article thumbnail

Pennsylvania residents are unprotected against modern data breaches

Scott R. Davis

The first Apple iPhone was released in 2007, Ransomware became a common word in 2011, and Microsoft Windows 10 was released in 2015. Over the last fourteen years much has changed with technology. The one thing that hasn’t changed since 2006, is you guessed it, Pennsylvania’s Breach of Personal Information Notification Act.

Internet 130
article thumbnail

Scott Davis To Testify to Joint Session of PA Legislature on PA Breach Notification Law

Scott R. Davis

To put that into perspective of modern technology, the first iPhone was released in 2007 and ransomware didn’t become a common word until 2011. The Breach of Personal Information Notification Act (P.L. 474, No 94) passed on December 22, 2005 and became law on June 19, 2006.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Covid-19: Elements of a Scenario

Emergency Planning

About the same time, 2007, Dr Michael Leavitt of the US Department of Health and Human Services wrote: "We don't know when a pandemic will arrive. McCaw 2007. PLoS One 2007:2(11): e1220, 1-6. They also involve very high degrees of uncertainty. Mathews et al. References Mathews, J.D., McVernon, E.S. McBryde and J.M.

Pandemic 130
article thumbnail

Technology: What, When and How to Adopt

Disaster Zone Podcast

In 2007, Jim was appointed General Manager of the Los Angeles Emergency Management Department, where he led a successful departmental reorganization and restructuring of Los Angeles’ emergency management protocols and processes. The podcast guest is Jim Featherstone , He is a native of Washington D.C.

article thumbnail

Data Privacy Day: one resolution for 2021

Synology

Since the first Data Privacy Day back in 2007, online privacy threats have multiplied. When it comes to keeping your personal information secure, don’t take anyone at their word — use encryption. On top of more traditional threats like phishing — which has been around since at least the early 1990s — users today face […].

article thumbnail

Maui Wildfire Disaster Recovery

Disaster Zone Podcast

It was in the weeks and months following these events that he watched many survivors evolve into disaster victims as they didn't know what to do or where to turn for help. It was in the weeks and months following these events that he watched many survivors evolve into disaster victims as they didn't know what to do or where to turn for help.

article thumbnail

What’s new with Citrix Analytics for Performance – Q1 2022

Citrix

When I started my Citrix career in 2007, I was a technical support engineer helping customers of all sizes and types solve problems. While the Citrix versions of MetaFrame 3.0, and Presentation Server 4.5 are quite different from the … The post What’s new with Citrix Analytics for Performance – Q1 2022 first appeared on Citrix Blogs.

87