
Introducing the Newcomer to the Data Party
AllThere’s a party, and you’re invited!
“Who’s coming?” you ask.
Well, we don’t really know.
“Who’s throwing it?” you say.
Kind of no one.
“Umm . . . I’m confused. Is this actually a party?” you respond.
It…

Best in Show: How to Build an Exemplary Preferences Center
AllThanks to cable TV and Christopher Guest’s hilarious Best In Show mockumentary, even cat people are familiar with the snobby, persnickety world of dog competitions.
The Westminster Kennel Club Dog Show is the second-longest-running sporting…

The Colorado Privacy Act 101
AllThe Four Corners of the Centennial State’s new privacy law
Colorado is home to the highest incorporated city in the US (Leadville), the highest paved road in North America (the road to Mt. Evans), and the highest car tunnel in the world…

Does My Business Website Really Need a Privacy Policy?
AllFrom picking the color scheme to writing SEO copy to integrating your payment platforms, building a website or app is a huge project. After you’ve tested all your links, worked out the UX bugs, and built an interactive chat function, the last…

What Is Data Lineage?
AllFrom Odysseus to Wonder Woman, every hero has an origin story.
Whether they are about orphans or gods, unwilling champions or those born into greatness, origin stories are compelling narratives that position the protagonist in the world.…

Get a Privacy Guru Without Breaking the Bank
AllNew data privacy laws like the European Union’s General Data Protection Regulation (GDPR) require many companies to have a dedicated data privacy officer overseeing their data collection and processing program.
Separate but related, the…


How Service & Software Go Together When It Comes To Privacy
All, CyberSecurity, PrivacyPrivacy compliance is a long road. Luckily, you don’t have to go it alone.
Privacy management software can help you set up a robust privacy program. But without a privacy expert, you will be driving blind.
If privacy laws had a relationship…


How to Protect Against Ransomware: Five Ways to Safeguard Your Business
All, CyberSecurity, PrivacyIn 17th and 18th century England, highwaymen—thieves who traveled and robbed on horseback—concealed themselves along wooded sections of major roads leading out of London, waiting for the chance to stop vulnerable travelers in stagecoaches…




10 Privacy Steps for SaaS Companies
AllSoftware as a service is vital for businesses, but so is privacy and data security. SaaS providers must deliver for their customers or risk a dangerous credibility gap, plus data breaches, fines, fees, and everything else that goes along with…




Pocket Guides
pocket-guides