logo
#

Latest news with #Identifiable

MCMC clarifies mobile phone data collection amid media reports, ensures privacy
MCMC clarifies mobile phone data collection amid media reports, ensures privacy

The Sun

time07-06-2025

  • Business
  • The Sun

MCMC clarifies mobile phone data collection amid media reports, ensures privacy

KUALA LUMPUR: The Malaysian Communications and Multimedia Commission (MCMC) has clarified its collection of mobile phone data (MPD) from Mobile Network Operators (MNOs), assuring that no Personally Identifiable Information (PII) is accessed, processed, or disclosed. The clarification comes amid recent media reports regarding the matter. In a statement today, MCMC said MPD was used strictly for the generation of official statistics to support evidence-based policymaking in two key domains, namely the ICT Sector and the Tourism Sector. For the ICT Sector, MPD helps produce granular statistics, such as the number of active mobile broadband subscriptions and penetration rates at the state, district, mukim, parliamentary constituency, state legislative assembly (DUN), and local authority levels. For the Tourism Sector, it generates indicators such as the number of visitors and domestic tourism trips. 'The MPD data requested from MNOs is anonymised and contains no PII. 'In addition, MNOs are given the option to either process the MPD data within their own secure environment and submit the required anonymised and aggregated output to MCMC, or, for MNOs without in-house processing capabilities, to submit the anonymised data to MCMC for processing. 'In both cases, no individual subscriber can be identified through the data collected,' it said. MCMC further clarified that the use of MPD as a new source of national statistics was a strategic direction set by the government to strengthen the quality and timeliness of statistical outputs for policy and planning purposes. Implementation of MPD is through collaboration with the International Telecommunication Union (ITU) and the UN Committee of Experts on Big Data and Data Science, it added. Over the past two years, MCMC said extensive engagement with all MNOs had been carried out to ensure mutual understanding of the data requirements, processes, and privacy safeguards. These included the MPD National Workshop held from Sept 2 to 5, 2024, attended by representatives from the Department of Statistics Malaysia (DOSM), International Telecommunication Union (ITU), Ministry of Communications, Ministry of Tourism, Art and Culture, and MNOs (CelcomDigi, Maxis, TM Tech, U Mobile, and YTL). 'This initiative aligns with international best practices. It mirrors similar projects already implemented in countries such as Indonesia and Brazil, where anonymised telecommunications data is used to enhance national statistics while fully safeguarding user privacy,' it said.

MCMC clarifies phone data use, ensures user privacy
MCMC clarifies phone data use, ensures user privacy

The Sun

time07-06-2025

  • Business
  • The Sun

MCMC clarifies phone data use, ensures user privacy

KUALA LUMPUR: The Malaysian Communications and Multimedia Commission (MCMC) has clarified its collection of mobile phone data (MPD) from Mobile Network Operators (MNOs), assuring that no Personally Identifiable Information (PII) is accessed, processed, or disclosed. The clarification comes amid recent media reports regarding the matter. In a statement today, MCMC said MPD was used strictly for the generation of official statistics to support evidence-based policymaking in two key domains, namely the ICT Sector and the Tourism Sector. For the ICT Sector, MPD helps produce granular statistics, such as the number of active mobile broadband subscriptions and penetration rates at the state, district, mukim, parliamentary constituency, state legislative assembly (DUN), and local authority levels. For the Tourism Sector, it generates indicators such as the number of visitors and domestic tourism trips. 'The MPD data requested from MNOs is anonymised and contains no PII. 'In addition, MNOs are given the option to either process the MPD data within their own secure environment and submit the required anonymised and aggregated output to MCMC, or, for MNOs without in-house processing capabilities, to submit the anonymised data to MCMC for processing. 'In both cases, no individual subscriber can be identified through the data collected,' it said. MCMC further clarified that the use of MPD as a new source of national statistics was a strategic direction set by the government to strengthen the quality and timeliness of statistical outputs for policy and planning purposes. Implementation of MPD is through collaboration with the International Telecommunication Union (ITU) and the UN Committee of Experts on Big Data and Data Science, it added. Over the past two years, MCMC said extensive engagement with all MNOs had been carried out to ensure mutual understanding of the data requirements, processes, and privacy safeguards. These included the MPD National Workshop held from Sept 2 to 5, 2024, attended by representatives from the Department of Statistics Malaysia (DOSM), International Telecommunication Union (ITU), Ministry of Communications, Ministry of Tourism, Art and Culture, and MNOs (CelcomDigi, Maxis, TM Tech, U Mobile, and YTL). 'This initiative aligns with international best practices. It mirrors similar projects already implemented in countries such as Indonesia and Brazil, where anonymised telecommunications data is used to enhance national statistics while fully safeguarding user privacy,' it said.

MCMC Clarifies Mobile Phone Data Collection Amid Media Reports, Ensures Privacy
MCMC Clarifies Mobile Phone Data Collection Amid Media Reports, Ensures Privacy

Barnama

time06-06-2025

  • Business
  • Barnama

MCMC Clarifies Mobile Phone Data Collection Amid Media Reports, Ensures Privacy

KUALA LUMPUR, June 6 (Bernama) -- The Malaysian Communications and Multimedia Commission (MCMC) has clarified its collection of mobile phone data (MPD) from Mobile Network Operators (MNOs), assuring that no Personally Identifiable Information (PII) is accessed, processed, or disclosed. The clarification comes amid recent media reports regarding the matter. In a statement today, MCMC said MPD was used strictly for the generation of official statistics to support evidence-based policymaking in two key domains, namely the ICT Sector and the Tourism Sector. For the ICT Sector, MPD helps produce granular statistics, such as the number of active mobile broadband subscriptions and penetration rates at the state, district, mukim, parliamentary constituency, state legislative assembly (DUN), and local authority levels. For the Tourism Sector, it generates indicators such as the number of visitors and domestic tourism trips. 'The MPD data requested from MNOs is anonymised and contains no PII. 'In addition, MNOs are given the option to either process the MPD data within their own secure environment and submit the required anonymised and aggregated output to MCMC, or, for MNOs without in-house processing capabilities, to submit the anonymised data to MCMC for processing. 'In both cases, no individual subscriber can be identified through the data collected,' it said. MCMC further clarified that the use of MPD as a new source of national statistics was a strategic direction set by the government to strengthen the quality and timeliness of statistical outputs for policy and planning purposes. Implementation of MPD is through collaboration with the International Telecommunication Union (ITU) and the UN Committee of Experts on Big Data and Data Science, it added. Over the past two years, MCMC said extensive engagement with all MNOs had been carried out to ensure mutual understanding of the data requirements, processes, and privacy safeguards.

A DOGE staffer working as a ‘senior advisor' in the government's cybersecurity agency once provided tech support to a cybercrime ring
A DOGE staffer working as a ‘senior advisor' in the government's cybersecurity agency once provided tech support to a cybercrime ring

Yahoo

time27-03-2025

  • Yahoo

A DOGE staffer working as a ‘senior advisor' in the government's cybersecurity agency once provided tech support to a cybercrime ring

Edward Coristine, a 19-year-old DOGE member, has been linked to a cybercrime group through his former company, DiamondCDN. Coristine has been listed as an adviser in multiple U.S. government agencies, including the Cybersecurity and Infrastructure Security Agency. A member of Elon Musk's Department of Government Efficiency (DOGE) appears to have provided tech support to a cybercrime group known as EGodly. Edward Coristine, also known by his nickname "Big Balls," has been linked to the cybercrime group through a company he ran called DiamondCDN. According to corporate and digital records reviewed by Reuters and Telegram messages seen by Fortune, EGodly was one of the company's users. The group publicly thanked Coristine's company for its assistance in a post on its Telegram channel on Feb. 15, 2023. "We extend our gratitude to our valued partners DiamondCDN for generously providing us with their amazing DDoS protection and caching systems, which allow us to securely host and safeguard our website," the message read. An FBI agent who had contact with EGodly told Reuters the group had been investigated due to a connection with swatting, a practice of making false emergency calls in an attempt to send SWAT teams to targeted addresses. He called EGodly "not a pleasant group," referring to the members as "bad folks." In other messages shared on the Telegram channel and reviewed by Fortune, the group can also be seen selling people's private PII (Personally Identifiable Information), boasting about hacking government emails and cyberstalking an FBI agent. In one post, the group advertised "Brazil government emails" for sale, telling members they could use the addresses to get information on users by sending data requests to the support of platforms. In one video posted by the account, a car drove past what appeared to be the FBI agent's house while someone screamed out the window: "EGodly says you're a bitch!" An analysis of digital records conducted by Reuters found that between October 2022 and June 2023, the EGodly website, was linked to IP addresses associated with DiamondCDN and other businesses owned by Coristine. During this period, some visitors to the site encountered a DiamondCDN "Security check," the outlet reported. Representatives for the State Department and DiamondCDN did not immediately return requests for comment from Fortune. The department and Coristine did not reply to Reuters comment requests either. Coristine's role within the government is not entirely clear. The 19-year-old was most recently a freshman mechanical engineering and physics major at Boston's Northeastern University until joining Elon Musk's cost-cutting team at DOGE. He also worked briefly at Musk's brain implant company Neuralink. According to Reuters, he's listed as a "senior adviser" at the State Department as well as the Cybersecurity and Infrastructure Security Agency. He's also been linked to the Department of Homeland Security by a Washington Post report. Wired has also reported that Coristine is listed as one of several 'experts' at the Office of Personnel Management, the government's HR department. Although Coristine's link to EGodly may have been brief, Nitin Natarajan—formerly the deputy director of CISA under President Joe Biden—expressed concern about the teenager now being part of a team with extensive access to government systems. "This stuff was not in the distant past," Natarajan told Reuters. "The recency of the activity and the types of groups he was associated would definitely be concerning." It's also not the first time Coristine has made headlines for his past associations. Last month, Bloomberg reported that he was previously fired from an internship at Path Network for reportedly leaking information to competitors. Coristine later denied doing anything "contractually wrong' while working at Path Network via a post on Discord, per Bloomberg. This story was originally featured on

CloudDefense.AI Reveals Key Strategies to Identify and Protect Personal Identifiable Information (PII) in the Cloud
CloudDefense.AI Reveals Key Strategies to Identify and Protect Personal Identifiable Information (PII) in the Cloud

Associated Press

time14-03-2025

  • Business
  • Associated Press

CloudDefense.AI Reveals Key Strategies to Identify and Protect Personal Identifiable Information (PII) in the Cloud

'Protecting PII isn't just about compliance - it's about building trust. Organizations that secure their data proactively will lead within the changing digital environment.' — Abhi Arora, COO of CA, UNITED STATES, March 14, 2025 / / -- As businesses migrate to the cloud, securing Personal Identifiable Information (PII) becomes urgent. Cloud environments offer flexibility and scalability, but poor security can expose sensitive data to cybercriminals. Misconfigurations or unchecked access can lead to significant PII exposure, causing financial, legal, and reputational damage. a leader in cloud security, assists companies in proactively identifying and securing PII before threats arise. A significant risk in cloud security is the lack of visibility into where PII is stored and accessed. Organizations struggle to track sensitive data across databases, logs, backups, and third-party applications. Without understanding data flow, businesses are vulnerable to unauthorized access and accidental leaks. highlights the need for automated discovery and classification tools that monitor cloud environments, ensuring organizations know where their PII resides and who can access it. Controlling access to PII is crucial. Excessive permissions pose threats, with many breaches stemming from poor access management rather than complex attacks. follows the Principle of Least Privilege (PoLP), granting only essential access to employees and applications. Using Cloud Infrastructure Entitlement Management (CIEM) and Role-Based Access Control (RBAC), organizations can automate reviews, detect and remove excessive permissions, thus minimizing risks. Restricting access is insufficient. If data is compromised, encryption is essential. Properly encrypted data remains unreadable, even to attackers. advises using strong encryption like AES-256 for data at rest and TLS for data in transit. Tokenization and effective key management also protect sensitive data. Many organizations neglect key management by storing encryption keys with the data. highlights the need for secure, separate storage of keys to prevent unauthorized decryption access. Encryption minimizes data exposure, but real-time monitoring and threat detection are essential to prevent security incidents. Cloud environments are dynamic, requiring ongoing monitoring and anomaly detection to respond swiftly to evolving cyber threats. highlights advanced Threat Detection and Response (TDR) solutions for immediate alerts on suspicious activities and unauthorized access, enabling organizations to act before breaches occur. Organizations must prioritize compliance with data protection regulations like GDPR, CCPA, HIPAA, and PCI-DSS, which impose strict guidelines on handling personally identifiable information (PII). Non-compliance risks penalties, and customer trust. automates audits, enforces data retention policies, and trains staff in sensitive data handling. By embedding security into cloud operations, organizations ensure compliance and maintain strong security. As cloud adoption continues to grow, businesses must stay ahead of evolving threats by proactively securing PII. remains committed to helping organizations build resilient cloud security strategies through CNAPP, DSPM, and CIEM solutions. By taking a proactive stance on data protection, access control, encryption, and threat monitoring, businesses can fortify their cloud environments and build lasting trust with customers. About headquartered in Palo Alto, is a cutting-edge Cloud-Native Application Protection Platform (CNAPP) that provides end-to-end security for cloud infrastructures and applications. seamlessly integrates advanced technology and expertise, making it the ultimate solution for mitigating security risks from development to deployment. Their state-of-the-art platform offers a full spectrum of security solutions, ensuring organizations can confidently protect their cloud environments. Covering every layer of security, provides SAST, DAST, SCA, IaC Scanning, Advanced API Security, Container Security, CSPM, CWPP, CIEM, Kubernetes Security, and AI-SPM. Moreover, their exclusive technology guarantees continuous policy enforcement and proactive threat mitigation. enhances security with AI-driven remediation, attack path analysis, and automated risk assessment to reduce vulnerability noise and detect zero-day threats in real-time. This innovative approach boosts security efficiency, providing up to five times the value of traditional tools and establishing them as leaders in cloud security. If you want to learn more about and explore one of the best CNAPPs in the industry, please book a free demo or connect with them at [email protected] X LinkedIn Instagram YouTube Legal Disclaimer:

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store