Blog - data breach notification rules
Data Breaches 2023: Consequences of Non-Compliance with Privacy Laws
Mar 9, 2023Beyond regulatory fines or even class action settlements, consequences of non-compliance with privacy laws often follow a brand for years in its wake. Continue reading for major data breaches to keep on your radar and steps you can take today to protect your customers and safeguard their trust.
Read MoreKey Takeaways IAPP Webinar: Privacy Incident Management Simplified
Feb 9, 2023In case you missed our latest webinar on simplifying privacy incident management, we’ve got you covered. Continue reading to learn the key takeaways from the event.
Read MoreRemove Subjectivity and Streamline Data Breach Decisioning: Lessons from Live Q&A
Dec 8, 2022In the latest session of The Privacy Collective, we discussed how privacy teams can improve consistency in incident response, build team collaboration, and eliminate the subjectivity inherent in breach decisioning. Continue reading to learn the key takeaways from the session.
Read MoreFeatured Resources
Explore More2023 Privacy Incident Management Benchmarking Report
18 Functions to Prove Value with Intelligent Incident Response
7 Steps to Raise Your Incident Response IQ
Privacy Team Tabletop Exercise
Other States Take Note: California State Assembly Passes AB 2273
Sep 15, 2022The California assembly recently passed a comprehensive age-appropriate privacy legislation– the California Age-Appropriate Design Code Act, also known as AB 2273. If approved by Governor Newsom, the Act would require businesses that “provide online services, products, or features that are likely to be accessed by children” to increase their level of privacy and safety protections.
Read MoreToo Much or Too Little? The Risks of Under- or Over-Reporting Data Breaches
Aug 10, 2022Given the complexity of breach notification laws, companies are often found under- or over-reporting data breaches.
Read MoreRecession-Proof Your Privacy Program
Jun 16, 2022With talks of an impending recession, now is a critical time for organizations to turn inwards and focus on costly legacy operations, like mitigating privacy risks and streamlining incident management.
Read More