Prior to the pandemic outbreak, some 5.2 percent of U.S. employees worked remotely on a full time basis according to the U.S. Census.
On June 24, 2020, an online panel of WG11 drafting team members discussed their June 2020 draft Commentary ,
As businesses re-open and take cautionary measures to prevent spread of COVID-19, many organizations have incorporated thermal scanner policies onsite.
In today’s highly regulatory environment it is essential that you have a clear understanding of risk across the enterprise. A risk management framework can bring visibility to key business and compliance risks and enable a company to make decisions on where to prioritize its limited resources. It is through a risk management framework that real […]
As technologies advance in our fast-paced world, our activities and information are being constantly collected and monitored – so what is ‘privacy’?
With Privacy Laws such as CCPA, 2020 focuses on the Importance of Respecting Privacy, Safeguarding Data and Enabling Trust – Data Privacy Day is a day to remember.
The clock is ticking towards the January 1, 2020 deadline when the much-anticipated California Consumer Protection Act (CCPA) will take effect. CCPA is the most sweeping legislation to date in the U.S. that concerns the protection of personal information.
Privacy legislation varies for each state, and is evolving as time passes. To help you view the status of privacy bills, here is a quick chart view of laws to date.
If you are a business in the United States, or anywhere for that matter, its time to start taking notice at where your consumers are located; Because compliance regulations such as those implemented by the European Union, California and Colorado may apply to your organization if you hold the personal information and data of people […]
Developing cyber security and privacy policies and procedures to comply with applicable regulations is only the first step in securing your data and preventing a breach and risk management. This panel will discuss how organizations of all sizes can develop a cyber risk management approach that will enable them to develop a comprehensive, robust, resilient, […]