This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC’s registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.
Special to Dark Reading: Maria Korolov, IT Pro Today
Compliance with the new privacy rules doesn’t always fall on data center managers, but when it does, it’s more difficult than it may sound.
The new set of privacy laws that went into effect in California on January 1 affects companies in and outside of the state – across the US and even around the world. A somewhat similar set of rules went into effect in Europe in 2018. Its effects are also felt well beyond European borders, by all companies above a certain size that provide services to Europeans.
For the most part, these laws are designed to protect individual consumers’ privacy. Both the California Consumer Privacy Act (CCPA) and Europe’s General Data Protection Regulation (GDPR) include the “right to be forgotten.” It entitles every consumer to request that a company delete all the information it has collected about them, with a few exceptions, such as cases where the data needs to be retained to comply with other requirements.
If IP addresses are collected for cybersecurity purposes, for example, to ensure that only legitimate users are accessing data and systems, the information falls under one of the nine exceptions to this provision of the CCPA.
In most companies, it will be up to the individual business units, with the help of IT, legal, and marketing, to manage collection of consumer data and create processes to delete it on request. Does this mean data center managers are off the hook and can ignore CCPA?
Read the full article here.
Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio
From DHS/US-CERT’s National Vulnerability Database
On the QFX3500 and QFX3600 platforms, the number of bytes collected from the RANDOM_INTERRUPT entropy source when the device boots up is insufficient, possibly leading to weak or duplicate SSH keys or self-signed SSL/TLS certificates. Entropy increases after the system has been up and running for so…
Background For regular, unencrypted FTP traffic, the FTP ALG can inspect the unencrypted control channel and open related sessions for the FTP data channel. These related sessions (gates) are specific to source and destination IPs and ports of client and server. The design intent of the ftps-extensi…
An open redirect is present on the gateway’s login page, which could cause a user to be redirected to a malicious site after logging in.
A reflected XSS vulnerability exists within the gateway, allowing an attacker to craft a specialized URL which could steal the user’s authentication token. When combined with CVE-2020-6803, an attacker could fully compromise the system.