Recursos de Software de Gestão de Privacidade de Dados
Clique em Artigos, Termos do Glossário, Discussões, e Relatórios para expandir seu conhecimento sobre Software de Gestão de Privacidade de Dados
As páginas de recursos são projetadas para fornecer uma visão geral das informações que temos em categorias específicas. Você encontrará artigos de nossos especialistas, definições de recursos, discussões de usuários como você, e relatórios de dados da indústria.
Artigos Software de Gestão de Privacidade de Dados
What Is Cloud Identity Management and Why It Is Important
As remote work becomes the new norm, cloud-based tools and work environments are following suit. But as a business and security leader, how do you ensure the right people have access to the right resources–all while keeping your data safe? That’s where cloud identity management comes in.
por Holly Landis
What Is a Data Breach? How to Prevent It and Best Practices
In the online realm, your personal and professional data can sometimes be the life of the party, even when you didn't send the invites!
por Sagar Joshi
Top 9 IoT Vulnerabilities to Enhance IoT Security in 2023
Have you ever left your home keys under a potted plant, thinking it would be safe there? But then you realize the pot is in plain sight and is the first place a thief would check if they were trying to rob you. Finding a more secure spot for your spare key and taking other precautions helps safeguard your home and all its valuable possessions.
por Tanuja Bahirat
Why Being Just Data Compliant Isn’t Enough
Imagine entering an amusement park that had a fire incident almost a month ago. But since then, the fire department has vetted the amusement park as “safe”. This is also the eighth fire incident in the past year, but there’s nothing to worry about as they are legally compliant with fire standards.
por Amal Joby
What Users Think of Data Privacy Management Software: Fall 2022
G2’s 2022 Fall Reports for software categories are out. Let’s get an update on the state of what users think of and rate their data privacy management software this quarter.
por Merry Marwig, CIPP/US
Data Privacy Tech Users Want Easier Tools
What do users of data privacy management software think about their software? At G2, we ask. G2 is the world’s largest tech marketplace, where B2B tech users can review the software and services they use and read other software reviewers’ insights to discover tech solutions that best fit their needs.
por Merry Marwig, CIPP/US
Implementing Data Privacy Management Software: How Long Does It Take?
It’s been a busy past year for those working in the data privacy industry. 2020 welcomed the implementation date (January 1, 2020) and enforcement date (July 1, 2020) of the California Consumer Privacy Act (CCPA).
por Merry Marwig, CIPP/US
2021 Trends in Vendor Security and Privacy Assessments
This post is part of G2's 2021 digital trends series. Read more about G2’s perspective on digital transformation trends in an introduction from Michael Fauscette, G2's chief research officer and Tom Pringle, VP, market research, and additional coverage on trends identified by G2’s analysts.
por Merry Marwig, CIPP/US
2021 Trends in People-Centric Data Privacy Tech
This post is part of G2's 2021 digital trends series. Read more about G2’s perspective on digital transformation trends in an introduction from Michael Fauscette, G2's chief research officer and Tom Pringle, VP, market research, and additional coverage on trends identified by G2’s analysts.
por Merry Marwig, CIPP/US
Investing in Automation in the Data Privacy Software Market
One of the hottest topics in data privacy management in 2020 is automation—specifically, automated data discovery and classification.
por Merry Marwig, CIPP/US
A Complete Guide to Data Privacy Management
To help buyers make sense of the data privacy software landscape, I will write several articles on various functions of data privacy software. My aim is to provide our readership with overviews and practical advice when buying data privacy software of all kinds. Our first installment is an overview of data privacy management software.
por Merry Marwig, CIPP/US
Process Data Portability Requests: What Businesses Need to Know
Ever been fed up with your cell phone provider? Maybe you had a good deal the first few months, then suddenly your rates shoot up or your service gets spotty. Perhaps you’ve ended a call with customer service saying, “Well, I’ve had enough. I’m switching providers.”
por Merry Marwig, CIPP/US
True Data Protection Demands More Than Just Regulation
I’ll let you in on a (poorly kept) secret: The use of advanced analytics and other AI-powered capabilities that help users manage and interrogate data isn't new. The practice has been around far longer than the current bubble of hype surrounding AI has been inflating.
por Tom Pringle
CCPA: Everything You Need to Know
Following extensive media coverage of the Facebook-Cambridge Analytica scandal, the Equifax data breach, and countless other known data breaches, consumers have become more aware of how their personal data is being used and misused by companies.
por Merry Marwig, CIPP/US
The G2 on Privacy: What to Know About the NIST Privacy Framework
The most valuable public companies in the world today are all driven by data.
por Merry Marwig, CIPP/US
Termos do Glossário Software de Gestão de Privacidade de Dados
Discussões Software de Gestão de Privacidade de Dados
0
Pergunta sobre: TrustArc
What is consent St TrustArc?What is consent St TrustArc?
TrustArc Cookie Consent Manager é uma solução configurável que permite que as organizações atendam aos requisitos de conformidade de cookies em todo o mundo, ao mesmo tempo em que oferece uma experiência de consentimento com a marca.
0
Pergunta sobre: Collibra
What is Critical data elements? How to identify CDE.How to identify critical data element
Há uma variedade de critérios que podem determinar que um elemento de dados seja crítico. Esses critérios podem incluir (mas não se limitam a) o seguinte:
1) Se o elemento deve ser alimentado a jusante ou incluído em um relatório
2) Se o elemento é usado de alguma forma em lógica ou como um filtro
3) Se é um campo chave
4) Se o campo impacta a qualidade do registro geral
5) Dados de referência em um registro geralmente serão identificados como um CDE, pois podem impactar lógica, qualidade, filtragem, etc.
Elementos de Dados Críticos são "...aqueles que são considerados vitais para o funcionamento bem-sucedido da organização"
0
Pergunta sobre: TrustArc
What is TrustArc used for?What is TrustArc used for?
Como líder em privacidade de dados, a TrustArc automatiza e simplifica a criação de programas de gestão de privacidade de ponta a ponta para organizações globais. A TrustArc ajuda clientes em todo o mundo a demonstrar conformidade, minimizar riscos e construir confiança.
Relatórios Software de Gestão de Privacidade de Dados
Grid® Report for Data Privacy Management
Winter 2025
Relatório G2: Grid® Report
Momentum Grid® Report for Data Privacy Management
Winter 2025
Relatório G2: Momentum Grid® Report
Grid® Report for Data Privacy Management
Fall 2024
Relatório G2: Grid® Report
Momentum Grid® Report for Data Privacy Management
Fall 2024
Relatório G2: Momentum Grid® Report
Grid® Report for Data Privacy Management
Summer 2024
Relatório G2: Grid® Report
Momentum Grid® Report for Data Privacy Management
Summer 2024
Relatório G2: Momentum Grid® Report