Data Erasure In Distributed Systems

My talk at this year’s Privacy Engineering Practice and Respect (PEPR) conference came on the heels of the Colorado House voting to pass the state’s comprehensive privacy legislation.

Implementing Two-Factor Authentication In DSARs And Beyond

Strong password practices are essential for keeping your company’s and users’ data safe, in processing DSARs and in your general business practices. However, passwords are just one part of the equation. For next-level protection, here’s the 411 on 2FA: two-factor authentication.

About Data Minimization

Data Minimization is a core privacy practice for organizations worldwide. This guide will cover the basic principles of Data Minimization, and show how your business can implement it in a privacy program.

An Interview with Suchi Natarajan

For our latest team intro, we met up with Suchi Natarajan
@suchirolls
, our Jr Web Developer! Suchi describes her integral role in building Ethyca’s web presence, and her superpowers don’t stop there. Catch our chat with the multitalented Suchi