71 results were returned
In this fourth article in our series on "Big Data & Issues & Opportunities" (see our previous article here), we focus on some of the cybersecurity aspects of big data processing. Where relevant, illustrations from the ...
This introductory article is the first in a series of articles looking into the legal, ethical and social issues and opportunities surrounding big data, which were brought to the forefront by the LeMO Project ...
It has been over 1,5 years since the General Data Protection Regulation (GDPR) has become applicable. While there was little enforcement in the first months, this has changed: European Data Protection Authorities (DPAs) ...
In this fifth article in our series on "Big Data & Issues & Opportunities" (see our previous article here), we focus on some of the breach-related obligations in a big data context. Where relevant, illustrations from ...
The decision (case C-210/16) deals mainly with the issue of “joint controllership” between Facebook and website operators using Facebook's 'Like' button on their website. The highest EU court decided that the operator ...
Draft revised rules on security assessment on providing new internet business published
As the date of implementation of the China Cybersecurity Law draws near, the Measures on the Security Examination of Network Products and Services was finalised and promulgated on 2 May 2017.
The Cybersecurity Law came into force on 1 June 2017. As reported previously in Update (3), one area under the law that concerns many businesses operating in China
As reported previously, the China Cybersecurity Law came into effect on 1 June 2017.
At the end of August, a number of draft Guidelines and draft National Standards were published by the National Information Security Standardisation Technical Committee, one of which is a revision of the draft Guidelines ...
DEFAULT DEFAULT Most Relevant Alphabetical Chronological Go
REFINE RESULTS: