Automating GDPR Compliance Through Tech
GDPR introduces a number of new data inventory and mapping obligations for enterprises. This Webinar featuring BigID, IBM the EU and French Regulator CNIL examines these requirements and approaches for…
Showing 1117 results
GDPR introduces a number of new data inventory and mapping obligations for enterprises. This Webinar featuring BigID, IBM the EU and French Regulator CNIL examines these requirements and approaches for…
…GDPR data subject obligations? Examination of different approaches to solving right to access, portability and erasure. Considerations for operationalizing inside an enterprise. A look at new tools like BigID for…
…is. Similarly, a geolocation is not explicitly personal. It is only personal if it can be associated with a person’s Web or mobile session. Examples of data that may be…
…data a company collected but also “whose” data was collected. BigID created the first product purpose-built platform for the kind of data discovery required for privacy. In so doing, we…
…they doing? Are people really necessary for privacy protection? Privacy and Technology leaders Dan Frank (Deloitte), Zac Murphy (T-Mobile), and Justin Antonipillai (WireWheel) lead this discussion for our community. …
Join executives from Macy’s Inc, Salesforce, and the Meredith Corporation in a panel discussion to learn how building a proactive data governance program can address imminent privacy regulations. [Originally aired…
…framework while delivering on new data offerings to create real insights derived from data. [Originally aired as part of BigID’s Digital Summit, Examining the Intersection of Privacy and Governance.] …
In the keynote presentation of the BigID Digital Summit, Examining the Intersection of Privacy and Governance, JoAnn Stonier, Chief Data Officer at Mastercard discusses current challenges facing both privacy and…
…browsing history: when combined with purchase transactions, travel itineraries, text messages, and forum posts, companies gain a complete profile of a customer’s social and business contacts, interests, likes, dislikes, and…
…data rights: What are the most common requests? Who are the most common requestors? What role does automation play in the data rights landscape? How do organizations currently manage a…
…this process by automatically applying advanced sensitivity tagging after every scan moving forward. Proactively Drive Action to Mitigate Risk Advanced Sensitivity Classification goes beyond just visibility: take action by proactively…
…was a real clarion call for digital transformation — and we created a lot of processes on the fly that made it possible for us to work in these remote…