Category: Legal Requirements

Page 5

Guide to the Illinois Biometric Information Privacy Act

Guide to the Illinois Biometric Information Privacy Act

With the advancement of technology, businesses are using new techniques to gather information from their users to create user-friendly experiences. However, this is also raises privacy questions. In fact, a case...

IT Security Policy Template

IT Security Policy Template

Every company that uses Information Technology (IT) should have an IT Security Policy. Even very small companies need an IT Security Policy since they are just as vulnerable to cyberattacks...

How to Handle GDPR Privacy Access Requests

How to Handle GDPR Privacy Access Requests

If you collect and process personal data about somebody, they may have the right under the GDPR to ask you what data you have and how you use it. The...

Your "Do Not Sell My Personal Information" Page

Your "Do Not Sell My Personal Information" Page

A "Do Not Sell My Personal Information" page enables consumers to opt out of the sale of their personal data. In this context, personal data includes but is not limited...

Common Data Breaches and How to Handle Them

Common Data Breaches and How to Handle Them

A data breach is an incident in which data that should be confidential is accessed by somebody without authorization. This could simply mean the unauthorized person seeing the data. Alternatively...

Don't Use Pre-Ticked Checkboxes For Cookies

Don't Use Pre-Ticked Checkboxes For Cookies

Using pre-checked consent boxes for cookies is now officially a breach of European privacy laws. The Court of Justice of the European Union has ruled that pre-ticked boxes violate requirements...