Devtools for Data Privacy — Step 3: An Ontology
The final piece of the privacy puzzle is an ontology: a powerful model that formalizes the complex relationships between data and its uses in modern tech stacks.
The final piece of the privacy puzzle is an ontology: a powerful model that formalizes the complex relationships between data and its uses in modern tech stacks.
Developer tools for data privacy, built to work in existing pipelines, offer immense potential for embedding privacy and respect into all tech stacks. Our CEO Cillian highlights the positive impacts of privacy devtools.
Engineering teams play a crucial role in modern privacy operations. Here are 6 key PrivEng skills and competencies that all Engineering teams should have in 2022.
Privacy engineering has emerged as a vital function for data-driven businesses, bridging the gap between Legal and Engineering teams to deliver trustworthy processes and products. Here’s what you should know.
For privacy engineers to build privacy directly into the codebase, they need agreed-upon definitions for translating policy into code. Ethyca CEO Cillian unveils an open-source system to standardize definitions for personal data living in the tech stack.
Consent is at the heart of modern privacy compliance. In this article, we look at how to build robust consent frameworks for laws like GDPR and CCPA.
Data maps are the lynchpins of modern privacy. In this article, we look at how to build the perfect business data map for compliance with laws like GDPR and CCPA.
Data subject requests and DSARs are core functions in modern privacy ops. In this article, we show how to successfully fulfill these requests in compliance with laws like GDPR and CCPA.
Colorado joins the ranks of California and Virginia in passing comprehensive consumer privacy legislation. Here’s how the latest privacy law stacks up to other frameworks, and what it could teach us about the future of American privacy regulation.
Strong password practices are essential for keeping your company’s and users’ data safe, in processing DSARs and in your general business practices. However, passwords are just one part of the equation. For next-level protection, here’s the 411 on 2FA: two-factor authentication.