Should make an interesting discussion case.
Joseph Lazzarotti of Jackson Lewis writes:
According to reports, bank customers in Australia (yes, data breach notification requirements exist down under) have been affected by “an industry-wide” data breach experienced by a third-party service provider to the banks – property valuation firm, LandMark White. As expected, the banks are investigating and in some cases notifying customers about the incident. However, there are reports that some of the affected banks are suspending this vendor from the group of valuation firms they use. This is not an unusual reaction by organizations whose third party service providers have or are believed to have caused a data breach affecting the organization’s customers, patients, students, employees, etc. But, it is worth thinking about whether that is the best course of action.
Read more on JDSupra.
GDPA inspired? More
specific Privacy requirements, now more specific Security
requirements.
Mike Nonaka, Libbie Canter, David Stein and Sam
Adriance of Covington & Burling write:
On March 5, 2019 the Federal Trade Commission (“FTC”) published requests for comment on proposed amendments to two key rules under the Gramm-Leach-Bliley Act (“GLBA”). Most significantly, the FTC is proposing to add more detailed requirements to the Safeguards Rule, which governs the information security programs financial institutions must implement to protect customer data.
In addition, the FTC is proposing to expand the definition of “financial institution” under the Safeguards Rule and the Privacy Rule to include “finders.” Finally, the FTC is proposing to amend the Privacy Rule to make technical and conforming changes resulting from legislative amendments to GLBA in the Dodd-Frank Act and FAST Act of 2015.
Read more on Inside
Privacy.
[From
the article:
Some of the specific
proposed changes include:
- Revising the requirement to designate an “employee or employees to coordinate [the] information security program” to require designation of a single individual, referred to as a Chief Information Security Officer (“CISO”), as responsible for overseeing and implementing the program;
- Requiring financial institutions to implement access controls on information systems, as well as restrict access to physical locations containing customer information only to authorized individuals;
- Requiring customer information to be encrypted, both in transit and at rest;
- Requiring information systems to include audit trails designed to detect and respond to security events;
- Requiring financial institutions to develop procedures for the secure disposal of customer information in any format that is no longer necessary for their business operations or other legitimate business purposes;
- Requiring financial institutions to implement policies and procedures “to monitor the activity of authorized users and detect unauthorized access or use of, or tampering with, customer information by such users;”
A perspective on
propaganda.
Beyond
Hybrid War: How China Exploits Social Media to Sway American Opinion
… our research demonstrates that social media
influence campaigns are not a one-size-fits-all technique. We
studied Chinese state-run social media influence operations and
concluded that the Chinese state utilized techniques different from
the Russian state. These differences in technique are driven by
dissimilar foreign policy and strategic goals.
… We believe that the Chinese state has
employed a plethora of state-run media to exploit the openness of
American democratic society in an effort to insert an intentionally
distorted and biased narrative portraying a utopian view of the
Chinese government and party.
… According to the French researchers,
nation-state information manipulation includes three criteria:
- A coordinated campaign
- The diffusion of false information or information that is consciously distorted
- The political intention to cause harm
Perspective.
Nearly
one-in-five Americans now listen to audiobooks
“Americans are spreading their book consumption
across several formats, and the use of audiobooks is rising. About
three-quarters (74%) of Americans have read a book in the past 12
months in any format, a figure that has remained largely unchanged
since 2012, according to a Pew
Research Center survey conducted in January. Print
books remain the most popular format for reading, with 67%
of Americans having read a print book in the past year. And while
shares of print and e-book readers are similar to those from a survey
conducted in 2016, there has been a modest but statistically
significant increase in the share of Americans who read audiobooks,
from 14% to 18%. Overall, Americans read an average (mean) of 12
books per year, while the typical (median) American has read four
books in the past 12 months. Each of these figures is largely
unchanged since 2011, when the Center first began conducting the
surveys of Americans’ book reading habits…”
Sound trivial?
How
Frito-Lay Applies Machine Learning
… “One of my first projects at the company
involved building systems that could sense the texture of chips
without destroying them,” said Mirza. For this project, he was
capturing acoustic data and manually processing it.
“It's a system that hits the chip with lasers,
listens to the sound coming off them, and then uses that data to
correlate the sound into texture,” Mirza said. This system could
provide an automated quality check for the company’s chip
processing systems.
… Mirza said this project, which is still in
process, is estimated to save the company over a million dollars a
year based on its ability to optimize the potato peeling process in
the U.S. alone. With a global deployment, additional savings are
expected.
Just because we use it…
Turnitin to
Be Acquired by Advance Publications for $1.75B
… Founded in 1998 by four university students,
iParadigms, Turnitin’s previous parent company, launched with a
vision to offer tools across different industries, from law to
education and technology. Over the years, it saw the most success in
education and the company shifted to focus specifically on that
market.
An idea I missed.
Agri-tech
startup Hello Tractor to expand across Nigeria, Kenya
Hello
Tractor connects tractor owners to farmers through an Internet of
Things (IoT)-enabled digital solution that bridges the gap between
manual and mechanised farming.
The startup, which last year entered
into a partnership with IBM Research to pilot a new tool for
farmers, enables farmers to request affordable tractor services,
while providing enhanced security to tractor owners through remote
asset tracking and virtual monitoring.
No comments:
Post a Comment