The National Institute of Standards and Technology (NIST) has just released version 1.0 of the NIST Privacy Framework; a new tool centered around managing privacy risk. In addition to covering general best practices and strategies for organizational data control, risk management & compliance the publication also highlights the the relationship between the Privacy Framework with NIST’s Cybersecurity Framework.
A data breach occurs when there is an intentional or unintentional release of secure or private/confidential information to an untrusted environment. Data breaches can come in a plethora of forms, most commonly: ransomware, malware, phishing, denial of service & physical theft.
Here are five upcoming events in the legal industry to consider if you are looking to expand your industry knowledge, learn about emerging trends and connect with legal thought leaders.
Technology is connecting our lives like never before due to countless Wi-Fi enabled gadgets and thousands of mobile applications. The Internet of Things (IoT) is the ever-increasing network of devices that have their own IP address; think about your phone, smartwatch, GPS, tablets, Google Glass etc. Devices that were once standalone such as the thermostat, vehicle sensors, medical implants, alarm systems, and garage doors can now all be networked to the internet.
The BIPA guards against the unlawful collection and storing of biometric information.
The California Consumer Privacy Act (CCPA) gives customers extensive new rights protecting their personal information. Under the new regulations business will need to publicly disclose their data sharing and privacy practices and give them the option to have their data cleared. One goal of this is to clear away unsolicited marketing and allow consumers the…
Optical Character Recognition (OCR) is technology that aids in converting paper based documents, images and large volume repositories into electronically searchable and archival data. OCR can work with both hard copy data and digital information helping reviewers and teams boost visibility and control over their data.
Dark Data is all of the “non conventional” sources for data that are commonly overlooked in discovery. Dark data can be unstructured and a lot of the time can be a daunting unstructured repository of information assets. These types of data are similar to big data and are also a part of the bigger whole…
ISO/IEC 27701 is an extention to the existing ISO/IEC security standards 27001 and 27002. ISO/IEC 27001 specifies a management system that is intended to bring information security under management control and gives specific requirements.