June, 2012

article thumbnail

Article 29 Working Party adopts document on BCRs for processors

Privacy and Cybersecurity Law

Following our recent blog post, the Article 29 Working Party has adopted a document (WP195) on Binding Corporate Rules (“BCRs”) for processors […].

40
article thumbnail

“Fair dealing” online? No quick test, no one-size fits all

Privacy and Cybersecurity Law

Mark and Constance Fournier operate the Free Dominion website as a political news discussion forum. Richard Warman had an exclusive […].

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NIST Releases Cloud Computing Guidance

Privacy and Cybersecurity Law

Following on the heels of its December guidance on cloud privacy and security, NIST has released SP 800-146, “Cloud Computing […].

40
article thumbnail

Cookie Consent Exemptions – The Article 29 Working Party’s View

Privacy and Cybersecurity Law

There have been further developments this week on the new ‘cookies rule’ with the Article 29 Working Party issuing its […].

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

The FTC’s Myspace Consent Order May Impact Use by Mobile App Developers of Unique IDs

Privacy and Cybersecurity Law

On May 8th, the FTC released its proposed consent order in its investigation of Myspace.com, finding the social networking site […].

Mobile 40
article thumbnail

OCR releases audit protocols for HIPAA Security, Privacy and Breaches

Privacy and Cybersecurity Law

The Department of Health & Human Services (HHS) is required under Section 13411 of the HITECH Act to conduct periodic […].

40
article thumbnail

Privacy and data interception in Saudi Arabia

Privacy and Cybersecurity Law

As part of our coverage of global privacy and data security issues, we thought you would be interested in a […].

40