The Need-to-Know Terms of the General Data Protection Regulation
We’ve compiled our recent series of terms pertaining to the General Data Protection Regulation (GDPR). GDPR goes into effect May 25th, and many organizations are still struggling to meet the...
View ArticleDebunking the Top 7 GDPR Myths for Compliance Success
While the General Data Protection Regulation (GDPR) goes into effect May 25th, many companies are still struggling to make sense of the regulation and prepare for ongoing compliance. In this post, I...
View ArticleWhat is considered personal data and what rights do individuals have?
The ultimate goal of the GDPR is to ensure that the private data of EU citizens remains just that — private. In this GDRP minute, we discuss what is considered data under the GDPR and what rights do...
View ArticleDo you need fresh consent from everyone to comply with GDPR?
Well the answer is not that simple because the GDPR has set the bar pretty high when it comes to consent. First off, if you already have an existing relationship with customers who have purchased goods...
View ArticleGDPR Day Has Commenced
GDPR Day has commenced May 25th is finally upon us, which means GDPR day has commenced. Many companies are likening GDPR to the dreaded Y2K we faced at the end of the last millennium. Sure, it is...
View ArticleGDPR by Department: GDPR for HR Professionals
GDPR is important for every department in an organization to understand. In this blog, we’ll look at the unique responsibilities of GDPR for HR Professionals. As you (should) well know by now, the...
View ArticleSpooky Stats for Cyber Security Awareness Month
Spooky Stats for National Cyber Security Awareness Month The last day of Cyber Security Awareness Month is upon us, so let’s round up the month with some cybersecurity numbers from 2018 so far....
View Article7 Ways to Tell your System is Compromised
How do you tell if your computer or accounts have been hacked? When we’re using our home computers, we don’t have an IT department to reach out to in order to troubleshoot our systems, servers and...
View ArticleHow to secure e-PHI true to the Security Rule under HIPAA
When working for a care provider, it’s important you understand all of HIPAA’s requirements, but many of your responsibilities, as a security professional, reside in the Security Rule. Whether you work...
View ArticleWhat you need to know about the PCI DSS and PII
Personally Identifiable Information (PII) can mean a number of things but is an important piece of any security or privacy-focused regulation, such as PCI DSS. The Payment Card Industry Data Security...
View Article
More Pages to Explore .....