Enhancing Enterprise Security By Combining Data Science With Domain Expertise

click on access

Organizations are recognizing that data scientists can play a valuable role in enterprise IT security. However, effective security requires a collaborative effort between data scientists and security professionals within an enterprise. While data scientists have a pivotal role to play, they cannot and should not operate in a vacuum. Leveraging Data Science to Mitigate Security … Read more

Myth 4: Cloud Computing Causes Additional Issues Under Privacy Law Because Data Is Transmitted Internationally

cloud functions

Fact is for most companies that they are already transmitting data internationally, because they use the Internet (for example, to email spreadsheets to various office locations), or because they have subsidiaries, customers, suppliers or channel partners in other jurisdictions. In most cases, data transfers occur because data is needed in different jurisdictions, not because of … Read more

Myth 5: Data In The US Is Endangered By The USA Patriot Act/the USA Freedom Act

multiple devices

Fact is that the United States enacted the USA Patriot Act in October 2001 to fight terrorism and money laundering activities. The statute’s title – USA Patriot Act – stands for Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act.   It was intended to clarify, simplify and strengthen investigative … Read more

Myth 8: Data Privacy & Security Law Compliance Is The Provider’s Responsibility

locked data

Fact is that data privacy and security laws primarily hold the data controller responsible for compliance – i.e., the customer in a service provider relationship. The customer has to ensure that the data made available to the service provider has been collected in compliance with privacy laws, data subjects have consented or received notice, filings have … Read more

Myth 10: Vendor Has And Should Accept Unlimited Liability For Data Security Breaches


Fact is that service providers may not always be able to limit their liability vis-à-vis the data subjects in scenarios where they contract with corporate customers and not the data subjects themselves. If hackers gain unlawful access to information residing in a hosted database, the service provider may be liable directly vis-à-vis the data subjects … Read more

Gaining A Competitive Edge With Information Governance

red stamp

Information is power…but it also creates organizational riskInformation is an increasingly valuable business asset. It is a resource that can help empower a business, allow it to uncover new opportunities and develop a competitive edge. For example, many online businesses routinely sift through massive amounts of data collected from users for insights into how they … Read more