Skip to content

Blog

What Is TIPA? Tennessee’s Information Protection Act

June 23, 2023

By Alexis Porter

…imposed. Download the white paper. TIPA violations The Tennessee Information Protection Act (TIPA) assigns the Tennessee Attorney General (AG) as the sole authority to enforce its provisions, excluding any private…

Blog

What Is RoPA? Ensuring GDPR Compliance

July 24, 2023

By Alexis Porter

…post, we will delve into the significance of RoPA, its benefits, and best practices for implementing a robust privacy program. What is RoPA? RoPA, or Records of Processing Activities, refers…

Blog

The Costly Impact of a Data Breach on Individuals

March 24, 2023

By Alexis Porter

…2021 to $4.24 million. This includes costs such as investigation, remediation, legal fees, and lost business. Identity theft is the most common consequence of a data breach: A 2021 report…

Blog

The Data Odyssey: Navigating Cross-Border Data Transfers

March 30, 2023

By Verrion Wright

…The Asia-Pacific Economic Cooperation (APEC) Privacy Framework: The APEC framework provides a set of principles for cross-border data transfers, including notice, choice, accountability, security, and access. APEC member countries can…

Blog

CPRA: Employees and the New California Privacy Law

May 13, 2022

By Heather Federman

…Personal Information (“SPI”). Based on the plain reading of the statute, this right only applies to data collected with the “purpose of inferring characteristics.” §1798.121(a). Businesses generally do not collect…

Blog

New Makeover Ahead for NIST CSF

March 2, 2023

By Alexis Porter

and easier to use. Examine additional risk: The new framework will prioritize supply chain risk management, encompassing third-party risks such as cloud computing, software, networking equipment, and non-tech supply chains….

Blog

The EU AI Act: All You Need to Know in 2024

January 12, 2024

By Verrion Wright

…across structured and unstructured data sources. With BigID, organizations can: Discover personal and sensitive information in AI training sets, including secrets and passwords, customer data, financial data, IP, confidential, and

Blog

The Convergence of Data Security and IAM: A Paradigm Shift in Cybersecurity

February 1, 2024

By Alan Dayley

…providing granular authorization policies. This emphasizes a “consistent,” “context-aware,” and “continuous” approach to data access, ensuring flexibility, scalability, and risk-based access. Download Solution Brief. Adding in Data Loss Prevention and

Blog

AI Governance: Balancing Innovation and Ethical Accountability

May 24, 2023

By Peggy Tsai

AI Governance has long been important for organizations, providing a framework to prioritize investments in artificial intelligence. It ensures transparency, auditability, security, and compliance in data management. But now, with…