article thumbnail

[Podcast] A User's View of GDPR

AIIM

It's hard to believe it has been just about 3 months since the General Data Protection Regulation (GDPR) went into effect on May 25th, 2018. To help organizations prepare, there's no shortage of valuable GDPR resources available all over the internet. Click here to access our full library of episodes. What advice do they have?

GDPR 106
article thumbnail

GDPR Compliance Obligations: The relationship between Data Controllers and Third-Party Processors

AIIM

You might also be interested in: The Re-Permissioning Dilemma Under GDPR. Data Privacy and Open Data: Secondary Uses under GDPR. Three Critical Steps for GDPR Compliance. GDPR and Cross Border Data Flows between the EU and the US: Current State of the Law. What Do the GDPR and new Privacy Laws Mean for U.S.

GDPR 123
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Missing the GDPR deadline of May 2018: And then what?

Data Protector

As May 2018 looms, I’m aware of a growing number of companies that are seeking help with their GDPR compliance obligations. Many (me included) have been sent a stream of emails from self-styled “GDPR experts” containing dire warnings of ginormous fines for non-compliance. But enough of these GDPR ambulance chasers.

GDPR 120
article thumbnail

[Podcast] A User's View of GDPR

AIIM

It's hard to believe it has been just about 3 months since the General Data Protection Regulation (GDPR) went into effect on May 25th, 2018. To help organizations prepare, there's no shortage of valuable GDPR resources available all over the internet. Click here to access our full library of episodes. What advice do they have?

GDPR 80
article thumbnail

Security Affairs newsletter Round 222 – News of the week

Security Affairs

Backdoor mechanism found in Ruby strong_password library. UK ICO fines British Airways £183 Million under GDPR over 2018 security breach. Prototype Pollution flaw discovered in all versions of Lodash Library. Cyberattack shuts down La Porte County government systems. Hackers are poisoning the PGP SKS keyserver network poisoned.

Security 183
article thumbnail

Serpent backdoor targets French entities with high-evasive attack chain

Security Affairs

The phishing messages uses a weaponized Microsoft Word document masquerading as information relating to the “règlement général sur la protection des données (RGPD)” or the European Union’s General Data Protection Regulations (GDPR). Upon enabling the macro in the bait document, it fetches an image from a remote URL (e.g.

Libraries 250
article thumbnail

[Podcast] Exploring The Challenges of the Modern Business Ecosystem

AIIM

With stricter regulations like GDPR, CCPA, and more, what's the best way to make sure your business is clear of the data breach headlines? Click here to access our full library of episodes. How do you discover what you have and how to classify it? How do we address these new challenges? Want more episodes like this?

Libraries 161