Use this template to build procedures for subject access requests.
|
|
Use this example as a starting point to document your subject access request procedure for erasure requests.
|
|
Use this example as a starting point to document your subject access request procedure for rectification requests.
|
|
Use this tool as a starting point to track all types of subject access requests throughout the process.
|
|
This tool will help you organize the data handling requirements for users throughout each phase of data's lifecycle.
|
|
This tool will help you verify the classification levels of your data by ensuring a balance of protection for sensitive data with limited cost and user friction.
|
|
The US Federal Trade Commission announced both a $5-billion settlement with Facebook and a $575-million penalty against Equifax in the same week. Both were for data...
|
|
According to the latest Netwrix, concerns around data security have been encouraging 46% of organizations to move their personally identifiable information (PII) back on...
|
|
Varonis reports that even after GDPR, businesses still are failing to effectively protect sensitive data.
|
|
Using the cloud has become second nature for today’s organizations, and in most cases, cloud enthusiasts report an overall security improvement. However, DLP remains an issue.
|
|