article thumbnail

Security Compliance & Data Privacy Regulations

eSecurity Planet

Regulatory compliance and data privacy issues have long been an IT security nightmare. And since the EU’s General Data Protection Regulation (GDPR) took effect May 25, 2018, IT compliance issues have been at the forefront of corporate concerns. GDPR-style data privacy laws came to the U.S. Location Matters.

article thumbnail

Data Privacy in the United States: A Recap of 2023 Developments

Centraleyes

2023 marked a surge in comprehensive state data privacy laws. At the beginning of the year, only five states—California, Colorado, Virginia, Utah, and Connecticut—had comprehensive data privacy legislation. By the end of the year, the number of states with privacy laws more than doubled.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Data Privacy Week 2023: Privacy Gains Power From Other Societal Forces

Security Boulevard

In 2023, the larger implications of privacy — including the ethics of using artificial intelligence (AI) and biometrics, the management of consumer-to-business relationships, and public issues such as consumer protection — will become much clearer through regulatory and legal action. What's Next?

article thumbnail

DOJ Lawsuit Targets Apple's Privacy 'Shield' in Antitrust Fight

SecureWorld News

Antitrust experts say the lawsuit's focus on Apple's privacy practices is a novel legal strategy that could remake the landscape for technology competition and consumer protection. The case may also reignite calls for broader reforms over data privacy and big tech's market power.

article thumbnail

Explained: Privacy washing

Malwarebytes

Data are the most coveted currency of our era, and technology giants like Facebook, Google, and Amazon are considered the behemoths of the data gathering industry. And to achieve that goal it needs to gather as much information as possible about us. Maybe not specifically about us as a person, but at least about us as a group.

article thumbnail

How Thales and Red Hat Protect Telcos from API Attacks

Thales Cloud Protection & Licensing

Legacy Technology Clashes : Most Telcos have very large legacy IT footprints. This unfortunately does not always integrate well with more modern technologies such as containerized or Kubernetes-based cloud-native applications. Highly Coveted Data : Telcos manage lots of valuable data.

article thumbnail

CSO's ultimate guide to security and privacy laws, regulations, and compliance

CSO Magazine

The Health Information Technology for Economic and Clinical Health Act (HITECH). Maryland Personal Information Protection Act – Security Breach Notification Requirements – Modifications (House Bill 1154). Massachusetts 201 CMR 17 (aka Mass Data Protection Law). (NERC) standards. Massachusetts Bill H.4806

CSO 128