Six Steps to an Effective E-Commerce Privacy Notice

,
Good products and a good privacy notices are two things every e-commerce company needs to be successful. Thanks to the best practices that consumer privacy laws like the European Union’s General Data Protection Regulation (GDPR) and the…
Cyber security data protection business technology privacy concept. Young businessman select the icon security on the virtual display.

What You Need in Your Privacy Notice

,
Website privacy notices have been around for a long time, but good privacy notices?  Those are pretty new. Historically, online privacy notices have been boilerplate documents with pages upon pages of legal jargon that an ordinary consumer…
Wooden cubes with the letter from the ESG word. ESG - short for environmental social governance

How ESG Can Drive Your Privacy Program

ESG programs are the future of corporate social responsibility. But they’re also the future of consumer trust—and sustainable data privacy practices.  ESG might seem out of left field for privacy philosophy, but its foundations are a…

Trust: The New Currency You Should Be Investing In

,
Have you ever heard the saying “money isn’t worth the paper it’s printed on?” It’s one of those idioms that’s both true and not true at the same time. We’ll never turn down a crisp $50 bill, but that bill is objectively worthless.…
magnifying glass hovering over laptop analyzing data

Utah Consumer Privacy Act

,
Utah may have been the 45th state to get a star on the Star-Spangled Banner, but it’s at the forefront of data privacy in the US. As the fourth state to pass a comprehensive privacy law governing how businesses can collect and use consumer…
Data Privacy Automation

Protecting Your Crown Jewels: Why Data Privacy Automation Matters

,
Every aspect of our daily lives, from shopping to healthcare delivery to communication to banking, is moving online. This transition to digital means that consumers’ personal information is worth more than the Crown Jewels of the British Empire. Think…
third party risk management

Third-Party Risk Management

, ,
Oldest children around the world often bond over a specific shared memory.  The parents are gone, they’re in charge, and their younger siblings sneak off to the basement to watch the new, scary movie that just dropped. The normally responsible…

Pencils & Erasers: How Trust Is Leading the Privacy Conversation

“Everyone makes mistakes. That’s why pencils have erasers.” It’s a pretty common saying, and while it’s not wrong, it leaves out one important fact.  Erasers are much smaller than pencils. Only so many errors can be rubbed away…
zero party data

Introducing the Newcomer to the Data Party

There’s a party, and you’re invited! “Who’s coming?” you ask. Well, we don’t really know. “Who’s throwing it?” you say. Kind of no one. “Umm . . . I’m confused. Is this actually a party?” you respond. It…

What Is Data Minimization?

, , ,
Do you remember going to your grandparents’ house as a kid and pulling out a kitchen drawer jam-packed with expired mayonnaise and ketchup packets from a dozen different restaurants? Or opening a closet door . . . and having hundreds of gift…