Blogs tagged GDPR
-
More than just a number A large distribution list is meaningless, without useable data; if the later is not true about every customer on this list, it is time to reassess the relationship. Re-inventing “the talk” I have seen a lot of... Read More »0Comments4Likes
-
Introduction We live in an exciting era where business is transforming at an unprecedented rate that we have not fully come to grasp its impact on data privacy. Look at the statistics which are staggering. Globally, smartphone penetration is... Read More »0Comments3Likes
-
Summary: Using “radio buttons” or single-purpose sign-up forms instead of tick-boxes may help you balance subscriber numbers and opt-in rules. And keep wording simple and transparent. The Details: Tick boxes and the opt-in process... Read More »0Comments3Likes
-
In May 2021 the UK data protection and privacy regulator, the ICO (Information Commissioner’s Office) fined Amex (American Express) for sending “service message” emails which contained marketing. This article gives an explanation to the... Read More »0Comments0Likes
-
In this blogpost I will explain you the use case of automating General Data Protection Regulation (GDPR) requests with RPA. We, as consulting experts from enmore and BTC, analyzed how these processes currently take place in companies, what needs to... Read More »0Comments2Likes
-
Spatial Anonymization: How to hide personal data while keeping valuable insights. [1] When dealing with personal location data, you quickly run into questions about data privacy and anonymization. Due to the global pandemic and the many different... Read More »5Comments13Likes
-
Protecting Personal Identifiable Information What is PII? Personally Identifiable Information (PII), is any data that can be used used to identify an individual such as names, Birthdate, driver’s license number, SSNs, bank account numbers,... Read More »2Comments2Likes
-
Part 3 of a 6-Part Series Our personal data has many dimensions – all of which can be cross-related and mapped in ways that no one could have imagined a few years ago. Take, for example, browsing history: when combined with purchase transactions,... Read More »0Comments1Like
-
As an alternative to real-time reporting, I sometimes hear that SAP systems are checked for real incidents at regular intervals (e.g. monthly). For this purpose, the SAP Security Audit Log among many other logs are checked for violations of system... Read More »1Comment9Likes
-
The SAP landscape is changing to enable a unique digital transformation. A new world is emerging; on-premise is moving to cloud, IT is being delivered as a service and applications are more agile and able to be improved ‘on the fly’. How many... Read More »1Comment5Likes