
Norman Ainsworth
Change Management AdvisorThe East African Community (EAC) has embarked on a pivotal journey to harmonize data governance frameworks across its eight Partner States. This initiative aspires to create a seamless and secure environment for cross-border data flows, underscoring the EAC's ambition to lead in digital transformation and regional integration. The EAC Secretariat
In an era where online privacy is of paramount concern, the adherence of websites to privacy regulations is critically important for safeguarding personal data. The importance is magnified by the increasing scrutiny from both consumers and regulatory bodies like the California Privacy Rights Act (CPRA) and the General Data Protection Regulation
The financial sector is under increasing scrutiny from US federal and state regulators regarding third-party risk management. Financial institutions must establish rigorous practices to ensure compliance with regulatory expectations, as recent enforcement actions have demonstrated the severe consequences of non-compliance. The focus on managing
The Digital Operational Resilience Act (DORA) represents a pivotal regulation established by the European Union (EU) to bolster the digital operational robustness and cybersecurity of financial institutions. With the compliance deadline rapidly approaching, financial entities must gain a comprehensive understanding of the scope, requirements, and
The landscape of digital data governance is rapidly evolving, with major global digital powers adopting distinct approaches. This article delves into the data governance models of the United States (US), China, and the European Union (EU), examining their fundamental principles and exploring potential trends towards global convergence. Divergent
Hewlett Packard Enterprise (HPE) has launched a comprehensive investigation following claims by the hacker collective known as IntelBroker, which has announced the sale of allegedly stolen HPE data on an infamous cybercrime forum. The supposed stolen information includes sensitive and critical data such as source code for HPE's Zerto and iLO