Sentences with phrase «by the data breach involving»

As many as 143 million consumers — mostly Americans, but some UK and Canadian residents — were affected by a data breach involving highly sensitive and personal information.
Facebook executives could be summoned to Germany, as the country's justice minister wants to confirm if any of the 30 million German users were affected by the data breach involving Cambridge Analytica.

Not exact matches

As incidents involving data breaches by hackers litter the evening news, technophiles and technophobes alike have become more concerned about the security of their data, especially that tied to credit cards and other financial information.
Examples of these risks, uncertainties and other factors include, but are not limited to the impact of: adverse general economic and related factors, such as fluctuating or increasing levels of unemployment, underemployment and the volatility of fuel prices, declines in the securities and real estate markets, and perceptions of these conditions that decrease the level of disposable income of consumers or consumer confidence; adverse events impacting the security of travel, such as terrorist acts, armed conflict and threats thereof, acts of piracy, and other international events; the risks and increased costs associated with operating internationally; our expansion into and investments in new markets; breaches in data security or other disturbances to our information technology and other networks; the spread of epidemics and viral outbreaks; adverse incidents involving cruise ships; changes in fuel prices and / or other cruise operating costs; any impairment of our tradenames or goodwill; our hedging strategies; our inability to obtain adequate insurance coverage; our substantial indebtedness, including the ability to raise additional capital to fund our operations, and to generate the necessary amount of cash to service our existing debt; restrictions in the agreements governing our indebtedness that limit our flexibility in operating our business; the significant portion of our assets pledged as collateral under our existing debt agreements and the ability of our creditors to accelerate the repayment of our indebtedness; volatility and disruptions in the global credit and financial markets, which may adversely affect our ability to borrow and could increase our counterparty credit risks, including those under our credit facilities, derivatives, contingent obligations, insurance contracts and new ship progress payment guarantees; fluctuations in foreign currency exchange rates; overcapacity in key markets or globally; our inability to recruit or retain qualified personnel or the loss of key personnel; future changes relating to how external distribution channels sell and market our cruises; our reliance on third parties to provide hotel management services to certain ships and certain other services; delays in our shipbuilding program and ship repairs, maintenance and refurbishments; future increases in the price of, or major changes or reduction in, commercial airline services; seasonal variations in passenger fare rates and occupancy levels at different times of the year; our ability to keep pace with developments in technology; amendments to our collective bargaining agreements for crew members and other employee relation issues; the continued availability of attractive port destinations; pending or threatened litigation, investigations and enforcement actions; changes involving the tax and environmental regulatory regimes in which we operate; and other factors set forth under «Risk Factors» in our most recently filed Annual Report on Form 10 - K and subsequent filings by the Company with the Securities and Exchange Commission.
Our experience includes representing clients in a variety of matters involving alleged employee misconduct in investigations of data security breaches by the U.S. Department of Education.
For example, unlike high - profile data breaches, the Intel security issue involves vulnerabilities in Intel's physical product itself — its chips — that could be exploited by hackers.
By way of a refresher, following the implementation of the new data breach sections of PIPEDA, organizations that experience a data breach (referred to in PIPEDA as a «breach of security safeguards») must determine whether the breach poses a «real risk of significant harm» (which may include bodily harm, humiliation, damage to reputation or relationships, loss of employment, business or professional opportunities, financial loss, identity theft, negative effects on the credit record and damage to or loss of property) to any individual whose information was involved in the breach by conducting a risk assessmenBy way of a refresher, following the implementation of the new data breach sections of PIPEDA, organizations that experience a data breach (referred to in PIPEDA as a «breach of security safeguards») must determine whether the breach poses a «real risk of significant harm» (which may include bodily harm, humiliation, damage to reputation or relationships, loss of employment, business or professional opportunities, financial loss, identity theft, negative effects on the credit record and damage to or loss of property) to any individual whose information was involved in the breach by conducting a risk assessmenby conducting a risk assessment.
This thinking is challenged by a US Department of Health and Human Services (HHS) study that assesses the root cause of significant data breaches involving health information.
The law as it currently stands has weak annual reporting requirements from government agencies, does not provide much protection to Canadians from abusive treatment by foreign states, does not give the Privacy Commissioner order - making power, does not provide redress in cases involving harm, does not prevent over-collection of personal information, does not protect against surveillance where the data is not recorded, and does not feature security breach disclosure requirements.
With the increased use of technology and in light of data breaches such as that experienced by Equifax, organizations have become acutely aware of the corresponding threats that come from cyberattacks that can seriously threaten reputation, not only for the company directly involved but their business partner clients as well.
An April 2018 article based on a controversy involving Cambridge Analytica «s collection of Facebook user data asserted that social media users could receive $ 17,500 each in compensation over the «data breach» (which Facebook asserted was not a data breach but rather an unauthorized acquisition of user data by a third party).
In various statements by Facebook and its executives, the company has claimed that there was no «data breach» involved, but that user data was used in an unauthorized manner.
The recent data breach involving alleged misuse of information of Facebook users by data mining and analytics firm Cambridge Analytica has once again highlighted the need for users to treat their digital lives as their physical ones.
Written By ESR News Blog Editor Thomas Ahearn Applicant Tracking Solutions (ATS) operators will review ATS integrations with their background screening partners to address emerging legal risks involving areas such as data breaches and litigation over consent forms in previously accepted processes and revise those integrations accordingly in 2016.
a b c d e f g h i j k l m n o p q r s t u v w x y z