Skip to content

Blog

Navigating Brazil’s LGPD: Compliance Made Simple

May 16, 2023

By Alexis Porter

…access, loss, or disclosure. Right to Anonymization, Blocking, or Elimination: Individuals have the right to request the anonymization, blocking, or deletion of unnecessary or excessive data. Right to Complaint: Individuals…

Blog

What Is the Cloud Data Management Framework? (CDMC)

September 30, 2021

By BigID

…most. This data includes — but is in no way limited to: personal information (PI) or sensitive personal data personally identifiable information (PII) client identifiable information nonpublic information (NPI) and

Blog

Data Flows, Google Analytics, and EU-US Data Transfers

January 25, 2022

By Jaclyn Wishnia

…NOYB (None of Your Business) — the company founded by Max Schrems, the Austrian lawyer at the center of the titular case — following Schrems II. The Austrian DPA concluded…

Blog

PIPEDA Compliance: Navigating Canada’s Privacy Landscape

April 13, 2023

By Alexis Porter

…to protect the information. Accuracy: Organizations must ensure that personal information is accurate, complete, and up-to-date. Safeguards: Organizations must protect personal information with appropriate security safeguards, and must take steps…

Blog

Spring Clean Your Digital Clutter: 5 Data Deletion Tips

March 20, 2023

By Alexis Porter

…lifecycle in a single platform. With this app, organizations can reduce attack surfaces, maintain compliance, and enhance their data hygiene. Here are five tips for using BigID’s data deletion app…

Blog

CCPA Compliance Checklist: A Guide to California Consumer Privacy Act

May 23, 2024

By Alexis Porter

and Inventory Customer Data Identify all sources of customer data collection (e.g., websites, mobile apps, in-store interactions). Create a comprehensive inventory of all personal information collected, stored, processed, and shared….

Blog

Revolutionizing Cloud Security Through CICD Pipelines

July 18, 2023

By Seth Feldman

…potential security threats. In such a landscape, the importance of real-time threat detection and response escalates. Historically, security measures were manually updated and deployed, a time- and resource-intensive process that…

Blog

A Taste of Surveillance: The Truth About Third-Party Cookies

June 28, 2023

By Alexis Porter

…cookies, including third-party ones. Some examples include: General Data Protection Regulation (GDPR): The GDPR, enforced in the European Union (EU), emphasizes user consent and data protection. It requires websites to…

Blog

Streamlining Consent Management for Privacy Compliance

March 14, 2023

By Alexis Porter

…the General Data Protection Regulation (GDPR) that followed. Canadian Personal Information Protection and Electronic Documents Act (PIPEDA) (2000): This regulates the collection, use, and disclosure of personal information by private…