Data collection can be the most complex and technically rigorous of all discovery phases. It involves the extraction of potentially relevant electronically stored information (ESI) from its native ...
The first quarter gives businesses a chance to build momentum for their privacy program, whether by confirming what’s working or adjusting what’s not.
With a patchwork of U.S. state privacy laws, there’s a lot of uncertainty about what needs to be done and when. Fortunately, you can become broadly compliant by following some basic best practices. If ...
With third-party cookies on their way out, organizations need to start mapping out what a first-party data strategy looks like for their business. Use this checklist from OneTrust as your roadmap to ...
2. A description of the security breach, which should include: a. the categories and number of data subjects concerned 3. The measures taken or proposed to be taken to mitigate or address the possible ...