The safe harbor agreement is a key component of conducting business overseas, but all that has changed. Data privacy and trans-Atlantic relationships have been protected by the "safe harbor" agreement since 2000. This joint decision made by the European Union and the United States government stated that U.S.-based businesses could send EU citizens' data back to American...
October 09, 2015
Leave a comment
Personal Data Protection,
Data Sovereignty,
Compliance,
data privacy
By Wael Aggan
Without adequate email protection, some business people could experience personal and business-related disruption. The data breach of Avid Life Media demonstrated how easy it is for cybercriminal groups to steal incriminating information, as hackers successfully breached the company's network and made off with the personal records and account data of millions of...
August 27, 2015
Leave a comment
Email Security,
Personal Data Protection,
Breach,
data privacy
By Wael Aggan
Your data is valuable. Data security is not just a concern for corporations with millions of shoppers' payment card numbers and valuable intellectual property. As a consumer, you also need to implement data protection solutions if you want your personal emails, private information and sensitive data to stay out of the hands of cybercriminals, the government and data...
Any organization that deals with payment card data must comply with the Payment Card Industry's Data Security Standards. Cloud computing provides organizations with a way to reinvent their IT systems, replacing legacy hardware with services that scale according to business needs. Nowadays, the cloud acts as a differentiator between the best and the worst businesses, but...
MITC attcks allow cybercriminals to access data and documents stored in popular file synchronization services such as Google Drive. Cloud storage has slowly but surely become the best method for sharing, backing up and remotely accessing data in all forms, from Word documents to movies to sensitive, personally identifiable information. So, given Google's position in...
Consumers and organizations should be worried about their cyberprivacy and data security if the CISA bill passes Senate this week. With the U.S. Senate set to go on recess for the remainder of the summer, consumers and Internet users rejoiced, assuming that the judgment over the Cybersecurity Information Sharing Act would be delayed to the fall. This would give...
Bill S-4 or the Digital Privacy Act or An Act to Amend the Personal Information Protection and Electronic Documents Act is the Canadian government's latest attempt to reform PIPEDA, and it was passed into a law as of June 18, 2015. After a tumultuous 2014 and a similar start to 2015, the Canadian government approved changes made to the Personal Information Protection...
July 11, 2015
Leave a comment
Personal Data Protection,
Compliance,
User Privacy,
data privacy
By Wael Aggan
Many people feel that Cloud computing has been around for quite a long time, and intrusion into such technology is far from innovative. To them, it appears that instead of storing data on their own servers in a server farm, they now store their data in much larger clusters of servers in someone’s data center. The Cloud's threats arise from the sheer scale of data that...