Fides now supports e2e data subject rights fulfillment, free & open-source.
Learn more
🚀
Use Cases
Resources
Developers
About
Use Cases
Privacy-as-Code
Make automated privacy checks part of your CI pipeline to ensure compliant code.
Data Mapping
Generate dynamic inventory of an entire business data ecosystem.
Privacy Requests
Automate access and erasure requests with fine-grained control throughout the data stack.
Resources
Our Manifesto
An open-source vision for the future of data privacy.
Blog
Browse our blog for privacy thought leadership, regulatory updates, and engineering tutorials.
Integrations
Browse our library of 700+ data integrations.
Privacy Hub
For learning the basics, read up on Privacy 101.
CPRA Hub
California privacy guides for CCPA & CPRA.
PrivEng Jobs Board
Hand-picked open privacy engineering roles.
Developers
Developer Hub
Dive into Fides open-source content and community.
Github
Browse the Fides repo, grow your PrivEng power.
Documentation
Learn how to use the Fides toolset.
About
About
Learn what motivates our team's vision for the future of data privacy.
News
Read about our latest appearances in the news, on podcasts, and at events.
Jobs & Culture
Come build the trust infrastructure of tomorrow with the Ethyca team.
Book a Demo
Sitemap
Pages
About
Blog
Book Demo
Careers
CPRA Hub
Data Subject Requests with Fides
Dev Tools
Developer Hub
Devtools for Data Privacy - Step 1: Privacy Taxonomy V1.0
Featured Articles
Fides
Fides Community Overview
Form Submitted
Get started with Fides!
GRC Doc
Home
Home
IAPP Hub
Impressum
Integrations
Jobs & Culture
Learn More About Fides
Legal
DPA
Matomo Opt Out
MSA
News
Newsletter
Press Releases
Privacy Choice of Top Teams
Privacy engineering jobs board
Privacy Hub
Privacy-as-Code
Products
Products – Atlas
Products – Pro
Resources
Slack Signup
Use Case Consent Management
Use Case Data Maps
Use Case Subject Request
Women Leaders Directory
Welcome to Ethyca, Winston Ethycat
Posts by category
Category:
Blog
Privacy-As-Code: Correcting TikTok’s $92M BIPA violation using Fides Open-Source
Preparing for Connecticut’s New Privacy Law: The Privacy-as-Code Perspective
How NIST’s Privacy Engineering Objectives Can Help You Build A Privacy Engineering Program
3 Important Lessons For A Privacy Career: Notes From The Women In Privacy Career Panel
Privacy-As-Code: Preventing Facebook’s $5B violation using Fides Open-Source
Privacy is an afterthought in the software lifecycle. That needs to change.
Getting Started With Fides — Step 3: Evaluating Code For Privacy Compliance
Getting Started With Fides — Step 2: Creating Privacy Policies As Code
Getting Started With Fides — Step 1: Annotating Resources
Devtools for Data Privacy — Step 3: An Ontology
Devtools for Data Privacy — Step 2: Imagining the Benefits
Announcing Fides: an open-source vision for the future of data privacy
Is This Thing On? Decoding Audacity’s Privacy Update
Meet The Colorado Privacy Act: An Intro To CPA Compliance
See A Dark Pattern, Defeat A Dark Pattern
Data Erasure In Distributed Systems
Big Tech As Its Own Privacy Regulator, Part 2: For Kids
Implementing Two-Factor Authentication In DSARs And Beyond
Your Guide To The May 2021 Ruling On Facebook’s EU-US Data Transfers
What Florida And Washington Are Teaching Us About Privacy Legislation
Global Comparison Of DSARs And Data Subject Requests
Why Data Erasure Actually Might Not Leave A Blank Cell
How Cookie Consent May Evolve With EU’s Proposed ePrivacy Regulation
Big Tech As Its Own Privacy Regulator
Back To The Future (Of Consent)
Opt-In and Opt-Out: Consent Management For Global Readiness
What We’re Saying When We Say Automated Data Mapping
The Definitive Guide To Picking A Data Privacy Management Solution For Your Business
Moving Beyond Spreadsheets to Automated Data Mapping Tools
What Businesses Can Learn From WhatsApp’s Privacy Policy Uproar
The Senate’s Talking Privacy Laws Again…But Is Anything Different?
Did The EU Just Pull The Rug Out From Data-Driven Businesses? Here’s What You Need To Know.
What the Schrems II decision means for the future of data privacy… and your business
How To Do Database Notation For Data Mapping
What FB’s “Limited Data Use” means for your marketing team’s CCPA compliance efforts
How To Address A Subject Erasure Request
How To Implement A Data Minimization Strategy
How To Talk To Users About Their Privacy Requests
How To Verify User Identity For Data Subject Access Requests
Privacy By Design
Consent Processing
The Deep Privacy Challenge of Doing DPIAs Well
The Divided States of America(n Data)
How Online Experience Varies by Purchasing Power
Ethics & Trust in Tech: Thought Leadership
How Does Data Privacy Affect My Job?
Trust in Data & Technology
Data Security: 4 Ways Your Team Can Do Better
Fundamentals of Ethical & Compliant Data Management
Preserving Data Privacy in the Age of Facial Recognition
Inefficiency in Data Privacy for Online Advertising
Data Privacy & The Future of Digital Advertising
Do These 3 Things for User Data Privacy Compliance
Security & Privacy: Minimizing Data Breach Risk at the Source
Category:
CPRA Hub
CDPA, CCPA, And The Letter Of The Law
Automated Data Mapping Is A Must For CPRA Compliance
A CPRA Note from our CEO
The Story Behind CPRA: Less Than a Year After the Introduction of the CCPA, Why is California Voting on Another Privacy Law?
5 Key Updates to Get from CCPA to CPRA Compliance
Here’s why a cookie consent manager won’t get you CCPA-compliant.
CPRA Will Be On The Ballot. Here’s What It Means.
Additional Modifications to the CCPA
The CCPA’s “Do Not Sell My Personal Information” Provision
What is the CCPA? A Guide to California Privacy Law
Category:
News
Ethyca announces end-to-end privacy rights automation for free
Ethyca Successfully Completes SOC 2 Type II Audit
Privacy By Design, By All Of Us-Eduardo Armendariz, Senior Software Engineer
Privacy By Design, By All Of Us-Dawn Pattison, Senior Software Engineer
Privacy By Design, By All Of Us-Catherine Smith, Software Engineer
An Interview with Suchi Natarajan
An Interview with Nelson Schoenbrot
An Interview with Bianca Pasternack
An Interview with Kelly Huang
An Interview with Austin Kraft
Ethyca’s funding announcement: a letter from the CEO
Data privacy start-up Ethyca raises $4.2m seed round
Ethyca announces world first self-service privacy products
Category:
Privacy Hub
6 Privacy Engineering Skills Teams Need In 2022
Privacy Engineering: An Intro To The Field
About Data Mapping
About Consent Management
About Data Subject Requests
EU-US Data Transfers
Your Guide To User Consent In Plain Terms
Data Privacy Acronym List
General Data Protection Regulation (GDPR)
Worldwide Privacy Laws
Federal US Privacy Laws
California Consumer Privacy Act (CCPA)
Data Minimization
Data Privacy vs. Data Security
Private Right of Action
Data Breach Notifications
Data Protection Impact Assessments (DPIAs)
Data Protection Officer
Data Subject Requests (DSRs)
How To Build Your Company’s Data Map
What’s the Difference Between Data Security & Data Privacy?
An Overview of States Passing Privacy Laws
Governments & Privacy
A Framework for Privacy Risk Self-assessment
How To Assess Vendors For Data Privacy Compliance
GDPR Fully Explained
Category:
Team
Category:
Uncategorized
Privacy Regulation Tracker