Ë

“I think it’s of great concern to marketers,” Bill Hearn, a regulatory law specialist in the Folger Rubinoff firm told a Toronto workshop sponsored by the Canadian Marketing Association.

Read More

"If you're not actively watching for attacks that are going on, it's very difficult to be able to say you're in a good space,"

Read More

GDPR has already been in place for nearly six months and, despite a number of domesday predictions made in the lead-up to the implementation date on 25th May, most have not come to pass

Read More

Canada’s privacy watchdog has asked the Federal Court to rule on Mountain View search giant Google’s indexing practices as they pertain to the Personal Information Protection and Electronic Documents Act (PIPEDA).

Read More

Restrictions on data localization are not entirely new to Canada, since similar provisions are found in the CPTPP (the successor to the Trans Pacific Partnership). That means that Canada has already agreed to limits on data localization with or without the USMCA.

Read More

Unfortunately, with technology on the rise, there’s more room for cyber crime in 2018. According to the Cyber Security Breaches Survey 2018, 43% of businesses were a victim of a cyber security breach in the last 12 months.

Read More

Attribute Based Access Control (ABAC) is defined as an access control mechanism that utilizes certain attributes available at the time a request is made to dynamically determine if access should be granted or denied based on a pre-defined access control policy.

Read More

The reality is that there are various studies that have been conducted over the last number of years about whether the average person would give up their password for a piece of chocolate, share their passwords, or install any sort of protection on their mobile devices and so forth.

Read More

A number of options exist for an organization to generate test data ranging from using production data, to dynamic masking of data, and even using synthetic data generation.

Read More

Collected data increases in sensitivity over time when details are combined and related to generate an accurate and complete picture or profile for individual clients.

Read More

DataStealth is a paradigm-shifting solution that will significantly reduce the scope of your PCI Compliance audit by up to 95%. DataStealth removes payment card information from data and documents BEFORE it enters your network.

Read More

Today marks the first day of National Cyber Security Awareness Month (NCSAM), a collaborative effort that began in 2004 as part of a joint campaign of the National Cyber Security Alliance and the U.S. Department of Homeland Security (DHS).

Read More