[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"layout":3,"i-tabler:language":300,"i-tabler:chevron-down":304,"i-tabler:moon":306,"i-material-symbols-light:arrow-forward":308,"i-material-symbols-light:menu":310,"i-tabler:radar":312,"i-tabler:hand-stop":314,"i-tabler:scale":316,"i-tabler:world":318,"i-tabler:radar-2":320,"i-tabler:book-2":322,"i-tabler:lifebuoy":324,"i-tabler:arrow-up-right":326,"i-tabler:settings":328,"i-tabler:shield-check":330,"blog-are-schools-leaking-personal-data-on-their-students":332,"blog-sidebar-taxonomy":456,"blog-list-p1-l5-call-tall-xare-schools-leaking-personal-data-on-their-students":498,"i-tabler:category-2":608,"i-tabler:user":610,"i-tabler:calendar":612,"i-tabler:tags":614,"i-tabler:arrow-left":616,"i-tabler:brand-openai":618,"i-tabler:atom":620,"i-tabler:bolt":622,"i-tabler:rosette-discount-check":624,"i-tabler:brand-google":626,"i-tabler:folder":628,"i-tabler:check":630,"i-tabler:article":632,"i-tabler:calendar-event":634,"i-tabler:chevron-right":636},{"settings":4,"headerNav":13,"footerNav":197,"socialLinks":281,"hasResources":11,"latestWhitepaper":288},{"id":5,"site_name":6,"default_seo_title_template":7,"default_meta_description":8,"default_social_image":9,"footer_text":9,"default_contact_email":10,"default_phone":9,"default_linkedin":9,"default_youtube":9,"search_enabled":11,"search_empty_state_copy":9,"consent_banner_enabled":12,"consent_banner_copy":9,"gpc_message_copy":9},"site-config","Lokker","{{title}} | Lokker","Precision control over consumer data collection and sharing, built for privacy-first organizations.",null,"info@lokker.com",true,false,[14,22,28,34,40,46,52,58,64,69,75,81,87,93,99,105,111,116,122,128,134,140,145,151,157,163,169,174,180,185,191],{"id":15,"status":16,"sort":17,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":19,"url":20,"parent_item":9,"featured":12,"open_in_new_tab":12,"icon_key":21},"nav-products","published",20,"","Products","/products","monitor",{"id":23,"status":16,"sort":24,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":25,"url":26,"parent_item":9,"featured":12,"open_in_new_tab":12,"icon_key":27},"nuxt-who-we-help",25,"Who We Help","/who-we-help","user-shield",{"id":29,"status":16,"sort":30,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":31,"url":32,"parent_item":23,"featured":12,"open_in_new_tab":12,"icon_key":33},"nuxt-who-privacy-teams",26,"Privacy Teams","/who-we-help/privacy-teams","privacy-officer",{"id":35,"status":16,"sort":36,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":37,"url":38,"parent_item":23,"featured":12,"open_in_new_tab":12,"icon_key":39},"nuxt-who-legal-compliance",27,"Legal & Compliance","/who-we-help/legal-compliance","scale",{"id":41,"status":16,"sort":42,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":43,"url":44,"parent_item":23,"featured":12,"open_in_new_tab":12,"icon_key":45},"nuxt-who-insurance",28,"Insurance & Risk","/who-we-help/insurance","shield-dollar",{"id":47,"status":16,"sort":48,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":49,"url":50,"parent_item":23,"featured":12,"open_in_new_tab":12,"icon_key":51},"nuxt-who-agencies",29,"Agencies","/who-we-help/agencies","building-store",{"id":53,"status":16,"sort":54,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":55,"url":56,"parent_item":23,"featured":12,"open_in_new_tab":12,"icon_key":57},"nuxt-who-it-security-leader",30,"IT & Security Leaders","/who-we-help/it-security-leader","shield",{"id":59,"status":16,"sort":60,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":61,"url":62,"parent_item":9,"featured":12,"open_in_new_tab":12,"icon_key":63},"nuxt-solutions",31,"Solutions","/solutions","puzzle",{"id":65,"status":16,"sort":66,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":67,"url":68,"parent_item":59,"featured":12,"open_in_new_tab":12,"icon_key":39},"nuxt-sol-litigation-discovery",32,"Litigation & discovery","/solutions/litigation-discovery",{"id":70,"status":16,"sort":71,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":72,"url":73,"parent_item":59,"featured":12,"open_in_new_tab":12,"icon_key":74},"nuxt-sol-ma-due-diligence",33,"M&A due diligence","/solutions/ma-due-diligence","case-study",{"id":76,"status":16,"sort":77,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":78,"url":79,"parent_item":59,"featured":12,"open_in_new_tab":12,"icon_key":80},"nuxt-sol-board-risk-reporting",34,"Board & risk reporting","/solutions/board-risk-reporting","report",{"id":82,"status":16,"sort":83,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":84,"url":85,"parent_item":59,"featured":12,"open_in_new_tab":12,"icon_key":86},"nuxt-sol-portfolio-monitoring",35,"Portfolio monitoring","/solutions/portfolio-monitoring","dashboard",{"id":88,"status":16,"sort":89,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":90,"url":91,"parent_item":59,"featured":12,"open_in_new_tab":12,"icon_key":92},"nuxt-sol-healthcare",36,"Healthcare","/solutions/healthcare","healthcare",{"id":94,"status":16,"sort":95,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":96,"url":97,"parent_item":59,"featured":12,"open_in_new_tab":12,"icon_key":98},"nuxt-sol-consent-audit",37,"Consent Audit","/solutions/consent-audit","shield-check",{"id":100,"status":16,"sort":101,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":102,"url":103,"parent_item":59,"featured":12,"open_in_new_tab":12,"icon_key":104},"nuxt-sol-third-party-script-governance",38,"Script Governance","/solutions/third-party-script-governance","code",{"id":106,"status":16,"sort":107,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":108,"url":109,"parent_item":59,"featured":12,"open_in_new_tab":12,"icon_key":110},"nuxt-svc-consent-tag-orchestration",39,"CMP & tag orchestration","/services/consent-tag-orchestration","tag-manager",{"id":112,"status":16,"sort":107,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":113,"url":114,"parent_item":9,"featured":12,"open_in_new_tab":12,"icon_key":115},"nav-resources","Resources","/resources","guide",{"id":117,"status":16,"sort":118,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":119,"url":120,"parent_item":112,"featured":12,"open_in_new_tab":12,"icon_key":121},"nav-res-docs",40,"Documentation","/docs","book",{"id":123,"status":16,"sort":124,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":125,"url":126,"parent_item":112,"featured":12,"open_in_new_tab":12,"icon_key":127},"nav-res-whitepapers",41,"Whitepapers","/resources?type=whitepapers","whitepaper",{"id":129,"status":16,"sort":130,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":131,"url":132,"parent_item":112,"featured":12,"open_in_new_tab":12,"icon_key":133},"nav-res-quarterly-reports",41.5,"Quarterly Reports","/resources?type=quarterly_reports","chart-bar",{"id":135,"status":16,"sort":136,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":137,"url":138,"parent_item":112,"featured":12,"open_in_new_tab":12,"icon_key":139},"nav-res-blog",42,"Blog","/blog","blog",{"id":141,"status":16,"sort":142,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":143,"url":114,"parent_item":112,"featured":12,"open_in_new_tab":12,"icon_key":144},"nav-res-downloads",43,"Downloads & Checklists","checklist",{"id":146,"status":16,"sort":147,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":148,"url":149,"parent_item":112,"featured":12,"open_in_new_tab":12,"icon_key":150},"nav-res-press",44,"Press & News","/press","press",{"id":152,"status":16,"sort":153,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":154,"url":155,"parent_item":112,"featured":12,"open_in_new_tab":12,"icon_key":156},"nav-res-events",44.5,"Industry Events","/events","calendar-event",{"id":158,"status":16,"sort":159,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":160,"url":161,"parent_item":112,"featured":12,"open_in_new_tab":12,"icon_key":162},"nav-res-glossary",44.8,"Privacy Glossary","/glossary","book-2",{"id":164,"status":16,"sort":165,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":166,"url":167,"parent_item":9,"featured":12,"open_in_new_tab":12,"icon_key":168},"nav-training",45,"Training","/training","training",{"id":170,"status":16,"sort":171,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":172,"url":167,"parent_item":164,"featured":12,"open_in_new_tab":12,"icon_key":173},"nav-training-academy",46,"Privacy Academy","school",{"id":175,"status":16,"sort":176,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":177,"url":178,"parent_item":9,"featured":12,"open_in_new_tab":12,"icon_key":179},"nav-company",50,"Company","/about","building",{"id":181,"status":16,"sort":182,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":183,"url":178,"parent_item":175,"featured":12,"open_in_new_tab":12,"icon_key":184},"nav-about",51,"About","team",{"id":186,"status":16,"sort":187,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":188,"url":189,"parent_item":175,"featured":12,"open_in_new_tab":12,"icon_key":190},"nav-careers",52,"Careers","/careers","briefcase",{"id":192,"status":16,"sort":193,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":194,"url":195,"parent_item":175,"featured":12,"open_in_new_tab":12,"icon_key":196},"nav-contact",53,"Contact","/contact","email",[198,201,204,207,210,213,216,219,222,225,228,231,234,237,240,243,245,248,251,254,257,260,263,266,271,276],{"id":199,"status":16,"sort":200,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":25,"navigation_label":25,"url":26,"open_in_new_tab":12},"nuxt-f-who-we-help",1,{"id":202,"status":16,"sort":203,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":25,"navigation_label":31,"url":32,"open_in_new_tab":12},"nuxt-f-privacy-teams",2,{"id":205,"status":16,"sort":206,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":25,"navigation_label":37,"url":38,"open_in_new_tab":12},"nuxt-f-legal-compliance",3,{"id":208,"status":16,"sort":209,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":25,"navigation_label":43,"url":44,"open_in_new_tab":12},"nuxt-f-insurance",4,{"id":211,"status":16,"sort":212,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":25,"navigation_label":49,"url":50,"open_in_new_tab":12},"nuxt-f-agencies",5,{"id":214,"status":16,"sort":215,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":25,"navigation_label":55,"url":56,"open_in_new_tab":12},"nuxt-f-it-security-leader",6,{"id":217,"status":16,"sort":218,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":61,"navigation_label":61,"url":62,"open_in_new_tab":12},"nuxt-f-solutions",7,{"id":220,"status":16,"sort":221,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":61,"navigation_label":67,"url":68,"open_in_new_tab":12},"nuxt-f-sol-litigation-discovery",8,{"id":223,"status":16,"sort":224,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":61,"navigation_label":72,"url":73,"open_in_new_tab":12},"nuxt-f-sol-ma-due-diligence",9,{"id":226,"status":16,"sort":227,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":61,"navigation_label":78,"url":79,"open_in_new_tab":12},"nuxt-f-sol-board-risk-reporting",10,{"id":229,"status":16,"sort":230,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":61,"navigation_label":84,"url":85,"open_in_new_tab":12},"nuxt-f-sol-portfolio-monitoring",11,{"id":232,"status":16,"sort":233,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":61,"navigation_label":90,"url":91,"open_in_new_tab":12},"nuxt-f-sol-healthcare",12,{"id":235,"status":16,"sort":236,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":61,"navigation_label":96,"url":97,"open_in_new_tab":12},"nuxt-f-sol-consent-audit",13,{"id":238,"status":16,"sort":239,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":61,"navigation_label":102,"url":103,"open_in_new_tab":12},"nuxt-f-sol-third-party-script-governance",14,{"id":241,"status":16,"sort":242,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":61,"navigation_label":108,"url":109,"open_in_new_tab":12},"nuxt-f-svc-consent-tag-orchestration",15,{"id":244,"status":16,"sort":242,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":177,"navigation_label":183,"url":178,"open_in_new_tab":12},"nav-f-about",{"id":246,"status":16,"sort":247,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":177,"navigation_label":188,"url":189,"open_in_new_tab":12},"nav-f-careers",16,{"id":249,"status":16,"sort":250,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":177,"navigation_label":194,"url":195,"open_in_new_tab":12},"nav-f-contact",17,{"id":252,"status":16,"sort":253,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":177,"navigation_label":148,"url":149,"open_in_new_tab":12},"nav-f-press",18,{"id":255,"status":16,"sort":256,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":177,"navigation_label":131,"url":132,"open_in_new_tab":12},"nav-f-quarterly-reports",18.5,{"id":258,"status":16,"sort":259,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":177,"navigation_label":166,"url":167,"open_in_new_tab":12},"nav-f-training",19,{"id":261,"status":16,"sort":262,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":177,"navigation_label":154,"url":155,"open_in_new_tab":12},"nav-f-events",19.5,{"id":264,"status":16,"sort":265,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":177,"navigation_label":160,"url":161,"open_in_new_tab":12},"nav-f-glossary",19.8,{"id":267,"status":16,"sort":17,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":268,"navigation_label":269,"url":270,"open_in_new_tab":12},"nav-f-privacy","Legal","Privacy Policy","/privacy-policy",{"id":272,"status":16,"sort":273,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":268,"navigation_label":274,"url":275,"open_in_new_tab":12},"nav-f-terms",21,"Terms of Use","/terms-of-use",{"id":277,"status":16,"sort":278,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":268,"navigation_label":279,"url":280,"open_in_new_tab":12},"nav-f-security",22,"Security","/security",[282],{"status":16,"sort":200,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"show_in_header":12,"show_in_footer":11,"audience_visibility":9,"id":283,"platform":284,"label":285,"url":286,"icon_key":287},"social-linkedin","linkedin","LinkedIn","https://www.linkedin.com/company/lokker","brand-linkedin",{"id":289,"title":290,"slug":291,"publish_date":292,"summary":293,"featured":12,"gated":12,"hero_image":294,"stock_image":9,"categories":299},"6fb13ba4-76d7-4855-bbf0-195c9e4ce8c8","Research Report: Website Privacy and Compliance Challenges","website-privacy-and-compliance-challenges","2024-09-03T09:11:28","By publishing this report, we aim to inform website owners about privacy concerns, potential repercussions, and mitigation strategies. We also strive to underscore the necessity for increased governance within companies, and tools that extend beyond typical consent management to ensure a safer and more transparent online experience for users.",{"id":295,"title":296,"width":297,"height":298},"f614e065-a4a1-44ea-9637-4eeff646cd25","Remediation Workflow",1080,720,[],{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":303},0,24,"\u003Cg fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\">\u003Cpath d=\"M9 6.371C9 10.789 6.761 13 4 13m0-6.629h7\"/>\u003Cpath d=\"M5 9c0 2.144 2.252 3.908 6 4m1 7l4-9l4 9m-.9-2h-6.2M6.694 3l.793.582\"/>\u003C/g>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":305},"\u003Cpath fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"m6 9l6 6l6-6\"/>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":307},"\u003Cpath fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M12 3h.393a7.5 7.5 0 0 0 7.92 12.446A9 9 0 1 1 12 2.992z\"/>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":309},"\u003Cpath fill=\"currentColor\" d=\"M17.079 12.5H5v-1h12.079l-5.792-5.792L12 5l7 7l-7 7l-.713-.708z\"/>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":311},"\u003Cpath fill=\"currentColor\" d=\"M4 17.27v-1h16v1zm0-4.77v-1h16v1zm0-4.77v-1h16v1z\"/>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":313},"\u003Cg fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\">\u003Cpath d=\"M21 12h-8a1 1 0 1 0-1 1v8a9 9 0 0 0 9-9\"/>\u003Cpath d=\"M16 9a5 5 0 1 0-7 7\"/>\u003Cpath d=\"M20.486 9A9 9 0 1 0 9.004 20.495\"/>\u003C/g>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":315},"\u003Cg fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\">\u003Cpath d=\"M8 13V5.5a1.5 1.5 0 0 1 3 0V12m0-6.5v-2a1.5 1.5 0 1 1 3 0V12m0-6.5a1.5 1.5 0 0 1 3 0V12\"/>\u003Cpath d=\"M17 7.5a1.5 1.5 0 0 1 3 0V16a6 6 0 0 1-6 6h-2h.208a6 6 0 0 1-5.012-2.7L7 19q-.468-.718-3.286-5.728a1.5 1.5 0 0 1 .536-2.022a1.87 1.87 0 0 1 2.28.28L8 13\"/>\u003C/g>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":317},"\u003Cpath fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M7 20h10M6 6l6-1l6 1m-6-3v17m-3-8L6 6l-3 6a3 3 0 0 0 6 0m12 0l-3-6l-3 6a3 3 0 0 0 6 0\"/>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":319},"\u003Cg fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\">\u003Cpath d=\"M3 12a9 9 0 1 0 18 0a9 9 0 0 0-18 0m.6-3h16.8M3.6 15h16.8\"/>\u003Cpath d=\"M11.5 3a17 17 0 0 0 0 18m1-18a17 17 0 0 1 0 18\"/>\u003C/g>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":321},"\u003Cg fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\">\u003Cpath d=\"M11 12a1 1 0 1 0 2 0a1 1 0 1 0-2 0\"/>\u003Cpath d=\"M15.51 15.56A5 5 0 1 0 12 17\"/>\u003Cpath d=\"M18.832 17.86A9 9 0 1 0 12 21m0-9v9\"/>\u003C/g>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":323},"\u003Cg fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\">\u003Cpath d=\"M19 4v16H7a2 2 0 0 1-2-2V6a2 2 0 0 1 2-2z\"/>\u003Cpath d=\"M19 16H7a2 2 0 0 0-2 2M9 8h6\"/>\u003C/g>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":325},"\u003Cg fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\">\u003Cpath d=\"M8 12a4 4 0 1 0 8 0a4 4 0 1 0-8 0\"/>\u003Cpath d=\"M3 12a9 9 0 1 0 18 0a9 9 0 1 0-18 0m12 3l3.35 3.35M9 15l-3.35 3.35m0-12.7L9 9m9.35-3.35L15 9\"/>\u003C/g>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":327},"\u003Cpath fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M17 7L7 17M8 7h9v9\"/>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":329},"\u003Cg fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\">\u003Cpath d=\"M10.325 4.317c.426-1.756 2.924-1.756 3.35 0a1.724 1.724 0 0 0 2.573 1.066c1.543-.94 3.31.826 2.37 2.37a1.724 1.724 0 0 0 1.065 2.572c1.756.426 1.756 2.924 0 3.35a1.724 1.724 0 0 0-1.066 2.573c.94 1.543-.826 3.31-2.37 2.37a1.724 1.724 0 0 0-2.572 1.065c-.426 1.756-2.924 1.756-3.35 0a1.724 1.724 0 0 0-2.573-1.066c-1.543.94-3.31-.826-2.37-2.37a1.724 1.724 0 0 0-1.065-2.572c-1.756-.426-1.756-2.924 0-3.35a1.724 1.724 0 0 0 1.066-2.573c-.94-1.543.826-3.31 2.37-2.37c1 .608 2.296.07 2.572-1.065\"/>\u003Cpath d=\"M9 12a3 3 0 1 0 6 0a3 3 0 0 0-6 0\"/>\u003C/g>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":331},"\u003Cpath fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M11.46 20.846A12 12 0 0 1 3.5 6A12 12 0 0 0 12 3a12 12 0 0 0 8.5 3a12 12 0 0 1-.09 7.06M15 19l2 2l4-4\"/>",{"id":333,"status":16,"sort":9,"date_created":334,"date_updated":335,"user_created":336,"user_updated":336,"title":337,"slug":338,"publish_date":339,"summary":340,"body":341,"reading_time_override":9,"featured":12,"seo_title":9,"seo_description":9,"seo_canonical_url":9,"seo_noindex":12,"seo_nofollow":12,"search_boost":9,"search_exclude":12,"hero_image_attribution":342,"hero_image_photographer_url":343,"categories":344,"tags":414,"hero_image":437,"stock_image":9,"seo_social_image":9,"author":451},"14a2eb8e-9bfe-4dd9-a1c4-9be0bd88c753","2026-03-15T21:46:16.835Z","2026-03-21T00:41:54.566Z","d01e7b0b-322c-4e0e-852b-bf7d13527c96","Are schools leaking personal data on their students?","are-schools-leaking-personal-data-on-their-students","2021-04-06T14:45:00","The latest research indicates most are. And the data they are leaking flows to third parties through remote learning apps and school websites. As a society, we have underestimated the threat to children’s privacy presented by online learning applications used by most schools today.","\u003Cp>\u003Cstrong>\u003Cem>The latest research indicates most are. And the data they are leaking flows to third parties through remote learning apps and school websites.\u003C/em>\u003C/strong>\u003C/p>\n\n\u003Ch3>Remote Learning Apps: feeding our children’s information to data brokers\u003C/h3>\n\n\u003Cp>As a society, we have underestimated the threat to children’s privacy presented by online learning applications used by most schools today.  Students’ data is flowing to third parties despite the existence of laws intended to specifically protect it. And likely in ways that would be prohibited by those laws if those involved were aware of it.\u003C/p>\n\n\u003Ch3>Serious student privacy issues began before COVID-19\u003C/h3>\n\n\u003Cp>While the COVID-19 pandemic accelerated the \u003Ca href=\"https://theconversation.com/remote-education-is-rife-with-threats-to-student-privacy-148955\" target=\"_blank\" rel=\"noopener noreferrer\" referrerpolicy=\"no-referrer\">scope and the severity\u003C/a> of the privacy problem by pushing schools into online learning, the data abuse began well before the pandemic. \u003C/p>\n\n\u003Cp>The current privacy epidemic is a result of multiple factors. First, is the widespread use of off-the-shelf code which includes third-party functionality that collects, records, and often sells or re-shares student data with other parties. Then there’s the lack of visibility into which third parties are present in the data chain of these apps and what they’re doing with users’ personal data.\u003C/p>\n\n\u003Ch3>No real choice\u003C/h3>\n\n\u003Cp>Parents generally oversee their children’s use of social media and watch to make sure that they don’t put too much information online. This stems from concerns over stalkers and predators, but it also helps prevent data brokers from getting too much data about kids before they’re even old enough to understand the risks. \u003C/p>\n\n\u003Cp>But with remote learning applications used by schools for online instruction, the story is different. You don’t really have a choice unless you decide to homeschool your kids. And even then, you may decide to use online tools or apps that can expose you to many of the same problems.\u003C/p>\n\n\u003Ch3>So, what are online learning apps doing with our children’s data?\u003C/h3>\n\n\u003Cp>Most of us assume schools and their vendors are following all the rules, especially around student privacy. Two recent studies, however, suggest that these apps could be moving a lot of personal student data and not even know it. \u003C/p>\n\n\u003Cp>This week, the \u003Ca href=\"https://me2ba.org/\" target=\"_blank\" rel=\"noopener noreferrer\" referrerpolicy=\"no-referrer\">Me2B Alliance\u003C/a> released a \u003Ca href=\"https://me2ba.org/school-mobile-apps-student-data-sharing-behavior/\" target=\"_blank\" rel=\"noopener noreferrer\" referrerpolicy=\"no-referrer\">US-based study\u003C/a> of 73 mobile applications being used by 38 schools across the country. \u003C/p>\n\n\u003Cp>\u003Cstrong>A few of their findings:\u003C/strong>\u003C/p>\n\n\u003Cul>\u003Cli>On average, each app was sending data to 10.6 third party data channels\u003C/li>\u003Cli>Some of these apps were sending data to what Me2B classifies as “high risk” or “very high risk” third parties, those which share data onward to many other entities; this risk was significantly lower with iOS apps than Android ones\u003C/li>\u003Cli>Data collection was happening even when the apps were not actively being used, and often even when the user was not signed in\u003C/li>\u003Cli>Data shared with third parties included mobile advertising identifiers (MAIDs), which are unique identifiers used to build consumer profiles\u003C/li>\u003C/ul>\n\n\u003Ch3>More privacy questions than answers\u003C/h3>\n\n\u003Cp>Me2B didn’t do a deeper dive on whether these third parties were handling data correctly but did conclude that the privacy notifications associated with them are unlikely to be current or complete. This is especially true for apps that share data with third parties who themselves pass data onward.\u003C/p>\n\n\u003Ch3>Evidence of a wider problem\u003C/h3>\n\n\u003Cp>Me2B are not the only ones to look at the student privacy problem.  IDAC also did a \u003Ca href=\"https://digitalwatchdog.org/privacy-considerations-as-schools-and-parents-expand-utilization-of-ed-tech-apps-during-the-covid-19-pandemic/\" target=\"_blank\" rel=\"noopener noreferrer\" referrerpolicy=\"no-referrer\">study on applications used in an educational context\u003C/a> (not necessarily in schools), which was released in September 2020. \u003C/p>\n\n\u003Cp>They did manual testing on 98 iOS and Android apps, as well as automated testing on 421 (the specific apps are included in their report).\u003C/p>\n\n\u003Cp>\u003Cstrong>They found that:\u003C/strong>\u003C/p>\n\n\u003Cul>\u003Cli>A small number of the apps were collecting and sharing location data and persistent personal identifiers, and a few were also exposing personal information in URL query strings, which is not a safe practice. \u003C/li>\u003Cli>Potentially worse, 79 of the 123 apps they manually tested were communicating personal data to multiple third parties (not the company that owns the app) and they had similar results with automated testing.\u003C/li>\u003Cli>A significant number of the Android apps were engaging in “ID bridging,” sending both the AAID (a “less sensitive” identifier for targeting advertising) as well as the actual Android ID; sending both of these gets around the user’s ability to reset the AAID and disconnect themselves from their previous history.  It violates Google’s policy for developers.\u003C/li>\u003Cli>Finally, many of the apps make use of third-party code in the form of analytics or advertising SDKs – meaning that they were bringing third parties into the mix by default, and in ways, they likely were not aware of.\u003C/li>\u003C/ul>\n\n\u003Ch3>Remote learning apps may just be the tip of the privacy iceberg\u003C/h3>\n\n\u003Cp>While these studies have focused on mobile apps, the problem isn’t exclusive to them.  Any website which collects personal data and is not transparent about exactly how they are using data and who else is accessing it presents the same risks.\u003C/p>\n\n\u003Cp>Educational websites which incorporate third-party code expose users to all the risks associated directly with that code (who else the app owner shares data with, and why?).  Not only is this a big privacy problem but it is also a major cybersecurity problem. Third-party app code integrated into a school’s website increase the risk of undetected attacks on that codebase such as the MageCart attacks on any web payment forms.\u003C/p>\n\n\u003Ch3>Privacy is a core technological problem that’s getting worse\u003C/h3>\n\n\u003Cp>It’s worth repeating that these privacy issues didn’t originate with the COVID-19 pandemic.  Schools were already using apps to communicate with students and parents, make announcements, track homework assignments, and many other things before the pandemic hit.\u003C/p>\n\n\u003Cp>For example, one school was even using software to approve and create digital hall passes in 2019, as covered in the \u003Ca href=\"https://www.washingtonpost.com/technology/2019/10/29/school-apps-track-students-classroom-bathroom-parents-are-struggling-keep-up/?arc404=true\" target=\"_blank\" rel=\"noopener noreferrer\" referrerpolicy=\"no-referrer\">Washington Post\u003C/a>. All the pandemic did was massively accelerate the use of educational technology, as schools were forced to migrate to online learning to continue operating without endangering lives.\u003C/p>\n\n\u003Ch3>Now, almost everyone is affected\u003C/h3>\n\n\u003Cp>The number of students using these apps increased tremendously over the last year, and the functions performed day to day by learning software increased as well. Some companies which had relatively little involvement with education (e.g. Zoom) suddenly found themselves heavily in the market, and not without growing pains.\u003C/p>\n\n\u003Cp>In this kind of rapidly-changing environment, schools were understandably prioritizing how best to get their core functions online. They did not have the time to properly vet the nuances of privacy and data handling.  Most figured child data and general privacy protections were covered. But clearly, in some cases, schools were encouraged to cut corners, get ramped up, and work out the details later. \u003C/p>\n\n\u003Cp>With schools already being under-resourced, and the relevant resources told to get everything online in a relatively short period of time, it’s no surprise that they didn’t catch some of these critical privacy issues.\u003C/p>\n\n\u003Ch3>Aren’t there laws protecting children’s personal information?\u003C/h3>\n\n\u003Cp>Absolutely.  In the US, there’s the \u003Ca href=\"https://www.ftc.gov/tips-advice/business-center/guidance/complying-coppa-frequently-asked-questions-0\" target=\"_blank\" rel=\"noopener noreferrer\" referrerpolicy=\"no-referrer\">Children’s Online Privacy Protection Act\u003C/a>, which places restrictions on operators of websites or online services which collect personal information about children under age 13 or market toward that age group. \u003C/p>\n\n\u003Cp>There’s also the \u003Ca href=\"https://www2.ed.gov/policy/gen/guid/fpco/ferpa/index.html\" target=\"_blank\" rel=\"noopener noreferrer\" referrerpolicy=\"no-referrer\">Family Educational Rights and Privacy Act\u003C/a>, which protects student educational records.  In the EU, the GDPR places special restrictions on consent and the use of data pertaining to children (defined by default as under age 16, though member states can lower that to 13). \u003C/p>\n\n\u003Ch3>The problem with enforcement\u003C/h3>\n\n\u003Cp>Some of this data collection and use is unlawful – and that’s not a hard call, as the consents and privacy statements they are publishing are clearly incomplete.  But people have to be aware that there’s some difficulty in initiating an enforcement action.\u003C/p>\n\n\u003Cp>One of the problems with making use of third-party code is that your codebase becomes extremely complex – and you don’t have full visibility or control over it. It gets even worse as third parties pass data to fourth parties, fifth parties, and so on.\u003C/p>\n\n\u003Cp>Organizations operating an app or website which includes third-party code are often unaware of all the third parties within their ecosystem, much less what those parties are doing with the data they collect. \u003C/p>\n\n\u003Cp>Case in point, when IDAC reached out to a couple of the app developers to ask why they were sharing data with third parties, the developers were unaware that it was even happening.  (They shut it down after they found out in both cases, so the apps weren’t supporting a critical operational function.)\u003C/p>\n\n\u003Ch3>Data leaks, data breaches, and hacks\u003C/h3>\n\n\u003Cp>It’s bad enough that you don’t necessarily understand what the code in your mobile app or on your school’s website does with your users’ data, but you also become vulnerable to attacks on that third-party code.\u003C/p>\n\n\u003Cp>For example, there’s a loose criminal group called “MageCart” whose stock in trade is compromising third-party code in web payment forms and shopping carts to steal credit card numbers and defraud users. We’ve written about MageCart’s disastrous attacks on corporations like British Airways on this blog before.\u003C/p>\n\n\u003Cp>Because these are attacks against the third-party codebase and not your own, and because the MageCart group is careful in how they operate, these attacks are especially difficult to catch before they damage you. Fortunately, MageCart goes after the big fish, but the risk of exposure and likelihood of a data exploit remain nonetheless.\u003C/p>\n\n\u003Ch3>What can be done?\u003C/h3>\n\n\u003Cp>If you’re a parent or student, you don’t have a lot of options here. You can use the privacy settings available to you in your OS or web browser and restrict data flow to the extent possible. You can also pressure your schools to review the privacy practices of their apps.\u003C/p>\n\n\u003Cp>If you’re a school or school system, you can have your counsel review the legal agreements with the app vendors for privacy provisions and ensure all privacy notices you and your students are receiving are up to date. You should raise questions when you have concerns. And you absolutely should ensure that all of your faculty, staff, and students get appropriate training on online privacy – which very few have actually had.\u003C/p>\n\n\u003Cp>If you’re a vendor providing educational services, you need to get your hands around your environment, and the third (fourth, fifth, etc.) parties within it as soon as possible.\u003C/p>\n\n\u003Ch3>Don’t wait for a fine or breach\u003C/h3>\n\n\u003Cp>Now that the initial panic phase of the pandemic is over, privacy enforcement actions are coming. The US FTC and the European DPAs are likely to get very aggressive if you’ve been giving student data to commercial organizations.\u003C/p>\n\n\u003Cp>To start with, make sure that you understand everything in your ecosystem and who it sends data to. Make sure your privacy notices are accurate, up to date, and complete.\u003C/p>\n\n\u003Cp>You should also close off any channels where data is flowing, and it doesn’t need to.  Remember, you need specific purposes to move sensitive data, and if you didn’t know it was moving in the first place, you legally didn’t have a specific purpose for doing it.\u003C/p>\n\n\u003Ch3>Tech solutions to tech problems\u003C/h3>\n\n\u003Cp>Here is where a solution like Lokker can help. Not only will a free Lokker Privacy Scan map your entire ecosystem, showing you what all is happening, but our Privacy Automation Platform also enables you to selectively shut off or anonymize individual data flows to third-party apps. This essentially cuts off the ability of your website to leak sensitive information at all – from the source.\u003C/p>\n\n\u003Ch3>Opt-in vs Opt-out Privacy\u003C/h3>\n\n\u003Cp>At Lokker, we are all about changing the rules of how companies use and protect private data. The current systems for website publishing and mobile application development are not deploying with a privacy-first mentality as they should have been.\u003C/p>\n\n\u003Cp>Lokker firmly believes in Privacy by Design and will always work to develop solutions that fix the current “opt-out” privacy assumptions by moving companies to a zero-trust, “opt-in” only default state to private data sharing of any kind – for children and adults. And we will always strive to do this in the most efficient and transparent ways possible.\u003C/p>","Photo by Victoria Feliniak on Unsplash","https://unsplash.com/@xvictoriafeliniak",[345],{"categories_id":346},{"id":347,"status":16,"sort":9,"date_created":348,"date_updated":9,"user_created":336,"user_updated":9,"name":137,"slug":139,"description":9,"category_type":139,"parent_category":9,"blog_posts":349,"whitepapers":413},"6414d638-0f20-4ac4-a09c-aebb86f309e5","2026-03-15T21:46:15.475Z",[212,218,224,230,236,242,250,253,259,17,273,278,350,302,24,30,36,42,48,54,60,66,71,77,83,89,95,101,107,118,124,142,165,171,351,352,353,176,182,187,193,354,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373,374,375,376,377,378,379,380,381,382,383,384,385,386,387,388,389,390,391,392,393,394,395,396,397,398,399,400,401,402,403,404,405,406,407,408,409,410,411,412],23,47,48,49,54,57,58,59,60,63,64,65,66,67,68,69,70,73,74,75,76,77,78,81,82,83,84,85,86,87,88,89,90,91,92,93,94,95,96,118,120,122,124,125,126,127,128,129,130,131,132,133,134,135,136,138,139,140,141,142,144,145,147,[],[415],{"tags_id":416},{"id":417,"status":16,"sort":203,"date_created":418,"date_updated":9,"user_created":336,"user_updated":9,"name":419,"slug":420,"description":9,"blog_posts":421},"8b27d7d4-ddd4-42ca-8a00-c8a17fbd11ce","2026-03-15T21:46:15.650Z","Consumer Privacy","consumer-privacy",[200,203,206,212,259,17,273,302,193,422,367,368,373,374,375,376,377,378,381,382,385,386,387,388,423,424,390,425,397,398,426,427,428,429,430,431,432,433,434,435,436],55,97,98,121,146,156,160,161,162,164,166,167,168,170,176,{"id":438,"storage":439,"filename_disk":440,"filename_download":441,"title":442,"type":443,"folder":444,"uploaded_by":336,"created_on":445,"modified_by":446,"modified_on":447,"charset":9,"filesize":448,"width":297,"height":298,"duration":9,"embed":9,"description":9,"location":9,"tags":9,"metadata":449,"focal_point_x":9,"focal_point_y":9,"tus_id":9,"tus_data":9,"uploaded_on":450},"aec7f64e-be68-478a-b177-d5a3f694da98","local","aec7f64e-be68-478a-b177-d5a3f694da98.jpg","end-to-end-encryption.jpg","End to End Encryption","image/jpeg","b4c82ed5-9523-40e8-9496-69840a2524a3","2026-03-21T00:41:26.500Z","35bfe58e-4c3f-41fa-b3dd-7000fe249faf","2026-04-16T20:24:15.739Z","70074",{},"2026-03-21T00:41:26.514Z",{"id":452,"status":16,"sort":9,"date_created":453,"date_updated":9,"user_created":336,"user_updated":9,"name":454,"slug":455,"job_title":9,"bio_short":9,"bio_full":9,"email_public":9,"linkedin_url":9,"x_url":9,"youtube_url":9,"website_url":9,"featured":12,"about_section":9,"headshot":9},"23a86091-4092-4ac8-922d-7c8d75f94194","2026-03-15T21:46:15.374Z","Kaitlyn Fisher","kaitlyn",{"categories":457,"tags":468},[458,459,462,465],{"slug":139,"name":137,"count":118},{"slug":460,"name":461,"count":200},"infographic","Infographic",{"slug":463,"name":464,"count":203},"latest-news","Latest News",{"slug":466,"name":467,"count":218},"video","Video",[469,472,473,476,479,481,484,485,488,490,493,496],{"slug":470,"name":471,"count":209},"consent-management","Consent Management",{"slug":420,"name":419,"count":242},{"slug":474,"name":475,"count":206},"emerging-risks","Emerging Risks",{"slug":477,"name":478,"count":203},"featured","Featured",{"slug":480,"name":480,"count":200},"GPC",{"slug":482,"name":483,"count":200},"health-care","Health Care",{"slug":92,"name":90,"count":203},{"slug":486,"name":487,"count":218},"marketing-and-ad-tech","Marketing and Ad Tech",{"slug":489,"name":489,"count":200},"Privacy Compliance",{"slug":491,"name":492,"count":259},"privacy-regulations","Privacy Regulations",{"slug":494,"name":495,"count":200},"web-and-cloud-architecture","Web and Cloud Architecture",{"slug":497,"name":497,"count":200},"Web Governance",[499,527,553,574,587],{"id":500,"title":501,"slug":502,"publish_date":503,"summary":504,"featured":12,"hero_image":505,"stock_image":9,"author":510,"categories":515,"tags":518},"8bda2a57-2372-4e94-903b-bb22c79c5b4d","Is Your Website Ignoring the Digital Handshake?","gpc-compliance-digital-handshake","2026-04-17T12:00:00","Global Privacy Control (GPC) has evolved from a niche browser setting into a critical legal mandate that regulators now enforce through \"outside-in\" technical audits. It is no longer enough to have a compliant privacy policy; organizations must ensure their website’s code actually honors these automated opt-out signals at the network layer to avoid costly settlements and misrepresentation charges. Lokker bridges this gap by providing real-time, network-layer enforcement that blocks unauthorized data flows and generates the technical evidence required to prove that a company’s privacy promises match its actual website behavior.",{"id":506,"title":507,"width":508,"height":509},"95607546-9002-4cae-b495-ea212aecd93f","Premium Photo 1676618539992 21c7d3b6df0f",3132,1762,{"name":511,"slug":512,"headshot":513},"Jocelyne De La Cruz","jocelyne-de-la-cruz",{"id":514},"b5c8b5c5-5579-49f3-a3c3-0e9c89873aa4",[516],{"categories_id":517},{"name":137,"slug":139},[519,521,523,525],{"tags_id":520},{"name":489,"slug":489},{"tags_id":522},{"name":497,"slug":497},{"tags_id":524},{"name":480,"slug":480},{"tags_id":526},{"name":419,"slug":420},{"id":528,"title":529,"slug":530,"publish_date":503,"summary":531,"featured":12,"hero_image":532,"stock_image":536,"author":538,"categories":543,"tags":546},"3db571af-cdd7-4dfc-a43a-a2fc3a0414e9","You Still Can’t See or Control Your Website","you-still-cant-see-or-control-your-website","Companies believe they have control over data collection through policies, consent tools, and governance, but in practice, they lack visibility into what actually executes in the browser. Modern websites are dynamic and constantly changing, creating a growing gap between intended behavior and real data flows. Without continuous, real-time insight and control at the point of collection and execution, organizations are operating on assumptions, leaving them exposed to unseen risk and liability.",{"id":533,"title":534,"width":297,"height":535},"6f25951e-b8a8-4eab-86a2-824c6dc5d838","Privacy Notice Disclosure",443,{"image":537},{"id":533},{"name":539,"slug":540,"headshot":541},"Ian Cohen","ian-cohen",{"id":542},"3551c919-254a-4669-8d25-e37e9a0f2f73",[544],{"categories_id":545},{"name":137,"slug":139},[547,549,551],{"tags_id":548},{"name":419,"slug":420},{"tags_id":550},{"name":471,"slug":470},{"tags_id":552},{"name":492,"slug":491},{"id":554,"title":555,"slug":556,"publish_date":557,"summary":558,"featured":12,"hero_image":559,"stock_image":9,"author":563,"categories":566,"tags":571},"7137075f-e0eb-4ff3-a895-3632d36e0166","Check out Marsh’s latest webinar featuring Troutman Pepper and LOKKER!","check-out-marshs-latest-webinar-featuring-troutman-pepper-and-lokker","2025-10-22T12:27:05","We were proud to join our partners at Marsh and Troutman Pepper for an in-depth discussion on evolving privacy regulations and the growing risks surrounding website tracking technologies. Hear from our CEO, Ian Cohen, alongside leading experts in privacy law and cyber-risk, as they discuss practical strategies organizations can take today to mitigate regulatory exposure […]",{"id":560,"title":561,"width":297,"height":562},"3a9e781e-c5a6-42f7-9e50-71dea6b58fe8","Opt in Opt out Toggle",850,{"name":564,"slug":565,"headshot":9},"Sebastian Crumpacker","sebastianlokker-com",[567,569],{"categories_id":568},{"name":464,"slug":463},{"categories_id":570},{"name":467,"slug":466},[572],{"tags_id":573},{"name":419,"slug":420},{"id":575,"title":31,"slug":576,"publish_date":577,"summary":578,"featured":12,"hero_image":579,"stock_image":9,"author":582,"categories":585,"tags":586},"a60ed511-7d31-49c6-91ea-da176d1096d1","privacy-teams","2025-05-06T12:00:00","Cross-Functional Issues with Data Privacy As privacy regulations rapidly evolve and enforcement intensifies, organizations are discovering that managing data privacy cannot be confined to the legal department alone. Cross-functional collaboration—between legal, engineering/IT, marketing, and privacy teams—is no longer optional. This outlines the key challenges, misalignments, and practical strategies organizations can adopt to build aligned, effective […]",{"id":580,"title":581,"width":297,"height":298},"35fe4bc2-e15b-411c-bb31-e1ad7018ecdb","Litigation Risk Exposure",{"name":583,"slug":584,"headshot":9},"Randy Peterson","randy",[],[],{"id":588,"title":589,"slug":590,"publish_date":591,"summary":592,"featured":12,"hero_image":593,"stock_image":9,"author":597,"categories":598,"tags":603},"5dea87b3-6ae4-4181-9ed0-b7d2000b3a1d","Understanding VPPA Privacy Risks","understanding-vppa-privacy-risks","2025-04-15T12:22:26","Background In 1988, while being confirmed as a Supreme Court justice, Robert Bork’s video rental records were published by the Washington City Papers. Soon after, Congress passed the Video Privacy Protection Act of 1988. This is a U.S. federal law meant to protect the privacy of consumers' video rental history. It prohibits video service providers […]",{"id":594,"title":595,"width":297,"height":596},"b5693d55-2128-41bc-9cfe-4d1ff41dd882","Firewall Protection",608,{"name":583,"slug":584,"headshot":9},[599,601],{"categories_id":600},{"name":137,"slug":139},{"categories_id":602},{"name":467,"slug":466},[604,606],{"tags_id":605},{"name":419,"slug":420},{"tags_id":607},{"name":492,"slug":491},{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":609},"\u003Cpath fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M14 4h6v6h-6zM4 14h6v6H4zm10 3a3 3 0 1 0 6 0a3 3 0 1 0-6 0M4 7a3 3 0 1 0 6 0a3 3 0 1 0-6 0\"/>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":611},"\u003Cpath fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 7a4 4 0 1 0 8 0a4 4 0 0 0-8 0M6 21v-2a4 4 0 0 1 4-4h4a4 4 0 0 1 4 4v2\"/>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":613},"\u003Cpath fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M4 7a2 2 0 0 1 2-2h12a2 2 0 0 1 2 2v12a2 2 0 0 1-2 2H6a2 2 0 0 1-2-2zm12-4v4M8 3v4m-4 4h16m-9 4h1m0 0v3\"/>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":615},"\u003Cg fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\">\u003Cpath d=\"M3 8v4.172a2 2 0 0 0 .586 1.414l5.71 5.71a2.41 2.41 0 0 0 3.408 0l3.592-3.592a2.41 2.41 0 0 0 0-3.408l-5.71-5.71A2 2 0 0 0 9.172 6H5a2 2 0 0 0-2 2\"/>\u003Cpath d=\"m18 19l1.592-1.592a4.82 4.82 0 0 0 0-6.816L15 6m-8 4h-.01\"/>\u003C/g>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":617},"\u003Cpath fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M5 12h14M5 12l6 6m-6-6l6-6\"/>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":619},"\u003Cg fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\">\u003Cpath d=\"M11.217 19.384A3.501 3.501 0 0 0 18 18.167V13l-6-3.35\"/>\u003Cpath d=\"M5.214 15.014A3.501 3.501 0 0 0 9.66 20.28L14 17.746V10.8\"/>\u003Cpath d=\"M6 7.63c-1.391-.236-2.787.395-3.534 1.689a3.474 3.474 0 0 0 1.271 4.745L8 16.578l6-3.348\"/>\u003Cpath d=\"M12.783 4.616A3.501 3.501 0 0 0 6 5.833V10.9l6 3.45\"/>\u003Cpath d=\"M18.786 8.986A3.501 3.501 0 0 0 14.34 3.72L10 6.254V13.2\"/>\u003Cpath d=\"M18 16.302c1.391.236 2.787-.395 3.534-1.689a3.474 3.474 0 0 0-1.271-4.745l-4.308-2.514L10 10.774\"/>\u003C/g>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":621},"\u003Cg fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\">\u003Cpath d=\"M12 12v.01m7.071-7.081c-1.562-1.562-6 .337-9.9 4.243c-3.905 3.905-5.804 8.337-4.242 9.9c1.562 1.561 6-.338 9.9-4.244c3.905-3.905 5.804-8.337 4.242-9.9\"/>\u003Cpath d=\"M4.929 4.929c-1.562 1.562.337 6 4.243 9.9c3.905 3.905 8.337 5.804 9.9 4.242c1.561-1.562-.338-6-4.244-9.9c-3.905-3.905-8.337-5.804-9.9-4.242\"/>\u003C/g>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":623},"\u003Cpath fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M13 3v7h6l-8 11v-7H5z\"/>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":625},"\u003Cg fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\">\u003Cpath d=\"M5 7.2A2.2 2.2 0 0 1 7.2 5h1a2.2 2.2 0 0 0 1.55-.64l.7-.7a2.2 2.2 0 0 1 3.12 0l.7.7c.412.41.97.64 1.55.64h1a2.2 2.2 0 0 1 2.2 2.2v1c0 .58.23 1.138.64 1.55l.7.7a2.2 2.2 0 0 1 0 3.12l-.7.7a2.2 2.2 0 0 0-.64 1.55v1a2.2 2.2 0 0 1-2.2 2.2h-1a2.2 2.2 0 0 0-1.55.64l-.7.7a2.2 2.2 0 0 1-3.12 0l-.7-.7a2.2 2.2 0 0 0-1.55-.64h-1a2.2 2.2 0 0 1-2.2-2.2v-1a2.2 2.2 0 0 0-.64-1.55l-.7-.7a2.2 2.2 0 0 1 0-3.12l.7-.7A2.2 2.2 0 0 0 5 8.2z\"/>\u003Cpath d=\"m9 12l2 2l4-4\"/>\u003C/g>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":627},"\u003Cpath fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M20.945 11a9 9 0 1 1-3.284-5.997l-2.655 2.392A5.5 5.5 0 1 0 17.125 14H13v-3z\"/>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":629},"\u003Cpath fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M5 4h4l3 3h7a2 2 0 0 1 2 2v8a2 2 0 0 1-2 2H5a2 2 0 0 1-2-2V6a2 2 0 0 1 2-2\"/>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":631},"\u003Cpath fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"m5 12l5 5L20 7\"/>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":633},"\u003Cpath fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M3 6a2 2 0 0 1 2-2h14a2 2 0 0 1 2 2v12a2 2 0 0 1-2 2H5a2 2 0 0 1-2-2zm4 2h10M7 12h10M7 16h10\"/>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":635},"\u003Cg fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\">\u003Cpath d=\"M4 7a2 2 0 0 1 2-2h12a2 2 0 0 1 2 2v12a2 2 0 0 1-2 2H6a2 2 0 0 1-2-2zm12-4v4M8 3v4m-4 4h16\"/>\u003Cpath d=\"M8 15h2v2H8z\"/>\u003C/g>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":637},"\u003Cpath fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"m9 6l6 6l-6 6\"/>"]