article thumbnail

Baby App “Peekaboo” Leaks Photos, Videos and Personal Data

Adam Levin

Data privacy and security come as our priority. Only families & friends can have access to baby’s moments at your control,” says the app’s description, which has been downloaded over a million times since 2012. Bithouse has yet to comment on the leak or take the leaked data offline.

article thumbnail

Elevating Data Privacy: TrustArc’s Accountability Approach with Nymity PMAF

TrustArc

In a digital era where data privacy underpins brand trust, organizations aim to not only comply with privacy laws but to fully embody them. TrustArc's Nymity Privacy Management Accountability Framework™ (PMAF), pioneered in 2012 and continuously evolving, now includes advanced provisions for AI data privacy governance.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Compliance with Global Data Privacy Regulations: GDPR, CCPA, and PDPA

Responsible Cyber

In todays globalized world, businesses must navigate a complex web of data privacy regulations to ensure the protection of individuals personal information. Disclosures : Organizations must clearly disclose how they use and share data. GDPR serves as a benchmark for global best practices.

article thumbnail

Tinder achieves certification in Information Security Management System

CyberSecurity Insiders

Note- Launched: in the year 2012, Tinder allows users to like or dislike the photos, bio and common interest about all prospective matches and has gained over 5.2 million pay subscribers till the end of 2019. The post Tinder achieves certification in Information Security Management System appeared first on Cybersecurity Insiders.

article thumbnail

STEPS FORWARD: How the Middle East led the U.S. to adopt smarter mobile security rules

The Last Watchdog

Here are key takeaways: Middle East motivation Somewhat quietly since about 2012 or so, nation states of the Middle East, led by Saudi Arabia and the UAE, commenced a quiet surge to the forefront of implementing comprehensive cybersecurity regulations. For a full drill down, give a listen to the accompanying podcast.

Mobile 205
article thumbnail

Zappos Offers Users 10% Discount in 2012 Breach Settlement

Threatpost

Lawyers will get $1.6 million in a settlement that stems from a breach that affected more than 24 million customers.

Retail 42
article thumbnail

MY TAKE: COVID-19’s silver lining could turn out to be more rapid, wide adoption of cyber hygiene

The Last Watchdog

Still, over time, they’ve been woven into baseline data security regulations far and wide. NIST specs are echoed in the data loss disclosure and data privacy laws that have cropped up in many U.S. states, for instance.