Third-Party Risk Management Best Practices
Every company uses 3rd parties to augment their business but every company doesn't effectively manage the risks associated with using those 3rd parties. Read about TPRM best practices.
Third-Party Monitoring: The 80/20 Rule Wins
Understanding the importance and the associated risks with each of your third parties allows you to prioritize your time wisely. Read more about the best ways to allocate your time.
PIA and DPIA Automation
Privacy Impact Assessments (PIA), including Data Privacy Impact Assessments (DPIA), are critical for helping organizations identify real and potential compliance risks with their internal policies and external regulations.
GDPR Compliance Has Just Become Easier
CENTRL is excited to announce the launch of its integrated privacy management application, Privacy360.
GDPR requires that data privacy must be considered before implementing a project or a process. If the project or process is considered to be high-risk, GDPR requires conducting a Data Protection Impact Assessment (DPIA) in order to meet compliance.
California Privacy Act Compliance
The California Consumer Privacy Act (CCPA) of 2018 passed on June 28, 2018, and is now law. The law introduces new privacy rights for consumers and will require companies that conduct business in the State of California.
The European Union's General Data Protection Regulation (GDPR) was effective on May 25, 2018. The sweeping reforms under the GDPR built on the previous data protection principles in the EU member countries.
California Consumer Privacy Act of 2018
Read how businesses will need to modify to comply with CCPA and learn the major provisions of the California Consumer Privacy Act, 2018 (the “CCPA”)
GDPR Compliance Software
The General Data Protection Regulation (GDPR) requires organizations handling European Union citizens' personal data to keep their data secure and levies large fines to those companies failing to comply.
6 Capabilities Key to B2B File Sharing Success
Many companies share files and data with clients and partners daily. CENTRL guarantees secure sharing of your files.
Where File Sharing Systems and Secure Data Rooms Fail
Cloud-based file sharing is a business imperative for exchanging information between companies. Learn more about limitations of data rooms and file sharing systems.
Information Security Due Diligence
From recent data breaches to increased regulation, conducting information security due diligence on your partners has become a requirement in today's changing world.
Due Diligence Software
Due diligence software's overarching goal is to minimize the time and effort spent on the due diligence process and maximize time on the analysis.
Investment Operational Due Diligence - AIMA Partnership
Automate full diligence process and allows you to focus on risk insight through detailed analytics and dashboards.