-
What You Need to Know About The CPRA
The CPRA goes into effect soon, so here's what you need to know about California's new privacy legislation, how it compares to the CCPA, & the current state of privacy regulation in the greater U.S.
-
2:04
The Cost of an EU Cloud Code of Conduct Assessment
-
2:31
The Cost of a Privacy Program Assessment
-
3:35
The Cost of a GDPR Assessment
-
Privacy Appreciated Now More Than Ever
Schellman's Chris Lippert reflects on Data Privacy Day and why given recent global developments privacy means a bit more this year than it has in the past
-
1:49
CaCPA - Wait and See?
Effective date is not until 2020 - when should you pay attention?
-
California Consumer Privacy Act of 2018 and Its Impact on Businesses
Last month, the California Consumer Privacy Act of 2018 was passed by California legislature, expanding the definition of personal data and including more rights for California residents.
-
Bridging the Gap Between Security and Privacy
Security Geeks and Privacy Peeps
-
Global Privacy Updates at the Global Privacy Summit
GDPR was the star of the show for the 2018 IAPP Global Privacy Summit.
-
GDPR vs. Existing Frameworks: Overlaps, Differences, and Filling the Gaps
Here’s the big question: Is the General Data Protection Regulation (GDPR) a revolutionary regulation that introduces new concepts of security and privacy? The answer — yes and no. The...
-
The GDPR and Personal Data…HELP!
With the General Data Protection Regulation (GDPR) becoming effective May 25, 2018, organizations (or rather, organisations) seem to be stressing a bit. Most we speak with are asking,...
-
Utilizing SOC Examinations to Help with Vendor Management
You most likely selected the link to this blog to discover one of two things: 1) how to effectively manage vendor requirements via SOC reports or 2) what the SOC 1/SOC 2 examination...
-
How to Protect Personally Identifiable Information (PII)
Protecting personally identifiable information (PII) in your charge is paramount to keeping your customers' trust. We provide 6 steps that can help decrease the likelihood of a breach & keep PII safe.
-
Loading More...