Remove Events Remove Healthcare Remove Personal data
article thumbnail

List of data breaches and cyber attacks in November 2020 – 586 million records breached

IT Governance

million) Phil i ppines COVID-19 track and trace app leaks citizens’ data (unknown) Contractor mistakenly removed data from Hong Kong’s Queen Mary Hospital (442) Cloud Clusters Inc.

article thumbnail

The Belgian Data Protection Authority Publishes Recommendation Concerning Data Processing for Direct Marketing Purposes

HL Chronicle of Data Protection

Political parties inviting their contacts to participate in political events. Keeping track of their clients’ various actions; Promoting their brand to the public; Inviting clients or prospects to events (to promote their organisation); Disseminating targeted offers to clients with a view to meet their interests; and.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

China’s First Data Protection Measures Lifting Its Veils

HL Chronicle of Data Protection

Article 2 of the draft Data Security Measures states that the provisions therein govern all sector data processing activities (including, but not limited to, data collection, retention, transfer, and processing and use), that use cyber technologies within the territory of the People’s Republic of China.

article thumbnail

Encryption – A Feasible Savior against Prevalent Privacy Issues in Business Communication

Security Affairs

Perhaps, such lack of seriousness towards cybersecurity is the reason why businesses tend to suffer loss of users’ personal data, millions of dollars in resulting damages and, eventually, the loss of reputation in the industry. Encryption plays an integral role in securing the online data as well as its integrity.

article thumbnail

Privacy and Cybersecurity Top 10 for 2018

Data Matters

The May 25, 2018 effective date for the EU’s General Data Protection Regulation (GDPR) will no doubt be a central focus of 2018. Europe’s omnibus new framework for data protection law applies to (almost) all entities that collect and process EU personal data regardless of where the data are processed.

Privacy 67
article thumbnail

The Applications of Blockchain in Data Management

AIIM

Let's take a look at what the use of blockchain can do for your data management. Data Security. Given the high number of data breaches in recent years, we all have good reason to be concerned about the misuse of our personal data. As blockchain is linear, a historical chain of events can be clearly followed.

article thumbnail

Anonymization & Pseudonymization as Tools for Cross-Border Discovery Compliance

ARMA International

Almost all cross-border documents that might be sought in litigation will contain at least some personal information. See the GDPR, Regulation (EU) 2016/679 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC [2016] OJ L119/1, 33.