All Data Privacy articles – Page 44

  • Blog

    MediaPro Launches New Adaptive Phishing Simulator

    2015-10-09T11:00:00Z

    MediaPro this week announced two new tools to support its existing Adaptive Awareness Framework: the Adaptive Phishing Simulator and the Adaptive Knowledge Assessment. Both tools are part of MediaPro’s full suite of products designed to address companies’ evolving needs toward implementing a truly integrated security awareness program. More inside.

  • Blog

    Double Trouble in Internal Investigations After Schrems

    2015-10-09T09:45:00Z

    Image: Last week another huge shift in the compliance world happened: the Schrems decision by the European Court of Justice, finding that the previously presumed European Union Safe Harbor regime is invalid. For the anti-corruption compliance practitioner, the decision is double-trouble when you consider it in light of the recent ...

  • Article

    SEC Faces New Obstacles in e-Discovery Efforts

    2015-10-06T13:15:00Z

    As the SEC ferrets out inside traders and Ponzi schemers of the Internet Age, more voices are saying the agency has too much leeway to gather electronic records against investigation targets. Congress is mulling legislation to curb SEC power to get e-mail from Internet service providers; federal judges are applying ...

  • Article

    Data Security Impasse Overturns Safe Harbor Program

    2015-10-06T12:15:00Z

    An Austrian student’s displeasure with Facebook has invalidated the longstanding trans-Atlantic Safe Harbor program for international data transfers. That complaint, originally about Facebook’s alleged cooperation in U.S. government spying, has reached the highest court and Europe and overturned 15 years of data privacy rules. Companies are left with few viable ...

  • Resource

    e-Book: The Evolving Era of Big Data

    2015-09-30T09:30:00Z Provided by

    Data has broken free from the confines of computers and mobile devices, making it hard for pretty much anyone to control what is collected, how it is aggregated, and how it can be used. To make matters worse, a new breed of connected devices is becoming a far more difficult ...

  • Blog

    ACE Introduces Global Cyber Facility

    2015-09-28T11:00:00Z

    ACE Group, a multiline property and casualty insurer, last week announced the launch of ACE’s Global Cyber Facility, which goes beyond standard risk transfer by incorporating a comprehensive risk management solution into a single policy purchase. More inside.

  • Blog

    PwC Names Privacy Innovation Strategist

    2015-09-24T12:45:00Z

    PwC, U.S., has appointed Peter Cullen as privacy innovation strategist. With over 20 years of experience in corporate governance, privacy and risk management, Cullen provides strategic leadership to organizations, helping them leverage Big Data to achieve business value. More inside.

  • Article

    Calls for More Data Sharing to Step Up Terrorism Fight

    2015-09-22T10:00:00Z

    Washington wants Corporate America to step up its attention to terrorism risk. That was the message at a recent congressional hearing, the latest instance of voices saying business and government should cooperate to uncover terrorists’ sophisticated financing schemes. “Most of the early warning signs reside with the private sector, and ...

  • Blog

    K2 Intelligence Enhances Regulatory Compliance and Cyber Defense Team

    2015-09-04T13:45:00Z

    K2 Intelligence, an investigative, compliance and cyber-defense services firm, recently appointmented two cyber-security veterans to its compliance and cyber defense team. Dana Syracuse will join the firm on Sept. 10 and Vincent D’Agostino joined on Aug. 31. More inside.

  • Article

    More Cyber-Security Guidelines for Govt Contractors

    2015-08-25T10:00:00Z

    Image: The Obama Administration is considering new cyber-security guidance that would effectively impose stringent new reporting obligations on government contractors. That means more due diligence on third parties, and a review of contract language to see who is responsible for what. “[E]verybody is going to need to get their cyber-house ...

  • Blog

    ACC Launches Information Governance Committee

    2015-08-18T11:30:00Z

    The Association of Corporate Counsel (ACC), a global legal association representing 40,000 in-house counsel in 90 countries, last week announced the launch of a new practice area committee. The ACC Information Governance Committee will foster engagement and collaboration on corporate legal departments’ role in data protection and collection, discovery procedures ...

  • Blog

    Accellion Launches Governance Package for Kiteworks

    2015-08-14T14:00:00Z

    Accellion, a provider of private cloud solutions for secure file sharing and collaboration that ensure data security and compliance, recently announced that it has added new security and governance capabilities to its kiteworks secure content platform. Accellion's kiteworks governance package is designed to assist enterprise organizations in demonstrating compliance with ...

  • Article

    CCOs Playing a Stronger Role in Data Privacy Practices

    2015-08-11T14:00:00Z

    Image: As data privacy laws proliferate, they are creating a web that traps how corporations use personal data in their operations. The challenge for compliance officers: how to play a more strategic role and ensure your business doesn’t get stuck. “The inclusion of the CCO function in defining controls related ...

  • Article

    SEC Pushes New Limits on Cyber-Security, Securities Fraud

    2015-08-11T09:15:00Z

    Another byproduct of life in the cyber-security age: The SEC is redefining insider trading to focus more on improper trading, even if you are a thief mining a company for inside information without actually working there. The misconduct—called, yes, “outsider trading”—seems to be an SEC-enforceable offense so far, and it ...

  • Article

    The Keys to Better Access Control Systems

    2015-08-04T14:30:00Z

    Image: Gone are the days when “access control” meant locking your door or filing cabinet. Now compliance, IT, and audit teams must collaborate on controls to access networks rather than physical stores of information. Inside, we look at three best practices to design strong access control and at how to ...

  • Blog

    New Mimecast Services Extend Spear-Phishing Protection

    2015-07-17T12:30:00Z

    Mimecast has announced two new measures designed to protect against spear-phishing. The first measure, Attachment Protect, and user awareness enhancements reduce the threat from malware-laden attachments and help IT teams improve employee security awareness. The second measure, Mimecast Targeted Threat Protection – URL Protect, give customers a comprehensive line of ...

  • Article

    How to Simplify Cyber-Security Controls Amid Abundant Laws

    2015-07-14T11:30:00Z

    By now every compliance officer has already heard the warning that it’s a matter of when you suffer a cyber-security breach, not if. Then comes compliance with breach disclosure rules—and those demands are becoming as perplexing as the cyber-threat itself. Overwhelmed, compliance officers are seeking ways to navigate these demands ...

  • Article

    Avoiding the Pitfalls of Data Mining

    2015-07-14T11:00:00Z

    In recent months, numerous companies have found themselves the target of legal and enforcement actions for obtaining or using personal data without consent. The kicker: Most of these actions could have been easily avoided, since most of the infractions were clear violations of contract law. “If companies simply complied with ...

  • Blog

    Akerman Launches New Data Law Practice

    2015-06-19T10:45:00Z

    Law firm Akerman this week announced the launch of its newly created Data Law Practice, and the expansion of the firm's varied services in the increasingly business critical areas of information governance, e-discovery, and data privacy and security. Details inside.

  • Article

    The Workflows You Need to Use After a Data Breach

    2015-06-09T11:00:00Z

    Compliance officers have enough scrambling to do after a data breach. Not understanding the steps to take, or not being in proper position to take them, only makes matters worse. Inside, guest columnist John Reed Stark walks through all the steps your company needs to take—including those to take before ...