Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
GDPR Oddsmakers: Who, Where, When Will Enforcement Hit First?
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
Ayo99
50%
50%
Ayo99,
User Rank: Apprentice
7/10/2018 | 4:46:41 AM
Re: stop data processing
luckly im not live in europe.. and my target market are asian
alise1208
50%
50%
alise1208,
User Rank: Apprentice
6/21/2018 | 6:05:27 AM
GSPR experience
When I was looking for any information about GDPR compliance, I came across many articles where companies described their experience in solving this issue. Here is one great post on Redwerk's blog https://redwerk.com/blog/turning-gdpr-compliance-redwerks-experience I think everyone can use this tips and implement in their company, as GDPR fines already come into force.
AnneJoiner
50%
50%
AnneJoiner,
User Rank: Apprentice
6/1/2018 | 6:57:12 AM
Re: Targeting Habitual Violators
that sound is good
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
5/31/2018 | 10:46:51 PM
Re: Targeting Habitual Violators
@Ryan: I'm not so sure there will be a lot of companies going out of business here, but the UK's ICO (i.e., that nation's DPA responsible for enforcing GDPR there) is on record as saying that they will exercise the same restraint and discretion that they always have -- noting that, pre-GDPR, maximum fining power for their organization under then-present regulations was £500,000, and that they had never once fined anyone that maximum.
CleanShine
50%
50%
CleanShine,
User Rank: Apprentice
5/30/2018 | 3:34:56 PM
thanks
Good
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
5/30/2018 | 2:35:47 PM
Re: Ghostery
I am sorry for this but could not resist .....

They are giving these legal issues interesting names these days, Who's filing first, what is filing second and i don't know who is issuing the third filing.  WHAT?  i SAID WHO is filing first.  That's what I am trying to find out, WHO is filing first? Yes.  Yes? Precisely.  Oh, precisely is filing first - NO NOTHING OF THE KIND, WHO IS FILING FIRST..
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
5/30/2018 | 2:38:26 AM
Ghostery
I think we already have an answer to the underlying question here: Ghostery.

The company was one of many to send GDPR contact emails -- but the person in charge of that task CC'd everyone instead of BCC'ing everying. The result was massive exposure of individuals' email addresses.

This was made public, and the company has indicated that it will self-report this data leak.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/29/2018 | 3:07:13 PM
Re: Targeting Habitual Violators
However, I don't mind that GDPR enforcement is targeting a more draconian narrative and trying to remove habitual violators from the ecosystem. I would be ok with that too. Singling our the violators is the way to go I would say.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/29/2018 | 3:05:37 PM
Re: stop data processing
But to order the company to stop processing and in essense stop bringing in money to the organization will most definitely bring those bad practices to a halt. I would agree. We need to start somewhere and improve on it.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/29/2018 | 3:03:24 PM
Re: stop data processing
Most companies can more than survive fines that are given based on bad practices. That would be one of the concerns I have. That is still ok, fine could be increased at one point I would guess.
Page 1 / 2   >   >>


COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
Exploiting Google Cloud Platform With Ease
Dark Reading Staff 8/6/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-16168
PUBLISHED: 2020-08-07
Temi firmware 20190419.165201 does not properly verify that the source of data or communication is valid, aka an Origin Validation Error.
CVE-2020-8025
PUBLISHED: 2020-08-07
A Incorrect Execution-Assigned Permissions vulnerability in the permissions package of SUSE Linux Enterprise Server 12-SP4, SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 15; openSUSE Leap 15.1, openSUSE Tumbleweed sets the permissions for some of the directories of the p...
CVE-2020-8026
PUBLISHED: 2020-08-07
A Incorrect Default Permissions vulnerability in the packaging of inn in openSUSE Leap 15.2, openSUSE Tumbleweed, openSUSE Leap 15.1 allows local attackers with control of the new user to escalate their privileges to root. This issue affects: openSUSE Leap 15.2 inn version 2.6.2-lp152.1.26 and prior...
CVE-2020-16219
PUBLISHED: 2020-08-07
Delta Electronics TPEditor Versions 1.97 and prior. An out-of-bounds read may be exploited by processing specially crafted project files. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute arbitrary code, and/or crash the application.
CVE-2020-16221
PUBLISHED: 2020-08-07
Delta Electronics TPEditor Versions 1.97 and prior. A stack-based buffer overflow may be exploited by processing a specially crafted project file. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute arbitrary code, and/or crash the application.