Skip to content

Blog

A Guide to Types of Sensitive Information

May 21, 2024

By Alexis Porter

…information” of a resident of New York — also referred to as “covered businesses.” Private information expands upon “personal information,” which was the type of data originally regulated by New

Blog

What Is the Cloud Data Management Framework? (CDMC)

September 30, 2021

By BigID

…compliance for new and emerging privacy and protection regulations, and secure personal, sensitive, and regulated data in the cloud. Transform data security with ML-based classification, file analysis, and apps to…

Blog

Data Flows, Google Analytics, and EU-US Data Transfers

January 25, 2022

By Jaclyn Wishnia

…only a few weeks into the new year, and already two significant decisions have followed in the aftermath of the Schrems II ruling. The new decisions were issued by the…

Blog

A Taste of Surveillance: The Truth About Third-Party Cookies

June 28, 2023

By Alexis Porter

…did they know? The answer—- third-party cookies. These clever little bits of code are set by domains other than the website you’re visiting. They track your online activities, allowing advertisers…

Blog

How to Implement a DSPM Framework

December 16, 2022

By Alan Dayley

…be able to remove all concerning external or public access to files at scale. In addition, BigID has just introduced new capabilities to reduce risk by making it easy to…

Blog

Oregon Proposes Data Broker Registration

March 9, 2022

By Jaclyn Wishnia

…in preparing for HB 4017’s potential new requirements by helping them classify and catalog the types of data they collect or license — and by automating opt-out requests from individual…

Blog

Understanding EAR vs. ITAR Regulations

August 20, 2024

By Alexis Porter

…can track and review files containing sensitive data with open access — and produce audit reports of high-risk targets. Leverage Risk Scoring: BigID scores risk based on a variety of…