Insights and opinions on data protection, privacy and cybersecurity contributed by thought leaders from around the world.
Data protection laws that demand explicit consent, right to be forgotten and algorithm transparency may have a chilling effect on artificial intelligence.
With every new opportunity comes new challenges. How can innovative enterprises capture the vast potential and rise up to the challenge of big data privacy?
Ransomware attacks are the frightening new hacking phenomenon that is hitting businesses all over the world. Here are five ways to stop ransomware attacks.
If your business is dealing with data then ignoring the peace of mind that cyber liability insurance would provide would be foolhardy. In fact, the very survival of a business that stores and leverages customer data in any way may very well depend on good cyber liability coverage.
Yoshihiro Satoh pointed out the difference between privacy and security and then explained about the specific measures for each and also the common measures between them.
In this article, Mary Thel Mundin examines the recently implemented rules and regulations of the Data Privacy Act of the Philippines (RA 10173) and the implications for organisations that handle personal data both within the borders of the Philippines and those who handle personal data and have links to the Philippines.
A key concept of many privacy laws is the definition of “personal data”, “personal information” or “personally identifiable information”. If it’s not “personal data”, you are likely outside of the scope of data protection laws, however that is a line in the sand which is constantly moving – in this article David Fraser of McInnes Cooper in Canada examines what that constantly shifting line means for privacy, and the individual.
Attribute based access control provides a dynamic level of access control, based on the environment and conditions, needed for privacy and data protection.