October, 2015

article thumbnail

Written First On Medium. Discuss.

John Battelle's Searchblog

The post Written First On Medium. Discuss. appeared first on John Battelle's Search Blog. Image Credit Arch Cape Inn. So I had a thought about the state of the publishing world, specifically that part of it that we’d call blogging(1). And it struck me. Why haven’t we made our own Medium? No, wait, that doesn’t quite sound right. Medium is awesome, and in fact I am writing this post in ( on ?!

article thumbnail

NIST Releases Final Report on De-Identification of Personal Information

Hunton Privacy

The National Institute of Standards and Technology (“NIST”) recently released the final draft of its report entitled De-Identification of Personal Information. The report stems from a review conducted by NIST of various de-identification techniques for removal of personal information from computerized documents. While de-identification techniques are widely used, there is concern that existing techniques are insufficient to protect personal privacy because certain remaining information can make

Privacy 75
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Surviving the eye of the enterprise hype storm

Collaboration 2.0

At the height of conference season it can seem the hi-tech 'tail' is wagging the customer 'dog', despite increasingly sophisticated business needs. As some businesses transform to bring software in house to meet strategic needs, some hi-tech marketing rhetoric stretches reality and credibility.

article thumbnail

Introducing AIIM: The Global Community of Information Professionals

JKevinParker

It is no secret that I love AIIM International. I owe a lot to AIIM for my professional development, industry knowledge, and the wonderful network within our industry. I only wish I had learned about AIIM much sooner than I did! So, this post is a very quick introduction to some of the value I see that AIIM offers. Please share it with anyone you think can benefit from AIIM Professional Membership.

ECM 64
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

DB2 for z/OS: DDF and Accounting Trace Records

Robert's Db2

I recently encountered a situation that served to illuminate a number of important aspects of application processing in the context of the DB2 for z/OS distributed data facility (DDF). I'll go through the scenario here, in hopes that you will find the information to be useful. A systems programmer contacted me about a problem his organization had run into with a new application that accesses DB2 for z/OS by way of a network connection (and so uses DDF).

Access 59

More Trending

article thumbnail

Maker, Soylent, Hyperloop, USC: The Places I’ll Visit In LA Next Month

John Battelle's Searchblog

The post Maker, Soylent, Hyperloop, USC: The Places I’ll Visit In LA Next Month appeared first on John Battelle's Search Blog. (cross posted from NewCo ). Picking a schedule for a NewCo festival is an art – it takes a lot more time and thought than your average event. But it’s also fun – each session and company description has been highly curated, and I learn a lot simply by reading through the diversity of experiences that are on offer.

IT 76
article thumbnail

Article 29 Working Party Issues Statement on Consequences of Safe Harbor Ruling

Hunton Privacy

On October 16, 2015, the Article 29 Working Party (the “Working Party”) issued a statement on the consequences of the recent ruling of the Court of Justice of the European Union (the “CJEU”) invalidating the European Commission’s Safe Harbor Decision. In its statement, the Working Party called upon the EU Member States and EU institutions to open discussions with U.S. authorities in order to find political, legal and technical solutions enabling transfers to the U.S. that respect EU citizens’ fu

article thumbnail

Surviving the eye of the enterprise hype storm

Collaboration 2.0

At the height of conference season it can seem the hi-tech 'tail' is wagging the customer 'dog', despite increasingly sophisticated business needs. As some businesses transform to bring software in house to meet strategic needs, some hi-tech marketing rhetoric stretches reality and credibility.

article thumbnail

Finally! A Way to Make SharePoint Useful

JKevinParker

On 8/26/2015, I was the featured speaker for an AIIM Webinar on SharePoint and how to make it useful. View the presentation recording at the AIIM site , or browse the slides below. Finally! A Way to Make SharePoint Useful from AIIM Webinar Description According to a recent AIIM survey, 37% of SharePoint users have failed to achieve their original expectations for the platform.

Cloud 45
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

DB2 for z/OS: Getting a Handle on a CPU-Constrained Environment

Robert's Db2

z/OS systems are famous for their reliability, and part of that story is the ability of z/OS to accommodate surges of application activity: you can pile more and more work onto a z/OS system, and it will keep on trucking, slicing the "pie" of available processing capacity into smaller and smaller slices to keep a workload moving along. That's highly preferable to failing as a result of being overloaded, but there is a point at which applications running on a z/OS system will perform in a sub-opt

IT 48
article thumbnail

Security in the finance sector: Whose role is it anyway?

CGI

Security in the finance sector: Whose role is it anyway? Anonymous. Mon, 10/26/2015 - 01:33. Despite increasing regulations across the finance sector globally, fraud and associated risks continue to increase—and at a staggering pace. Thomson Reuters was recently quoted as saying, “Increased regulation isn’t just a temporary challenge for global financial institutions—it’s the new reality.”.

IT 40
article thumbnail

Safe Harbor: A29 Statement Released on “What’s Next?”

Privacy and Cybersecurity Law

The Article 29 Working Party has, today, published its Statement following the Safe Harbor decision last week. It’s been confirmed […].

IT 40
article thumbnail

EU Commissioner Announces Further Guidance on the Impact of the Safe Harbor Ruling and an Agreement “In Principle” on a New Safe Harbor Framework

Hunton Privacy

On Monday, October 26, 2015, EU Commissioner for Justice, Consumers and Gender Equality, V?ra Jourová, gave a speech before the European Parliament’s Committee on Civil Liberties, Justice and Home Affairs (“LIBE Committee”) on the recent ruling by the Court of Justice of the European Union (the “CJEU”) that invalidated the European Commission’s Safe Harbor Decision.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Senate Passes Cybersecurity Information Sharing Act

Hunton Privacy

On October 27, 2015, the U.S. Senate passed S.754 – Cybersecurity Information Sharing Act of 2015 (“CISA”) by a vote of 74 to 21. CISA is intended to facilitate and encourage the sharing of Internet traffic information between and among companies and the federal government to prevent cyber attacks, by giving companies legal immunity from antitrust and privacy lawsuits.

article thumbnail

CJEU Declares the Commission’s U.S. Safe Harbor Decision Invalid

Hunton Privacy

On October 6, 2015, the Court of Justice of the European Union (the “CJEU”) issued its judgment in the Schrems v. Facebook case, following the Opinion of the Advocate General published on September 23, 2015. In its judgment, the CJEU concluded that: The national data protection authorities (“DPAs”) have the power to investigate and suspend international data transfers even where the European Commission (the “Commission”) has adopted a decision finding that a third country affords an adequate lev

article thumbnail

FCC Cites Lyft Inc. and First National Bank Corp. for TCPA Violations

Hunton Privacy

On September 11, 2015, the Federal Communications Commission (“FCC”) announced that Lyft Inc. (“Lyft”) and First National Bank Corporation (“FNB”) violated the Telephone Consumer Protection Act (“TCPA”) by forcing their users to consent to receive automated text messages as a condition of using their services. The FCC warned that these violations could result in fines if they continue.

article thumbnail

German Parliament Adopts Data Retention Law with Localization Requirement

Hunton Privacy

On October 16, 2015, the German Parliament adopted a new data retention law requiring telecommunications operators and Internet service providers to retain customer Internet and phone usage data, including phone numbers, call times, IP addresses, and the international identifiers of mobile users (if applicable) for 10 weeks. The law requires user location data obtained in connection with mobile phone services to be retained for four weeks.

IT 45
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

German DPA Issues Position Paper on Data Transfer Mechanisms in Light of CJEU Safe Harbor Decision

Hunton Privacy

On October 14, 2015, the data protection authority (“DPA”) in the German state of Schleswig-Holstein ( Unabhängiges Landeszentrum für Datenschutz ) issued a position paper (the “Position Paper”) on the Safe Harbor Decision of the Court of Justice of the European Union (the “CJEU”). In the Position Paper, the DPA disagrees with the European Commission’s (the “Commission’s”) opinion that alternative data transfer mechanisms may be used in place of Safe Harbor.

Paper 45
article thumbnail

UK Deputy Information Commissioner on Safe Harbor: “Don’t Panic”

Hunton Privacy

On October 27, 2015, David Smith, the UK Deputy Commissioner of the Information Commissioner’s Office (“ICO”), published a blog post commenting on the ongoing Safe Harbor compliance debate in light of the Schrems v. Facebook decision of the Court of Justice of the European Union. His key message to organizations was, “Don’t panic.”. After engaging in a brief analysis of the implications of the decision, David Smith asked, “Where does this leave businesses that are using the Safe Harbor?

article thumbnail

Secure Your Computer and Avoid Pop-up Scams

JKevinParker

If you get a pop-up while surfing the Web that claims you have a virus or a trojan horse or other security issue, don't believe it, don't call the number, and don't click any links or even their "OK" button. Just close your browser (and all open programs) and run your computer's security scan. I just ran across a pop-up with a toll-free number and a message of doom and gloom in both text and audio, urging me to call their tech support line to get my computer fixed.

article thumbnail

German DPAs Issue Joint Position Paper on Alternatives to Safe Harbor

Hunton Privacy

On October 26, 2015, the German federal and state data protection authorities (the “German DPAs”) published a joint position paper on Safe Harbor and potential alternatives for transfers of data to the U.S. (the “Position Paper”). The Position Paper follows the Court of Justice of the European Union’s (the “CJEU’s”) ruling on Safe Harbor and contains 14 statements regarding the ruling, including the following key highlights: In light of the Safe Harbor Decision of the CJEU, the German DPAs call

Paper 40
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Federal Court: Attorney-Client Privilege and Work-Product Doctrine Upheld for Materials Associated with Internal Data Breach Investigation

Hunton Privacy

On October 23, 2015, the United States District Court for the District of Minnesota, in large part, upheld Target’s assertion of the attorney-client privilege and work-product protections for information associated with a privileged, internal investigation of Target’s 2013 data breach. The plaintiffs contended that the challenged information was not protected by the attorney-client privilege or the work-product doctrine because “Target would have had to investigate and fix the data breach regard

article thumbnail

Putative Data Breach Class Action Against Uber Dismissed Without Prejudice

Hunton Privacy

The United States District Court for the Northern District of California recently dismissed?without prejudice?a former Uber driver’s class action complaint. The driver, Sasha Antman, was one of roughly 50,000 drivers whose personal information was exposed during a May 2014 data breach. Uber contended the accessed files contained only the affected individuals’ names and drivers’ license numbers.

article thumbnail

Irish Data Protection Authority to Investigate Facebook’s Data Transfers

Hunton Privacy

On October 20, 2015, at a hearing in the Irish High Court, Irish Data Protection Commissioner Helen Dixon confirmed that she will investigate allegations made by privacy activist Max Schrems concerning Facebook’s transfer of personal data to the U.S. in reliance on Safe Harbor. Dixon welcomed the ruling of the High Court and noted that she would proceed to “investigate the substance of the complaint with all due diligence.” In 2013, Schrems complained to the Irish Data Protection Commissio

article thumbnail

CIPL Supports Theme of “Privacy Bridges” at 37th International Privacy Conference in Amsterdam

Hunton Privacy

On October 27, 2015, Hunton & Williams LLP’s Centre for Information Policy Leadership (“CIPL”) will conduct a joint workshop with Nymity on Bridging Disparate Privacy Regimes through Organizational Accountability. As a side event to the 37th International Privacy Conference in Amsterdam during the week of October 26, the workshop is specifically designed to support and further explore the theme of global “ Privacy Bridges ” that will be discussed at the International Privacy Conference.

Privacy 40
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

FTC Advertising Practices Division Chief of Staff Phyllis Marcus Joins Hunton

Hunton Privacy

Hunton & Williams welcomes Phyllis H. Marcus as counsel to the firm’s privacy and competition teams. Phyllis joins the firm from the Federal Trade Commission, where she held a number of leadership positions, most recently as Chief of Staff of the Division of Advertising Practices. Phyllis led the FTC’s children’s online privacy program, including bringing a number of enforcement actions and overhauling the Children’s Online Privacy Protection Act (“COPPA”) Rule.

Privacy 40
article thumbnail

California Passes New Digital Privacy Law

Hunton Privacy

On October 8, 2015, California Governor Jerry Brown signed into law the California Electronic Communications Privacy Act (“CalECPA”). The law requires police to obtain a warrant before accessing an individual’s private electronic information, such as text messages, emails, GPS data and online documents that are stored in the cloud and on smartphones, tablets, computers and other digital devices.

article thumbnail

EU and U.S. Privacy Expert Group Releases “Privacy Bridges” Report

Hunton Privacy

On October 21, 2015, the EU-U.S. Privacy Bridge Initiative, a group of transatlantic privacy experts that was convened in April of 2014 , released its report on Privacy Bridges – EU and US Privacy Experts in Search of Transatlantic Privacy Solutions. The group of 19 data protection expert members included President of Hunton & Williams LLP’s Centre for Information Policy Leadership (“CIPL”) Bojana Bellamy and CIPL’s Senior Policy Advisor Fred H.

Privacy 40