Driving Innovation with Privacy Engineering

…the concept has remained somewhat “open-ended,” according to Bhajaria. And initially, “that’s how it was supposed to be,” he attests. “It was interpreted to mean that, before something goes out…

CCPA Updated Regulations: Working through the Operational Impact

…following metrics in their Privacy Policy: (1) number of requests received/complied with/denied, (2) number of requests to delete that business received/complied with/denied, (3) number of opt-out request received/complied with denied,…

Connecticut Data Privacy Act: Safeguarding Privacy Rights

…fail to comply with the CTDPA and seek damages and attorney’s fees. Who must comply? Connecticut’s CTDPA (Connecticut Data Privacy Act) applies to businesses that collect, use, or share the…

Brazil’s LGPD Goes Into Effect: What Companies Need to Know

…requests. Reporting on whose data they have: Enable correction workflows and validate whether sensitive data is being captured. Detecting out-of-policy, cross-border data transfers: Track data access, usage, and transfer violations…

After CCPA: CPRA and The Future State of US Privacy

…visibility into what’s actually at stake. “If you ask people, what do you think of privacy, almost everybody says, ‘Yeah, I’m pro-privacy,’” Arney says. But once you start to put…

The Ultimate Guide to Harnessing Unstructured Data

…a comprehensive cybersecurity strategy. And that’s where BigID comes in. Download the solution brief. How to Secure Unstructured Data Ultimately, it all comes down to data visibility and control. In…