Remove Guidelines Remove Internet Remove Mobile
article thumbnail

30 ways to improve IoT privacy

Network World

Much work still must be done before the industrial and municipal Internet of Things (IoT) becomes widely adopted outside of the circle of innovators. One field, privacy, well understood by the public and private sector in the context of the cloud, PCs and mobile, is in the early stage of adaptation for the IoT.

article thumbnail

IoT privacy: 30 ways to build a security culture

Network World

Much work still must be done before the industrial and municipal Internet of Things (IoT) becomes widely adopted outside of the circle of innovators. One field, privacy, well understood by the public and private sector in the context of the cloud, PCs and mobile, is in the early stage of adaptation for the IoT.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

6 African tech companies transforming the KYC landscape

CIO Business Intelligence

KYC guidelines, including government regulations, are meant to prevent unlawful access to the banking system and typically include anti-money laundering requirements such as verification of customers’ identity, and assessing their risk factors.

Company 245
article thumbnail

The Legal Challenges of the Internet of Things

CTOvision

The problem is, it is easier than ever for manufacturers to integrate data storage, but oftentimes the privacy and legal repercussions of the Internet of Things (IoT) are not considered. Here are a few legal aspects for businesses to consider when it comes to the Internet of Things. Internet-connected devices pose a challenge.

Internet 150
article thumbnail

Steps CIOs should take to protect customer data in Nigeria’s open banking systems

CIO Business Intelligence

Open banking is the only way you can set systems like agency banking, mobile banking and use dollars.”. The Operational Guidelines for Open Banking in Nigeria published by the CBN stress that customer data security is critical for the safety of the open banking model. Traditional banking is fading away,” he says.

Banking 299
article thumbnail

The Importance of an Online Encryption Policy

CTOvision

Though you may have the best IT department in the world and advanced computing resources, if there are no written methodical steps that will serve as guidelines or Standard Operating Procedure (SOP) for computing and data storage, then all these hiring-sprees of IT talents and investments are doomed to fail.

Policies 283
article thumbnail

Web accessibility emerges as a top CIO priority

CIO Business Intelligence

And 412 of the top 500 internet retailers have been party to at least one lawsuit over the last four years alleging that their websites discriminate against users with disabilities. But CIOs increasingly ignore such details at their peril: 11 lawsuits are filed every day in U.S. courts over website inaccessibility. That’s a tricky order.

Retail 340