privacy

Comply With 2023 US Privacy Laws (Virginia, Connecticut, Utah, Colorado)

Blueprint: Security

Organizations need to employ a systematic approach in establishing and operationalizing risk-based and right-sized privacy programs.

Privacy Framework Tool

Tool: Security

The key deliverable in the Data Privacy Program blueprint, the Data Privacy Framework takes into account the current state of privacy and provides you with the steps to move towards a mature data privacy program.

US Privacy Law Scope and Readiness Assessment Tool

Tool: Security

This tool provides you with a checklist to start assessing the applicability and privacy compliance readiness level for the following privacy and data protection laws and regulations enacted by Virginia, Connecticut, Utah, and Colorado.

Build Business-Aligned Privacy Programs for Higher Education Institutions

Blueprint: Industry Coverage

College students are living in environments that increasingly require regular interaction with information technology and data. Students are wary of privacy risks and value privacy protections. So should the leaders at the education institutions.

Embed privacy by design into your business processes and protect high-risk personal data.

Build Business-Aligned Privacy Programs for Higher Education Institutions. Solution Set. blueprint. Industry Coverage. Privacy by Design Education Privacy student privacy University Privacy data protection personal information FERPA higher education Faculty Privacy Privacy Risks College Privacy LFBP. College students are living in environments that increasingly require regular interaction with information technology and data. Students are wary of privacy risks and value privacy protections. So should the leaders at the education institutions.. Embed privacy by design into your business processes and protect high-risk personal data..

Data Privacy Program Report

Templates And Policies: Security

This template outlines the operations of your organization's data privacy program by presenting specific metrics across all twelve areas of data privacy, in a digestible and business-relevant context.

Data Privacy Program RACI Chart

Tool: Security

Assign ownership to ensure the data privacy program is governed in an effective way. Leverage the Data Privacy RACI Chart to support the privacy governance model and ensure that privacy permeates the entire organization.

Demonstrate Data Protection by Design for IT Systems

Blueprint: Security

Privacy is now considered an integral part of information security. In fact, consumers often want more than a company’s word that their data is secure; they want to see hard evidence. Thus, companies need to be able to demonstrate how they are securing client data.

Claiming to take privacy seriously isn’t enough; it’s time to show your work.

Privacy is now considered an integral part of information security. In fact, consumers often want more than a company’s word that their data is secure; they want to see hard evidence. Thus, companies need to be able to demonstrate how they are securing client data.. Claiming to take privacy seriously isn’t enough; it’s time to show your work..

Demonstrate Data Protection by Design for IT Systems – Executive Brief

Note: Security

Read this Executive Brief to understand why data protection by design will help you demonstrate your commitment to privacy.

SECURITI.ai Addresses the Privacy vs. AI Debacle With the Industry’s First AI-Powered Privacy Solution

Software Reviews: Security

AI-powered privacy is here to stay, driven by the innovative team at SECURITI.ai. The company injects automation through AI with its PrivacyOps solution, PRIVACI, taking the effort out of mapping out personal data within its various repositories.

AI-powered privacy is here to stay, driven by the innovative team at SECURITI.ai. The Silicon Valley–based company injects automation through AI with its PrivacyOps solution, PRIVACI.ai, taking the onerous effort out of mapping out personal data within its various repositories inside and outside of the business.

2B Advice Makes Moves to Support a Privacy-Aware Culture

Software Reviews: Security

The privacy management software space is rapidly becoming crowded with vendors all looking to add value. 2B Advice has released the most recent version (7.0) of its software, emphasizing the support tools needed to build a privacy-aware culture.

The privacy management software space is rapidly becoming crowded with vendors all looking to add value. 2B Advice has released the most recent version (7.0) of its software, emphasizing the support tools needed to build a privacy-aware culture.

Reduce Risks With a Quantitative Approach to Privacy Compliance

Live Webinar:

Data privacy is increasingly top of mind, regardless of company size or industry.

Ethyca’s Additional $13.5 Million in Series A Funding Drives Momentum for Automation Features

Software Reviews: Security

The industry’s first self-service privacy software solution Ethyca receives its second round of investor funding, aptly timed with the release of Ethyca Pro. The privacy management solution provides full automation capabilities for data mapping, data subject requests (DSRs), and consent...

The privacy management solution provides full automation capabilities for data mapping, data subject requests (DSRs), and consent management for various international privacy regulations. . Ethyca provides a self-service privacy compliance solution that eliminates the need for manual input.

Sick of Searching? TrustArc Automates Identifying Applicable Regulations

Software Reviews: Security

TrustArc’s introduction of Privacy Profile aims to solve an ongoing problem privacy professionals have: identifying all applicable regulations.

TrustArc’s introduction of Privacy Profile aims to solve an ongoing problem privacy professionals have: identifying all applicable regulations.

Conduct an AI Privacy Risk Assessment

Blueprint: Security

Design an AI implementation that is guided by data governance and data privacy best practices. Effective AI implementation is built on a foundation of effective data privacy principles and awareness.

Navigate AI privacy and data concerns with a comprehensive privacy impact assessment.

Security. artificial intelligence privacy implications of AI AI and privacy privacy impact assessment privacy-preserving AI AI and data protection AI ethics and privacy privacy risks in AI AI and privacy laws responsible AI and privacy privacy by design personal information protection personal information and AI Exponential IT eIT.

Telecommunications Privacy and Security Report

Industry: Industry Coverage

Telecommunications Privacy and Security Report

5G has provided a critical foundation for the deployment of many new services – and has opened Telecom up to new threats to the privacy of sensitive subscriber data and classified company data.Learn about the privacy and security trend and its impact on the Telecommunications industry, along with takeaways to update your IT strategy.

Privacy by Design for Digital Marketing

Blueprint: Security

This research will help you embed privacy by design principles into the digital marketing lifecycle and processes to enable business growth while managing data protection risks.

Mitigating data protection risks while enabling your business growth.

Privacy by Design for Digital Marketing. Solution Set. blueprint. Security. Data privacy and advertising digital marketing privacy online advertising marketing privacy Privacy by design privacy by design principles consumers privacy advertising and privacy. This research will help you embed privacy by design principles into the digital marketing lifecycle and processes to enable business growth while managing data protection risks.. Mitigating data protection risks while enabling your business growth..

Webinar: Reduce Risks With a Quantitative Approach to Privacy Compliance

Video: Security

Take out privacy compliance's grey areas with a quantitative, risk-informed approach.

Embed Privacy and Security Culture Within Your Organization

Blueprint: Security

A strong security program and privacy framework are fundamental to successful organizations and require a proactive approach that embeds principles in the operational seams of the organization. But building a privacy and security culture extends beyond projects, controls, and metrics, and it...

Drive employee engagement with privacy and security via governance and process integration.

A strong security program and privacy framework are fundamental to successful organizations and require a proactive approach that embeds principles in the operational seams of the organization.

Hospital Privacy, Confidentiality & Security Report

Industry: Industry Coverage

Hospital Privacy, Confidentiality & Security Trend Report and Review

From the application of patient care through to the payment of insurance claims, protecting the privacy of patient data is fundamental.Continuing security threats can find weaknesses that can be exploited within your existing network.It is critical to keep IT systems and data safe as a number one priority, and this trend analysis will provide you with ways for your IT team to evaluate and manage threats.

Prepare to Privacy-Proof Your AI Technology

Live Webinar:

Couple this with increasing pressure from data privacy regulations and the landscape becomes challenging to navigate.
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019