Simply removing direct and indirect personal identifiers isn’t enough to achieve de-identification of a dataset. Data controllers must also analyze the context in which the data is presented, as well as the risk of re-identification. Not only that, but technical methods for performing de...
Countries are continuing to escalate restrictions on storage location and transfers of data, with China being the most recent to follow suit. China broadened its cybersecurity initiatives significantly in 2016 with the release of the Cybersecurity Law (Law). Scheduled to come into effect June 1,...
France’s new Digital Republic Act [1] significantly strengthens protections that control how French businesses use and retain personally identifying data. The law expands the scope and authority of the 1978 French Data Protection Act and brings the country to the foreground of modernizing the...
It's the age of the Personal Brand, courtesy of social media. Never before has it been so easy to develop your own personal brand online - all you have to do is be prolific within and across social media sites. But what's that mean to your organization now - and when you leave? ...
In all social networks I’m a big advocate of blending the personal and professional. If you send me all updates about what your company is doing, I’m likely going to ignore you. Likewise, if it’s all status updates about your personal life. There are a few folks that I...
8403 Colesville Rd #1100Silver Spring, MD 20910USA
Phone: (301) 587-8202Toll free: (800) 477-2446Fax: (301) 587-2711Email: hello@aiim.org
JoinBenefitsLearn More
About UsTerms of Use