More Privacy Articles

Technology

BYOD Brings Both Risks & Rewards: Considering the information governance implications of BYOD programs

As companies work to control costs and mitigate risk, bring your own device (BYOD) programs create as many questions as solutions. Employees are looking for faster and more fully integrated mobile devices – while corporate law and IT departments work to control costs, mitigate risk and to...

Read More

Cybersecurity

Data Mapping for Global Privacy Compliance

It has been a year since the Safe Harbor framework was invalidated by the European Court of Justice. That framework allowed U.S. companies that registered with the Federal Trade Commission to legitimately transfer data from EU member countries to the U.S. At the time the Safe Harbor was invalidated...

Read More

Technology

Caring About Cloud Migration

Information technology departments across all industries face enormous pressure to control costs and reduce their budgets. At the same time, they’re coping with the massive growth of data to store on IT systems and data servers. This had led to a mass migration of data to cloud-based storage...

Read More

Related Events

Feb08

Privacy

Webcast: Accelerate your CPRA Compliance Program

DATE & TIME

1:00 p.m. - 2:00 p.m. ET

Details