data protection

International Lawyers Network Announces the Launch of Comprehensive Data Protection Guide

The International Lawyers Network is pleased to announce the release of its latest initiative, the ILN Data Protection Guide. Developed by our cybersecurity and data privacy experts, this comprehensive guide offers valuable insights into data protection regulations across multiple jurisdictions.




data protection

Online data backups - a valuable addition to your total data protection solution

About five years ago online data backup services began to emerge as an alternative method of backing up your data. The best advantage of online data backups is that they, by definition, are remote, so if a fire burns down your home you'll still have a backup to roll your data back.




data protection

General Data Protection Regulation: new ethical and constitutional aspects, along with new challenges to information law

The EU 'General Data Protection Regulation' (GDPR) marked the most important step towards reforming data privacy regulation in recent years, as it has brought about significant changes in data process in various sectors, ranging from healthcare to banking and beyond. Various concerns have been raised, and as a consequence of these, certain parts of the text of the GDPR itself have already started to become questionable due to rapid technological progress, including, for example, the use of information technology, automatisation processes and advanced algorithms in individual decision-making activities. The road to GDPR compliance by all European Union members may prove to be a long one and it is clear that only time will tell how GDPR matters will evolve and unfold. In this paper, we aim to offer a review of the practical, ethical and constitutional aspects of the new regulation and examine all the controversies that the new technology has given rise to in the course of the regulation's application.




data protection

Hybrid encryption of Fernet and initialisation vector with attribute-based encryption: a secure and flexible approach for data protection

With the continuous growth and importance of data, the need for strong data protection becomes crucial. Encryption plays a vital role in preserving the confidentiality of data, and attribute-based encryption (ABE) offers a meticulous access control system based on attributes. This study investigates the integration of Fernet encryption with initialisation vector (IV) and ABE, resulting in a hybrid encryption approach that enhances both security and flexibility. By combining the advantages of Fernet encryption and IV-based encryption, the hybrid encryption scheme establishes an effective and robust mechanism for safeguarding data. Fernet encryption, renowned for its simplicity and efficiency, provides authenticated encryption, guaranteeing both the confidentiality and integrity of the data. The incorporation of an initialisation vector (IV) introduces an element of randomness into the encryption process, thereby strengthening the overall security measures. This research paper discusses the advantages and drawbacks of the hybrid encryption of Fernet and IV with ABE.




data protection

How the renewed data protection landscape impact BPO industry

With the increased focus on data security and privacy, BPO service providers will need to restructure their data compliance plan ahead of time. This is not only to ensure that the soon-to-be-updated rules are implemented in a timely manner but also to improve customer service efficiency and increase the firm's general reputation.




data protection

Centre invokes Data Protection to tighten noose around e-pharma companies

The Drugs, Medical Devices and Cosmetics Bill, 2023, will replace the existing Drugs and Cosmetics Act of 1940.




data protection

Apple expands Advanced Data Protection option globally

Beginning with iOS 16.3, the security feature will allow users to enable end-to-end encryption for a variety of additional iCloud data categories, including Photos, Notes, Voice Memos, Messages backups, device backups, and more, reports MacRumors.




data protection

Cybersecurity and Privacy Data Protection Solutions Build Your Own Cyber University

Educate your customers and partners on the real threats and real solutions to help them be cybersmart to be cybersafe with your own corporate university.




data protection

Marquis Who's Who Honors Matthew O. Keane for Expertise in Data Protection and Security

Matthew O. Keane is a leading expert in the technology sector as a principal client solutions architect at AHEAD




data protection

Centris Expands Offerings with Outsourced Data Protection Officer (DPO) Services for North American Businesses

Centris, a leading provider of innovative data protection solutions, proudly announces the launch of its Outsourced Data Protection Officer (DPO) services tailored specifically for North American businesses.




data protection

Centris Launches GDPR Data Protection Officer Outsourcing Services for North American Businesses

Centris is excited to announce the launch of its GDPR Data Protection Officer (DPO) outsourcing services, now available to North American businesses at fixed fees.




data protection

Centris Introduces Data Protection Officer Outsourcing Services to Enhance GDPR Compliance

Centris, a premier consulting firm specializing in compliance and regulatory solutions, is excited to announce the launch of its Data Protection Officer (DPO) Outsourcing Services.




data protection

Data Protection for Multinational Employers: Frameworks, Artificial Intelligence and More




data protection

New Year, New Data Protection Laws: What Employers Should Know

  • Fourteen states have adopted comprehensive data protection laws, most of which will take effect within the next two years.
  • Of these laws, only the California Privacy Rights Act applies to HR data.
  • Nevertheless, employment counsel and HR professionals will be involved in assisting their organizations to comply with the broad range of responsibilities these laws impose.
  • States are also proposing and enacting smaller laws applicable to HR data.




data protection

Brazil Data Protection Law – Litigation in the Context of Employment

  • Employers operating in Brazil will likely see an uptick in litigation involving claims filed under the country’s Data Protection Law (LGPD).
  • The Brazilian National Data Protection Agency, the entity charged with enforcing the LGPD, recently issued new guidance on this law.

The Brazilian Data Protection Law (LGPD) in effect since 2020 is starting to show its effects in the litigation landscape.




data protection

Developing a Global Data Protection Framework for Artificial Intelligence in the Workplace

  • Despite the broad range of artificial intelligence technologies and the flurry of new laws regulating them, virtually all laws regulating how these technologies process data follow the same basic framework.
  • This means employers can follow a relatively straightforward checklist around the world to work through the major data protection issues.
  • This Insight walks through the checklist and identifies significant variations between regions and countries.




data protection

A Comprehensive Global Guide for AI Data Protection in the Workplace

Zoe Argento, Kwabena Appenteng, Alyssa Daniels, Philip Gordon, Rajko Herrmann, Soowon Hong, Renata Neeser, Naomi Seddon, Christina Stogov and Grace Yang share a comprehensive guide for how employers can ensure data protection as they implement artificial intelligence.

Corporate Compliance Insights

View




data protection

Maintaining Data Protection Controls

Many data protection regulations, such as PCI DSS and HIPAA, levy heavy fines for data breaches of sensitive information. Effective data protection controls are necessary to avoid breaches of regulatory, statutory, or contractual obligations related to sensitive data.

Organizations that handle sensitive data, such as healthcare and credit card information, are required to audit data protection controls on an annual basis. Leveraging Tenable reports enables organizations to protect data in accordance with business risk posture for Confidentiality, Integrity and Availability (CIA).

The National Institute of Standards (NIST) Special Publication 800-53 provides comprehensive guidance for a secure infrastructure, including guidance on data protection and encryption. The information provided in Tenable dashboards and reports enables Risk Managers and Chief Privacy Officers to demonstrate to third parties and regulatory bodies that sensitive data is protected in accordance with Data Loss Prevention requirements.

The NIST Cybersecurity Framework (CSF) is a control framework, which has high level controls that align with
ISO 27001, NIST SP 800-53, and others. The Cybersecurity Framework’s prioritized, flexible, and cost-effective approach helps to promote the protection and resilience of critical infrastructure and other sectors important to the economy and national security. Many regulating bodies accept evidence documentation of compliance with the NIST CSF as assurance that the organization has effective controls in place to meet their security requirements. The HIPAA Security Rule Crosswalk to NIST Cybersecurity Framework is an example of a regulation aligning with NIST.

The report is available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, assurance report cards and assets. The report is located in the Tenable.sc Feed under the category Threat Detection & Vulnerability Assessments.

The report requirements are:

Tenable.sc 5.9.0
Nessus 10.2.0

Leveraging Tenable reports enables operations teams to verify that appropriate protections are in place for data at rest, data in transit, and removable media. Security leaders need to SEE everything, PREDICT what matters most and ACT to address cyber risk and effectively align cybersecurity initiatives with business objectives.

Chapters

Executive Summary: This chapter provides a summary view on the state of protections controls relating to Certificates, Encryption, and Confidentiality and Protected Information.

Data Protection Details – This chapter provides details on the state of protection controls in the environment for Certificates, Encryption, and Confidentiality and Protected Information, which are described below.

  • Certificates – This section displays findings for hosts with expired certificates, certificates that are expiring soon, untrusted certificates and self-signed certificates.  Expired certificates and other certificate problems cause a denial of service, man-in-the-middle, and trust-related concerns for organizations.  
  • SSL/TLS Vulnerability Summary – This section provides an overview of systems and vulnerabilities related to SSL/TLS.  The SSL/TLS Vulnerabilities by Type element displays a count of systems and vulnerabilities related to SSLv2 and SSLv3 in the first two rows. From the third row down, information is provided on all the systems running any version of TLSv1 and higher.
  • Encryption – This section provides an overview of systems and vulnerabilities related to SSL/TLS and Encryption/Cryptographic Compliance. Information presented in this section highlights issues such as weak hashing algorithms and keys as well as the use of insecure encryption ciphers. Many of these issues are the result of misconfigurations or use of outdated encryption methods. This detailed information also highlights vulnerabilities that can be exploited by attackers. Tenable recommends that security teams review the data to determine the risk to the organization.
  • Confidentiality of Protected Information – This section provides an overview of systems and vulnerabilities related to Security Requirement 3.13.16 in the NIST Special Publication 800-171. Revision 2 provides guidance to protect the confidentiality of Controlled Unclassified Information (CUI) at rest and maps to Security Control SC-28 of NIST Special Publication 800-53.  
  • File Content Audit Results – The following section displays File Content Audit Results. The first two rows of the File Contents Audit Results Compliance Checks provide the total count of Passed checks, Failed checks, and checks requiring a manual review. The first row, ‘Check Count’, provides a count of the current checks per check status. The second row, ‘Check Ratio’, provides a ratio view of check status. The three columns together total 100%. The last two rows provide a system count analysis. The third row, ‘System Count’, provides the number of systems with at least one audit check in the applicable state. The last row, ‘System Ratio’, provides a percentage of systems with at least one audit check in the applicable state.




data protection

Artificial Intelligence & data protection in Singapore

Data has emerged as the most important driver for modern economic development. New industries have arisen from the use of data with personal information as the core asset, while many traditional models of business are ‘disrupted’ or drastically transformed. Artificial Intelligence (A.I.) has also become an integral tool for the management and processing of data, including personal data, as it provides greater accuracy and capability. How should the use of A.I. in data management be regulated and should it be treated any differently under the data protection regime? What role can A.I. play in regulating the use of personal data and as a cybersecurity tool? Is creating a form of propertisation of personal data and ‘data ownership’ useful? These are just some of the lingering questions that regulators and organisations are currently grappling with. Central to the issue is how A.I. can best serve and safeguard humanity’s interests. Warren Chik is Associate Professor of Law at SMU School of Law, and concurrently Deputy Director at SMU’s Centre for AI and Data Governance. In this podcast, he shares his recent research into Artificial Intelligence and Data Protection in Singapore, which takes a deeper look into consumers’ trust, organisational security and government regulation.




data protection

West Africa: Nigeria Advocates Robust Data Protection

[Daily Trust] The federal government has stressed the importance of robust personal data protection to prevent cybercrimes and foster trust.




data protection

Dutch data protection authority fines TikTok €750,000 over privacy flaw

Dutch data protection authority fines TikTok €750,000 over privacy flaw




data protection

Ireland fines WhatsApp €225m for breaking EU data protection rules

Ireland fines WhatsApp €225m for breaking EU data protection rules




data protection

UK revives plan to reform data protection rules with an eye on boosting the economy

A new data bill from the U.K. Department for Science, Innovation and Technology (DSIT) aims to revive several measures that failed to pass under the prior government, while rowing back on some controversial post-Brexit reforms proposed by conservative ministers. The government reckons the “Data (Use and Access) Bill” (DUA) stands to boost the U.K. economy […]

© 2024 TechCrunch. All rights reserved. For personal use only.



  • Privacy
  • Government & Policy
  • uk data reform
  • uk data use and access bill
  • UK GDPR reform
  • data privacy

data protection

The future of HR Management: at the intersection of AI and personal data protection

Recent years have seen an outburst of interest in artificial intelligence. Technologies based on AI have attracted investors all over the world on an unprecedented scale. More and more smart services are becoming a reality. For example, Staples is u...




data protection

HR e-briefing 484 - Data protection: ICO flexes muscles with first use of new fines power

The ICO has announced its first use of its recent power to issue fines or monetary penalties for serious breaches of the data protection legislation. The power became effective in April 2010 (see Full Article



data protection

Tough new fines for breach of data protection law

The Criminal Justice and Immigration Act, which received royal assent on 8 May 2008, introduces a new section into the Act allowing the IC to impose a fine where there has been a serious breach of the eight data protection 'principles' set out in th...




data protection

Systems and methods for variable redundancy data protection

The present inventions are related to systems and methods for data processing, and more particularly to systems and methods for variable rate coding in a data processing system.




data protection

LawArXiv Papers | Analysis of the NHSX Contact Tracing App ‘Isle of Wight’ Data Protection Impact Assessment

This note examines the published data protection impact assessment (DPIA) released by NHSX in relation to their contact tracing/proximity tracing app. It highlights a range of significant issues which leave the app falling short of data protection legislation. It does this in order so that these issues can be remedied before the next DPIA is published.




data protection

IBM Mainframe Ushers in New Era of Data Protection

IBM today shipped the first of its breakthrough IBM Z mainframe from its factory in Poughkeepsie, NY. The IBM Z is the world's most powerful and secure transaction system capable of running more than 12 billion encrypted transactions per day - equivalent to 400 Cyber Mondays.




data protection

IBM Launches New Storage Software to Simplify Data Protection

IBM today announced a new data protection software that is easy to set up, easy to manage and helps simplify data recovery. IBM Spectrum Protect™Plus can be set up quickly making data protection available in as little as one hour.








data protection

IHC HR e-briefing 131 - Data protection: ICO flexes muscles with first use of new fines power

The ICO has announced its first use of its recent power to issue fines or monetary penalties for serious breaches of the data protection legislation. The power became effective in April 2010 (see Full Article



data protection

Changes on the horizon in 2020: China and Hong Kong’s proposed reforms to data protection, cyber security and Internet content regulation

2020 looks set to be a significant year for privacy, cyber security and Internet content reforms in China and Hong Kong. On 20 December 2019, the Cyberspace Administration of China released the “Regulation on Governance of Internet Information...




data protection

Six reasons to care about Brazil’s new data protection law

...




data protection

Irish Data Protection Commissioner (DPC) issues guidance on CCTV for controllers

The DPC has published useful guidance on CCTV usage for controllers. The guidance is intended to assist owners and occupiers of premises to understand their responsibilities and obligations regarding data protection when using CCTV. This is particul...




data protection

German data protection authorities agree on calculation model for GDPR fines

While fines recently imposed by the French and UK data protection supervisory authorities have been high, the supervisory authorities in Germany have so far imposed rather moderate penalties. This could now be changed by a new model for calculating ...




data protection

Floodgates open on class actions in data protection

Court of appeal overturns High Court judgment in Lloyd v Google LLC [2019] EWCA Civ 1599 Court of Appeal judgment The Court of Appeal has given the go-ahead for a representative claim to be served on Google LLC in the U.S. for alleged data breaches,...




data protection

Speed read: Useful November 2019 guidelines on controller, processor and joint controllership concepts from the European Data Protection Supervisor

Summary On 7 November 2019 the EDPS issued guidance on how to determine who is a controller, processor and joint controller. The EDPS is an independent supervisory authority whose primary objective is to ensure EU institutions and bodies respect the...




data protection

Coronavirus – Data Protection considerations for alternative communication platforms – Global

How does the communication within a team take place in the home office? Due to the increasing intensity of preventive measures against the spread of corona, more and more companies are closing down their locations and, where possible, relocating bus...




data protection

No cookie consent walls — and no, scrolling isn’t consent, says EU data protection body

You can’t make access to your website’s content dependent on a visitor agreeing that you can process their data — aka a ‘consent cookie wall’. Not if you need to be compliant with European data protection law. That’s the unambiguous message from the European Data Protection Board (EDPB), which has published updated guidelines on the […]




data protection

Data protection and Facebook : an empirical analysis of the role of consent in social networks / by Patricia Rogosch and Erik Hohl

Rogosch, Patricia