Your Search Results
Your search results for ‘list of data breaches’ returned 486 results
Articles of the GDPR
...data Article 13 – Information to be provided where personal data are collected from the data subject Article 14 – Information to be provided where personal data have not been...

How Do You Demonstrate Accountability Under the GDPR?
...referred to as ‘data protection principles’ or ‘data processing principles’. The principles are: Lawfulness, fairness and transparency Purpose limitation Data minimisation Accuracy Storage limitation Integrity and confidentiality Accountability Among organisations...
Data Protection Consultancy Case Study
...reviews and policy implementation Third-party due diligence reviews DPIA (data protection impact assessment) process creation and completion of assessments Review or creation of data breach policies and processes Data mapping...

Data Protection Enforcement: Your Cookie Compliance Questions Answered
...function, the data that is being processed and the obligation to inform individuals how their data is used will prove beneficial to demonstrate compliance. Popular AI agents in use today...

8 Ways to Reduce Your PCI DSS Compliance Burden
...sensitive authentication data), you should never store data you don’t need. The same applies to personal information and the GDPR (General Data Protection Regulation): the data minimisation principle says to...

51 Must-Know Phishing Statistics for 2023
...of phishing is to capture people’s login credentials, and according to IBM’s Cost of a Data Breach Report, compromised credentials are the most common cause of data breaches. It found...
Data Privacy
...your data processing obligations will change, contact our experts today. Consultancy DPO as a Service Data Protection Consultancy Services Privacy as a Service (PaaS) GDPR EU Representative Privacy Threat Modelling...

Capita Admits That Its ‘Cyber Incident’ Was Ransomware and That Customer Data Was Breached
...supplier or colleague data having been compromised.” “Working in collaboration with our specialist technical partners, including the team of leading cybersecurity experts at Microsoft Incident Response, we have restored Capita...