Data privacy has been a powder keg for litigation over the last few years, especially as state privacy laws evolve alongside international regulations and data transfer pacts. To help mitigate these ...
On August 29, 2023, the California Privacy Protection Agency (CPPA) Board unveiled Draft Regulations on Risk Assessment and Cybersecurity Audit. The CPPA Board ...
Neglecting to conduct a rigorous risk assessment or overlooking certain business functions can inadvertently put a business ...
With so much of our society’s data flowing through digital platforms, keeping it safe is increasingly crucial. If your business has access to any personal information (PI)—a person's full name, phone ...
SAN FRANCISCO--(BUSINESS WIRE)--DataGrail, a leading data privacy platform, today announced its new Risk Monitor product to help organizations overcome the challenges that accompany privacy risk ...
AUSTIN, Texas, Oct. 18, 2018 /PRNewswire/ -- TrustArc, the leading data privacy management company, today announced two significant enhancements to the TrustArc ...
Businesses’ mishandling of consumer personal data has resulted in data breaches and an erosion of individuals’ rights, members of a California agency tasked with ...
Through this partnership, LOKKER's privacy risk data will be available in Bitsight's cyber insurance platform, equipping underwriters with actionable insights to make informed policy decisions, as ...
Remember when the ad industry glommed onto the phrase “Data is the new oil”? Well, sensitive data is crude oil, at least from the perspective of any marketer who might want to collect and use it. The ...
Google's lead privacy regulator in the European Union has opened an investigation into whether it has complied with the bloc's data protection laws in relation to use of people's information for ...
A tool being developed by the U.S. Department of Homeland Security (DHS) to help it sift through large volumes of data in the search for terrorist threats poses several privacy concerns, the ...
HIPAA violations don’t always come from malicious attacks or headline-making data breaches. More often, they stem from ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results