News

Introduction: Facial recognition technology has become a ubiquitous tool in the modern world, used by both individuals and organizations for a variety of purposes, including security, identification, ...
As covered in part one of this series the PDPA Law Notification of Changes to the Thailand PDPA law. The second of these is covered below. PDPC PDPA Law Notification of Changes : Security Measures of ...
Introduction. Malaysia’s Updated PDPA has recently undergone important changes.These updates, however, have been missed or ignored by many organisations. Consequently, both local and international ...
Introduction. In the global marketplace, Indian companies trading across India, the European Union (EU), and the United Kingdom (UK) face the complex challenge of adhering to multiple data protection ...
Understanding DSARs and the DPO’s Core Responsibilities. Data Subject Access request enable individuals to understand what personal data an organisation holds about them, how it is processed, and why.
With the introduction of the Personal Data Protection Amendment Bill 2024, Malaysia has taken a significant leap in aligning its data protection regulations with global standards. The updated ...
In today’s interconnected world, businesses constantly handle vast amounts of data. With the proliferation of digital transactions and the increasing importance of data in decision-making, it has ...
The United Kingdom’s job market is facing a significant downturn. Reports show job opportunities plummeting and financial optimism among British finance chiefs hitting its lowest levels since 2020.
Step 2: Appoint a Data Protection Officer. A Data Protection Officer (DPO) plays a critical role in overseeing data protection practices. They ensure that the organisation’s policies align with PDPA ...
The Role of a Global Data Protection Officer. A Global Data Protection Officer is responsible for ensuring that an organisation’s data protection strategy aligns with legal requirements in all ...
One valuable tool for businesses to navigate the complexities of privacy management is the (NIST) Privacy Framework.
Phishing is a cyberattack where the attacker masquerades as a trusted entity to dupe individuals into providing sensitive data, such as login credentials and financial information. These emails may be ...