Build a Data Privacy Program – Phase 1: Collect Privacy Requirements

This phase of the blueprint, Build a Data Privacy Program, will help you to understand the key drivers and expectations of privacy from all areas of your organization.

Build a Data Privacy Program

Sell privacy to the business by speaking a language they understand. IT and InfoSec leaders need to see privacy as more than just compliance – as a driver of business...
  • guided implementation icon

Build a Data Privacy Program – Phase 2: Conduct a Privacy Gap Analysis

This phase of the blueprint, Build a Data Privacy Program, will help you to understand the current state of privacy, identify the target state, and develop gap-closing...

Privacy Analysis by Business Unit Tool

A condensed version of the Data Privacy Framework, this tool emphasizes four key areas of the data privacy framework that can be applied at a more granular, business-unit...

Build a Data Privacy Program – Phase 3: Build the Privacy Roadmap

This phase of the blueprint, Build a Data Privacy Program, will help you to prioritize initiatives based on a collective score that takes into account cost, effort,...

Tech Trend Update: If Digital Ethics Then Data Equity

The COVID-19 crisis demands solutions, and some technologists might insist it's time to move fast and break things. But building new technologies without digital ethics...

SECURITI.ai Addresses the Privacy vs. AI Debacle With the Industry’s First AI-Powered Privacy Solution

AI-powered privacy is here to stay, driven by the innovative team at SECURITI.ai. The company injects automation through AI with its PrivacyOps solution, PRIVACI, taking...

2B Advice Makes Moves to Support a Privacy-Aware Culture

The privacy management software space is rapidly becoming crowded with vendors all looking to add value. 2B Advice has released the most recent version (7.0) of its...

Google Sets Limit on How Long It Will Store Some Data

In response to criticism over data collection practices, Google is introducing default deletion of location history in its web and application activities for new accounts.

Proteus-Cyber Bridges the Gap Between Data Privacy and Threat Intelligence

Proteus-Cyber, a leading vendor within the privacy program management space, has added two standout features to its current privacy software offering. The Threat...
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us