Third Party Risk Management

How to Manage Third-Party Risk With Increased Number of Remote Workers

Any compliance officer knows the importance of third-party risk management (TPRM)–and that keeping vendors in compliance with data privacy and protection laws is a continuous process. But, since the Covid-19 pandemic has forced most businesses to work remotely, overseeing vendor compliance has become much more difficult due to lack of a centralized operation. That’s in…
To access this post, you must purchase Student, Government or Professional.
Read More
EasyJet Hack

Breaking Down the EasyJet Hack

Earlier this month, European budget airline EasyJet was hacked. In a “highly sophisticated attack,” 9 million customers had personal information, including email addresses and travel itineraries, compromised. And 2,208 customers had their credit card information stolen. The attack has left many customers “in limbo”, with many questioning how a company that claimed to comply with…
To access this post, you must purchase Student, Government or Professional.
Read More
Privacy Cage

Privacy Cages: The End of Data Privacy Laws? 

Evervault, a Dublin-based data privacy company has raised $16 million in its Series A funding round led by Index Ventures. This takes the total raised by the company to $19 million, giving it crucial resources to “build the API (application programming interface) for data privacy.” The company, founded by Shane Curran, has a simple manifesto:…
To access this post, you must purchase Student, Government or Professional.
Read More
Federated Learning

What is Federated Learning? And How Can Differential Privacy Make it Better?

Machine learning is a constantly growing technology. But some recent developments are particularly noteworthy for business leaders because they are paving the way for fairer, safer, more private, and more affordable machine learning algorithms.  In 2017, Google announced that machine learning models trained with user interaction from mobile devices would adopt federated learning while, in…
To access this post, you must purchase Student, Government or Professional.
Read More
Data Privacy

Complying with Data Privacy Law Lends a Competitive Advantage

Data governance and data privacy compliance almost always complement each other. When organizations are compliant with data privacy and security guidelines, it is likely because an effective data governance strategy is already in place. And the opposite is oftentimes also true. At the risk of oversimplifying these broad concepts, data privacy is about identifying and…
To access this post, you must purchase Student, Government or Professional.
Read More
Data Encryption

Current Industry Regulations for Data Encryption: Are You Up to Date?

Though data is an incredibly valuable resource, more data generally means more responsibility. A larger amount of data presents a larger attack surface for hackers to target through cyberattacks. Encryption, the act of translating data into a new form that is undecipherable without a special key, is an impactful method of avoiding these issues and…
To access this post, you must purchase Student, Government or Professional.
Read More
Standardized Business Terms

How to Establish Standardized Business Terms, A First Step in Data Privacy Compliance

Technology and distributed work environments are making businesses and startups operate on a global scale. With the advent of new channels of communication comes a complex set of challenges, one of which is conflicting business terminology and naming conventions. This problem is especially evident in compliance departments as they struggle to make sense of proliferating…
To access this post, you must purchase Student, Government or Professional.
Read More
Back To Top