With the forthcoming General Data Protection Regulation (GDPR) set to change the cybersecurity landscape of data collection and storage in the European Union (EU), one of the most important areas that organizations processing or storing EU citizens' data will need to ensure they are complying with is the GDPR's consent guidelines.
Read more »Tag: consumer consent
-
GDPR, Part IV: The Data Subject Consent Provisions Posted on: November 21, 2017 In: Data Privacy & Cybersecurity
Blog Search
Featured Posts
- December 04, 2020 Respect and Communication: Pathways to Productive and Satisfied Employees
- December 03, 2020 The Second Wave is Here – N.J. Executive Order 192 Imposes New Pandemic-Related Requirements for Employers
- November 10, 2020 California Voters Make CCPA 2.0 a Reality – California Privacy Rights Act Ballot Measure Passes
- May 29, 2020 Seventh Circuit Court of Appeals Recent Decision in Molson-Coors v. Anheuser-Busch Affirms Lesson: Choose Words Wisely
Blog Tags
alabama
arkansas
audit
biometric data
breach notification
california
ccpa
client notification
colorado
congress
consumer notification
coronavirus
covid-19
cpra
credit card fraud
cryptocurrency
cybersecurity
cyber threat
data breach
data privacy
data privacy directive
data protection officer
data security
department of commerce
ecj
email
employment
equifax
ethereum
eu
eu-u.s. privacy shield
eu-us privacy shield
european union
executive order
fbi
fcra
federal communication
federal trade commission
financial fraud kill chain
fraud
gdpr
genetic data
hacker
hacking
healthcare
hhsocr
hhs ocr
hipaa
holiday season
human resources
identity theft
illinois
incidence response plan
incident response
information security
insider attacks
insurance
insurance industry
irs
legislative alert
malware
managed service providers
maryland
microsoft office 365
multi-factor identification
net neutrality
new jersey
new mexico
new york
ninth circuit
nist security controls
nydfs
online operators
patching
personal data
personal information
phishing
protected health information
ransomware
rdp
regulations
scare scam
security posture assessment
security vulnerabilities
service provider agreement
social engineering
social media
statute
supreme court
tax returns
tennessee
third party
utah
video-teleconferencing
virginia
w2
washington
websites
workplace policy
zoom