Remove Consumer Protection Remove Manufacturing Remove Risk
article thumbnail

California Privacy Agency Enforcement, CCPA Rulemaking, and CIPA Reform

SecureWorld News

This provision mirrors the Agency's prior settlement with a major auto manufacturer, wherein it emphasized that contracting out privacy rights to a third-party consent management tool, without monitoring and oversight of that tool, is not a defense to liability. Peters, Ali Bloom, and Chirag H.

article thumbnail

Key Cybersecurity Trends for 2025. My Predictions

Jane Frankland

In this blog, I’m exploring these changes, grouped under key categories that I’ve used in previous years, to help business leaders and cyber risk owners better prepare for the evolving landscape. Critical infrastructure face heightened risk from targeted disruptions, as do small businesses who are the backbone of the economy.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New IoT Security Regulations

Schneier on Security

Due to ever-evolving technological advances, manufacturers are connecting consumer goods­ -- from toys to lightbulbs to major appliances­ -- to the internet at breakneck speeds. But like nearly all innovation, there are risks involved. It falls upon lawmakers to create laws that protect consumers.

IoT
article thumbnail

Advice for manufacturers on the coming PSTI regulation

Pen Test Partners

This is a pivotal moment for manufacturers, importers, and distributors, imposing new compliance measures to safeguard against cyber threats. Implications for manufacturers and vendors This regulatory overhaul extends its reach to the core economic actors in the product lifecycle; manufacturers, importers, and distributors of smart products.

article thumbnail

Explained: Privacy washing

Malwarebytes

A small but telling example was a recent court case where a judge ruled that car manufacturers collecting users’ text messages and call logs did not meet the Washington Privacy Act’s (WPA) standard that a plaintiff must prove that “his or her business, his or her person, or his or her reputation” has been threatened.

article thumbnail

The Top 7 AI Compliance Tools of 2024

Centraleyes

From predictive analytics to real-time monitoring, AI tools empower companies to anticipate risks, streamline operations, and uphold regulatory standards effectively. These tools monitor risk profiles and regulatory changes, enabling organizations to address potential issues preemptively.

article thumbnail

SiteLock’s Top Five Cybersecurity Predictions For 2020

SiteLock

This allows the attacker unauthorized access to numerous accounts or servers, putting the end-user’s information at risk. Malicious text messages are at the center of SMS phishing, and similar to email phishing, they aim to trick users into taking action that puts them and their personal data at risk. Given that over 2.5