Remove Data collection Remove Data privacy Remove Encryption Remove Information Security
article thumbnail

How Companies Need to Treat User Data and Manage Their Partners

Security Affairs

Most of them relate to safeguarding data from misuse and reassuring that all procedures abide by the active regulations. Data Storage: Evaluates the risks around the vendor’s data storage and data retention capabilities to understand how effective they are in keeping sensitive data safe and secure.

article thumbnail

Mental Health Apps are Likely Collecting and Sharing Your Data

Security Boulevard

As such, these apps appear to operate in a legal "gray area," but that doesn't mean their data practices are ethical or even follow proper basic information security principles for safeguarding data. and actively used/shared.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

‘A lot of late nights’: Zoom’s compliance chief reflects on the year that was the pandemic

SC Magazine

Among them, the discovery that the app was not end-to-end encrypted as advertised, and that between 2018 and 2019, a “ZoomOpener” webserver module was installed on Macs that bypassed Apple’s security. Those challenges and others were met by quick response. Did the company emerge better for it all?

article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

” “It would be possible, on detailed examination of video, to compromise elements of operational security,” agreed Mike Hamilton, co-founder and chief information security officer of CI Security and former Seattle CISO. Long-term data storage is often a liability rather than an asset,” added Costlow.