Data Security Privacy requires a 360° strategy High profile data breaches hit the news almost weekly. The Ponemon Institute has found that a data breach can cost…Sophie Jackson6. January 2022
Data SecurityDataMapper What is sensitive personal data? Most privacy regulations draw a clear distinction between personal data and sensitive personal data. How can you identify the personal…Sophie Jackson27. November 2021
Data SecurityDataMapper Migrating to the Cloud? Clean up first! Switching from on-premise storage to cloud services can reduce management costs and give you the flexibility to expand or contract your storage…Sophie Jackson27. November 2021
Data SecurityShareSimple How can I stay safe when using email? Email was created in 1971. Now, 60 years later, it is still one of our most effective ways to communicate.…Sophie Jackson11. November 2021
Data SecurityPrivacy Data collection: 7 best practices to build trust Most people know that they need to share some personal information with you to get the most value from your…Sophie Jackson30. October 2021
Data SecurityDataMapper California’s CCPA vs. Europe’s GDPR The EU’s GDPR and California’s CCPA were both drafted to give people more control over their personal data. Both impose…Christian Bohn15. October 2021
Data SecurityPrivacy China’s PIPL vs. Europe’s GDPR The latest data protection regulation (and one with potentially the greatest reach) is China’s Personal Information Protection Law. It deserves…Christian Bohn15. October 2021
Data SecurityDataMapperPrivacy Sensitive personal data FAQ Before collecting personal information, you should know what type of data it is. Is it sensitive personal data, or is…Christian Bohn2. August 2021
Data SecurityDataMapperRequest ManagerShareSimple Meeting data compliance standards In recent years, data compliance has become more important than ever. In 2018 new legislation was implemented as part of…Christian Bohn2. August 2021