A Sneak Peek into Data Mapping: What Implementation Really Looks Like
It's Time to Think About Data Mapping Differently
[Webinar] You Are Here: First Steps in Data Mapping
The CCPA for the Land Title Industry: Practical Compliance With CCPA and New Privacy Laws
E7: The DataSmart Method of Valuing Data Assets
When people say "data is the new oil," they're usually referring to its value. But in reality, oil requires careful handling, management, storage, protection, and processing before it can be turned into a truly valuable...more
In the fast-paced world of energy trading, where every decision relies on accurate data, the success of your Energy Trading and Risk Management (ETRM) system, especially when working with RightAngle, depends on a solid...more
On October 16, China’s Ministry of State Security highlighted a case where a foreign company, in collaboration with a Chinese company, conducted illegal surveying and mapping within the territory of China under the guise of...more
In Texas, Whataburger is more than a fast food restaurant. It’s a cultural icon, deeply ingrained in the identity of many Texans. Founded in Corpus Christi, Texas, Whataburger has been a homegrown favorite for generations...more
The date of application of the EU Data Act is slowly approaching. By 12 September 2025 all IoT providers / manufacturers will need to implement the Data Act. There is still time to carry out the necessary actions to adapt to...more
In our recent webinar, It’s Time to Think About Data Mapping Differently, a poll revealed some interesting information: Nearly 50 percent of respondents house their data map in a spreadsheet. (Roughly 15 percent say they...more
Data privacy can feel abstract. Privacy professionals may be better equipped to wrap their heads around the concepts than the general population. But even professionals struggle when it comes to operationalizing those...more
Are you overwhelmed by data mapping? Is it a daunting process for your privacy team? That's not surprising, and you are not alone. Conventional data mapping methods heavily rely on direct integrations, leading to unnecessary...more
Sprawling. That’s one way to describe the nature of data and responsibilities in modern organizations. There’s a lot of personally identifiable information (PII) and sensitive data to track, and knowing what lives where so...more
Join our enlightening webinar to explore the critical role of data discovery in constructing a comprehensive and accurate data inventory, essential for streamlining privacy compliance and enhancing data governance. In this...more
The Practical Privacy Workshop is a half day continuing education event designed to keep you informed on important topics, trends, and best practices in the world of data privacy. Join us for breakfast, presentations that...more
You Are Here: First Steps in Data Mapping You can’t be compliant if you're lost in your data landscape. Where do you collect personal information? What do you collect? Where does it live, and what other systems does it flow...more
I am an advocate of data mapping. I also usually attempt to discuss key custodians with opposing counsel. However, in cases with a large number of custodians, I often find that it is difficult to keep track of them,...more
Most people find data privacy compliance to be complicated enough. So, when they encounter the concept of data mapping—something that isn’t an explicit requirement in any data privacy law—many find themselves scratching their...more
Following the update to the Committee on Foreign Investment in the United States (“CFIUS” or the “Committee”) Enforcement and Penalty Guidelines, the Committee has continued to signal its intention to more heavily leverage...more
When it comes to data privacy, what are the biggest sources of risk for businesses? According to a recent IAPP-KPMG Privacy Risk study, businesses see regulatory compliance, data management and data governance as their top...more
It’s evident that the legal eDiscovery industry is undergoing significant transformation, driven by the ever-expanding data varieties, volumes, and the velocity in growth for varieties and volume, especially in the last...more
Data security is a top concern for organizations in today’s digital landscape. It protects data from unauthorized access, use, modification, or disclosure, and requires implementing technical, administrative, and physical...more
In the legal operations realm, eDiscovery has always been a critical function, but the rapid advent of digital technologies has dramatically increased its complexity. While these advancements offer new tools for communication...more
Data subject access requests (DSARs), records of processing activities (RoPAs), vendor risk management, a dozen other data privacy compliance requirements—all of them depend upon or are significantly facilitated by a map of...more
2023 is shaping up to be a landmark year for data privacy, on both sides of the Atlantic. In the US, four new state laws go into effect – two on July 1 – while California is expanding its already robust requirements, and...more
If you don’t know where your business collects, stores, and processes consumer data, you can’t manage that data in a compliant fashion. You won’t know whether...more
Data migration is a critical process that involves transferring data from one location, format, or application to another. Typically, this occurs when an organization introduces a new system or location for its data, often...more