privacy
Comply With 2023 US Privacy Laws (Virginia, Connecticut, Utah, Colorado)
Blueprint: Security
Privacy Framework Tool
Tool: Security
The key deliverable in the Data Privacy Program blueprint, the Data Privacy Framework takes into account the current state of privacy and provides you with the steps to move towards a mature data privacy program.
US Privacy Law Scope and Readiness Assessment Tool
Tool: Security
This tool provides you with a checklist to start assessing the applicability and privacy compliance readiness level for the following privacy and data protection laws and regulations enacted by Virginia, Connecticut, Utah, and Colorado.
Build Business-Aligned Privacy Programs for Higher Education Institutions
Blueprint: Industry Coverage
College students are living in environments that increasingly require regular interaction with information technology and data. Students are wary of privacy risks and value privacy protections. So should the leaders at the education institutions.
Embed privacy by design into your business processes and protect high-risk personal data.
Build Business-Aligned Privacy Programs for Higher Education Institutions. Solution Set. blueprint. Industry Coverage. Privacy by Design Education Privacy student privacy University Privacy data protection personal information FERPA higher education Faculty Privacy Privacy Risks College Privacy LFBP. College students are living in environments that increasingly require regular interaction with information technology and data. Students are wary of privacy risks and value privacy protections. So should the leaders at the education institutions.. Embed privacy by design into your business processes and protect high-risk personal data..
Data Privacy Program Report
Templates And Policies: Security
This template outlines the operations of your organization's data privacy program by presenting specific metrics across all twelve areas of data privacy, in a digestible and business-relevant context.
Data Privacy Program RACI Chart
Tool: Security
Assign ownership to ensure the data privacy program is governed in an effective way. Leverage the Data Privacy RACI Chart to support the privacy governance model and ensure that privacy permeates the entire organization.
Demonstrate Data Protection by Design for IT Systems
Blueprint: Security
Privacy is now considered an integral part of information security. In fact, consumers often want more than a company’s word that their data is secure; they want to see hard evidence. Thus, companies need to be able to demonstrate how they are securing client data.
Claiming to take privacy seriously isn’t enough; it’s time to show your work.
Privacy is now considered an integral part of information security. In fact, consumers often want more than a company’s word that their data is secure; they want to see hard evidence. Thus, companies need to be able to demonstrate how they are securing client data.. Claiming to take privacy seriously isn’t enough; it’s time to show your work..
Demonstrate Data Protection by Design for IT Systems – Executive Brief
Note: Security
Read this Executive Brief to understand why data protection by design will help you demonstrate your commitment to privacy.
SECURITI.ai Addresses the Privacy vs. AI Debacle With the Industry’s First AI-Powered Privacy Solution
Software Reviews: Security
AI-powered privacy is here to stay, driven by the innovative team at SECURITI.ai. The company injects automation through AI with its PrivacyOps solution, PRIVACI, taking the effort out of mapping out personal data within its various repositories.
AI-powered privacy is here to stay, driven by the innovative team at SECURITI.ai. The Silicon Valley–based company injects automation through AI with its PrivacyOps solution, PRIVACI.ai, taking the onerous effort out of mapping out personal data within its various repositories inside and outside of the business.
2B Advice Makes Moves to Support a Privacy-Aware Culture
Software Reviews: Security
The privacy management software space is rapidly becoming crowded with vendors all looking to add value. 2B Advice has released the most recent version (7.0) of its software, emphasizing the support tools needed to build a privacy-aware culture.
The privacy management software space is rapidly becoming crowded with vendors all looking to add value. 2B Advice has released the most recent version (7.0) of its software, emphasizing the support tools needed to build a privacy-aware culture.
Reduce Risks With a Quantitative Approach to Privacy Compliance
Live Webinar:
Data privacy is increasingly top of mind, regardless of company size or industry.
Ethyca’s Additional $13.5 Million in Series A Funding Drives Momentum for Automation Features
Software Reviews: Security
The industry’s first self-service privacy software solution Ethyca receives its second round of investor funding, aptly timed with the release of Ethyca Pro. The privacy management solution provides full automation capabilities for data mapping, data subject requests (DSRs), and consent...
The privacy management solution provides full automation capabilities for data mapping, data subject requests (DSRs), and consent management for various international privacy regulations. . Ethyca provides a self-service privacy compliance solution that eliminates the need for manual input.
Sick of Searching? TrustArc Automates Identifying Applicable Regulations
Software Reviews: Security
TrustArc’s introduction of Privacy Profile aims to solve an ongoing problem privacy professionals have: identifying all applicable regulations.
TrustArc’s introduction of Privacy Profile aims to solve an ongoing problem privacy professionals have: identifying all applicable regulations.
Privacy Protection: Going Global
Note: Trends and Predictions
Privacy regulations are about to become one of the great constraining forces on e-commerce, and one of the final legal bastions of personal protection for individuals, whether one lives in the E.U., the U.S., or elsewhere.
Privacy Regulations in the U.S. and E.U. Today Vladeck: Up until about three years ago, the dominant framework for consumer privacy was called “notice and choice.” The theory was that as long as you gave consumers notice of some kind, and gave them a choice of some kind, your obligations were satisfied.
Conduct an AI Privacy Risk Assessment
Blueprint: Security
Design an AI implementation that is guided by data governance and data privacy best practices. Effective AI implementation is built on a foundation of effective data privacy principles and awareness.
Navigate AI privacy and data concerns with a comprehensive privacy impact assessment.
Security. artificial intelligence privacy implications of AI AI and privacy privacy impact assessment privacy-preserving AI AI and data protection AI ethics and privacy privacy risks in AI AI and privacy laws responsible AI and privacy privacy by design personal information protection personal information and AI Exponential IT eIT.
Telecommunications Privacy and Security Report
Industry: Industry Coverage
Telecommunications Privacy and Security Report
5G has provided a critical foundation for the deployment of many new services – and has opened Telecom up to new threats to the privacy of sensitive subscriber data and classified company data.Learn about the privacy and security trend and its impact on the Telecommunications industry, along with takeaways to update your IT strategy.
Privacy by Design for Digital Marketing
Blueprint: Security
This research will help you embed privacy by design principles into the digital marketing lifecycle and processes to enable business growth while managing data protection risks.
Mitigating data protection risks while enabling your business growth.
Privacy by Design for Digital Marketing. Solution Set. blueprint. Security. Data privacy and advertising digital marketing privacy online advertising marketing privacy Privacy by design privacy by design principles consumers privacy advertising and privacy. This research will help you embed privacy by design principles into the digital marketing lifecycle and processes to enable business growth while managing data protection risks.. Mitigating data protection risks while enabling your business growth..
Webinar: Reduce Risks With a Quantitative Approach to Privacy Compliance
Video: Security
Take out privacy compliance's grey areas with a quantitative, risk-informed approach.
Embed Privacy and Security Culture Within Your Organization
Blueprint: Security
A strong security program and privacy framework are fundamental to successful organizations and require a proactive approach that embeds principles in the operational seams of the organization. But building a privacy and security culture extends beyond projects, controls, and metrics, and it...
Drive employee engagement with privacy and security via governance and process integration.
A strong security program and privacy framework are fundamental to successful organizations and require a proactive approach that embeds principles in the operational seams of the organization.
Hospital Privacy, Confidentiality & Security Report
Industry: Industry Coverage
Hospital Privacy, Confidentiality & Security Trend Report and Review
From the application of patient care through to the payment of insurance claims, protecting the privacy of patient data is fundamental.Continuing security threats can find weaknesses that can be exploited within your existing network.It is critical to keep IT systems and data safe as a number one priority, and this trend analysis will provide you with ways for your IT team to evaluate and manage threats.
Prepare to Privacy-Proof Your AI Technology
Live Webinar:
Couple this with increasing pressure from data privacy regulations and the landscape becomes challenging to navigate.
Filter by Content Type
- All Results
- Note (291)
- Software Reviews (143)
- Blueprint (47)
- Tech Note (31)
- Video (30)
- Templates And Policies (29)
- Tool (24)
- Live Webinar (19)
- Diagnostic (14)
- In The News (14)
- Industry (11)
- Academy Course (8)
- Job Description (1)
- Knowledge Base (1)
- Press Release (1)
- Research Center (1)
- Site Page (1)