|
Use this template to document what will be included on your subject access request landing page.
|
|
|
Use this template to build procedures for subject access requests.
|
|
|
Use this example as a starting point to document your subject access request procedure for erasure requests.
|
|
|
Use this example as a starting point to document your subject access request procedure for rectification requests.
|
|
|
Use this tool as a starting point to track all types of subject access requests throughout the process.
|
|
|
AU10TIX, an identity verification and biometric onboarding company, received a $60-million investment from TPG Capital, valuing the company at $260 million.
|
|
|
Trend Micro has added training content to its free Phish Insight tool, originally a simple, cloud-based phishing platform. The new training content comes from partnerships...
|
|
|
Infosec now offers campaign kits through its Infosec IQ product: prebuilt campaigns consisting of layered training materials and implementation recommendations. While many...
|
|
|
Based on a recent survey conducted by Enterprise Management Associates (EMA), organizations are confused about what privileged access management (PAM) is and whether they...
|
|
|
Symantec recently announced new features for its Integrated Cyber Defense Platform aimed at boosting DLP strategies in the cloud via zero trust technologies from Luminate,...
|
|