Segui le novità via Telegram privacy, solo notizie selezionate. Segnala anche tu (livechat)

Use Cases and Requirements for Decentralized Identifiers · 2022-08-02 09:01 estimated reading time: 61 min Use Cases and Requirements for Decentralized Identifiers The need for globally unique identifier schemes has been addressed many times. Globally unique ID schemes typically rely on a central authority controlling a 'root' space that is then delegated to lo
Eternit Italia: chiavetta Usb vuota, salta sentenza Torino · 2022-07-14 17:19 estimated reading time: 1 min Prospettive svizzere in 10 lingueAccedi Profilo utente Famigliari delle vittime ad uno dei processi in Italia all'imprenditore svizzero Stephan Schmidheiny sulla vicenda Eternit (foto d'archivio del 2015) KEYSTONE/EPA ANSA/ALESSANDRO DI MARCO sda-atsQues
EDPO (European Data Protection Office) on LinkedIn: Hotel giant Marriott confirms yet another data breach · 2022-07-08 17:09 estimated reading time: < 1 min LinkedIn respects your privacyLinkedIn and 3rd parties use essential and non-essential cookies to provide, secure, analyze and improve our Services, and to show you relevant ads (including professional and job ads) on and off LinkedIn. Learn more in ou
CHM Live | The Great Hack · 2022-07-04 06:01 estimated reading time: 2 min CHM Live | The Great Hack - Invidious Watch on YouTube(Embed)Switch Invidious InstanceEmbed LinkShow annotationsDownload as: 132,012936Genre: Science & TechnologyFamily friendly? YesWilson score: 0.9959Engagement: 0.709% Computer History Museum [Record
Privacy KPIs for Financial Services Companies | RadarFirst · 2022-06-30 08:30 estimated reading time: 5 min Highlights:A guide to privacy benchmarking for C-suite Actionable KPIs to improve incident response Free fill-in-the-blank benchmarking infographic Read more below.Benchmark and Improve Incident Response PlanningCredit card numbers, bank account information
Ransomware and data protection compliance · 2022-06-28 23:29 estimated reading time: 20 min At a glancePersonal data breaches from the ICO’s caseload during 2020/2021 have seen a steady increase in the number and severity caused by ransomware. This is a type of malicious software or “malware” designed to block access to computer systems, an
13 steps to follow to comply with the GDPR rules ICPTE · 2022-06-25 00:58 estimated reading time: 4 min The GDPR Regulation (Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 9
ICCL report on the scale of Real Time Bidding data broadcasts in the U.S. and Europe · 2022-05-17 06:45 estimated reading time: 1 min The Biggestdata breachThe Biggestdata breachICCL report on the scale of Real-Time Bidding data broadcasts in the U.S. and Europe16 May 2022: Real-Time Bidding (RTB) is $117+ billion industry that operates behind the scenes on websites and apps. It tracks wh
Europeans' data shared 376 times daily in advertising sales, report says · 2022-05-17 06:43 estimated reading time: 2 min Image source, GettyData about every internet user is shared hundreds of times each day as companies bid for online advertising slots, a report suggests.The study, by the Irish Council for Civil Liberties (ICCL), found that the average European user's data i
Colpita da ransomware ABI, Associazione Bancaria Italiana (in)sicurezza digitale · 2022-04-29 15:46 estimated reading time: 4 min Attaccata Associazione Bancaria Italiana (ABI), da ransomware Vice Society, i dati rubati sono online e diventano pubblici foto, dati personali ed economici dei dipendentiIl gruppo ransomware Vice Society ha preso di mira, colpito e portato a segno un attac
Blockchain (III): Smart Contracts and personal data | AEPD · 2022-04-21 13:43 estimated reading time: 6 min Smart contracts are one of the most widely used and well-known applications of the blockchain along with cryptocurrencies. Despite its name, a smart contract is nothing more than a program (an algorithm) that is stored on the  nodes of a blockchain and tha
Software development with Data Protection by Design and by Default · 2022-03-25 09:31:51+0 estimated reading time: 3 min These guidelines are primary intended for developers, software architects, project managers, testers, data protection officers and security advisors. Everybody who develops and contributes to the development of software containing or processing personal dat
Administrative fine to the Swedish Customs for deficient routines controlling worker&#039;s cloud against instructions · 2022-03-20 09:13:59+0 estimated reading time: 1 min The Swedish Authority for Privacy Protection (IMY) has investigated a personal data breach within the Swedish Customs and notes that the agency has had deficient routines and insufficient technical barriers, which has led to data from criminal investigation
What's new in Italy on Data Protection n.2, Marzo 2022 | What's new in Italy · 2022-03-08 05:41:37+0 estimated reading time: 3 min Attacco informatico: comunicazione agli interessati e riscontro documentato al Garante Privacy Il Garante per la protezione dei dati personali, con provvedimento n. 21 del 27 gennaio 2022, si è pronunciato su una comunicazione relativa ad un incidente di
Data protection self assessment · 2022-02-04 10:15:13+0 estimated reading time: 2 min This self assessment toolkit has been created with small organisations in min d. It will be most helpful to small to medium sized organisations from the private, public and third sectors. Good information handling makes good business sense. You'll enhance
How to minimise the risk of personal data breaches happening · 2022-01-13 19:16:51+0 estimated reading time: 2 min This simple guide has been written to help small organisations improve the security of their data and keep it from getting lost, damaged or stolen.       The 72 hours following a personal data breach are particularly critical. If you’re dealing with o
Violation de données : sanction de 180 000 euros à l’encontre de la société SLIMPAY · 2021-12-30 16:49:12+0 estimated reading time: 2 min Le contrôle et la sanction de la CNILLa société SLIMPAY est un établissement de paiement agréé qui propose notamment des solutions de paiements récurrents à ses clients. Courant 2015, elle a effectué un projet de recherche interne, lors duquel elle
DPO, come svolgere gli audit sull'amministratore di sistema Cyber Security 360 · 2021-10-15 16:43 estimated reading time: 5 min L’amministratore di sistema è la figura chiave nella gestione, manutenzione e protezione dei sistemi informativi: l’attività di audit del DPO assume pertanto grande importanza per verificare che svolga la sua funzione secondo quanto richiesto dalla no

dal 2004 diritto e informatica