July, 2016

article thumbnail

5 useful tips to bulletproof your credit cards against identity theft

Elie

Here are the 5 ways I bulletproof my credit cards against identity theft, and you can use them yourself very easily. As a bonus, at the end of the post I have added an experimental step to defend against the recent chip downgrading attack.

62
article thumbnail

Why CGC Matters to Me

ForAllSecure

By David Brumley. In 2008 I started as a new assistant professor at CMU. I sat down, thought hard about what I had learned from graduate school, and tried to figure out what to do next. My advisor in graduate school was Dawn Song , one of the top scholars in computer security. She would go on to win a MacArthur "Genius" Award in 2010. She's a hard act to follow.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CNIL Serves Formal Notice to Microsoft to Comply with French Data Protection Law

Hunton Privacy

On July 20, 2016, the French Data Protection Authority (“CNIL”) announced that it issued a formal notice to Microsoft Corporation (“Microsoft”) about Windows 10, ordering Microsoft to comply with the French Data Protection Act within three months. Background. Following the launch of Microsoft’s new operation system, Windows 10, in July 2015, the CNIL was alerted by the media and political parties that Microsoft could collect excessive personal data via Windows 10.

article thumbnail

IRS Phone Scams

Roger's Information Security

I received the following voicemail on my home number today. “The reason of this call is to inform you that the IRS is filing lawsuit against you to get more information about this case file. Please call immediately on our department number 347-637-6615. I repeat 347-637-6615. Thank you.” While tax season is the high season for this particular scam, “The IRS is filling a lawsuit against you” strikes fear into the heart of the recipient any time of year.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

The Information Management Umbrella

Brandeis Records Manager

George Despres, CRM. Program Director for University Records Management, Brandeis University. (The content in this blog reflects the opinions of the author, and not of Brandeis University.). A colleague at another university recently polled a listserv group of records managers in Higher Ed. The survey probed the records management programs’ locations within the organization.

More Trending

article thumbnail

Key criteria to consider in choosing a cloud migration partner

CGI

Key criteria to consider in choosing a cloud migration partner. natalya.kalina…. Thu, 07/28/2016 - 03:46. Many organizations are seeking to reduce their legacy IT spend and re-invest the savings into digital enabling technologies like cloud computing to drive business agility, transformation and overall competiveness. Their aging IT infrastructures have become too expensive and time consuming to maintain, and the key technologies supporting their business are reaching end of life or end of maint

Cloud 40
article thumbnail

InfoGovCon 2016 Promo Video

JKevinParker

Check out the new promo video for InfoGovCon 2016 ! I'm excited to be one of the speakers for this exciting event. You should come! Learn more at: www.InfoGovCon.com.

40
article thumbnail

EU Commission Signs Agreement with Industry on Cybersecurity

Hunton Privacy

On July 5, 2016, the European Commission announced the launch of a new public-private partnership (the “Partnership”) on cybersecurity, as part of its Digital Single Market and EU Cybersecurity strategies. In this context, the European Commission released several documents, including a Commission Decision establishing a contractual arrangement of the new Partnership for cybersecurity industrial research, and a Staff Working Document on the preparation activities for the Partnership.

article thumbnail

Why CGC Matters To Me

ForAllSecure

In 2008 I started as a new assistant professor at CMU. I sat down, thought hard about what I had learned from graduate school, and tried to figure out what to do next. My advisor in graduate school was Dawn Song , one of the top scholars in computer security. She would go on to win a MacArthur "Genius" Award in 2010. She's a hard act to follow. I was constantly reminded of this because, by some weird twist of fate, I was given her office when she moved from CMU to Berkeley.

Paper 40
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Privacy Shield gets approval: certainty at last??

Privacy and Cybersecurity Law

The European Commission yesterday issued an adequacy decision adopting the EU-US Privacy Shield, which replaces Safe Harbor as a framework […].

Privacy 40
article thumbnail

French Parliament Rejects Data Localization Amendment

Hunton Privacy

On June 30, 2016, a joint committee composed of representatives from both chambers of the French Parliament (“Joint Committee”) reached a common position on the French ‘Digital Republic’ Bill that rejects the data localization amendment previously approved by the French Senate, but significantly amends other aspects of the French Data Protection Act.

GDPR 53
article thumbnail

EU Regulators Will Not Challenge Adequacy of Privacy Shield for at Least One Year

Hunton Privacy

On July 26, 2016, Isabelle Falque-Pierrotin, the Chairwoman of the Article 29 Working Party of data protection regulators, announced that EU data protection regulators will not challenge the adequacy of the EU-U.S. Privacy Shield (“Privacy Shield”) for at least one year ( i.e. , until after summer 2017). The European Commission is scheduled to conduct a mandatory review of the adequacy of the Privacy Shield by May 2017.

Privacy 49
article thumbnail

ICO Releases Annual Report for 2015-2016

Hunton Privacy

On June 28, 2016, the UK Information Commissioner’s Office (“ICO”) released its Annual Report for 2015 -2016 (the “Report”). According to the Report, the ICO has dealt with an increase in the number of data protection concerns, handling 16,388 complaints in total. Particularly noteworthy is the £130,000 fine imposed on Pharmacy 2U for breach of the fair processing requirements under the UK Data Protection Act 1998.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Article 29 Working Party and EDPS Release Opinions on the ePrivacy Directive

Hunton Privacy

On July 25, 2016, the Article 29 Working Party (the “Working Party”) and the European Data Protection Supervisor (“EDPS”) released their respective Opinions regarding the review of Directive 2002/58/EC on privacy and electronic communications (the “ePrivacy Directive”). Both the Working Party and the EDPS stressed that new rules should complement the protections available under the EU General Data Protection Regulation (“GDPR”).

article thumbnail

Second Circuit Holds Microsoft Cannot Be Compelled to Turn Over Emails Stored Abroad

Hunton Privacy

This post has been updated. . On July 14, 2016, the U.S. Court of Appeals for the Second Circuit held that Microsoft Corporation (“Microsoft”) cannot be compelled to turn over customer emails stored abroad to U.S. law enforcement authorities. As we previously reported , in April 2014 a judge in the U.S. District Court for the Southern District of New York ruled that Microsoft must release user data to U.S. law enforcement when issued a search warrant under the Stored Communications Act (“SCA”),

article thumbnail

EU Member States Approve Privacy Shield

Hunton Privacy

On July 8, 2016, EU representatives on the Article 31 Committee approved the final version of the EU-U.S. Privacy Shield (“Privacy Shield”) to permit transatlantic transfers of personal data from the EU to the U.S. As we previously reported , the Privacy Shield is a successor framework to the Safe Harbor, which was invalidated by the Court of Justice of the European Union in October 2015.

Privacy 45
article thumbnail

Order, Order: Why the UK court system is ready for transformational change…

CGI

Order, Order: Why the UK court system is ready for transformational change…. shobana.lv@cgi.com. Thu, 07/28/2016 - 05:17. The UK Criminal Justice System is suffering a crisis of public perception. A Citizens Advice study in 2015 found that one in five people who had been involved in the UK court system left with a worse opinion than when they entered it.

Paper 40
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

U.S. data transparency act compliance in reach, offering potential for new data uses

CGI

La conformité à la loi américaine sur la transparence des données ouvre la voie à de nouvelles possibilités en matière d’utilisation des données. pallavi.m@cgi.com. Thu, 07/28/2016 - 07:04. Reconnaissant l’importance que revêt la transparence fiscale ainsi que la complexité et la diversité des sources de financement du gouvernement fédéral des États-Unis, le Congrès américain a adopté la loi sur la responsabilité et la transparence numériques (« Digital Accountability and Transparency Act » ou

article thumbnail

White House Releases New Policy on Federal Cyber Incident Response

Hunton Privacy

On July 26, 2016, the White House unveiled Presidential Policy Directive PPD-41 (“PPD-41”), Subject: United States Cyber Incident Coordination, which sets forth principles for federal responses to cyber incidents approved by the National Security Council (“NCS”). Coming on the heels of several high-profile federal breaches, including the Office of Personnel Management’s loss of security clearance information and the hack of over 700,000 IRS accounts, PPD-41 is a component of President Obama’s Cy

article thumbnail

OCR Settles Two HIPAA Cases with Public Health Centers in Oregon and Mississippi

Hunton Privacy

On July 21, 2016, the U.S. Department of Health and Human Services’ Office for Civil Rights (“OCR”) entered into resolution agreements with two large public health centers, Oregon Health & Science University (“OHSU”) and the University of Mississippi Medical Center (“UMMC”), over alleged HIPAA violations. OHSU. Following the submission of multiple breach notification reports by OHSU in 2013, OCR investigated and found “evidence of widespread vulnerabilities within OHSU’s HIPAA compliance pro

article thumbnail

Lisa Sotto Interviewed on Privacy Piracy Radio Show

Hunton Privacy

On July 25, 2016, Lisa Sotto , partner and head of the Global Privacy and Cybersecurity practice at Hunton & Williams LLP, was interviewed on KUCI 88.9 FM radio’s Privacy Piracy show. Lisa discussed the changing regulatory landscape, information security enforcement actions, the threat actors who attack companies’ data and how to manage the aftermath of a data breach.

Privacy 40
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

The EU-U.S. Privacy Shield: A How-To Guide

Hunton Privacy

On July 12, 2016, after months of negotiations and criticism, the EU-U.S. Privacy Shield (“Privacy Shield”) was officially adopted by the European Commission and the Department of Commerce. Similar to the Safe Harbor, companies must certify their compliance with the seven principles comprising the Privacy Shield to use the Shield as a valid data transfer mechanism.

Privacy 40
article thumbnail

U.S. Department of Commerce Launches Privacy Shield Website

Hunton Privacy

On July 26, 2016, the U.S. Department of Commerce announced that it has launched a new website that provides individuals and companies with additional information regarding the EU-U.S. Privacy Shield Framework (“Privacy Shield”). Among other things, the website provides information about complying with, and self-certifying to, the Privacy Shield’s principles.

Privacy 40
article thumbnail

Advocate General Finds Member States May Not Breach EU Laws Over Electronic Communications Retention

Hunton Privacy

On July 19, 2016, Advocate General Saugmandsgaard Oe (“Advocate General”), published his Opinion on two joined cases relating to data retention requirements in the EU, C-203/15 and C-698/15. These cases were brought following the Court of Justice for the European Union’s (“CJEU’s”) decision in the Digital Rights Ireland case, which invalidated Directive 2006/24/EC on data retention.

article thumbnail

Why CGC Matters To Me

ForAllSecure

In 2008 I started as a new assistant professor at CMU. I sat down, thought hard about what I had learned from graduate school, and tried to figure out what to do next. My advisor in graduate school was Dawn Song , one of the top scholars in computer security. She would go on to win a MacArthur "Genius" Award in 2010. She's a hard act to follow. I was constantly reminded of this because, by some weird twist of fate, I was given her office when she moved from CMU to Berkeley.

Paper 40
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

WHY CGC MATTERS TO ME

ForAllSecure

In 2008 I started as a new assistant professor at CMU. I sat down, thought hard about what I had learned from graduate school, and tried to figure out what to do next. My advisor in graduate school was Dawn Song , one of the top scholars in computer security. She would go on to win a MacArthur "Genius" Award in 2010. She's a hard act to follow. I was constantly reminded of this because, by some weird twist of fate, I was given her office when she moved from CMU to Berkeley.

Paper 40
article thumbnail

European Commission Adopts Privacy Shield

Hunton Privacy

On July 12, 2016, the EU Commissioner for Justice, Consumers and Gender Equality, V?ra Jourová, and U.S. Secretary of Commerce Penny Pritzker announced the formal adoption of the EU-U.S. Privacy Shield (the “Privacy Shield”) framework, composed of an Adequacy Decision and accompanying Annexes. The Privacy Shield is designed to protect the fundamental rights of individuals whose personal data is transferred to the U.S. and ensure legal certainty for businesses with respect to transatlantic transf

Privacy 40
article thumbnail

UK Government Ends NHS Patient Database Scheme

Hunton Privacy

On July 6, 2016, the UK government decided to close its controversial care.data scheme after concerns were raised about the safeguards in place to protect individuals’ health care data and issues with patient transparency. Under the care.data scheme, all National Health Service (“NHS”) patients’ health care data was held in a central database. The NHS claimed that the program would benefit patients through improved knowledge of drug performance, greater budget efficiencies and an ability to comp