Resources

Third-Party Risk Management Best Practices

Every company uses 3rd parties to augment their business but every company doesn't effectively manage the risks associated with using those 3rd parties. Read about TPRM best practices.

Third-Party Monitoring: The 80/20 Rule Wins

Understanding the importance and the associated risks with each of your third parties allows you to prioritize your time wisely. Read more about the best ways to allocate your time.

PIA and DPIA Automation

Privacy Impact Assessments (PIA), including Data Privacy Impact Assessments (DPIA), are critical for helping organizations identify real and potential compliance risks with their internal policies and external regulations.

GDPR Compliance Has Just Become Easier

CENTRL is excited to announce the launch of its integrated privacy management application, Privacy360.

Assessment Automation

GDPR requires that data privacy must be considered before implementing a project or a process. If the project or process is considered to be high-risk, GDPR requires conducting a Data Protection Impact Assessment (DPIA) in order to meet compliance.

California Privacy Act Compliance

The California Consumer Privacy Act (CCPA) of 2018 passed on June 28, 2018, and is now law. The law introduces new privacy rights for consumers and will require companies that conduct business in the State of California.

GDPR Compliance

The European Union's General Data Protection Regulation (GDPR) was effective on May 25, 2018. The sweeping reforms under the GDPR built on the previous data protection principles in the EU member countries.

California Consumer Privacy Act of 2018

Read how businesses will need to modify to comply with CCPA and learn the major provisions of the California Consumer Privacy Act, 2018 (the “CCPA”)

GDPR Compliance Software

The General Data Protection Regulation (GDPR) requires organizations handling European Union citizens' personal data to keep their data secure and levies large fines to those companies failing to comply.

6 Capabilities Key to B2B File Sharing Success

Many companies share files and data with clients and partners daily. CENTRL guarantees secure sharing of your files.

Where File Sharing Systems and Secure Data Rooms Fail

Cloud-based file sharing is a business imperative for exchanging information between companies. Learn more about limitations of data rooms and file sharing systems.

Information Security Due Diligence

From recent data breaches to increased regulation, conducting information security due diligence on your partners has become a requirement in today's changing world.

Due Diligence Software

Due diligence software's overarching goal is to minimize the time and effort spent on the due diligence process and maximize time on the analysis.

Investment Operational Due Diligence - AIMA Partnership

Automate full diligence process and allows you to focus on risk insight through detailed analytics and dashboards.

  • {index}
  • {title}

    {content}