To enable effective execution of compliance to the GDPR, the Data Subject Access Request procedure within the organization should be aligned to the requirements specified...
|
|
This Info-Tech briefing will provide a synopsis of what occurred and how organizations can leverage this data breach to expand their security program.
|
|
Use this tool to dynamically document all data that is retained by the organization, how long it will be stored, and other details.
|
|
Use this external-facing template to customize a privacy notice that provides users with a comprehensive understanding of how you process their personal data, why, and...
|
|
Use this external-facing template to customize a cookie policy that provides users with a clear and comprehensive understanding of what cookies are, how they are...
|
|
This phase of the blueprint, Build a Data Privacy Program, will help you to understand the current state of privacy, identify the target state, and develop gap-closing...
|
|
The key deliverable in the Data Privacy Program blueprint, the Data Privacy Framework takes into account the current state of privacy and provides you with the steps to...
|
|
A condensed version of the Data Privacy Framework, this tool emphasizes four key areas of the data privacy framework that can be applied at a more granular, business-unit...
|
|
This phase of the blueprint, Build a Data Privacy Program, will help you to prioritize initiatives based on a collective score that takes into account cost, effort,...
|
|
Effective data security involves many moving parts, and will require support from a number of key individuals within the organization. The Data Security Technical Report...
|
|