December 8, 2023
What Is the EU-US Data Privacy Framework & How Should You Plan?

The General Data Protection Regulation (GDPR) is one of the most wide-reaching and stringent data...

November 14, 2023
Acceptable Use Policy for Generative AI: Where to Start? 

Generative artificial intelligence (AI) are prediction algorithms that can be leveraged to create any type...

August 16, 2023
What’s the Worst That Could Happen? A Guide to AI Risks

While generative artificial intelligence (AI), foundation models, and Large Language Models (LLMs) are often described...

August 16, 2023
Types of AI and Input Models Explained

ChatGPT is one of the fastest-growing artificial intelligence (AI)-powered apps of all time, but it...

May 3, 2023
Why Tech Companies Should Care About Healthcare Data Breaches

Health data is one of the most valuable assets organizations in the healthcare and life...

April 28, 2023
How Does Data Classification Help Protect Data Privacy?

As data breaches and cyber attacks become more common, protecting data privacy is an increasingly...

March 24, 2023
What Are the Key APRA Data Security Standards?

Financial data is among the most sensitive information an organization can possess, yet its use...

December 22, 2022
The Next Generation of CCPA Compliance Requirements

The 2020 elections not only saw record turnout, but also ushered in a suite of...

August 19, 2022
The Data Privacy Regulation Roundup: What Data Teams Need to Know

When the General Data Protection Regulation (GDPR) entered into force, US privacy law was still...

October 22, 2021
Why Is GDPR Compliance Important and How Do I Achieve It?

A modern analytics environment is typically built to reduce time to data, leaving compliance as...

May 7, 2021
What is Data De-identification and Why is It Important?

Data de-identification is a form of dynamic data masking that refers to breaking the link between data...

April 29, 2021
Why Clarifying De-Identification Concepts is Key to Sufficient Data Protection

Data protection law emerged in the 1970’s in Europe as a means to protect against...

February 5, 2021
What is Differential Privacy? A Guide for Data Teams

In today’s day and age, we’re accustomed to technological advances and capabilities being uncovered all...

January 20, 2021
How to Unlock Successful, Scalable GDPR Compliance

The General Data Protection Regulation (GDPR) is omnipresent: It applies to every person or entity...

A Call for a Risk-Based Assessment of Anonymization Approaches
August 24, 2020
A Call for a Risk-Based Assessment of Anonymization Approaches

Why it’s time to reexamine the binary dichotomy between personal and aggregate data, and what...

August 17, 2020
Myth Busting Legal Compliance Automation in Data Analytics

Let’s face it: compliance can be tricky when it comes to data science and analytics....

Provisioned Access
January 30, 2020
Why Provisioned Access is the Key to the Right to be Forgotten

Since the Court of Justice of the European Union (EU) decided the Google Spain case...

July 22, 2019
Why a Data Privacy Compliance Journey Should Start with Privacy by Design

Global interest in privacy has led to a recent explosion in privacy-centric legislation. Consequently, organizations...

January 15, 2019
Create Instant, Customizable Reports on Data Activities with Immuta

Reports on data processing activities are crucial for compliance. Describing processing activities – like what...

December 19, 2018
Differentiating Data Security in the GDPR from Privacy

The European Union’s General Data Protection Regulation — one of the most forward-leaning privacy regulations...

November 21, 2018
Why a Professor in Information Technology Law & Data Governance Joined Immuta

I joined the Immuta team last Monday and, since then, have been asked several times:...