On the back of the 2020 EU Cybersecurity Strategy, EU legislators enacted several regulations aimed at creating a more robust EU cybersecurity framework. This includes the Digital Operational Resilience Act (DORA), which aims to harmonize fragmented approaches to regulation around…
Your organization runs on data and software. But this whole IT environment needs to live somewhere. Preferably a safe place that no unwanted people can access. What options do you have? How should you choose where to host your…
EU-US Privacy Shield Framework The Privacy Shield program is being administered by the International Trade Administration (ITA) within the U.S. Department of Commerce, to enable enterprises in the US to join the EU-US Privacy Shield framework. This program enables these…
Geo-fencing is a new term in the digital marketing space that puts the location of the devices to work for the provision of services. The services could be push messages and notifications that a user gets when the device…
Data Leak Prevention Technology: Data leak prevention technology keeps sensitive corporate data secure by identifying potential data breaches and helping to eliminate them. DLP software classifies, regulates confidential business data, and identifies data violations typically driven by regulatory compliance…
What has changed though with the COVID-19 crisis is the choice to work from home or office. Many governments across the world have made it mandatory that organizations provide work from home options to their employees, wherever applicable. Thus, the…
Several companies have begun exploring how they can enhance the protection of users’ data and play a role in the continuing conversation about privacy as a human right. Those that are yet to do so have to develop the necessary…
In today’s digital world, the issue of data privacy is provoking constant debates with large corporations and even governments being objurgated for invasions of privacy. According to online statistics firm Statista, only about a third of internet users in the…
ITAR was enacted in 1976 to control the export of defense-related articles and services. It stipulates that non-US persons are not allowed to have logical or physical access to articles modulated by International Traffic in Arms Regulations; which…
Data security is at the heart of the upcoming General Data Protection Regulation (GDPR). It sets strict obligations on data controllers and processors in matters pertaining data security while concurrently providing guidance on the best data security practices. And for…