T he ICIC is the Â International Conference of Information Commissioners. The Conference was first held in 2003 when Information Commissioners and Ombudsmen met for the first time in Berlin to adopt a declaration for further cooperation and experience sharing among regulatory authorities charged with overseeing the access to public information.
My advice (Disclaimer: I'm not a lawyer) is to use GDPR as your baseline privacy framework then manage the gaps for tricksy places like California...: Companies that do business in California know that it is a magnet for class action litigation. The California Consumer Privacy Act ("CCPA"), a new privacy law that applies to data collected about California residents, will provide even more incentive to plaintiff’s attorneys to bring suit in California. The CCPA was enacte
When Porter wrote about the Competitive Advantage of Nations, GDPR et al weren't even a twinkle in the eye of regulators. There's good reason for nations and organisations to take privacy seriously...: If China doesn't step up its efforts on issues such as data privacy and intellectual property protection, the country could lose out on a 37 trillion yuan ($5.5 trillion) growth opportunity in the decade ahead, according to new analysis. Based on research from economics con
Think before you 'git commit && git push'...: A scan of billions of files from 13 percent of all GitHub public repositories over a period of six months has revealed that over 100,000 repos have leaked API tokens and cryptographic keys, with thousands of new repositories leaking new secrets on a daily basis. The scan was the object of academic research carried out by a team from the North Carolina State University (NCSU), and the study's results have been shared wi
This puts the challenges for security researchers in perspective as the planet shifts to IPv6...: [...] Time for a little math. The IPv6 Internet has 2^128 addresses, or 3.4 times 10^38 — an astronomical number. (For comparison, astronomers estimate that there are 2 times 10^23 stars in the universe, which means there are a million billion times more IPv6 addresses than stars.) If it took a single second to scan the entire IPv4 address space, it would take 25 billion bill...
We should all know by now that "Risk = likelihood x impact". Given the likelihood that someone will attempt to exploit these vulnerabilities in your network it's worth checking if an attack against one of these top ten would work against you...: Security vulnerabilities in Microsoft software have become an even more popular means of attack by cyber criminals - but an Adobe Flash vulnerability still ranks as the second most used exploit by hacking groups. Analysis by rese
Professional services firms struggle to justify internal spend that can't be billed out to a client. I seems that GCs suffer from the same problem...: According a new survey from Clyde & Co and Winmark, the number one reason that General Counsel (GCs) struggle with legal tech adoption and implementation is "difficulty in getting budget". But, don't blame the board for that.... By: CloudNine
This is why we will continue to see random ware attacks. Crime does pay... Cities and towns continue to be a profitable target for successful ransomware attacks. As we previously reported, the list of cities and towns getting hit with ransomware attacks continues to grow.... By: Robinson+Cole Data Privacy + Security Insider