CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
  • See all results
Teresa Troester Falk
Chief Global Privacy Strategist at Nymity
Leading Nymity’s global privacy strategy, Teresa Troester-Falk is a thought leader in the privacy industry. An accomplished privacy professional (CIPP/US), lawyer, and leader in managing and integrating complex data privacy compliance issues and strategy, Teresa is an expert in cross-border data transfers and the challenges faced by the privacy office.


Businessman in a cardboard sails in a storm at sea showing how organizations cope with GDPR and CCPA regulations
Data ProtectionInsights

GDPR, CCPA, LGDP and More: Staying Afloat in the Sea of Global Privacy Regulations

April 17, 2019
117 GDPR omnibus laws, 28 CCPA sectoral laws and more amendments coming up for the CCPA and LGDP, how do you keep your privacy program afloat? Read More
EU flags waving in front of European Parliament building
Data ProtectionInsights

Processing Personal Data on the Basis of “Legitimate Interests” Under the GDPR

July 6, 2018
While the legitimate interests ground for processing under the GDPR can be lawfully applied in many cases, a provisional balance should be established by data controllers with more safeguards for the protection of data subjects. Read More
Image of Business People Meeting for GDPR Compliance
Data ProtectionInsights

A Practical Guide to Demonstrating GDPR Compliance

June 8, 2018
Developing an effective privacy management infrastructure for GDPR compliance seems daunting. How do you prioritize to meet GDPR accountability obligations? Read More
Image of stethoscope on heartbeat chart showing how privacy management software is needed
Data ProtectionInsights

The Ultimate Guide to Buying Privacy Management Software

May 4, 2018
Privacy management software can help you increase your efficiency and accuracy by automating complex or high volumes of privacy management activities, including privacy impact assessments (PIAs)/data protection impact assessments (DPIAs), data mapping/data inventory, and enterprise assessments. How do you choose? Read More
Image of office desk with piles of paperwork signifying the need for buying privacy office support software
Data PrivacyInsights

The Ultimate Guide to Buying Privacy Office Support Software

April 18, 2018
The responsibilities of the privacy office include building and maintaining an effective privacy program consisting of policies, procedures, and other mechanisms, sometimes referred to as governance. Privacy office support software can assist the individuals who are responsible for these tasks. Read More
Image of woman holding a pen and staring at laptop screen signifying the need for buying legal research software
Data PrivacyInsights

The Ultimate Guide to Buying Legal Research Software

March 9, 2018
Legal research software provides fundamental support for the privacy office. Armed with up-to-the-minute knowledge, and a thorough understanding of current legal requirements, the privacy office can advise on compliance with privacy obligations across multiple jurisdictions. How do you choose the right solution? Read More
Image of checklist on a clipboard and pen representing the need to demonstrate compliance using an accountability approach
Data ProtectionInsights

An Accountability Approach to Demonstrating Compliance

September 21, 2016
In this final instalment of an ongoing series on the issues that affect compliance in an ever more complex world Teresa Troester-Falklooks at how organisations can demonstrate compliance using an accountability approach. Read More
Image of building plans and tool representing getting started on structured privacy management
Data PrivacyInsights

Structured Privacy Management Accountability: Getting Started

May 21, 2016
In part I of an ongoing series of articles Teresa Troester-Falk examined how the evolution of the concept of Accountability as a privacy and data protection principle. In this article, part II she looks at accountability in practice, and how to achieve accountability through structured privacy management. Read More
Image of calculator representing accountability as a data protection and privacy principle
Data PrivacyInsights

The Concept of “Accountability” as a Privacy and Data Protection Principle

February 19, 2016
In part one of an ongoing series of articles Teresa Troester-Falk examines exactly how we define the principle of Accountability in terms of privacy and data protection in today’s fast moving and fluid world where increased threats to data integrity are rapidly becoming one of the most pressing issues faced by global businesses. Read More

Latest

Pedestrians cross the road in India showing impact of data breach on payment processor

Amazon, Swiggy Payment Processor Juspay Downplays Data Breach That Led To 100 Million Records Circulating on the Dark Web

Businessman walks in airport terminal showing potential immunity passports as COVID vaccine rolls out

Controversial “Immunity Passports” Debated as COVID Vaccine is Rolled Out

Flags of the European Union flying showing EDPB cross border data transfer guidance post Schrems II

European Data Protection Board Highlights Ways to Comply

People using messaging apps on smartphone showing revelations by privacy labels

New iOS Privacy Labels Reveal Major Data Collection Differences Between Messaging Apps

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

Follow us

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow us

© 2020 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
Start typing to see results or hit ESC to close
U.S. Regulations Data Breach EU GDPR Cyber Threat
See all results