Blogs

blog post
Take control of your unruly data with privacy-preserving classification

Thanks to increasing data privacy regulations, such as the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA),…

Compliance & Regulations Data Management & Governance Data Privacy Data Protection

blog post
Data classification policies: Should your business have one?

The key to successful data lifecycle management and security starts with a few essential activities — one of them being…

Data Management & Governance

blog post
7 Things to Consider When Classifying Your Sensitive Data

Data classification is simple in theory. It involves tagging pieces of data by their levels of sensitivity and applying security…

Data Management & Governance Sensitive Data

blog post
Squaring the Schrems II Circle With Geo-Fencing

About the author Scott M. Giordano is an attorney with more than 20 years of legal, technology, and risk management…

Data Management & Governance

blog post
The Transatlantic Digital Divide: How Data Classification Can Ease Data Privacy Tensions, Post-Schrems II

About the author Scott M. Giordano is an attorney with more than 20 years of legal, technology, and risk management…

Data Management & Governance

blog post
Ten Steps to an Effective Data Protection Program

What is a data protection program? Data protection involves securing sensitive data so organizations can use it for business purposes…

Compliance & Regulations Data Breach Data Management & Governance Data Protection Data Security Sensitive Data

blog post
Ensuring Data Privacy While Preserving Data Integrity

Organizations rely on data to make strategic decisions—but if you can’t trust the accuracy and integrity of your data, how…

Data Management & Governance Data Privacy

blog post
How to determine the sensitivity of information

BLOG How to Determine the Sensitivity of Information BY RYAN TULLYSeptember 30, 2024 Not all data is created equally —…

Data Management & Governance Sensitive Data