One of the first questions a business asks when they receive a privacy-related request from a user is: "how do we respond"? This guide contains templates for different types of privacy communication between privacy teams and their customers.
When your business receives a data subject request, verifying the identity of the requestor is a key first step. This step-by-step guide takes you through the pros and cons for different methods of subject request identity verification.
Privacy By Design is a key concept in the study of modern data privacy. It’s incorporated into the text of the GDPR as a core principle, and its influence is considerable across a number of data privacy laws worldwide.
"Consent" is a fundamental part of processing user data. It has a special place at the heart of digital privacy theory. Given the importance of consent, it shouldn't be surprising that there's plenty of legal wrangling over how it's defined.
Data Protection Impact Assessments are the sleeping giants that lie deep in the GDPR. Doing DPIAs well requires organizations to commit to responsible data management at a deep, deep level. That’s one of the reasons why they are so challenging.
Across the ocean, a much-publicized piece of holistic privacy legislation called the GDPR has transformed the relationship between citizens, businesses, and personal data. In 2019 it’s time to ask: why can’t the USA produce its own unified piece of federal data privacy regulation?
When people discuss issues with data privacy, class ranking is rarely part of the conversation. Even though the internet has been a markedly business-driven project for some years now, the old perception endures that URL life isn’t getting marked by the same dividing lines that mark IRL society.
Across the tech sector, there's widespread consensus that a trust deficit threatens to undermine the current business model of quality, ad-supported content. This mistrust exists between data subjects, data controllers, and data processors (to use GDPR parlance).
Over a year ago, we quietly started working on an engineering problem that is painful for developer teams everywhere. At the same time, it's vital for the safety of every user of the internet and data-powered businesses.