Latest Posts › Data Breach

Share:

Data Privacy Buy-In: The Usual Suspects and What to Say to Them

Getting the business to say “yes” to data privacy isn’t easy. Yet it remains one of the central tasks a data privacy professional must undertake. After all, you can’t protect consumers, protect your organization, and achieve...more

Privacy Impact Assessment Guide: 7 Best Practices to Master PIAs

One of data privacy’s greatest challenges is that it can all feel just so abstract. What does it really mean for an individual’s data to be at “risk”? What activities are riskier than others?...more

What Is Data Privacy Compliance and How Can You Achieve It?

Running a business is complex, and there is no end to the number of different domains that you’ll need to be familiar with if you want to be successful. Data privacy professionals might not need to ask what data privacy...more

GDPR Compliance Checklist: 8 Steps You Need to Complete

GDPR compliance can be tricky. Even if you summon the willpower to read through the law’s text, it can be tough to know where to start. As an alternative to pouring through the GDPR’s legalese, one way to establish a...more

16 Elements of a Data Privacy Program

Once you know what a data privacy program is on a basic level, the next question is clear: “What actual activities do I need to carry out in a data privacy program?” We’ve identified 16 key elements of a privacy...more

5 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide