GDPR
Announcing OpenText Legal Tech CE 21.4
“Well, that was fun,” said no one ever in the midst of a global pandemic! But what can be said of 2021 is that we’re…
Five pressing compliance and risk management priorities for 2021
The resilience of organizations has been put to the test during this past year. A global pandemic and political upheaval have led to an increased risk of regulatory penalties, reputational harm and erosion of customer trust. Looking forward, what can we expect…
NIST Privacy Framework – Governance, risk management and compliance
In this blog, we will focus on the importance of Governance, Risk Management, and Compliance (GRC) programs within the NIST Privacy Framework. Having an organizational…
NIST Privacy Framework – A focus on the identify function
Managing privacy using a risk-based approach is a consistent theme in many recent privacy regulations, including the EU General Data Protection Regulation (GDPR) and the…
Responding to subject rights requests for the CCPA and beyond
This blog is co-authored by Andy Teichholz and Gino Vicari. July 1, 2020 marks the start of enforcement of the California Consumer Privacy Act (CCPA)….
Is IoT undermining our reasonable expectation of privacy?
In the US, the concept of the ‘reasonable expectation of privacy’ came about when the police were considered to have breached the fourth amendment by…
Reducing the footprint of sensitive data in your enterprise
Research suggests that over one-fifth of all files are unprotected. Accenture estimates that information loss is the most expensive component of any cyberattack – representing…
Striking a balance between security and usability of sensitive data
Last year, the number of personal records exposed by cyber attacks on the financial services industry was an incredible 446,575,334 – more than triple from…
Data privacy is changing the relationship between you and your customers
The capture and collection of personal data is an important requirement in order to provide the individual, customized and tailored experience that people are demanding….
What makes a great CIAM platform?
The growth of Consumer Identity and Access Management (CIAM) has been phenomenal. The first CIAM systems only started to appear around 2014, but today almost…
Unlocking the value of unstructured data with OpenText and SAP S/4HANA
At a recent SAP® Innovation Forum event, delegates were focused on two clear priorities; managing and processing unstructured information, and transitioning to SAP S/4HANA®. Specifically:…
GDPR puts focus on the security of your EIM solutions
In its report, The role of technology in your GDPR strategy, IDC identifies EIM technologies as central to achieving compliance with the EU’s General Data Protection…
How Identity and Access Management helps meet the data protection requirements of GDPR
In my previous blog, I looked at how Identity and Access Management (IAM) can help with GDPR compliance. This time around, I’d like to go…
Stay in the loop!
Get our most popular content delivered monthly to your inbox.