IT Security Policy Template
Every company that uses Information Technology (IT) should have an IT Security Policy. Even very small companies need an IT Security Policy since they are just as vulnerable to cyberattacks...
How to Handle GDPR Privacy Access Requests
If you collect and process personal data about somebody, they may have the right under the GDPR to ask you what data you have and how you use it. The...
Your "Do Not Sell My Personal Information" Page
A "Do Not Sell My Personal Information" page enables consumers to opt out of the sale of their personal data. In this context, personal data includes but is not limited...
Common Data Breaches and How to Handle Them
A data breach is an incident in which data that should be confidential is accessed by somebody without authorization. This could simply mean the unauthorized person seeing the data. Alternatively...
Don't Use Pre-Ticked Checkboxes For Cookies
Using pre-checked consent boxes for cookies is now officially a breach of European privacy laws. The Court of Justice of the European Union has ruled that pre-ticked boxes violate requirements...
Washington Privacy Act (WPA) vs California Consumer Privacy Act (CCPA/CPRA)
The Washington Privacy Act (WPA) and the California Consumer Privacy Act (CCPA/CPRA) are two state acts out of the United States with similar aims - to protect the privacy of...