Search for:
Category

Cybersecurity, Data and Tech

Category

The Hungarian Parliament has recently adopted an amendment (Act No CXXIX of 2015) to the Information Act that will provide regulation regarding how data controllers must treat data breach incidents. Under the amendment, a data breach incident is any unauthorized processing of data, including the unauthorized access, alteration, unauthorized transfer,…

The Cybersecurity Unit of the US Department of Justice recently published guidance on “Best Practices for Victim Response and Reporting of Cyber Incidents.” The guidance is available here.  The document aims at assisting organizations in preparing a cyber incident response plan and responding to a cyber incident. It was drafted…

Monitoring the use of company-issued technology is controversial.  For some, the notion of monitoring employees’ use computers, smartphones, and emails is inconsistent with personal privacy.  To others, monitoring employees’ use of technology in the workplace is both the right and the responsibility of the prudent employer. While Canadian courts and…