Security
Topics
Types of Content
Symantec Leaves the Strongest Emotional Footprint in the IAM Space With Its Symantec VIP ProductRecent data released from SoftwareReviews' Identity Access Management (IAM) Customer Experience Report reveals Symantec VIP is performing above the rest when it comes to... |
|
General Security – User Acceptable Use PolicyUse this template to develop a comprehensive user-facing acceptable use policy to formalize various aspects of security that are relevant to your end users. |
|
Comply With the California Consumer Privacy ActThis project covers the major commonalities of GDPR and CCPA. |
|
Comply With the California Consumer Privacy Act – Executive BriefRead this Executive Brief to understand why it is critical to prepare for CCPA now. |
|
Comply With the California Consumer Privacy Act StoryboardThis storyboard will help you tackle CCPA compliance. |
|
Comply With the California Consumer Privacy Act – Phase 1: Create a Subject Access Request (SAR) ProcessThis phase of the blueprint, Comply with the California Consumer Privacy Act, will help you create a subject access request process. |
|
Example Data Flow Diagram – e-CommerceUse this example as a starting point to documenting your data flow diagrams. |
|
Subject Access Request (SAR) Process ChecklistUse this checklist to validate that you have prepared for all steps of the request process. |
|
Draft Subject Access Request (SAR) Landing Page TemplateUse this template to document what will be included on your subject access request landing page. |
|
Subject Access Request (SAR) ProcedureUse this template to build procedures for subject access requests. |
|