Data Erasure In Distributed Systems

My talk at this year’s Privacy Engineering Practice and Respect (PEPR) conference came on the heels of the Colorado House voting to pass the state’s comprehensive privacy legislation.

Implementing Two-Factor Authentication In DSARs And Beyond

Strong password practices are essential for keeping your company’s and users’ data safe, in processing DSARs and in your general business practices. However, passwords are just one part of the equation. For next-level protection, here’s the 411 on 2FA: two-factor authentication.

An Interview with Suchi Natarajan

For our latest team intro, we met up with Suchi Natarajan
@suchirolls
, our Jr Web Developer! Suchi describes her integral role in building Ethyca’s web presence, and her superpowers don’t stop there. Catch our chat with the multitalented Suchi

Your Guide To User Consent In Plain Terms

Teams need to present consent options to users in terms they can understand, and striking the balance between clarity and thoroughness is key for strong privacy ops. Here’s how your team can get there.