top of page
Privacy engineering is a discipline that integrates privacy into the SDLC and operationalizes Privacy by Design (PbD) to deliver privacy outcomes. Privacy Engineering brings together tools (including Privacy-enhancing Technologies) to build systems that respect privacy. These systems embody fundamental data protection principles by minimizing personal data use, maximizing data security, and empowering individuals. Join us for a conversation with Priya Keshav, CEO of Meru Data and Aaron Weller, Leader of HP's Privacy Engineering Center of Excellence around the importance of Privacy Engineering as part of a modern privacy program.
We will cover topics including:
- How do we operationalize legal and business requirements around privacy?
- What is Privacy Engineering and PETs?
- How do you build a Privacy Engineering Center of Excellence?
- Why would you need a CoE?
The legal and regulatory privacy landscape is evolving rapidly. The Ad Tech privacy space, in particular, is facing significant compliance and regulatory challenges in light of the recent enactment of comprehensive privacy legislation that regulates Ad Tech and increased regulatory scrutiny and enforcement. As a result, the Ad Tech space is one on which to keep an eye
Our webinar will cover the following topics:
- How recently enacted privacy laws (including U.S. state comprehensive privacy laws) affect the Ad Tech industry
- Notable regulatory developments impacting the Ad Tech industry
- How players in the Ad Tech ecosystem should approach privacy compliance in the wake of recent developments
Employee privacy rights pose unique challenges for US businesses. The ever-changing privacy law landscape is complex and if you don’t have a plan the liability and business interruption can be substantial. This panel will address some of the new requirements stemming from global privacy laws around collecting and processing employee data that every US business needs to know.
**This course has been approved by the State Bar of Texas for full CLE credit. MCLE stands for Minimum Continuing Legal Education and every active member of the State Bar must complete a minimum of 15 hours of continuing legal education (CLE) during each MCLE compliance year. Our Sponsor ID # is A17268. For an attorney to report your attendance, click on the link, log in, certify that the requested credit is correct, and click submit. ** Link: https://www.texasbar.com/AM/Template.cfm?Section=Home&Template=/Security/Login.cfm
Privacy has been at the forefront of business priorities and rightfully so. The privacy forward approach involves numerous complexities, the most important being the need for fundamental change in our data practices.
These changes have to start at the top and persist through to the grass-roots level which calls for accurate and continuous education and communication within the organization.
As we begin the new the year on the right foot, let's focus first on building a practice of appropriate education and communication within the company as this has consistently been the marker of successful change within any organization.
With the Colorado Privacy Act (CPA) expected to go into effect on July 1, 2023, the state will join the ranks of California and Virginia in terms of privacy legislation. This gives businesses about eight months to get things in order before the law goes into effect.
However, the CPA differs from the other state regulations in certain aspects. The latest draft regulations proposed by the Colorado AG add some complexity around the legal obligations by businesses.
This webinar will focus on helping businesses prepare for the Colorado Privacy Act. If you’re someone who is already compliant with the existing privacy laws or just starting out, join us to learn how you can prepare to achieve timely compliance with the upcoming Colorado regulations.
B2B exemptions under the California Consumer Privacy Act (CCPA) excluded personal information collected in a business-to-business (B2B) context from the scope of the CCPA. However, these exemptions will cease to apply starting January 1, 2023, with the enforcement of the CPRA.
This means companies collecting personal information (PI) of business contacts for providing or receiving a product or service to and from another business will have to comply with the requirements under the CPRA. This goes on to include the PI of workforce members, independent contractors, service providers and other business contacts that was collected to aid in providing or receiving a product or service to and from another business.
Priya Keshav, founder and CEO of Meru Data, will be speaking at the ARMA International & Arizona Chapter Event on “California’s Consumer Privacy Rights Act (CPRA): What Arizona Data Processors Need to Know”.
The session will discuss the key takeaways from California Attorney General’s notices to organizations addressing purportedly incomplete or untimely responses to DSARs, incomplete recordkeeping, and deficient consumer notices, and from civil suits alleging causes of action under the CCPA.
Is your privacy program Proactive or Reactive? Is Privacy your default setting? Most importantly, is Privacy embedded into your business practices and IT design?
Today's data governance world calls for a 'Privacy by design' approach where Privacy is already a part of the IT architecture of the business, where it is the default setting, and every practice that occurs, does so from a privacy-forward standpoint.
Tune into our webinar where Privacy professionals discuss the Privacy by design approach and how it can be implemented for new businesses as well as already existing ones. We will also cover best practices and tips to maintain the approach over the long term
Are you prepared for 2023? With new privacy laws going into effect in Virginia, Colorado, California, Utah, and Connecticut, what should you be doing now to help ensure timely compliance with these new requirements?
Developing a comprehensive, multi-state privacy strategy will be challenging, especially given the fact that some of the requirements for compliance are still under development. The best path for an organization is to implement a strong data privacy foundation with processes and tools that are scalable to adaptable to new regulations.
Join us for this webinar as we focus on the new state privacy laws, provide companies with helpful tips to prepare for the new laws before they take effect. We will also discuss what to expect from the rulemaking process.
Data minimization should be an integral part of an organization's privacy program. Data minimization requires good planning, connecting the dots, and working collaboratively with all relevant stakeholders across the organization. Please join us where we discuss the following:
- Data minimization requirement under CPRA, VCDPA, CPA, and GDPR
- How do you minimize collection?
- Reconciling the requirement to delete for Privacy and Retention Compliance
- Practical examples and use cases on how to plan
- Discuss existing case laws and requirements
- Steps that can lead to a sustainable data minimization program
- Incorporating best practices and lessons learned
Priya Keshav, the Founder, and CEO of Meru Data will be speaking on “Rethinking RIM for Data Minimization,
Are You Ready?” at the MER | The MER Conference 2022 | May 10th – 12th.
Join the live session on May 2022.
Internal controls are safeguards designed to avoid, detect and minimize risks. Internal Controls are valuable tools.
Companies are adopting internal control frameworks to enhance, measure and mature their privacy programs. In this webinar, we will discuss
1. Frameworks like ISO or NIST
2. Factors involved in picking the right framework
3. Incorporating privacy-related controls into the control environment
4. Can control enhance your operational efficiency?
5. How to measure the effectiveness and maturity of the program using these frameworks as a guide
With the exponential growth incorporating data, there is an increasing need to ensure all sensitive, personal, and business information is properly identified and secured. But it has become difficult for organizations to keep up with this growth in enterprise data and utilize its full potential. Only AI and machine learning technologies offer the ability to detect, map, and categorize sensitive data at an organizational level. However, mapping sensitive information at an enterprise scale requires a solution that is scalable and accurate.
Reasons to attend
- Get acquainted with the types of data classification
- Know how to properly scope and plan for such an effort
- Learn about the capabilities and limitations of such an AI/ML model and how to incorporate appropriate manual controls for successful execution
Join us for a webinar on Effective change management in IG and Privacy programs. Change management is critical for reducing user adoption risks and improving alignment. Done correctly, it leads to greater ownership and accountability across the organization around Privacy. It correlates directly with program success. But despite everyone's understanding, this is critical for success, why is change management so difficult?
Our panel will discuss the three main pillars of change management:
- Leadership and Influence: How can you enable leaders in your organization to persuade others to join in the execution of IG programs. How can your existing organization structure be leveraged to influence change?
- Negotiation and Persuasion: Be more transparent and engaging during the implementation process. This has a direct impact on user adoption, ROI and ultimately will lead the organization to its IG and Privacy goals. Communicating the “future state” will help people understand areas that will need to change the most.
- Tools and techniques needed: Do you have the right tools to introduce change? How will you be able to motivate others and deal with resistance to change? What are some of the emotional elements of change that you need to consider so that your IG and Privacy future state is realized and sustained?
We will cover topics like where privacy professionals go to keep themselves informed, areas of specialization that are developing in this space what skills are most sought after, where, and why.
- Keeping up with Privacy standards
How can we keep up with new and conflicting privacy compliance standards across the globe? What are some of the sources to stay current How effective are training and certification?
- How will the Privacy space evolve
What specializations do we see evolving within the Privacy space? What should Professionals in this area be thinking about to stay current Potentials areas of expertise that are developing: Privacy Law (Country specific), Privacy Engineering, Privacy Tech
- Where should Privacy sit within organizations?
What is the ideal model for Privacy – centralized function or distributed/embedded Where is Privacy currently in organizations – Legal, Compliance, Marketing? Which parts of the organizations are hiring today in Privacy?
Did you know 80% of people are more likely to buy from companies that they believe protect their personal information? Retail companies need to truly understand their consumers in order to both retain and successfully serve them. Can this be done effectively while also ensuring consumer privacy is safeguarded? Deriving value from consumer data and providing privacy protection are not either/or options for companies today. Both are a must for companies to succeed in Retail. Join us for a discussion on how you can proactively build programs to maximize both the value of your consumer data and ensure the privacy protection that consumers expect.
Key themes of the discussion:
- Customer centricity in Retail
- Maximizing data utility without compromising privacy
- Integrating “Privacy by Design” into day-to-day operations and why it’s important
- Can Privacy-enhancing technologies (PETs) help?
Rather than continuing to rush forward with implementing a digital transformation strategy, including privacy and security-related issues, organizations actually need to take two steps back to identify critical information management-related gaps before continuing to move forward. The first step is to automate information-related processes in conjunction with information management best practices to establish systematic controls and reporting mechanisms. The second step is to convince stakeholders that the program is effective by demonstrating positive ROI. This workshop discusses how to establish effective information assurance (IA) KPIs to successfully manage and sustain your privacy program from an IA perspective.
Priya Keshav, Founder and CEO of Meru Data, will present "Breaking Down Information Silos with IG Metrics & Transparency".
Learn from these and other educational sessions, only at InfoGov World conference days, September 16 and 17 (IG, RIM, and eDiscovery training happening on September 14 and 15). Don't miss out - register today!
Priya Keshav, Founder and CEO of Meru Data, will be speaking on “Implementing Data Minimization Programs at Global Enterprises” at the MER | The MER Conference 2021 | May 24 -27.
She will discuss key foundational elements required for a robust data minimization program and how they should be structured to engage stakeholders across the enterprise. Join the live session on May 25, 9:00 AM – 10:00 AM CDT.
Information has become a valuable asset of the digital realm, and safeguarding it should be the priority of every organization. With the growing opportunities for IoT and AI, it is pivotal to be abreast with the risks associated with the same. The Arizona Chapter is back with their ARMA AZ Spring 2021 Seminar!
This month will feature a talk on “IoT and AI, and why we should be interested in it” by guest speaker Priya Keshav, the CEO of Meru Data. Join the live seminar on March 18, 2021, at 8:00 AM MDT via Zoom.
What factors, qualities, and skills drive success, and how can those components help women pursuing careers and leadership roles in the information governance sector? panelists include Ann K. Snyder (Manager of Content Development at ARMA International), Priya Keshav (Founder and CEO of Meru Data), Stacey Egerton Davis (Senior Vice President of FinPay, LLC), and Lynn Molfetta (co-partner and consultant at MC Bernstein Data).
The session focuses on the intersection of IoT and AI and how it affects your security, privacy, and ethical risks. The presentation will share examples of how companies are viewing and managing these risks right now. The challenges companies face while trying to address these risks will also be discussed. Both IoT and AI are here to stay.
John Montana, Brian Tuemmler, Priya Keshav, and John Icaza will join a panel to provide practical advice for organizations on how to comply with various privacy regulations followed by a 45-minute roundtable discussion. Participating in this session will help you be knowledgeable and up to date about privacy compliance which will be a key skill going forward.
Technology is changing our lives in countless ways, from smart thermostats and smart watches to smart cities and energy grids. A wide variety of use cases are being enabled through smart devices called IoT or the Internet of Things. As companies unlock the potential of IoT, the number of IoT devices is expected to exponentially grow to 20 billion by 2020. Managing data from IoT is a looming challenge for legal professionals. We will discuss these challenges both how they affect the practice of law and the operational challenges surrounding data governance.
Invited speaker to discuss "IG Leadership in a Time of Transformation: Robots, Blockchains, and IoT Devices, Oh My!" The advent of AI and other innovative and disruptive technologies is an opportunity for CIGOs to step up in taking the lead in spearheading efforts to integrate such technologies into the workplace. The panel will share insights on how companies have used AI techniques and blockchains, including in changing the way recordkeeping functions, and will also discuss how the IoT environment poses new and unique challenges in the IG space.
The CIGO Summit is a by-invitation-only, executive event for senior leaders in cybersecurity, information management, law, privacy, data analytics, records management, compliance, and other IG-related disciplines.
IoT and Info Gov: What You Need To Know The Internet of things, or IoT, is transforming how we interface with the world. As organizations unlock the potential of IoT, the number of IoT devices is expected to exponentially grow. Managing data from IoT is a looming challenge for information governance professionals. Join this session for practical guidance on how to structure an IG program for IoT data.
bottom of page