
The Week in Cyber Security and Data Privacy: 4 – 10 March 2024
...incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. Publicly disclosed data breaches and cyber attacks:...

...incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. Publicly disclosed data breaches and cyber attacks:...

Expert insight from a data privacy trainer and DPO “Organisations tend to overcomplicate GDPR [General Data Protection Regulation] compliance.” That’s what data privacy trainer and DPO (data protection officer) Andy...
...reprimands; Imposing a temporary or permanent ban on data processing; Ordering the rectification, restriction or erasure of data; and Suspending data transfers to third countries. For comprehensive guidance and practical...
...Data subjects’ rights; Data controllers’ responsibilities; Data processors; Security of processing and data protection by design; Management of data breaches; DPIAs (data protection impact assessments); DPOs (data protection officers); and...

The data breaches that continue to make the headlines show the importance of data protection and laws like the GDPR (General Data Protection Regulation). If you’re only beginning to look...
...applies to the processing of EU residents’ personal data, regardless of where that processing takes place. Moreover, it applies to both data controllers and data processors, so, whether your organisation...

...to data protection. He is also an enthusiastic data privacy and cyber security trainer, consistently receiving high praise from course attendees. We spoke to him about international data transfers. Hi...

...for special categories of personal data (sensitive data), which you cannot process except under certain circumstances, there are six lawful bases for processing. These are: If the data subject gives...

...According to databreaches.net, the group exfiltrated tenant information, service management information, financial data, business data, property data, employee data and sensitive business information. Sample data posted on the Hunters site...