Compliance

Compliance | News, how-tos, features, reviews, and videos

EU / European Union / GDPR data privacy protection, regulation, compliance
smart city - wireless mobile network

A military meeting with civilians.

The Cybersecurity Maturity Model Certification explained: What defense contractors need to know

The Cybersecurity Maturity Model Certification (CMMC) is a unified standard for implementing cybersecurity across the defense industrial base, which includes over 300,000 companies in the supply chain.

Statue of Lliberty as a digital framework / New York / binary code

New York's SHIELD Act could change companies’ security practices nationwide

SHIELD Act provisions broaden the scope of consumer privacy and place requirement on protecting personal data for organizations that collect information on New York residents.

backdoor / abstract security circuits, locks and data blocks

Is the EARN-IT Act a backdoor attempt to get encryption backdoors?

New bipartisan US legislation to fight online child exploitation incentivizes companies to drop end-to-end encryption, critics say.

Brexit / GDPR  >  Cutting connections / United Kingdom / European Union / global security shield

What the Brexit Withdrawal Agreement Bill means for data protection and the GDPR

Boris Johnson's Withdrawal Agreement Bill (WAB) largely leaves existing data protection regulation in place, but changes are still possible.

A binary map of china.

China’s MLPS 2.0: Data grab or legitimate attempt to improve domestic cybersecurity?

The new version China’s Multi-Level Protection Scheme (MLPS) expands what companies fall under its purview and lower the threshold for government inspection. Should companies with operations in China be concerned?

Stack of legal documents with compliance and regulatory stamp

Schrems II: What the latest challenge to transatlantic data transfers means for IT

Austrian lawyer Max Schrems’ first complaint about Facebook’s transfer of his personal data to the U.S. brought down the Safe Harbor data sharing agreement. Now Europe’s highest court is examining his complaint about the use of...

compliance compliant regulation rules stamp gdpr

What is "reasonable security"? And how to meet the requirement

Privacy regulations such as the GDPR and CCPA require companies to provide "reasonable security" to protect customers' personal information. Here's how you might best achieve that standard.

audit binary compliance magnifying glass investigate

What is an IT auditor? A vital role for risk assessment

An IT auditor is responsible for analyzing and assessing an organization’s technological infrastructure to find problems with efficiency, risk management and compliance.

5 gdpr compliant notification documentation

Report: Over 59,000 GDPR data breach notifications, but only 91 fines

The low number of fines relative to the volume of reported breaches might be due to over-extended regulators, says a DLA Piper report.

European Union [EU] flag and binary code

Privacy Shield review: Prepare for the worst

The transatlantic data transfer agreement is under review this week.

Load More
Recommended for You