Data Collection Compliance

News & Analysis as of

Compliance, Technology and Data Analytics

Compliance professionals cannot do it alone. Of course, CCOs need compliance staff and the collaboration of business, human resources, legal, financial and audit, and related functions in order to succeed. I have made this...more

EDRM Releases New Security Questionnaire: eDiscovery Trends

As promised when they announced the project last August, EDRM announced last week the release of a new Security Audit Questionnaire, which is designed to be a practical tool for evaluating the security capabilities of...more

Pitfalls of Using Big Data Alone

I often write about the use of big data in a best practices compliance program. However, care must be taken in the use and interpretation of big data. One of the clearest reads into this topic is the recent book by Cathy...more

U.S. Customs and the New Trump Administration: Your Top Ten Questions Answered

During the campaign, U.S. Customs & Border Protection (CBP) was mostly mentioned by President Trump in the context of illegal immigration. Controlling the flow of people, however, is only one of the jobs of CBP, which is part...more

Understanding the Benefits of Benchmarking & How to Do It Successfully

To begin, let’s define “benchmarking.” There is often confusion regarding the difference between benchmarking and assessment. ...the process of benchmarking is a subset of compliance program assessment....more

Update from the French Data Protection Authority on the compliance package for connected vehicles

The market of the so-called “connected vehicles” has been considerably growing since 2015. According to a recent study by AlixPartners, 78 million of connected vehicles will be commercialized in 2018, generating a EUR40...more

Sampling as a Compliance Strategy

In the technology age in which we live, CCOs often come face to face with a new phenomenon – too much information or data. TMI is not something to laugh at nor ignore. CCOs often face situations where they need to understand...more

Paul Revere and the Use of Metadata in a Best Practices Compliance Program

Yesterday I celebrated the signing of the Declaration of Independence and, more particularly, the signature of John Hancock as emblematic of culture change in a compliance program. Today I want to celebrate another well-known...more

Big Data in a Best Practices Compliance Program, Part III-Visualization

Today I continue my exploration of big data in a best practices Foreign Corrupt Practices Act (FCPA) compliance program. Yesterday, I considered how you might use big data in a best practices compliance program. Today I want...more

Big Data in a Best Practices Compliance Program, Part II

Today I continue my exploration of big data in a best practices Foreign Corrupt Practices Act (FCPA) compliance program. Yesterday, I considered what big data is and some ways to think about it. Today I want to move into some...more

Data Analysis Week – Part II: Setting Up Your Analysis

Today, I continue my exploration of data analysis with Joe Oringel, co-founder and Managing Director of Visual Risk IQ, a consulting firm that helps audit and compliance people see and understand their data. Today, we look at...more

Russia ramps up compliance checks under its Data Localisation Law

Russia’s data protection authority, the Roskomnadzor, has recently announced its intention to increase the number of data localisation audits it carries out in 2016. It has pledged to conduct around 1,000 data localisation...more

Electronic Reporting to be the NPDES Rule

After a lengthy public notice and comment period, the final National Pollutant Discharge Elimination System (“NPDES”) Electronic Reporting Rule was published in the Federal Register on October 22, 2015, and will become...more

EBA publishes 2016 work programme

EBA has published its annual work programme for 2016, describing its specific activities and tasks for the coming year. EBA’s work for 2016 is defined under 34 activities in the following strategic areas...more

5 Questions to Ensure Your Policies Keep Up With the Pace of Change

You hear a lot these days about the ways that individuals’ private data is collected and potentially exposed—to technology companies, employers, the government and so on. You hear less about the concern of many employers, who...more

Could a Vendor’s Lax Info Security Ruin Your Holiday Sales? Seven Preventative Steps for Retailers

Many of the largest retailer data security breaches have been caused or enabled by the acts or omissions of retailers’ vendors, such as the widely publicized incident at Target Corporation. Several such breaches occurred...more

CFPB issues final HMDA rule

The CFPB has issued a final rule amending Regulation C, its Home Mortgage Disclosure Act regulation. The changes, which, in part, implement the Dodd-Frank Act’s amendments to HMDA, expand the scope of data required to be...more

States Continue To Grapple With Data Breach Notification Issues

Connecticut’s data breach notification law currently requires notification “without unreasonable delay.” Effective October 1, 2015, Connecticut will (a) require notice of any breach of security not only “without unreasonable...more

Second Chance to File Oppositions to CTIA Challenge

In its June 2015 Lifeline Order on Reconsideration, the FCC adopted a new rule which requires ETCs to retain documentation demonstrating subscriber eligibility for Lifeline, such as a copy of the applicant’s food stamp card...more

5 Tips for Quickly Identifying Responsive Data Sources for E-Discovery Collections

Working with IT or your service provider to collect/process from a variety of data sources, like email archives, file shares, legacy backup tapes, SharePoint, etc., can be a painful and complicated ordeal. You don’t...more

ACER reports on its activities under REMIT

ACER has published its third annual report. This covers its activities during 2014 for the implementation and monitoring of the Regulation on Energy Market Integrity and Transparency (REMIT). The report looks at...more

Russia’s new data law

Russia’s new Data Localisation Law went live yesterday on 1 September. Many companies with operations in Russia are scratching their heads about how to comply. The Basics - The new law applies to businesses with a...more

Privacy & Cybersecurity Update - August 2015

Third Circuit Affirms FTC’s Authority Over Cybersecurity: In the Wyndham case, the Third Circuit affirmed that the FTC has the authority to regulate cybersecurity under Section 5 of the FTC Act, and that the language of...more

The ABCs of COPPA Compliance

In today’s environment – when data breaches seem to be in the news nearly every day – the media, regulators and many others are hyper-focused on privacy issues. Schools and educational institutions are no exception when it...more

The Fingerprint File Doesn’t Have to Bring You Down: NAI Offers Advertisers Guidance on Digital Fingerprinting & Location...

Advertisers who use tools such as location data and newer non-cookie technologies to deliver interest-based advertising must carefully balance the use of those tools with consumer privacy. To achieve this balance, the Network...more

53 Results
|
View per page
Page: of 3
Cybersecurity

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×