CCPA

CCPA vs. GDPR: Similarities and Differences Explained

The California Consumer Privacy Act (CCPA) and the General Data Protection Regulation (GDPR) are laws that emerged to give individuals greater power over their personal information. Both regulate organizations that collect and use data in a variety of ways. A brief summary of the CCPA: Gives California residents increased transparency and control…

What Is Personal Data?

Put simply, personal data is information that relates to 1. an identified or identifiable person or 2. an identified or identifiable legal entity (where such information is protected similarly as personal data under applicable data protection laws and regulations). While regulations use different terms with slightly varying definitions, “personal…

What Is Data Misuse?

Data misuse is the use of information in ways it wasn’t intended for. User agreements, corporate policies, data privacy laws, and industry regulations all set conditions for how data can be collected and used. Data misuse violates these requirements. Unlike data theft, data misuse doesn’t necessarily happen as a result of a cyberattack or when…

What Is a Data Breach?

A data breach happens when cybercriminals gain unauthorized access to a system or network, allowing them to search for sensitive data pertaining to a business and its customers, and using it to extract some form of illegal value. Attackers might sell this data on the dark web, directly engage in fraud, hold the information for ransom, or use it to…

What Is Data Security?

Data security is the protection of digital data and accounts in accordance with laws and industry standards in order to mitigate risks and repel attackers. It encompasses business data, employee information, and customer and user data. If that sounds multifaceted, it is: putting data security into practice isn’t one size fits all. With companies…

Compliance and Consent: The Privacy Factors that Help Drive User Trust

If there’s one thing we took away from this year’s RSA Conference, it’s that privacy is top of mind for today’s organizations. But how can they abide by the many emerging privacy regulations without creating tedious user experiences? The answer: by adopting secure data handling practices that build user trust—while still providing delightful…

Putting Privacy First: Takeaways from RSA Conference 2020

What happens when you put hundreds of security professionals in a room? They come together to identify and discuss the emerging cybersecurity trends, challenges, and opportunities. At this year’s RSA Conference, the theme was “Human Element,” reminding us that every technology-related decision, innovation, and risk has direct impacts on…

The NIST Privacy Framework: Why it Matters

Okta’s vision is to be the platform that enables any organization to adopt any technology. To achieve that goal, it’s critical that Okta customers and partners have complete trust in our ability to keep their data private and secure. As such, we are constantly aligning our operations with comprehensive data privacy standards, developing best…

4 Steps to Building Consumer Trust

As cyber criminals become more refined in their exploits, customers and their personal information are being increasingly targeted—and that poses a growing threat to organizations. Today, according to the Ponemon Institute, the cost of a data breach is $3.92 million, including non-operational factors like reduced brand engagement and compromised…

Data Privacy Day: 5 Tips to Help Keep your Private Data Private

As new technologies continually integrate themselves deeper into the lives of average consumers, these users increasingly benefit from the enhanced productivity and convenience that these technologies offer. That being said, knowing how to leverage these technologies in a way that optimizes personal privacy isn’t always intuitive for the average…

Archive