hundreds of millions of consumers’ locations, including children, without their knowledge or consent. Among other requirements, the settlement orders the company to pay $950,000 in civil penalties. .

Privacy 49
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Lisa Sotto Interviewed: Are Law Firms Soft Targets for Hackers?

Hunton Privacy

In a recent video published by Mimesis Law, Lisa Sotto , chair of the firm’s Global Privacy and Cybersecurity practice , was interviewed during Mimesis Law’s Cy-Pher Executive Roundtable in New York. Sotto, along with several other privacy professionals, discussed the risks that law firms face in protecting their clients’ confidential information, as well as their own data.

Privacy 49
article thumbnail

New Do-Not-Call List Launched in France

Hunton Privacy

On June 1, 2016, a new do-not-call list (the “BLOCTEL list”) was implemented in France. French residents who do not wish to receive marketing phone calls may register their landline or mobile phone number online at www.bloctel.gouv.fr. The BLOCTEL list was created by French Consumer Law No. 2014-344 of March 17, 2014. This law prohibits companies from (1) making marketing calls to a consumer registered on the BLOCTEL list, except if the consumer is an existing customer of that company, and (2) s

article thumbnail

Complete Our GDPR Readiness Survey

Hunton Privacy

With the EU General Data Protection Regulation (“GDPR”) enacted and due to come into force in May 2018, the Centre for Information Policy Leadership at Hunton & Williams and AvePoint have launched a global survey to enable organizations to benchmark their readiness for the GDPR. The survey focuses on the key areas of impact and change for organizations under the GDPR, such as consent, legitimate interest, data portability, profiling, privacy impact assessments, DPOs, data transfers and priva

GDPR 45
article thumbnail

DHS and DOJ Issue Final Guidance on the Cybersecurity Information Sharing Act of 2015

Hunton Privacy

On June 15, 2016, the U.S. Department of Homeland Security (“DHS”) and U.S. Department of Justice (“DOJ”) jointly issued final guidance on the Cybersecurity Information Sharing Act of 2015 (“CISA”). Enacted in December 2015, CISA includes a variety of measures designed to strengthen private and public sector cybersecurity. In particular, CISA provides protections from civil liability, regulatory action and disclosure under the Freedom of Information Act (“FOIA”) and other open government laws fo

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

U.S. Government Seeks to Join Schrems Case

Hunton Privacy

On June 13, 2016, the U.S. government expressed its wish to join the legal proceedings brought by Max Schrems concerning the validity of international data transfers under EU Standard Contractual Clauses. Along with the U.S. government, the Irish Business and Employers Confederation and the Business Software Alliance, an industry trade group, also informed Ireland’s High Court of their desire to be added to the case as amici curiae , or “friends of the court.” Each party will now hav

article thumbnail

EU and U.S. Sign Umbrella Agreement

Hunton Privacy

On June 2, 2016, the European Union and the U.S. signed an Umbrella Agreement , which will implement a comprehensive data protection framework for criminal law enforcement cooperation. The agreement is not yet in effect and additional procedural steps are needed to finalize the agreement. The European Council will adopt a decision on the Umbrella Agreement after obtaining consent from the European Parliament.

article thumbnail

EDPS Releases Opinion on the EU-U.S. Privacy Shield

Hunton Privacy

On May 30, 2016, the European Data Protection Supervisor (“EDPS”) released its Opinion (the “Opinion”) on the EU-U.S. Privacy Shield (the “Privacy Shield”) draft adequacy decision. The Privacy Shield was created to replace the previous Safe Harbor framework invalidated by the Court of Justice of the European Union (“CJEU”) in the Schrems decision. Similar to the conclusion drawn from the Article 29 Working Party’s Opinion and the Resolution of the European Parliament, the Opinion recognizes the

Privacy 45