
How to influence compliance as a DPO (without making your colleagues cry!)
Get the latest tips on how to improve compliance (without the tears!) from Egress DPO Kevin Tunison.
Read articleOrganizations simply cannot risk breaking data security regulations. Here's everything you need to know to stay compliant.
Get the latest tips on how to improve compliance (without the tears!) from Egress DPO Kevin Tunison.
Read articleGet first-hand advice on discovering risk from Egress' highly-experienced DPO.
Read articleThe second half of our DPO's expert tips on discovering risks in your supply chain.
Read articleA protects California residents from data mismanagement and negligent email security. Click here to see how email security and CCPA compliance can be achieved on one platform
Read articleIf you use our software and services to process personal information of Californian residents then this activity may (depending on your financial size or the volume of your processing) will be subject to the requirements of the CCPA.
Learn how Egress software complies with CCPAThe California Consumer Privacy Act (CCPA) is an expansive data privacy regulation that significantly enhances consumers’ rights.
Read articleSimilar to the EU’s General Data Protection Regulation (GDPR), the California Consumer Privacy Act 2018 (AB 375) focuses on providing Californian consumers with control over their personal data. When it takes effect, in January 2020, it will be the strictest data privacy law in the United States.
Read articleOrganisations need to take a proactive approach to achieve compliance with the California Consumer Privacy Act, which represented a major step forward for data privacy rights for the state's residents from the start of 2020.
Read articleFind out everything you need to know about the California Consumer Privacy Act of 2018 (CCPA) and email encryption.
Read articleSeptember 3rd 2018; NY DFS Cybersecurity Regulation (23 NYCRR 500)
Read articleThe New York Department of Financial Services (NYDFS), responsible for regulating financial services and products within the state, has recently introduced Cybersecurity Regulation 23 NYCRR 500.
Read articleGDPR compliance can make or break businesses with EU customers – here are five tips for achieving compliance.
Read articleIf you use our services to process personal data of UK or EU citizens then this activity will be subject to the requirements of the GDPR. You will need to make sure that you comply with your obligations as either a Controller or Processor and we can help you meet these.
Learn how Egress software complies with GDPRSir Christopher Graham delivered his final annual report as Information Commissioner.
Read articleCoalfire have conducted an independent technical assessment of the Egress platform to determine the solution’s suitability for meeting EU GDPR controls for protection of personal data. This included technical testing, architectural assessment, and compliance validation.
Read articleHear what industry experts had to say on Egress' latest GDPR research.
Read articleArticle 15 of the GDPR concerns the right of access by the data subject. This means that under GDPR, EU citizens can contact organisations and businesses they have dealt with and find out what information is held on them, and how the organisation is processing that data.
Read articleFind out why more people are banding together to legally enforce their data privacy rights.
Read articleWe all know that the EU GDPR is coming into force very soon. May 2018 is going to usher in the new rules on data protection and privacy, and all organisations that deal with EU citizens’ personal information need to be ready.
Read articleFind out how Egress is responding to the European Court of Justice issuing its judgement that the EU/US Privacy Shield programme was invalid.
Read articleArticle 15 of the GDPR concerns the right of access by the data subject. This means that under GDPR, EU citizens can contact organisations and businesses they have dealt with and find out what information is held on them, and how the organisation is processing that data.
Read articleWe can provide further information to you about how the compliance measures that we take in respect of our own software and services can help you to meet your own obligations under HIPAA and HITECH. We can provide this information either under a non-disclosure agreement or through any secure portal functionality.
Read articleLearn how to create an effective email policy to ensure your organization's use of email adheres to HIPAA compliance measures.
Read articleThree tips for keeping ePHI secure while working remotely.
Read articleAny small US healthcare organisation that’s suffered a breach in 2018 had to notify HHS by March 1st 2019, which just rolled past.
Read articleLearn how to send encrypted HIPAA-compliant email in our comprehensive guide.
Read articleHIPAA (Health Insurance Portability and Accountability Act) is a major piece of data privacy legislation that aims to secure (electronic) Protected Healthcare Information (PHI and ePHI) from fraud and data breaches.
Read articleFind out more about the Health Insurance Portability and Accountability Act (HIPAA) and how to remain compliant when sharing sensitive data over email
Read articleOur software and services are firmly focussed on ensuring regulatory compliance – not just with the GLBA, but with other privacy regulations around the globe. You can find out more information on each of these using the links above or the Products and Solutions tabs at the top of the page.
Read articleFor over 20 years, UK Government has relied on the ‘gsi-family’ of email domains for securing email communication between government departments.
Read articleThe ISO 27001:2013 international standard specifies requirements for an Information Security Management System (ISMS)
Read articleISO27001 certification provides organisations with a way to demonstrate the strength of their security practices to customers, prospects and partners
Read articleFind the answers you need from our bank of first-hand research and thought leadership.
Visit cybersecurity information hub