Comprehensive software reviews to make better IT decisions
IAPP’s 2020 Privacy Tech Vendor Report Highlights Data Subject Request (DSR) Feature
The International Association of Privacy Professionals (IAPP) has released its 2020 Privacy Tech Vendor report, reviewing key software solution vendors within the space. This year’s report highlighted the recent addition of Data Subject Request (DSR) to the feature categories.
This most recent iteration of the IAPP Tech Vendor Report chose to include the DSR category within its evaluated features as this continues to present significant obstacles for organizations in-scope of the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA). Due to the complexity of taking on the DSR process as a manual task, especially for those organizations with large volumes of unstructured data, many key players in the privacy software space have opted to include it as a product feature, represented in 49 of the 304 total vendors assessed within the IAPP’s report. Although this feature provides an element of ease within the DSR steps, there still exist complications and nuances around elements of the DSR process. One key problematic area for organizations is in the identity verification step of the DSR, an area of focus that many key vendors have taken note of and promised to address through on-going feature improvements.
Source: IAPP Privacy Vendor Report
Privacy may no longer be center stage, but it isn’t dead yet. While privacy has taken a back seat during the flurry of activity that has followed in the wake of COVID-19, the IAPP’s annual Privacy Tech Vendor report provides valuable insight around the primary issues that organizations continue to face with respect to privacy regulation adherence. While the initial cost involved in acquiring an automated DSR software solution may seem difficult to justify, IT leaders must consider the implications of the following:
- Non-adherence to data privacy regulations and the potential resulting fines.
- Time and financial cost involved in establishing an in-house DSR solution.
- Process changes and re-education involved in altering current data collection methods.
Though the introduction of solutions that support DSR responses is not a cure-all, it may well be the more viable and resource-realistic option for organizations processing large volumes of complex, unstructured data. It is advised that organizations consider the expanded feature sets of privacy software vendors and weigh the financial cost with the support of streamlined processes, specifically those pertaining to the DSRs, prior to making their final purchase decision.
Want to Know More?
SECURITI.ai Addresses the Privacy vs. AI Debacle With the Industry’s First AI-Powered Privacy Solution
AI-powered privacy is here to stay, driven by the innovative team at SECURITI.ai. The company injects automation through AI with its PrivacyOps solution, PRIVACI, taking the effort out of mapping out personal data within its various repositories.
The privacy management software space is rapidly becoming crowded with vendors all looking to add value. 2B Advice has released the most recent version (7.0) of its software, emphasizing the support tools needed to build a privacy-aware culture.
Proteus-Cyber, a leading vendor within the privacy program management space, has added two standout features to its current privacy software offering. The Threat Intelligence feature tracks and links directly to CVEs discovered daily and can be integrated within the IT asset register of current Proteus-Cyber NextGen Data Privacy users.
The Department of Justice is looking to acquire a GRC tool for the Office of the CIO within the FBI’s Enterprise Information Security Section.
In response to criticism over data collection practices, Google is introducing default deletion of location history in its web and application activities for new accounts.
In early March, Titus released Titus Illuminate 2020, which was the company’s answer to the question of analyzing data at rest. This latest version of Illuminate leverages machine learning and AI in an effort to manage data that contains potentially sensitive or high-risk personal information.
In the data discovery and classification sphere, Varonis has long been associated with impressive features and a user-friendly approach to platform integration. The company takes things a step further by introducing the ability to focus on protection of personal data through a privacy lens.
PHEMI is a data privacy solution focused on keeping data-processing activities secure by redacting information based on the role of the accessor. Thus, allowing such data to be used for multiple use cases without compromising privacy.
Kenna Security deployed their new data driven vulnerability management program, Kenna.VM and accessory program, Kenna.VI. Released on April 28th, Kenna.VM was created with the purpose to set service-level agreements (SLAs) with risk tolerance in mind.