What is data encryption? We hear about it all the time and we may know what it means, in general terms. But, what is data encryption, actually? Let’s start with…
Our last stop in our data protection laws series takes us south to uncover a key law in one of the capitals of innovation of the southern hemisphere: Chile. See how it compares to the likes of GDPR, and how to comply with it properly.
Cybersecurity frameworks provide the structure and methodology you need to protect your important digital assets. Find out which framework best suits your needs!
Since its 2014 revision, FISMA provides Federal Agencies all cybersecurity resources and guidance they need through the Department of Homeland Security to guard their data infrastructures. Its cornerstone? A continuous loop of assessment, implementations, and monitoring.
Both U.S. neighboring countries pushed the region’s privacy standards forward with thorough, and similar, privacy protection laws. On the North, PIPEDA sets strong management principles, while on the South, LFPDPPP places the bar higher its specificity in data processing requirements.
Navigate through the Health Insurance Portability and Accountability Act requirements and learn which ones are a must-apply for your organization.
There’s countless opportunities to have your phone hacked. From adware, to malicious apps, learn how to identify suspicious behaviours and counter them.
California’s gigantic role in the online consumer world makes its privacy protection regulations, CalOPPA and CCPA, a must-comply-to for any business. Learn what these legislation cover and how to work towards compliance.