Excerpt from EY Wealth & Asset Management viewpoint. Joined-up data is increasingly crucial to creating shareholder value With the benefit of hindsight, it is easy to see why data has had such a meteoric rise up the agenda of asset managers’ executive teams. The explosion in the volume and speed of data accumulation across the … More Joined-up data: a Board imperative
The European Court of Justice (ECJ) has weighed-in on a long debated area of data protection law by ruling that the definition of personal data extends to dynamic IP addresses. In a ruling dated 19 October 2016 (ref.: C582/14), the ECJ found that dynamic IP addresses constitute personal data whenever the website host that processed … More EU: Court of Justice rules on dynamic IP addresses
EY has announced the launch of EY Ops Chain, a set of applications and services aimed at helping organizations commercialize the use of blockchain technology across the enterprise. EY Ops Chain combines blockchain-based services developed jointly by EY and industry collaborators, combining EY’s full range of consulting, tax and audit expertise to drive enhanced business … More EY infuses blockchain into enterprises and across industries with launch of EY Ops Chain
This article was first published on betterworkingworld.ey.com Could you explain how a cyber breach affects your bottom line? Cyber economics aims to do just that What is the true impact of a cyber breach? Lost data? Angry customers? A negative hit to your corporate reputation? With so many variables, many of which can be difficult … More Cyber economics: getting the board on board with cybersecurity
We are pleased to present the Spring 2017 edition of our Corporate and Commercial Law global update. This quarterly publication highlights a range of international corporate law matters and covers recent law developments in specific countries. In this issue, we have articles from a total of 36 jurisdictions on current legal affairs around the globe: … More Out now: EY Corporate & Commercial Law — global update, Spring 2017 edition
First published on betterworkingworld.ey.com Blockchain is more than just a data security protocol — it could transform the way industries and individuals do business Blockchain and the proliferation of the Internet of Things (IoT) presents an important opportunity to revolutionize supply chains, payments and revenue streams. But there are several unknowns and a number of … More With blockchain, what comes first, opportunity or threat?
Excerpt from EY report, Data ethics: digital dilemmas for the 21st century board. Just over 10 years since the phrase ‘data is the new oil’ (Clive Humby, 2006) was coined, the oil rush is gaining momentum. Companies are competing to create new markets and business models enabled by this rise in data, and unearth fresh … More Just because the law allows you to use data in a particular way, should you?
An overwhelming majority (89%) of power and utility executives say their cybersecurity function does not fully meet their organization’s needs, according to the EY Global Information Security Survey 2016-17. That number continues to rise compared with last year (86% in 2015) as companies struggle to manage increased risk from growth in digital and connected devices. … More Survey shows utilities’ cybersecurity not keeping up with technology
Following the adoption of the Cybersecurity Law of China (CSL) on 7 November 2016 by the National People’s Congress (NPC), the legal framework for data protection and cybersecurity continues to be enhanced at a significant pace. In November 2016, the Ministry of Industry and Information Technology released for consultation a draft Notice on Regulating the … More China is strengthening its legal framework for the digital economy
It’s not a crime to be attacked; you can’t stop being a target. It’s not a crime even to be breached; threats come from many directions and are highly sophisticated. The real problem is not realizing you’ve been breached, and failing to react in a planned and coordinated manner. As many organizations have learned – … More Incident response: Preparing for and responding to a cyber attack