Responding to a Data Subject Access Request under the GDPR

This whitepaper discusses the challenges faced by organizations in complying with a Data Subject Access Request (DSAR) and the impact the General Data Protection Regulation (GDPR) will have in responding to such requests from 25th May 2018. This paper focuses on the typical workflows involved and includes recommendations and best practices.

Spotlight

Computer Ease LLC

Computer Ease is a system integration and service company which has been meeting the data processing needs of clients throughout the NJ/NY/CT Tri-State area for 15 years. In addition, we have been providing quality computer systems and software support to retailers nationwide since 2001. Our experienced and dedicated staff has one goal - to help make all your computing experiences easy! We can help you solve computer problems, upgrade your system, expand your network, and so much more - all quickly and cost-effectively. Computer Ease has a solution to fit any of your business or home computing needs. Think you have a virus?? No problem!! Our technical staff brings over 30 years' combined experience to help you find the solution that's best suited for you and/or your business.

OTHER WHITEPAPERS
news image

Cloud Collaboration Security Technical Paper Series: Webex Messaging

whitePaper | December 17, 2022

Webex is a cloud collaboration platform that provides messaging, calling, and meeting features. This paper describes the architecture and security features related to the Webex Messaging service and the suite of tools that the Webex Messaging service provides to keep customers’ data safe from Cisco as well as external attackers.

Read More
news image

2022 Cyber Security Report

whitePaper | July 25, 2022

The past twelve months represents one of the most turbulent and disruptive periods on record, at least as far as security is concerned. As governments and businesses around the world continued to navigate the uncharted waters of a global pandemic, the so-called “new normal” still felt a long way off. Digital transformation efforts were dramatically accelerated as businesses embraced hybrid and remote working arrangements, but the same questions around security maturity that plagued many businesses in 2020 persisted through 2021.

Read More
news image

Optimizing Your Zero Trust Environment for Secure Video Conferencing

whitePaper | July 4, 2023

We’ve all heard the buzz around the virtual water cooler that Zero Trust Architectures are The Next Big Thing in network security, but what do we really know about them? And, perhaps more relevant to our discussion today, why should you care? This white paper looks at how and why Zero Trust (ZT) defines a data-centric security model and what that means in a real-time production environment. We build on that conversation to take a deeper look at how Pexip's video conferencing platform integrates with your existing ZT strategy and can even give you some new ZT concept ideas to consider.

Read More
news image

Data Security: The Key to Defeating Ransomware Attacks

whitePaper | May 26, 2022

Ransomware attacks have become increasingly pervasive and pernicious. Many organizations have suffered from at least one ransomware attack, and many ransomware victims have unfortunately been left with no resort other than paying the ransom and hoping to recover their data.

Read More
news image

AI Security White Paper

whitePaper | January 23, 2020

With the accumulation of big data, dramatic improvements in computing power, and continuous innovation in Machine Learning (ML) methods, Artificial Intelligence (AI) technologies such as image recognition, voice recognition, and natural language processing have become ubiquitous. Meanwhile, AI poses a significant impact on computer security: on the one hand, AI can be used to build defensive systems such as malware and network attack detection; on the other hand, AI might be exploited to launch more effective attacks.

Read More
news image

Security Overview Whitepaper

whitePaper | February 6, 2023

All encryption/decryption operations are only performed by RoboForm locally on user’s devices and never on the RoboForm Server. RoboForm Data Objects and other user data is never sent to the Server in an unencrypted form. All communication between RoboForm Clients and Server are conducted over encrypted channels only.

Read More

Spotlight

Computer Ease LLC

Computer Ease is a system integration and service company which has been meeting the data processing needs of clients throughout the NJ/NY/CT Tri-State area for 15 years. In addition, we have been providing quality computer systems and software support to retailers nationwide since 2001. Our experienced and dedicated staff has one goal - to help make all your computing experiences easy! We can help you solve computer problems, upgrade your system, expand your network, and so much more - all quickly and cost-effectively. Computer Ease has a solution to fit any of your business or home computing needs. Think you have a virus?? No problem!! Our technical staff brings over 30 years' combined experience to help you find the solution that's best suited for you and/or your business.

Events