Resources

Ask CENTRL: Does my business need to provide a CCPA policy and notices in languages other than English?

Every business subject to the CCPA must have a privacy policy that provides consumers with a comprehensive description of the following the business’s online and offline practices.

EXL Joins Forces with CENTRL to bring Cybersecurity solution to its Customers

Partnership enhances the foundation for smart, scalable, and sustainable one-stop-shop solutions to deliver best-in-class cyber risk assessment capabilities.

You’ve Got Mail

California Attorney General Begins Enforcement of CCPA - Notices of Noncompliance Sent to “Swath” of Companies on July 1, 2020

Documenting CCPA Compliance

The California Consumer Privacy Act (CCPA) permits the Attorney General (AG) to begin enforcement six months after publication of the final regulations or July 1, 2020, whichever is sooner. The July 1st date won that statutory race.

Possible Extension of CCPA Exemptions for B2B and Employee Data

The California Consumer Privacy Act (CCPA) was amended in 2019 to add two exemptions, one for certain personal information (PI) collected from consumers in business to business (B2B) transactions...

How to Respond to Consumer Requests to "Delete My Data"

Many businesses subject to the California Consumer Privacy Act (CCPA) had hoped that final regulations would be in place before the July 1st enforcement date of the CCPA.

Supply Chain Risk Management: How To Identify, Prioritize and Mitigate Risks Detect Vulnerabilities With Cyber Risk Assessment Tools

Modern cyber risk assessment tool strengthens your organization’s cybersecurity profile through powerful analytics and reports that can help you gain action-oriented insights, understand risk sources, highlight risks, and monitor key indicators.

Lights, Camera, Action! - California Attorney General Releases Proposed Final CCPA Regulations

There has been no lack of drama with the CCPA - from its introduction and swift passage by the state legislature in 2018 to the California Privacy Rights Act.

General Data Protection Regulation (GDPR) - Data Sheet

Snapshot of CENTRL GDPR software platform's key features and benefits. View or download PDF.

How CENTRL Helps with CCPA Compliance

INFOGRAPHIC: Combat Growing Third-Party Risk

Learn how to solve growing third-party risk by fighting supply chain attacks with end-to-end Third-Party Risk Management.

INFOGRAPHIC: Growing Third Party Risk

Learn how to solve growing third-party risk by fighting supply chain attacks with end-to-end Third-Party Risk Management.

INFOGRAPHIC: Risk Management Operations

Learn how you can automate end-to-end third-party vendor assessments while maintaining control of third-party risk and oversight.

INFOGRAPHIC: The Evolving Third Party Risk Management Landscape

Learn the different problems that companies are facing when it comes to third-party risks.

INFOGRAPHIC: The Hidden Cost of Vendor Risk and Compliance

To keep pace with the rising tide of consumer privacy regulations, global enterprises are often forced to allocate additional overhead towards third-party risk management to support regulatory compliance.

INFOGRAPHIC: The Hidden Cost of Vendor Risk and Compliance

To keep pace with the rising tide of consumer privacy regulations, global enterprises are often forced to allocate additional overhead towards third-party risk management to support regulatory compliance.

Privacy in a Box - Data Sheet

Privacy in a Box Combines the convenience of CENTRL's automated privacy management platform with Grant Thornton's deep privacy practice experience. View or download PDF.

Top 5 Survival Tips Learned from GDPR to Prepare you for CCPA - Guide

Learn what key steps you can take now to strengthen and get your privacy program under control.

Value of Automating your Due Diligence Process

Diligence, by definition has to be done accurately. Its management needs to be more than accurate, it needs to be efficient, too.

Data Request Portal - Data Sheet

CENTRL's Data Request Portal provides an automated and secure way to communicate with consumers to fulfill consumer rights requests. View or download PDF.

Top 4 Questions on the Reasonable Data Security Requirements under New York's SHIELD Act

SHIELD Act amended NY's existing data breach notification law by expanding the definitions of private information and breach of the security of the system.

  • {index}
  • {title}

    {content}