Remove Consumer Protection Remove Data breaches Remove Data privacy Remove Technology
article thumbnail

Security Compliance & Data Privacy Regulations

eSecurity Planet

Regulatory compliance and data privacy issues have long been an IT security nightmare. And since the EU’s General Data Protection Regulation (GDPR) took effect May 25, 2018, IT compliance issues have been at the forefront of corporate concerns. GDPR-style data privacy laws came to the U.S. Location Matters.

article thumbnail

Data Privacy Week 2023: Privacy Gains Power From Other Societal Forces

Security Boulevard

As the conversation around privacy progresses beyond a focus on security infrastructure and best practices for preventing data breaches, regulations are working to catch up. Offering personal data controls through AI could turn the tables on ethical concerns about this technology. What's Next?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Thales and Red Hat Protect Telcos from API Attacks

Thales Cloud Protection & Licensing

Over the past year, the Telecom industry has suffered some massive, high-profile data breaches — all of which happened by exploiting unprotected APIs. These include breaches on major operators such as T-Mobile. Legacy Technology Clashes : Most Telcos have very large legacy IT footprints.

article thumbnail

New Federal Privacy Law Legislation Introduced

SecureWorld News

to introduce a national data privacy law. With no current national law, states are forced to create their own privacy policies, which can be confusing and complicated for organizations operating in multiple states. Thankfully, it appears we have taken one step closer to having a national data privacy law.

article thumbnail

How Thales and Red Hat Protect Telcos from API Attacks

Security Boulevard

Over the past year, the Telecom industry has suffered some massive, high-profile data breaches — all of which happened by exploiting unprotected APIs. These include breaches on major operators such as T-Mobile. Legacy Technology Clashes : Most Telcos have very large legacy IT footprints.

article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

According to thought leaders, the compromise of video data could result in intellectual property theft, physical security threats, privacy violations, extortion and perhaps regulatory punishment. All sensitive data should only be stored for the amount of time required and in accordance with any data privacy policies,” said Smith.