[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"layout":3,"i-tabler:language":299,"i-tabler:chevron-down":303,"i-tabler:moon":305,"i-material-symbols-light:arrow-forward":307,"i-material-symbols-light:menu":309,"i-tabler:radar":311,"i-tabler:hand-stop":313,"i-tabler:scale":315,"i-tabler:world":317,"i-tabler:settings":319,"i-tabler:shield-check":321,"resource-listing-data-l50":323,"i-material-symbols-light:grid-view":1575,"i-material-symbols-light:description":1577,"i-material-symbols-light:bar-chart-4-bars":1579,"i-material-symbols-light:campaign":1581,"i-material-symbols-light:edit":1583,"i-tabler:file-text":1585,"i-tabler:chart-bar":1587,"i-tabler:file":1589,"i-tabler:pencil":1591},{"settings":4,"headerNav":13,"footerNav":197,"socialLinks":281,"hasResources":11,"latestWhitepaper":288},{"id":5,"site_name":6,"default_seo_title_template":7,"default_meta_description":8,"default_social_image":9,"footer_text":9,"default_contact_email":10,"default_phone":9,"default_linkedin":9,"default_youtube":9,"search_enabled":11,"search_empty_state_copy":9,"consent_banner_enabled":12,"consent_banner_copy":9,"gpc_message_copy":9},"site-config","Lokker","{{title}} | Lokker","Precision control over consumer data collection and sharing, built for privacy-first organizations.",null,"info@lokker.com",true,false,[14,22,28,34,40,46,52,58,64,69,75,81,87,93,99,105,111,116,122,128,134,140,145,151,157,163,169,174,180,185,191],{"id":15,"status":16,"sort":17,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":19,"url":20,"parent_item":9,"featured":12,"open_in_new_tab":12,"icon_key":21},"nav-products","published",20,"","Products","/products","monitor",{"id":23,"status":16,"sort":24,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":25,"url":26,"parent_item":9,"featured":12,"open_in_new_tab":12,"icon_key":27},"nuxt-who-we-help",25,"Who We Help","/who-we-help","user-shield",{"id":29,"status":16,"sort":30,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":31,"url":32,"parent_item":23,"featured":12,"open_in_new_tab":12,"icon_key":33},"nuxt-who-privacy-teams",26,"Privacy Teams","/who-we-help/privacy-teams","privacy-officer",{"id":35,"status":16,"sort":36,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":37,"url":38,"parent_item":23,"featured":12,"open_in_new_tab":12,"icon_key":39},"nuxt-who-legal-compliance",27,"Legal & Compliance","/who-we-help/legal-compliance","scale",{"id":41,"status":16,"sort":42,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":43,"url":44,"parent_item":23,"featured":12,"open_in_new_tab":12,"icon_key":45},"nuxt-who-insurance",28,"Insurance & Risk","/who-we-help/insurance","shield-dollar",{"id":47,"status":16,"sort":48,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":49,"url":50,"parent_item":23,"featured":12,"open_in_new_tab":12,"icon_key":51},"nuxt-who-agencies",29,"Agencies","/who-we-help/agencies","building-store",{"id":53,"status":16,"sort":54,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":55,"url":56,"parent_item":23,"featured":12,"open_in_new_tab":12,"icon_key":57},"nuxt-who-it-security-leader",30,"IT & Security Leaders","/who-we-help/it-security-leader","shield",{"id":59,"status":16,"sort":60,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":61,"url":62,"parent_item":9,"featured":12,"open_in_new_tab":12,"icon_key":63},"nuxt-solutions",31,"Solutions","/solutions","puzzle",{"id":65,"status":16,"sort":66,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":67,"url":68,"parent_item":59,"featured":12,"open_in_new_tab":12,"icon_key":39},"nuxt-sol-litigation-discovery",32,"Litigation & discovery","/solutions/litigation-discovery",{"id":70,"status":16,"sort":71,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":72,"url":73,"parent_item":59,"featured":12,"open_in_new_tab":12,"icon_key":74},"nuxt-sol-ma-due-diligence",33,"M&A due diligence","/solutions/ma-due-diligence","case-study",{"id":76,"status":16,"sort":77,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":78,"url":79,"parent_item":59,"featured":12,"open_in_new_tab":12,"icon_key":80},"nuxt-sol-board-risk-reporting",34,"Board & risk reporting","/solutions/board-risk-reporting","report",{"id":82,"status":16,"sort":83,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":84,"url":85,"parent_item":59,"featured":12,"open_in_new_tab":12,"icon_key":86},"nuxt-sol-portfolio-monitoring",35,"Portfolio monitoring","/solutions/portfolio-monitoring","dashboard",{"id":88,"status":16,"sort":89,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":90,"url":91,"parent_item":59,"featured":12,"open_in_new_tab":12,"icon_key":92},"nuxt-sol-healthcare",36,"Healthcare","/solutions/healthcare","healthcare",{"id":94,"status":16,"sort":95,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":96,"url":97,"parent_item":59,"featured":12,"open_in_new_tab":12,"icon_key":98},"nuxt-sol-consent-audit",37,"Consent Audit","/solutions/consent-audit","shield-check",{"id":100,"status":16,"sort":101,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":102,"url":103,"parent_item":59,"featured":12,"open_in_new_tab":12,"icon_key":104},"nuxt-sol-third-party-script-governance",38,"Script Governance","/solutions/third-party-script-governance","code",{"id":106,"status":16,"sort":107,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":108,"url":109,"parent_item":59,"featured":12,"open_in_new_tab":12,"icon_key":110},"nuxt-svc-consent-tag-orchestration",39,"CMP & tag orchestration","/services/consent-tag-orchestration","tag-manager",{"id":112,"status":16,"sort":107,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":113,"url":114,"parent_item":9,"featured":12,"open_in_new_tab":12,"icon_key":115},"nav-resources","Resources","/resources","guide",{"id":117,"status":16,"sort":118,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":119,"url":120,"parent_item":112,"featured":12,"open_in_new_tab":12,"icon_key":121},"nav-res-docs",40,"Documentation","/docs","book",{"id":123,"status":16,"sort":124,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":125,"url":126,"parent_item":112,"featured":12,"open_in_new_tab":12,"icon_key":127},"nav-res-whitepapers",41,"Whitepapers","/resources?type=whitepapers","whitepaper",{"id":129,"status":16,"sort":130,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":131,"url":132,"parent_item":112,"featured":12,"open_in_new_tab":12,"icon_key":133},"nav-res-quarterly-reports",41.5,"Quarterly Reports","/resources?type=quarterly_reports","chart-bar",{"id":135,"status":16,"sort":136,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":137,"url":138,"parent_item":112,"featured":12,"open_in_new_tab":12,"icon_key":139},"nav-res-blog",42,"Blog","/blog","blog",{"id":141,"status":16,"sort":142,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":143,"url":114,"parent_item":112,"featured":12,"open_in_new_tab":12,"icon_key":144},"nav-res-downloads",43,"Downloads & Checklists","checklist",{"id":146,"status":16,"sort":147,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":148,"url":149,"parent_item":112,"featured":12,"open_in_new_tab":12,"icon_key":150},"nav-res-press",44,"Press & News","/press","press",{"id":152,"status":16,"sort":153,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":154,"url":155,"parent_item":112,"featured":12,"open_in_new_tab":12,"icon_key":156},"nav-res-events",44.5,"Industry Events","/events","calendar-event",{"id":158,"status":16,"sort":159,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":160,"url":161,"parent_item":112,"featured":12,"open_in_new_tab":12,"icon_key":162},"nav-res-glossary",44.8,"Privacy Glossary","/glossary","book-2",{"id":164,"status":16,"sort":165,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":166,"url":167,"parent_item":9,"featured":12,"open_in_new_tab":12,"icon_key":168},"nav-training",45,"Training","/training","training",{"id":170,"status":16,"sort":171,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":172,"url":167,"parent_item":164,"featured":12,"open_in_new_tab":12,"icon_key":173},"nav-training-academy",46,"Privacy Academy","school",{"id":175,"status":16,"sort":176,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":177,"url":178,"parent_item":9,"featured":12,"open_in_new_tab":12,"icon_key":179},"nav-company",50,"Company","/about","building",{"id":181,"status":16,"sort":182,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":183,"url":178,"parent_item":175,"featured":12,"open_in_new_tab":12,"icon_key":184},"nav-about",51,"About","team",{"id":186,"status":16,"sort":187,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":188,"url":189,"parent_item":175,"featured":12,"open_in_new_tab":12,"icon_key":190},"nav-careers",52,"Careers","/careers","briefcase",{"id":192,"status":16,"sort":193,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":194,"url":195,"parent_item":175,"featured":12,"open_in_new_tab":12,"icon_key":196},"nav-contact",53,"Contact","/contact","email",[198,201,204,207,210,213,216,219,222,225,228,231,234,237,240,243,245,248,251,254,257,260,263,266,271,276],{"id":199,"status":16,"sort":200,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":25,"navigation_label":25,"url":26,"open_in_new_tab":12},"nuxt-f-who-we-help",1,{"id":202,"status":16,"sort":203,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":25,"navigation_label":31,"url":32,"open_in_new_tab":12},"nuxt-f-privacy-teams",2,{"id":205,"status":16,"sort":206,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":25,"navigation_label":37,"url":38,"open_in_new_tab":12},"nuxt-f-legal-compliance",3,{"id":208,"status":16,"sort":209,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":25,"navigation_label":43,"url":44,"open_in_new_tab":12},"nuxt-f-insurance",4,{"id":211,"status":16,"sort":212,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":25,"navigation_label":49,"url":50,"open_in_new_tab":12},"nuxt-f-agencies",5,{"id":214,"status":16,"sort":215,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":25,"navigation_label":55,"url":56,"open_in_new_tab":12},"nuxt-f-it-security-leader",6,{"id":217,"status":16,"sort":218,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":61,"navigation_label":61,"url":62,"open_in_new_tab":12},"nuxt-f-solutions",7,{"id":220,"status":16,"sort":221,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":61,"navigation_label":67,"url":68,"open_in_new_tab":12},"nuxt-f-sol-litigation-discovery",8,{"id":223,"status":16,"sort":224,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":61,"navigation_label":72,"url":73,"open_in_new_tab":12},"nuxt-f-sol-ma-due-diligence",9,{"id":226,"status":16,"sort":227,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":61,"navigation_label":78,"url":79,"open_in_new_tab":12},"nuxt-f-sol-board-risk-reporting",10,{"id":229,"status":16,"sort":230,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":61,"navigation_label":84,"url":85,"open_in_new_tab":12},"nuxt-f-sol-portfolio-monitoring",11,{"id":232,"status":16,"sort":233,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":61,"navigation_label":90,"url":91,"open_in_new_tab":12},"nuxt-f-sol-healthcare",12,{"id":235,"status":16,"sort":236,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":61,"navigation_label":96,"url":97,"open_in_new_tab":12},"nuxt-f-sol-consent-audit",13,{"id":238,"status":16,"sort":239,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":61,"navigation_label":102,"url":103,"open_in_new_tab":12},"nuxt-f-sol-third-party-script-governance",14,{"id":241,"status":16,"sort":242,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":61,"navigation_label":108,"url":109,"open_in_new_tab":12},"nuxt-f-svc-consent-tag-orchestration",15,{"id":244,"status":16,"sort":242,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":177,"navigation_label":183,"url":178,"open_in_new_tab":12},"nav-f-about",{"id":246,"status":16,"sort":247,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":177,"navigation_label":188,"url":189,"open_in_new_tab":12},"nav-f-careers",16,{"id":249,"status":16,"sort":250,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":177,"navigation_label":194,"url":195,"open_in_new_tab":12},"nav-f-contact",17,{"id":252,"status":16,"sort":253,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":177,"navigation_label":148,"url":149,"open_in_new_tab":12},"nav-f-press",18,{"id":255,"status":16,"sort":256,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":177,"navigation_label":131,"url":132,"open_in_new_tab":12},"nav-f-quarterly-reports",18.5,{"id":258,"status":16,"sort":259,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":177,"navigation_label":166,"url":167,"open_in_new_tab":12},"nav-f-training",19,{"id":261,"status":16,"sort":262,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":177,"navigation_label":154,"url":155,"open_in_new_tab":12},"nav-f-events",19.5,{"id":264,"status":16,"sort":265,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":177,"navigation_label":160,"url":161,"open_in_new_tab":12},"nav-f-glossary",19.8,{"id":267,"status":16,"sort":17,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":268,"navigation_label":269,"url":270,"open_in_new_tab":12},"nav-f-privacy","Legal","Privacy Policy","/privacy-policy",{"id":272,"status":16,"sort":273,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":268,"navigation_label":274,"url":275,"open_in_new_tab":12},"nav-f-terms",21,"Terms of Use","/terms-of-use",{"id":277,"status":16,"sort":278,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":268,"navigation_label":279,"url":280,"open_in_new_tab":12},"nav-f-security",22,"Security","/security",[282],{"status":16,"sort":200,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"show_in_header":12,"show_in_footer":11,"audience_visibility":9,"id":283,"platform":284,"label":285,"url":286,"icon_key":287},"social-linkedin","linkedin","LinkedIn","https://www.linkedin.com/company/lokker","brand-linkedin",{"id":289,"title":31,"slug":290,"publish_date":291,"summary":292,"featured":12,"gated":12,"hero_image":293,"categories":298},"4e24146b-5acd-4e52-aaff-be83ef6cbb64","privacy-teams","2025-05-06T09:01:36","Cross-Functional Issues with Data Privacy As privacy regulations rapidly evolve and enforcement intensifies, organizations are discovering that managing data privacy cannot be confined to the legal department alone. Cross-functional collaboration—between legal, engineering/IT, marketing, and privacy teams—is no longer optional. This outlines the key challenges, misalignments, and practical strategies organizations can adopt to build aligned, effective […]",{"id":294,"title":295,"width":296,"height":297},"35fe4bc2-e15b-411c-bb31-e1ad7018ecdb","Litigation Risk Exposure",1080,720,[],{"left":300,"top":300,"width":301,"height":301,"rotate":300,"vFlip":12,"hFlip":12,"body":302},0,24,"\u003Cg fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\">\u003Cpath d=\"M9 6.371C9 10.789 6.761 13 4 13m0-6.629h7\"/>\u003Cpath d=\"M5 9c0 2.144 2.252 3.908 6 4m1 7l4-9l4 9m-.9-2h-6.2M6.694 3l.793.582\"/>\u003C/g>",{"left":300,"top":300,"width":301,"height":301,"rotate":300,"vFlip":12,"hFlip":12,"body":304},"\u003Cpath fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"m6 9l6 6l6-6\"/>",{"left":300,"top":300,"width":301,"height":301,"rotate":300,"vFlip":12,"hFlip":12,"body":306},"\u003Cpath fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M12 3h.393a7.5 7.5 0 0 0 7.92 12.446A9 9 0 1 1 12 2.992z\"/>",{"left":300,"top":300,"width":301,"height":301,"rotate":300,"vFlip":12,"hFlip":12,"body":308},"\u003Cpath fill=\"currentColor\" d=\"M17.079 12.5H5v-1h12.079l-5.792-5.792L12 5l7 7l-7 7l-.713-.708z\"/>",{"left":300,"top":300,"width":301,"height":301,"rotate":300,"vFlip":12,"hFlip":12,"body":310},"\u003Cpath fill=\"currentColor\" d=\"M4 17.27v-1h16v1zm0-4.77v-1h16v1zm0-4.77v-1h16v1z\"/>",{"left":300,"top":300,"width":301,"height":301,"rotate":300,"vFlip":12,"hFlip":12,"body":312},"\u003Cg fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\">\u003Cpath d=\"M21 12h-8a1 1 0 1 0-1 1v8a9 9 0 0 0 9-9\"/>\u003Cpath d=\"M16 9a5 5 0 1 0-7 7\"/>\u003Cpath d=\"M20.486 9A9 9 0 1 0 9.004 20.495\"/>\u003C/g>",{"left":300,"top":300,"width":301,"height":301,"rotate":300,"vFlip":12,"hFlip":12,"body":314},"\u003Cg fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\">\u003Cpath d=\"M8 13V5.5a1.5 1.5 0 0 1 3 0V12m0-6.5v-2a1.5 1.5 0 1 1 3 0V12m0-6.5a1.5 1.5 0 0 1 3 0V12\"/>\u003Cpath d=\"M17 7.5a1.5 1.5 0 0 1 3 0V16a6 6 0 0 1-6 6h-2h.208a6 6 0 0 1-5.012-2.7L7 19q-.468-.718-3.286-5.728a1.5 1.5 0 0 1 .536-2.022a1.87 1.87 0 0 1 2.28.28L8 13\"/>\u003C/g>",{"left":300,"top":300,"width":301,"height":301,"rotate":300,"vFlip":12,"hFlip":12,"body":316},"\u003Cpath fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M7 20h10M6 6l6-1l6 1m-6-3v17m-3-8L6 6l-3 6a3 3 0 0 0 6 0m12 0l-3-6l-3 6a3 3 0 0 0 6 0\"/>",{"left":300,"top":300,"width":301,"height":301,"rotate":300,"vFlip":12,"hFlip":12,"body":318},"\u003Cg fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\">\u003Cpath d=\"M3 12a9 9 0 1 0 18 0a9 9 0 0 0-18 0m.6-3h16.8M3.6 15h16.8\"/>\u003Cpath d=\"M11.5 3a17 17 0 0 0 0 18m1-18a17 17 0 0 1 0 18\"/>\u003C/g>",{"left":300,"top":300,"width":301,"height":301,"rotate":300,"vFlip":12,"hFlip":12,"body":320},"\u003Cg fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\">\u003Cpath d=\"M10.325 4.317c.426-1.756 2.924-1.756 3.35 0a1.724 1.724 0 0 0 2.573 1.066c1.543-.94 3.31.826 2.37 2.37a1.724 1.724 0 0 0 1.065 2.572c1.756.426 1.756 2.924 0 3.35a1.724 1.724 0 0 0-1.066 2.573c.94 1.543-.826 3.31-2.37 2.37a1.724 1.724 0 0 0-2.572 1.065c-.426 1.756-2.924 1.756-3.35 0a1.724 1.724 0 0 0-2.573-1.066c-1.543.94-3.31-.826-2.37-2.37a1.724 1.724 0 0 0-1.065-2.572c-1.756-.426-1.756-2.924 0-3.35a1.724 1.724 0 0 0 1.066-2.573c-.94-1.543.826-3.31 2.37-2.37c1 .608 2.296.07 2.572-1.065\"/>\u003Cpath d=\"M9 12a3 3 0 1 0 6 0a3 3 0 0 0-6 0\"/>\u003C/g>",{"left":300,"top":300,"width":301,"height":301,"rotate":300,"vFlip":12,"hFlip":12,"body":322},"\u003Cpath fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M11.46 20.846A12 12 0 0 1 3.5 6A12 12 0 0 0 12 3a12 12 0 0 0 8.5 3a12 12 0 0 1-.09 7.06M15 19l2 2l4-4\"/>",{"whitepapers":324,"quarterlyReports":379,"downloads":393,"pressItems":394,"blogPosts":842},[325,328,338,348,358,369],{"id":289,"title":31,"slug":290,"publish_date":291,"summary":292,"featured":12,"gated":12,"hero_image":326,"categories":327},{"id":294,"title":295,"width":296,"height":297},[],{"id":329,"title":330,"slug":331,"publish_date":332,"summary":333,"featured":12,"gated":12,"hero_image":334,"categories":337},"6fb13ba4-76d7-4855-bbf0-195c9e4ce8c8","Research Report: Website Privacy and Compliance Challenges","website-privacy-and-compliance-challenges","2024-09-03T09:11:28","By publishing this report, we aim to inform website owners about privacy concerns, potential repercussions, and mitigation strategies. We also strive to underscore the necessity for increased governance within companies, and tools that extend beyond typical consent management to ensure a safer and more transparent online experience for users.",{"id":335,"title":336,"width":296,"height":297},"f614e065-a4a1-44ea-9637-4eeff646cd25","Remediation Workflow",[],{"id":339,"title":340,"slug":341,"publish_date":342,"summary":343,"featured":12,"gated":12,"hero_image":344,"categories":347},"98b5ee36-ac25-4b3e-accc-0744bf40d2ee","Online Data Privacy Report  March 2023","online-data-privacy-report-march-2023","2023-03-07T16:50:04","Our report dives into our web privacy research results and further outlines actions that companies and insurance agencies need to take to protect themselves in an evolving web privacy ecosystem.",{"id":345,"title":346,"width":296,"height":297},"954c966f-e3b6-4c29-91ba-d717572927f8","Data Protection Privacy",[],{"id":349,"title":350,"slug":351,"publish_date":352,"summary":353,"featured":12,"gated":12,"hero_image":354,"categories":357},"f8ebddd5-b8fa-4690-a1c6-2c787c6673aa","2022 Holiday Shopping Data Privacy Report","2022-holiday-shopping-data-privacy-report","2023-01-25T01:57:57","LOKKER conducted a study of the Top 100 e-commerce sites in the U.S. to determine how they used trackers, pixels, and cookies to collect, analyze, share, sell, and resell our personal information. The takeaway: shoppers unknowingly shared their personal data through a variety of web tracking technologies this holiday season.",{"id":355,"title":356,"width":296,"height":297},"286a51b0-2aa9-4a17-958d-b6a9ea1a6fae","Digital Tracking Surveillance",[],{"id":359,"title":360,"slug":361,"publish_date":362,"summary":363,"featured":12,"gated":12,"hero_image":364,"categories":368},"963b9780-7722-479e-b8bf-b112e3b12409","Online Data Privacy Report","your-customers-web-browser-is-your-greatest-vulnerability","2022-10-19T15:49:20","LOKKER scanned 170,000 websites to uncover the scale and scope of web privacy risks and found more than 1.5 million privacy risks lurking on websites. Download the research report to learn more.",{"id":365,"title":366,"width":296,"height":367},"92831572-28ca-43ff-a8af-da405025ee01","User Session Analytics",608,[],{"id":370,"title":371,"slug":372,"publish_date":373,"summary":374,"featured":12,"gated":12,"hero_image":375,"categories":378},"56124436-6879-4f64-a56b-d3f3c8e69b90","Beyond Consent – Online Privacy Needs Better Tech","beyond-consent-online-privacy-needs-better-tech-3","2022-06-13T14:04:00","In this report, we’ll share the latest insights of Lokker’s Privacy Edge™\nanalysis of 90,000+ websites across 11 industry segments and the trends that are impacting customer data privacy.",{"id":376,"title":377,"width":296,"height":367},"b5693d55-2128-41bc-9cfe-4d1ff41dd882","Firewall Protection",[],[380,387],{"id":381,"title":382,"slug":383,"reporting_period":384,"publish_date":385,"summary":386,"featured":11,"gated":12,"hero_image":9},"7cba1a8e-b5f1-4958-b4b0-e6a0d4e958fe","Quarterly Risk Report – Q1 2026","quarterly-risk-report-q1-2026","2026-Q1","2026-01-21T11:46:32","The digital privacy landscape is in constant motion, shaped by new litigation, shifting regulations, and rapid changes in tracking technology. This quarter’s report delivers a clear, data-backed look at where the risks are rising and how businesses can respond before they face legal or reputational fallout.",{"id":388,"title":389,"slug":390,"reporting_period":391,"publish_date":392,"summary":386,"featured":12,"gated":12,"hero_image":9},"b807e55f-2953-4c96-8eca-5320865bebf2","Quarterly Risk Report – Q3 2025","quarterly-risk-report-q3-2025","2025-Q3","2025-08-13T13:20:16",[],[395,405,412,421,430,439,448,457,466,475,484,493,502,511,520,529,538,547,556,565,574,583,592,601,610,619,628,637,646,655,664,673,682,691,700,707,716,725,734,743,752,761,770,779,788,797,806,815,824,833],{"id":396,"title":397,"slug":398,"publish_date":399,"type":400,"summary":401,"featured":12,"hero_image":402},"a586e84e-cba0-413e-8cb3-0e5ddf08d2fe","Honda Pays $632K Over Privacy Claims","honda-pays-632k-over-privacy-claims","2025-04-04T10:39:49","press_release","On March 7, 2025, the California Privacy Protection Agency (CPPA) reached a settlement with American Honda Motor for violating the California Consumer Privacy Act (CCPA).  The ruling is based on Hondas practices in handling consumer privacy requests and its sharing of personal information for advertising. This ruling from the CCPA makes it clear that simply […]",{"id":403,"title":404},"83fb6212-7e34-4c4c-bfc7-96caf8bb5b3b","Law Compliance Business",{"id":406,"title":407,"slug":408,"publish_date":409,"type":400,"summary":410,"featured":12,"hero_image":411},"7b98996d-14fa-47dc-a998-5d313e6cac58","LOKKER & Bitsight Partner to Meet Insurance Providers’ Growing Demand for Privacy Risk Analysis","lokker-bitsight-partner-to-meet-insurance-providers-demand-for-privacy-risk-analysis","2025-03-25T11:27:47","The partnership makes LOKKER’s privacy risk data available to Bitsight’s cyber insurance customers for both privacy risk analysis and suggested steps for remediation. Redwood City, Calif. – March 25, 2025 – LOKKER, provider of online data privacy and compliance solutions for enterprises, and Bitsight, the global leader in cyber risk management, today announced a partnership […]",{"id":335,"title":336},{"id":413,"title":414,"slug":415,"publish_date":416,"type":400,"summary":417,"featured":12,"hero_image":418},"1c57792a-c117-414c-ac71-69213c5d8833","How Will International Politics Complicate US Access to AI? [That DOS Won’t Hunt Podcast]","how-will-international-politics-complicate-us-access-to-ai-that-dos-wont-hunt-podcast","2025-02-11T10:47:49","International politics can disrupt companies’ AI strategies, shaping their ability to stay competitive. The scale of these disruptions—and the negotiations to mitigate them—hinges on how organizations adapt. Could the global demand for AI lead to unexpected alliances, much like those formed in the pursuit of fossil fuels? Is there a way forward for companies facing […]",{"id":419,"title":420},"54a2362e-77b5-42ad-b9eb-c3569df794eb","Network Request Waterfall",{"id":422,"title":423,"slug":424,"publish_date":425,"type":400,"summary":426,"featured":12,"hero_image":427},"2ba2b691-b731-470f-985c-309cfa809f9d","Privacy Laws Are Tightening – Don’t Let Consent Failures Put Your Banking Website at Risk","privacy-laws-are-tightening-dont-let-consent-failures-put-your-banking-website-at-risk","2025-01-30T08:17:14","Privacy laws are tightening, and weak consent practices can put banking websites at risk of fines and lost customer trust. This article authored by Lokker CEO Ian Cohen and published in FinTech Bloom breaks down the impact of evolving regulations like GDPR and CCPA, common consent failures, and how to fix them with better compliance […]",{"id":428,"title":429},"e5fbdf08-03a2-4414-b3a5-77095e90bd46","Ccpa Consumer Rights",{"id":431,"title":432,"slug":433,"publish_date":434,"type":400,"summary":435,"featured":12,"hero_image":436},"e7474f09-214e-4a59-9aa8-cc1a94a39ea1","2025 Privacy Predictions for Healthcare","2025-privacy-predictions-for-healthcare","2024-12-30T10:24:30","Staying ahead of privacy laws and consumer expectations isnt just about compliance; its about securing patient trust and staying competitive in an evolving industry. Dont miss the strategies to prepare for 2025—read the full article to ensure your organization is ready.",{"id":437,"title":438},"3bfe1f42-1c72-4a03-bf3e-3f879accfa74","User Preference Center",{"id":440,"title":441,"slug":442,"publish_date":443,"type":400,"summary":444,"featured":12,"hero_image":445},"b151d807-3543-41ad-9af4-33d3fbcf269c","The Hidden Drivers of Website Data Collection—and How to Take Control","the-hidden-drivers-of-website-data-collection-and-how-to-take-control","2024-12-20T13:51:57","Online privacy is gaining momentum in the U.S. as new regulations and enforcement actions proliferate. By 2025, eight additional state privacy laws will take effect, bringing the total to 19 comprehensive state-level privacy regulations. This push for tighter data oversight is essential—far more data is being collected and shared than most people, including tech professionals, realize.",{"id":446,"title":447},"e7645da9-b4e4-463d-ae4a-099db883e6c1","Identity Resolution Graph",{"id":449,"title":450,"slug":451,"publish_date":452,"type":400,"summary":453,"featured":12,"hero_image":454},"db4bff33-5bbe-451d-99fd-13a0d543e17f","Cybersecurity: Why it’s not just about hackers anymore","cybersecurity-why-its-not-just-about-hackers-anymore","2024-12-13T08:58:00","In a recent SecurityInfo Watch article, Lokker CEO Ian Cohen emphasizes a critical aspect of cybersecurity that often gets overlooked: the unintentional sharing of data without consent.",{"id":455,"title":456},"505c1c48-0dd2-4e4d-bab3-dd6467b0c4bd","Tracking Pixel Code",{"id":458,"title":459,"slug":460,"publish_date":461,"type":400,"summary":462,"featured":12,"hero_image":463},"840ed080-0acc-4dd1-8a29-fac368370deb","Healthcare Website Privacy Risk Basics – What You Need to Know","healthcare-website-privacy-risk-basics-what-you-need-to-know","2024-12-03T07:01:31","This article explains how these tools work, their impact on data privacy, and strategies to mitigate risks while ensuring compliance with healthcare privacy regulations.",{"id":464,"title":465},"3e92be12-88b6-488c-9afe-14a6c2bc92ea","Hipaa Compliance Shield",{"id":467,"title":468,"slug":469,"publish_date":470,"type":400,"summary":471,"featured":12,"hero_image":472},"3708aea9-1c77-49f0-805d-f2e664a444c4","Most Websites Get Consent Management Wrong—Is Yours One Of Them?","most-websites-get-consent-management-wrong-is-yours-one-of-them","2024-11-26T06:18:13","In this article for Forbes, Lokker CEO Ian Cohen discusses the common mistakes companies make with consent management on websites, particularly regarding cookie consent.",{"id":473,"title":474},"eeee25a1-67e2-484f-b8e6-d58959f41e21","Data Subject Rights",{"id":476,"title":477,"slug":478,"publish_date":479,"type":400,"summary":480,"featured":12,"hero_image":481},"b7d31687-8e03-4e26-9c13-245d4b7e26a2","Lawsuits Accuse LinkedIn of Tracking Users Health Info","lawsuits-accuse-linkedin-of-tracking-users-health-info","2024-10-31T06:49:00","LinkedIn faces three class action lawsuits in California, accused of unlawfully tracking users health information without consent. The lawsuits allege LinkedIn gathers sensitive health data via tracking pixels, sparking serious privacy and discrimination concerns. Lokker CEO Ian Cohen shares insights into how ad tech complexities enable this and advises healthcare organizations on protecting themselves against […]",{"id":482,"title":483},"20cab62e-98a4-483c-a5fa-2f2200a1cc0f","Programmatic Advertising",{"id":485,"title":486,"slug":487,"publish_date":488,"type":400,"summary":489,"featured":12,"hero_image":490},"16ffb59a-35be-4ba4-9b75-ec2f1284337a","Protect Your Business from the Consequences of Cookie Consent Failures","protect-your-business-from-the-consequences-of-cookie-consent-failures","2024-10-01T09:18:00","Cookie consent management is crucial for businesses as privacy laws tighten. Many think using a consent management platform (CMP) ensures compliance, but they often ignore other data collection methods like pixels and tags. This oversight risks consumer deception and legal action. In this article for Retail Touchpoints, Ian Cohen, Lokker CEO, stresses that retailers must […]",{"id":491,"title":492},"25eab12b-16ff-430d-81c2-6a8d48918bdc","Tag Dependency Chain",{"id":494,"title":495,"slug":496,"publish_date":497,"type":400,"summary":498,"featured":12,"hero_image":499},"d4b6c265-a35e-432e-b500-5c2417c0c84f","How To Avoid Liability When Using Cookie Consent Managers","how-to-avoid-liability-when-using-cookie-consent-managers","2024-09-26T09:41:00","In this article for Law360, Lokker CEO Ian Cohen highlights how a business could face legal trouble if cookie consent tools arent set up correctly. With evolving privacy laws, relying on consent managers alone won’t cut it. Misconfigured banners, hidden trackers, and outdated settings can lead to lawsuits. This article shares practical advice with attorneys […]",{"id":500,"title":501},"0d7eb89d-022c-4043-8df1-da876f6505f3","Cookie Consent Banner",{"id":503,"title":504,"slug":505,"publish_date":506,"type":400,"summary":507,"featured":12,"hero_image":508},"8bf44d35-460a-4736-a8de-d44b7a3257fe","A look at Lokkers new Consent Management Solution","a-look-at-lokkers-new-consent-management-solution","2024-09-20T08:59:00","Lokker CEO Ian Cohen sat down with the IAPP to talk about the launch of our new consent management solution. He discusses Lokkers innovative approach and how it compares to traditional consent management platforms. Understanding advancements in privacy technology and the gaps that remain can be crucial for businesses looking to enhance their data protection […]",{"id":509,"title":510},"b65d6e7e-2849-455f-81eb-19e1ef8d9258","Hashed Email Identity",{"id":512,"title":513,"slug":514,"publish_date":515,"type":400,"summary":516,"featured":12,"hero_image":517},"52ec1578-fcd6-44b0-888c-597ac50adb39","LOKKER launches consent management solution","lokker-launches-consent-management-solution-2","2024-09-10T10:07:00","In this article, Security Info Watch covers Lokkers new consent management solution, which fixes some of the traditional issues with consent managers. Read the full article to learn how to: Read the full article here.",{"id":518,"title":519},"b06fce17-db58-486a-94e2-124315b140d8","Trigger Condition Logic",{"id":521,"title":522,"slug":523,"publish_date":524,"type":400,"summary":525,"featured":12,"hero_image":526},"1e7d15c0-d090-49ae-ac33-e47979e45bab","LOKKER Launches Consent Management Solution","lokker-launches-consent-management-solution","2024-09-10T09:09:19","REDWOOD CITY, Calif. , Sept. 10, 2024 /PRNewswire/  LOKKER, provider of online data privacy and compliance solutions for enterprises, today released a new consent management solution available in its Privacy Edge™ Platform. This builds on LOKKERs earlier release of its Consent Verification tool, which allows businesses to check whether their existing consent management platform is configured correctly.",{"id":527,"title":528},"94e20acc-150a-4ea2-86e6-80b2f93ac3b4","Consent Management Platform",{"id":530,"title":531,"slug":532,"publish_date":533,"type":400,"summary":534,"featured":12,"hero_image":535},"b17a92a4-6f64-4173-ab18-b3eb9ca59f9f","LOKKER Launches New Feature to Bolster Consent Verification Compliance","lokker-launches-new-feature-to-bolster-consent-verification-compliance","2024-09-09T08:22:53","The Consent Verification tool came about when a LOKKER report revealed 90% of websites loaded cookies before any interaction with the consent banner.",{"id":536,"title":537},"d26c1018-01c2-48b5-8ad7-bc476173bee3","Real Time Bidding Flow",{"id":539,"title":540,"slug":541,"publish_date":542,"type":400,"summary":543,"featured":12,"hero_image":544},"7355fd11-d0cb-471e-9075-1008b9185e45","LOKKER CEO, Ian Cohen, Interviewed on How IT Leaders can Address Online Privacy Risks","lokker-ceo-ian-cohen-interviewed-on-how-it-leaders-can-address-online-privacy-risks","2024-09-04T05:28:34","This Q&amp;A covers how IT leaders specifically can address online privacy risks in a complex landscape shaped by varying state laws and privacy regulations. Ian Cohen, CEO of LOKKER, emphasizes the importance of using real-time monitoring tools and unified dashboards to manage privacy concerns and reduce the risk of lawsuits. He discusses the challenges posed […]",{"id":545,"title":546},"dc7f3c1d-b275-4d5b-ac6e-b2c3b642c6eb","Continuous Website Monitoring",{"id":548,"title":549,"slug":550,"publish_date":551,"type":400,"summary":552,"featured":12,"hero_image":553},"e03f0d5f-016d-403b-8404-5440ce7542e1","Privacy Oversights: Why Your Tech Stack Needs an Update","privacy-oversights-why-your-tech-stack-needs-an-update","2024-08-29T05:39:17","The article by Ian Cohen, CEO of LOKKER, emphasizes the importance of updating tech stacks to address privacy oversights caused by unauthorized data tracking and misconfigured consent tools. It highlights common issues with privacy tools, such as cookies loading before consent and outdated banners, which leave companies vulnerable to legal risks. IT leaders must adopt […]",{"id":554,"title":555},"06301416-562f-49fa-93a3-35697d51a7ec","Data Leakage Detection",{"id":557,"title":558,"slug":559,"publish_date":560,"type":400,"summary":561,"featured":12,"hero_image":562},"3600ddd8-1bb1-4b8b-a329-6da76b3229a0","Is Your Consent Banner Giving You a False Sense of Security?","is-your-consent-banner-giving-you-a-false-sense-of-security","2024-08-28T05:49:32","Many consent banners give organizations a false sense of security, as they often fail to properly block tracking technologies or mislead users with “dark patterns.” This leaves companies, especially in healthcare, vulnerable to legal risks under privacy regulations like UDAAP. Technical errors, misconfigurations, and deceptive designs in consent management platforms (CMPs) can unintentionally expose user […]",{"id":563,"title":564},"594bad0a-c949-4f29-b2d9-f17cbea68d5a","Script Piggybacking Risk",{"id":566,"title":567,"slug":568,"publish_date":569,"type":400,"summary":570,"featured":12,"hero_image":571},"77cc5f6d-2531-4a88-b9f3-68faef77b818","How Companies Can Comply With The My Health My Data Act","how-companies-can-comply-with-the-my-health-my-data-act","2024-08-02T05:58:38","The My Health, My Data Act (MHMDA), effective in Washington state, extends privacy protections to personal health data beyond traditional healthcare settings. Companies must ensure compliance by rethinking data collection practices, expanding transparency, and gaining explicit consent for sensitive information. This includes updating privacy policies, implementing opt-out options, and safeguarding data with strong security measures. […]",{"id":572,"title":573},"af71f162-b5fa-4180-869f-9837c1169f5c","Privacy Default Settings",{"id":575,"title":576,"slug":577,"publish_date":578,"type":400,"summary":579,"featured":12,"hero_image":580},"8c9982c6-9c8b-4854-bb55-5d3a43f717ff","LOKKER Launches New Web Privacy Risk Summary for Insurers","lokker-launches-new-web-privacy-risk-summary-for-insurers","2024-07-24T07:19:43","Provides insurers the ability to generate on-demand, real-time web privacy risk reports to share with their insureds to reduce related fines, lawsuits, and breaches REDWOOD CITY, Calif., July 23, 2024 /PRNewswire/  LOKKER, provider of online data privacy and compliance solutions for enterprises, today released a new privacy solution for insurers: the ability to share on-demand web privacy risk […]",{"id":581,"title":582},"f445b03d-a29a-4201-a650-4a39b83cfde0","Identity Graph Resolution",{"id":584,"title":585,"slug":586,"publish_date":587,"type":400,"summary":588,"featured":12,"hero_image":589},"891de214-719c-42e0-816c-cdada03acf94","Online Privacy in the Age of Data Brokers","online-privacy-in-the-age-of-data-brokers","2024-07-09T06:04:40","This article from Lokker CEO Ian Cohen highlights how data brokers collect, buy, and sell personal information without user consent, often resulting in privacy risks. It explains how companies use data for targeted ads and the hidden dangers this poses, such as identity theft and discrimination. The piece stresses the importance of increased regulation, user awareness, and proactive privacy tools to protect individuals’ data from being exploited by brokers in today’s digital landscape.",{"id":590,"title":591},"974c440b-2bab-47f1-8a1e-899fe4c22df3","Hashed Pii Transfer",{"id":593,"title":594,"slug":595,"publish_date":596,"type":400,"summary":597,"featured":12,"hero_image":598},"37c5f81b-7c19-4944-95bf-af449a23d9c7","Are Consent Banners Really Protecting Consumer Privacy?","are-consent-banners-really-protecting-consumer-privacy","2024-06-18T06:33:08","Cookie consent tools were created to comply with privacy laws like GDPR and CCPA by obtaining user permission before data sharing. However, recent research reveals that many of these tools are malfunctioning. Issues include cookies loading before consent, missing banners on certain pages, and outdated information.",{"id":599,"title":600},"6aedb9d7-a8ce-4f5d-8683-7fc591260d3b","Privacy Law Enforcement",{"id":602,"title":603,"slug":604,"publish_date":605,"type":400,"summary":606,"featured":12,"hero_image":607},"3af1c33a-f7fe-48a8-95c8-29028d4b445b","LOKKER Unveils Consent Verification","lokker-unveils-consent-verification","2024-06-04T14:04:40","LOKKER, provider of online data privacy and compliance solutions for enterprises, today released Consent Verification, a new tool in LOKKERs Privacy Edge Platform that gives businesses a simple way to check whether their consent banners are properly configured and working correctly.",{"id":608,"title":609},"7866ae60-2e42-427a-b61e-5d0200c243ee","Gdpr Article 25 Compliance",{"id":611,"title":612,"slug":613,"publish_date":614,"type":400,"summary":615,"featured":12,"hero_image":616},"dd5e458f-d23c-4941-8847-42f2226c22e0","Ian Cohen, CEO of Lokker, Discusses the Latest Online Tracking Concerns on the Healthcare Info Security Podcast","ian-cohen-ceo-of-lokker-discusses-the-latest-online-tracking-concerns-on-the-healthcare-info-security-podcast","2024-05-03T12:28:58","Despite a slight decrease in the past year, nearly one in three healthcare firms still utilize technologies like Meta Pixel, despite regulators warnings about privacy infringements. These trackers enable companies to gather and distribute individuals sensitive health data to advertisers and marketers, sparking significant privacy apprehensions.",{"id":617,"title":618},"956b7234-6a67-41c0-8ff8-3856fb1e7adb","Security Audit Report",{"id":620,"title":621,"slug":622,"publish_date":623,"type":400,"summary":624,"featured":12,"hero_image":625},"c87424f2-be2a-43d7-9009-b6c7d210cca0","The Top 4 Web Privacy Challenges for Retailers","the-top-4-web-privacy-challenges-for-retailers","2024-05-02T12:50:47","Read LOKKER CEO Ian Cohens latest article in Total Retail, titled The Top 4 Web Privacy Challenges for Retailers. The article emphasizes the importance of protecting customer data and complying with evolving privacy laws in retail.",{"id":626,"title":627},"3646116a-0ff8-4c39-b979-766d8e1dae47","Attribution Modeling",{"id":629,"title":630,"slug":631,"publish_date":632,"type":400,"summary":633,"featured":12,"hero_image":634},"d523f7f7-4f81-4144-86b2-c2d3363e25cf","The Rising Stakes of Healthcare Data Privacy in 2024: The Need for Practical Guidance","the-rising-stakes-of-healthcare-data-privacy-in-2024-the-need-for-practical-guidance","2024-05-02T12:30:20","The article The Rising Stakes of Healthcare Data Privacy in 2024: The Need for Practical Guidance, authored by LOKKER CEO Ian Cohen for MedCity News, highlights the growing importance of data privacy in the healthcare sector.",{"id":635,"title":636},"a0f36eba-9d8f-4553-b83d-d73a47f4eb4d","Appointment Booking Privacy",{"id":638,"title":639,"slug":640,"publish_date":641,"type":400,"summary":642,"featured":12,"hero_image":643},"f3ea1b13-826b-40d0-8c8c-b141f480b7cc","2023 in Review: The Rise of Healthcare Data Privacy Regulations","2023-in-review-the-rise-of-healthcare-data-privacy-regulations","2024-04-12T10:28:55","This article written for HealthIT Answers delves into the impactful changes in healthcare data privacy regulations enacted in 2023, notably spotlighting the Washington My Health My Data Act (MHMDA). This legislation mandates explicit opt-in consent for gathering specific consumer health data and empowers consumers to litigate against companies for breaches. Key highlights encompass the necessity of a distinct Consumer Health Privacy Policy on company websites and the mandate for opt-in consent when sharing data with third parties.",{"id":644,"title":645},"febe4cdc-23b3-4529-a488-26f2500dc9f7","Data Sharing Agreement",{"id":647,"title":648,"slug":649,"publish_date":650,"type":400,"summary":651,"featured":12,"hero_image":652},"107a1bc3-ffc2-455c-95f4-219f1b165572","Striking a Balance: Privacy in the Age of Location Tracking","striking-a-balance-privacy-in-the-age-of-location-tracking","2024-04-08T10:50:47","This article, written by LOKKER CEO Ian Cohen for CPO Magazine, delves into the privacy concerns associated with location tracking and individuals struggles in managing their personal location data.",{"id":653,"title":654},"c0a8370e-20c3-423b-bfb5-ce51fa8d9585","Business Handshake Deal",{"id":656,"title":657,"slug":658,"publish_date":659,"type":400,"summary":660,"featured":12,"hero_image":661},"d047a8ee-35fd-4d13-9841-0172e65f0452","Lokker Research Featured in the HIPAA Journal Article One-third of Healthcare Websites Still Use Meta Pixel Tracking Code","lokker-research-featured-in-the-hipaa-journal-article-one-third-of-healthcare-websites-still-use-meta-pixel-tracking-code","2024-04-05T08:22:02","The article One-Third of Healthcare Websites Have Meta Pixel Tracking Code, featuring research from Lokkers recent Online Data Privacy Report, highlights the widespread use of the Meta Pixel on healthcare websites, posing risks of HIPAA violations and patient privacy breaches. It focuses on the discovery that 33% of the top 100 U.S. hospitals have the […]",{"id":662,"title":663},"97d7e9aa-775c-4d59-b5b8-df9b914f9047","Meta Pixel on Health Sites",{"id":665,"title":666,"slug":667,"publish_date":668,"type":400,"summary":669,"featured":12,"hero_image":670},"212abad9-9fa4-4e6e-97c8-f02b81a948ed","Lokker Research Featured in Marketing Drive Article Privacy tools fall short: Here’s what the numbers say","lokker-research-featured-in-marketing-drive-article-privacy-tools-fall-short-heres-what-the-numbers-say","2024-04-05T08:07:48","The article Privacy tools fall short: Heres what the numbers say draws on Lokkers recent Online Data Privacy Report to shed light on significant gaps in current online privacy protections. Here are the key findings:",{"id":671,"title":672},"4ff2c365-4f05-4945-9e15-cd9688f57850","User Behavior Analytics",{"id":674,"title":675,"slug":676,"publish_date":677,"type":400,"summary":678,"featured":12,"hero_image":679},"d34f1604-75c6-4c40-a7f8-eac80899dd3a","Location tracking and the battle for digital privacy","location-tracking-and-the-battle-for-digital-privacy","2024-04-03T08:37:11","Check out Lokker CEO Ian Cohens latest article, Location tracking and the battle for digital privacy, recently published in Help Net Security. It sheds light on significant privacy concerns related to location data collection.",{"id":680,"title":681},"dcb474d4-68d3-49ba-b6fc-adb68ec34a14","Keystroke Capture Risk",{"id":683,"title":684,"slug":685,"publish_date":686,"type":400,"summary":687,"featured":12,"hero_image":688},"09a6ed93-3840-4637-bec9-08d90e2431d4","Report: LOKKER’s Analysis of More Than 3,400 Websites Reveals Meta Pixel Still on 33% of Healthcare Websites, with 12% of the S&P 500 Showing Likely Privacy Violations","report-lokkers-analysis-of-more-than-3400-websites-reveals-meta-pixel-still-on-33-of-healthcare-websites-with-12-of-the-sp-500-showing-likely-privacy-violations","2024-04-02T13:05:00","New Research Finds Serious Privacy Risks as Compliance is Getting More Complicated, Highlights Urgency for Businesses to Protect Consumers’ Data with Better Tooling",{"id":689,"title":690},"d66df141-a197-4b62-bcea-36eee09bba72","Web Analytics Report",{"id":692,"title":693,"slug":694,"publish_date":695,"type":400,"summary":696,"featured":12,"hero_image":697},"0527d1d2-0c0b-46c0-9be2-fe0886aabd09","LOKKER Research Highlighted in SecurityInfo Watch article, LOKKER: Serious online consumer data privacy risks in S&P 500, vertical industries","lokker-research-highlighted-in-securityinfo-watch-article-lokker-serious-online-consumer-data-privacy-risks-in-sp-500-vertical-industries","2024-04-02T08:44:39","The article Serious Online Consumer Data Privacy Risks in SP 500 Vertical Industries published in Security Info Watch features data from our recent Online Data Privacy Report, which found significant privacy risks linked to companies collection and use of consumer data across various sectors.",{"id":698,"title":699},"25d8db90-9b31-49e8-a8d5-97b7b680b9dd","Programmatic Ad Auction",{"id":701,"title":702,"slug":703,"publish_date":704,"type":400,"summary":705,"featured":12,"hero_image":706},"65f807b3-a2a9-4b9f-a096-7f6b392e34a4","LOKKER Launches First Feature to Notify Companies When Their Websites Are at Risk of Violating Privacy Laws","lokker-launches-first-feature-to-notify-companies-when-their-websites-are-at-risk-of-violating-privacy-laws","2024-02-14T14:39:25","LOKKER, provider of online data privacy and compliance solutions for enterprises, introduces a new feature included in its Privacy Edge™ software suite. LOKKER now gives companies a solution to monitor and remediate potential web privacy and compliance violations such as HIPAA, the Video Privacy Protection Act (VPPA) and state wiretapping laws across their portfolio of websites.",{"id":294,"title":295},{"id":708,"title":709,"slug":710,"publish_date":711,"type":400,"summary":712,"featured":12,"hero_image":713},"5495cb1c-1577-417e-bd2a-2493f5a7415c","Catch LOKKER CEO Ian Cohen on the What The Hack Podcast","catch-lokker-ceo-ian-cohen-on-the-what-the-hack-podcast","2023-09-13T14:04:48","Tune in as Ian talks with the hosts about the technological challenges of companies really protecting their customers privacy, not to mention the new (and complex) privacy compliance requirements in the US.",{"id":714,"title":715},"709f5fdd-caa5-4192-9236-e2a75d463895","Regulation Legal Document",{"id":717,"title":718,"slug":719,"publish_date":720,"type":400,"summary":721,"featured":12,"hero_image":722},"34f890cc-5508-4859-a4d1-4e331e560b3f","Web Privacy Risk Evaluation Finds Almost One-Third of the S&P 500s Websites Are at Significant Risk of Online Data Privacy Violations","web-privacy-risk-evaluation-finds-almost-one-third-of-the-sp-500s-websites-are-at-significant-risk-of-online-data-privacy-violations","2023-05-23T06:38:23","LOKKERs Web Privacy Risk Score™ Reveals Half Received Failing Grades for Consent Practices, Critical Threat as Class-Action Lawsuits and States Privacy Laws Increase",{"id":723,"title":724},"fec2b55b-9ebc-41f6-b211-6475dc1b787a","Risk Assessment Matrix",{"id":726,"title":727,"slug":728,"publish_date":729,"type":400,"summary":730,"featured":12,"hero_image":731},"01fe3e8d-4538-4ce2-b044-c21ea348072f","Interview of LOKKER CEO, Ian Cohen, Featured in Insurance Business America article How well do your clients know their data privacy risks?","interview-of-lokker-ceo-ian-cohen-featured-in-insurance-business-america-article-how-well-do-your-clients-know-their-data-privacy-risks","2023-04-28T07:43:00","LOKKER CEO Ian Cohen explains how class-action suits and regulatory measures are putting more pressure on organizations to protect their customers privacy on public-facing company website. Ian explains how LOKKER has developed a way for insurers to identify and quantify this web privacy risk to aid in the underwriting process.",{"id":732,"title":733},"35e27264-3098-45ee-a85d-74d4f68d69eb","Encrypted Data Transfer",{"id":735,"title":736,"slug":737,"publish_date":738,"type":400,"summary":739,"featured":12,"hero_image":740},"bfb4288a-956a-48cb-97f2-fc435729f781","LOKKER Finds One-Quarter of the Largest 1,000 Healthcare Organizations’ Websites Are at Significant Risk for Online Data Privacy Violations","lokker-finds-one-quarter-of-the-largest-1000-healthcare-organizations-websites-are-at-significant-risk-for-online-data-privacy-violations","2023-04-18T06:16:35","LOKKER’s Web Privacy Risk Score Reveals Common Consumer Data Privacy Risks in the Healthcare Sector as Class-Action Lawsuits Are on the Rise. LOKKER’s findings uncover great risk to consumers’ personal health information , with 26% of healthcare organizations’ Web Privacy Risk Scores flagged as above 335, and of those, more than 100 scored above 500, which indicates significant risk according to LOKKER.",{"id":741,"title":742},"8cd5c2a5-e1d0-4045-8639-0849a779f118","Gdpr Compliance Checklist",{"id":744,"title":745,"slug":746,"publish_date":747,"type":400,"summary":748,"featured":12,"hero_image":749},"f8f9eba7-afdc-4008-9517-bc15c8e43a82","LOKKER Unveils new Web Privacy Risk Score™ to Help Organizations Measure and Mitigate Online Privacy Threats","lokker-unveils-new-web-privacy-risk-score-to-help-organizations-measure-and-mitigate-online-privacy-threats","2023-03-28T13:51:39","LOKKERs Web Privacy Risk Score is a first-of-its-kind measure that quantifies a companys potential risk of privacy violations pertaining to the collection and sharing of customers online information.",{"id":750,"title":751},"118d7a64-0bbd-44db-b0ad-4bfc737935cf","Data Broker Network",{"id":753,"title":754,"slug":755,"publish_date":756,"type":400,"summary":757,"featured":12,"hero_image":758},"b936672e-6727-4872-8709-23593f33089e","LOKKER research featured in Consumer Data Bonanza Over Cyber Weekend","lokker-research-featured-in-consumer-data-bonanza-over-cyber-weekend","2023-01-25T16:35:15","Research and insights from LOKKERs 2022 Holiday Shopping Data Privacy Report were the basis for the article in Multichannel Merchant. The report looked at the top 100 e-commerce websites from Thanksgiving to Cyber Monday to see how many trackers were present, tracking visitors behavior and collecting their data. LOKKER Chief Commercial Officer, Jeremy Barnett, also […]",{"id":759,"title":760},"d76b1fad-ea93-47b0-b92a-ca349be12702","Browser Fingerprinting",{"id":762,"title":763,"slug":764,"publish_date":765,"type":400,"summary":766,"featured":12,"hero_image":767},"cd8749b2-8e3e-46ef-ac1f-dc36c9c30995","LOKKER mentioned in Clinic Reports Tracking Pixel Breach Involving 3rd Party","lokker-mentioned-in-clinic-reports-tracking-pixel-breach-involving-3rd-party","2023-01-25T16:12:12","BayCare Clinic in Wisconsin reported a data breach to the U.S. Department of Health and Human services as a result of patient data being exposed from the use of online tracking pixels. This article featured in HealthCare Info Security referenced LOKKERs study of pixels and trackers in the healthcare industry, and our findings that more than 2,500 healthcare provider websites use these tools.",{"id":768,"title":769},"f5db7a54-e134-4792-a5d1-0bb3cea80943","Browser Cookie Data",{"id":771,"title":772,"slug":773,"publish_date":774,"type":400,"summary":775,"featured":12,"hero_image":776},"b2e3db54-c059-4de7-b620-9bf0b0fd42a9","Research: LOKKERs Analysis of the Top 100 U.S. E-commerce Websites Finds Significant Data Privacy Risks for Consumers During the 2022 Holiday Season","lokkers-analysis-of-the-top-100-u-s-e-commerce-websites","2023-01-24T20:39:55","LOKKER evaluated the top 100 e-commerce sites in the U.S., from Thanksgiving through Cyber Monday, examining how consumer data was collected, shared and sold during the peak 2022 holiday shopping days.",{"id":777,"title":778},"1f4b0a5d-6da7-413b-9587-0329148c4553","Terms of Service Agreement",{"id":780,"title":781,"slug":782,"publish_date":783,"type":400,"summary":784,"featured":12,"hero_image":785},"3b2d7b12-6740-4840-98ac-b1fb568a87d2","LOKKER Announces Advisory Board of Nationally Recognized Cybersecurity and Data Privacy Leaders","lokker-announces-advisory-board","2023-01-10T16:19:31","Former U.S. Secret Service Chief of Staff, Homeland Security Senior Counsel, and Attorney General of Vermont Bring a Wealth of Experience in Cybersecurity and Data Privacy Issues",{"id":786,"title":787},"ff5320b6-abb3-42f7-8068-4156b48dabb8","TLS Certificate Security",{"id":789,"title":790,"slug":791,"publish_date":792,"type":400,"summary":793,"featured":12,"hero_image":794},"cab4396c-a1f9-4c5d-aaa4-9599780973a0","Where is your website visitors’ data really going?","where-is-your-website-visitors-data-really-going","2023-01-10T01:31:33","In this article for Security magazine, LOKKER CEO Ian Cohen explores, where website data is going and the risks that sharing it poses to consumers and companies alike.",{"id":795,"title":796},"d44e3585-4476-491a-a243-9d79ebb9f026","Tag Manager Dashboard",{"id":798,"title":799,"slug":800,"publish_date":801,"type":400,"summary":802,"featured":12,"hero_image":803},"52fef099-bd49-4e8c-8abf-8d9235765e25","Blocking Cookies is Insufficient","blocking-cookies-is-insufficient","2023-01-02T22:12:12","Despite the time and effort firms have spent implementing cookie consent notifications, these arent doing enough to protect businesses or their consumers from the recent wave of privacy lawsuits and regulatory fines, which are increasing in number and quantity.",{"id":804,"title":805},"4e04cc42-9805-4623-a2f3-21c9f6f5a6b5","Consent Banner Good Practice",{"id":807,"title":808,"slug":809,"publish_date":810,"type":400,"summary":811,"featured":12,"hero_image":812},"7e988dee-ae2a-4f7f-8ee5-51786d6710dd","LOKKER research featured in HIPAA Journal, Telehealth Websites are Transmitting Sensitive Health Information to Big Tech Firms","lokker-featured-in-hipaa-journal-telehealth-websites-data-sharing","2022-12-14T22:28:27","After a recent study by the Markup found that the majority of telehealth providers share their users sensitive information, LOKKER CEO Ian Cohen weighs in on how and why sensitive data is being shared inadvertently, online every day in this article featured in HIPAA Journal.",{"id":813,"title":814},"c28fe45c-f0ea-42c2-ac1d-6b8989e6b4cc","Privacy Risk Heat Map",{"id":816,"title":817,"slug":818,"publish_date":819,"type":400,"summary":820,"featured":12,"hero_image":821},"974a4039-27ba-4bbc-a8b0-a7c092fc419e","Privacy Edge PRO Recognized as an Infosec product of the month","privacy-edge-pro-recognized-as-infosec-product-of-themonth","2022-12-01T19:26:00","LOKKER is proud to be recognized by Help Net Security on their list of InfoSec products of the month for November 2022. Privacy Edge™ PRO, our latest privacy solution that allows companies like cyber insurers, privacy attorneys and eDiscovery firms to quickly identify and mitigate privacy threats across thousands of client websites  in one […]",{"id":822,"title":823},"b30a6d5d-d873-4b6d-84b6-f68778a2da7b","Network Traffic Analysis",{"id":825,"title":826,"slug":827,"publish_date":828,"type":400,"summary":829,"featured":12,"hero_image":830},"a5234b28-1fd3-495f-b8e3-ac3f743f5ff7","AGs Urge Apple to Tighten Health Privacy, Security in Apps","ags-urge-apple-to-tighten-health-privacy-security-in-apps","2022-11-22T15:03:21","Ten state attorneys general sent a letter to Apple urging the tech giant to address privacy and security gaps in third-party applications available on the App Store that track, collect or store reproductive health data in light of the overturning of Roe vs. Wade.",{"id":831,"title":832},"a8407fa6-500c-4eb7-8d95-ec40132e52e2","Proactive Privacy Controls",{"id":834,"title":835,"slug":836,"publish_date":837,"type":400,"summary":838,"featured":12,"hero_image":839},"e26ba288-fcb8-42b4-9a21-4ff0aea17eaa","LOKKER Launches Privacy Edge PRO™ to Help Companies Identify Cyber Threats Across ￼Large Portfolios of Web Properties and Comply With Data Privacy Laws","lokker-launches-privacy-edge-pro-to-help-companies-identify-cyber-threats-across-large-portfolios-of-web-properties-and-comply-with-data-privacy-laws","2022-11-16T13:28:34","LOKKER, provider of data privacy and compliance solutions for the enterprise, today announced the availability of LOKKER Privacy Edge PRO™, a cloud-based software solution that automates the rapid analysis of thousands of websites; identifies specific trackers, pixels and cookies; and alerts website owners when their customers’ personal information is at risk.",{"id":840,"title":841},"71467ee3-5f02-49ba-b529-96b24f147300","Automated Risk Scanning",[843,870,892,912,933,951,968,984,998,1020,1037,1056,1070,1086,1100,1116,1128,1144,1161,1176,1192,1208,1228,1248,1264,1281,1295,1313,1329,1349,1367,1385,1401,1417,1431,1447,1463,1479,1495,1509,1525,1541,1557],{"id":844,"title":845,"slug":846,"publish_date":847,"summary":848,"featured":12,"hero_image":849,"author":853,"categories":856,"tags":865},"7137075f-e0eb-4ff3-a895-3632d36e0166","Check out Marsh’s latest webinar featuring Troutman Pepper and LOKKER!","check-out-marshs-latest-webinar-featuring-troutman-pepper-and-lokker","2025-10-22T12:27:05","We were proud to join our partners at Marsh and Troutman Pepper for an in-depth discussion on evolving privacy regulations and the growing risks surrounding website tracking technologies. Hear from our CEO, Ian Cohen, alongside leading experts in privacy law and cyber-risk, as they discuss practical strategies organizations can take today to mitigate regulatory exposure […]",{"id":850,"title":851,"width":296,"height":852},"3a9e781e-c5a6-42f7-9e50-71dea6b58fe8","Opt in Opt out Toggle",850,{"name":854,"slug":855,"headshot":9},"Sebastian Crumpacker","sebastianlokker-com",[857,861],{"categories_id":858},{"name":859,"slug":860},"Latest News","latest-news",{"categories_id":862},{"name":863,"slug":864},"Video","video",[866],{"tags_id":867},{"name":868,"slug":869},"Consumer Privacy","consumer-privacy",{"id":871,"title":872,"slug":873,"publish_date":874,"summary":875,"featured":12,"hero_image":876,"author":877,"categories":880,"tags":885},"5dea87b3-6ae4-4181-9ed0-b7d2000b3a1d","Understanding VPPA Privacy Risks","understanding-vppa-privacy-risks","2025-04-15T12:22:26","Background In 1988, while being confirmed as a Supreme Court justice, Robert Bork’s video rental records were published by the Washington City Papers. Soon after, Congress passed the Video Privacy Protection Act of 1988. This is a U.S. federal law meant to protect the privacy of consumers' video rental history. It prohibits video service providers […]",{"id":376,"title":377,"width":296,"height":367},{"name":878,"slug":879,"headshot":9},"Randy Peterson","randy",[881,883],{"categories_id":882},{"name":137,"slug":139},{"categories_id":884},{"name":863,"slug":864},[886,888],{"tags_id":887},{"name":868,"slug":869},{"tags_id":889},{"name":890,"slug":891},"Privacy Regulations","privacy-regulations",{"id":893,"title":894,"slug":895,"publish_date":896,"summary":897,"featured":12,"hero_image":898,"author":899,"categories":900,"tags":905},"d4e339ea-f0ab-43eb-8a71-b6a51c88a9f8","The New York Health Information Privacy Act","the-new-york-health-information-privacy-act","2025-03-24T08:28:43","The New York Health Information Privacy Act (NY HIPA) is a new law aimed at strengthening the privacy and security of health-related information for New York residents. Enacted on January 22, 2025, NY HIPA introduces comprehensive regulations governing the collection, processing, and sharing of health data. As of now, this bill has passed the New […]",{"id":376,"title":377,"width":296,"height":367},{"name":878,"slug":879,"headshot":9},[901,903],{"categories_id":902},{"name":137,"slug":139},{"categories_id":904},{"name":859,"slug":860},[906,910],{"tags_id":907},{"name":908,"slug":909},"Health Care","health-care",{"tags_id":911},{"name":890,"slug":891},{"id":913,"title":914,"slug":915,"publish_date":916,"summary":917,"featured":12,"hero_image":918,"author":922,"categories":925,"tags":930},"f1c5b1c7-605c-4046-9021-a988a4b366ae","[Webinar] Meeting the Moment: The New Normal in Privacy","webinar-meeting-the-moment-the-new-normal-in-privacy","2024-09-19T08:12:00","Why is Privacy So Challenging? LOKKER CEO Ian Cohen, along with Foley attorneys Jennifer Urban and Aaron Tantleff, presented at the Midwest Cyber Security Alliance to discuss the significant shifts in data privacy that are creating new challenges for businesses. The discussion covered key privacy hurdles, including: This session explores these challenges from legal, marketing, […]",{"id":919,"title":920,"width":296,"height":921},"c3a7e093-eb12-4a32-9385-15322ccb5d40","Cybersecurity Technology",721,{"name":923,"slug":924,"headshot":9},"Ian Cohen","ian",[926,928],{"categories_id":927},{"name":137,"slug":139},{"categories_id":929},{"name":863,"slug":864},[931],{"tags_id":932},{"name":890,"slug":891},{"id":934,"title":935,"slug":936,"publish_date":937,"summary":938,"featured":12,"hero_image":939,"author":940,"categories":943,"tags":946},"1194e58c-fa6d-4f3a-8975-ac8fcd009804","Don’t Make These Common Mistakes When Setting Up Your Consent Management Tool","dont-make-these-common-mistakes-when-setting-up-your-consent-management-tool","2024-09-09T09:20:09","Avoid these common mistakes businesses make when setting up Consent Management Platforms (CMPs), from inconsistent web scanning to misclassifying cookies. Avoid non-compliance, protect user data, and maintain trust by ensuring your cookie consent banner meets privacy regulations.",{"id":804,"title":805,"width":296,"height":297},{"name":941,"slug":942,"headshot":9},"Kaitlyn Fisher","kaitlyn",[944],{"categories_id":945},{"name":137,"slug":139},[947],{"tags_id":948},{"name":949,"slug":950},"Consent Management","consent-management",{"id":952,"title":953,"slug":954,"publish_date":955,"summary":956,"featured":12,"hero_image":957,"author":961,"categories":962,"tags":965},"a2c2632c-5e76-47dc-a9cf-9203999b95ee","Why Your Consent Banner Might Be Out of Compliance—And You Don’t Even Know It","why-your-consent-banner-might-be-out-of-compliance-and-you-dont-even-know-it","2024-09-09T09:08:04","This article highlights the technical limitations of Consent Management Platforms (CMPs), revealing how many fail to block cookies or track user consent as promised fully. It provides insights into hidden compliance risks and offers guidance on how companies can ensure their consent banners meet privacy regulations.",{"id":958,"title":959,"width":296,"height":960},"97e6afd2-1971-44c1-ae59-0dd67cfd76b8","Cookie Consent Dialog",810,{"name":941,"slug":942,"headshot":9},[963],{"categories_id":964},{"name":137,"slug":139},[966],{"tags_id":967},{"name":949,"slug":950},{"id":969,"title":970,"slug":971,"publish_date":972,"summary":973,"featured":12,"hero_image":974,"author":977,"categories":978,"tags":981},"c8e02440-e6ab-47da-91a0-a7bc1577fd3d","Dark Patterns in Consent Management: Deceptive Tactics and Their Costly Consequences","dark-patterns-in-consent-management-deceptive-tactics-and-their-costly-consequences","2024-09-09T08:57:30","Explore the deceptive use of dark patterns in cookie consent banners, including how these tactics manipulate users into giving consent. It also discusses the costly consequences for businesses, including violations of privacy laws and the erosion of user trust.",{"id":975,"title":976,"width":296,"height":367},"37286617-eeb1-4a0d-97d7-588f4b1c51b4","Handshake Agreement Consent",{"name":941,"slug":942,"headshot":9},[979],{"categories_id":980},{"name":137,"slug":139},[982],{"tags_id":983},{"name":949,"slug":950},{"id":985,"title":986,"slug":987,"publish_date":988,"summary":989,"featured":12,"hero_image":990,"author":991,"categories":992,"tags":995},"fffc2d77-46ad-447c-ac7d-0dcce0d3b7cd","The 8 Best Data Privacy Software for 2024","best-data-privacy-software","2024-09-06T08:59:51","Implementing proper data privacy practices is more than just a legal obligation; its a key avenue for enhancing consumer trust. Find out the best data privacy tools to keep your organization safe.",{"id":345,"title":346,"width":296,"height":297},{"name":941,"slug":942,"headshot":9},[993],{"categories_id":994},{"name":137,"slug":139},[996],{"tags_id":997},{"name":868,"slug":869},{"id":999,"title":1000,"slug":1001,"publish_date":1002,"summary":1003,"featured":12,"hero_image":1004,"author":1007,"categories":1008,"tags":1011},"6f1b652b-c8df-4e06-bedc-5f16c6a201d9","Common Data Privacy Challenges Companies Face in 2024","common-data-privacy-challenges","2024-08-29T12:02:11","Examine the evolving challenges of data privacy compliance in 2024, addressing the complexities of third-party software, regulatory landscapes, and emerging technologies. This article explores best practices for companies to safeguard user data while adapting to new legal and technical realities.",{"id":1005,"title":1006,"width":296,"height":297},"236db1cb-67cb-4a48-9813-fa751d948de4","Legal Rights Consumer",{"name":941,"slug":942,"headshot":9},[1009],{"categories_id":1010},{"name":137,"slug":139},[1012,1014,1018],{"tags_id":1013},{"name":868,"slug":869},{"tags_id":1015},{"name":1016,"slug":1017},"Emerging Risks","emerging-risks",{"tags_id":1019},{"name":890,"slug":891},{"id":1021,"title":1022,"slug":1023,"publish_date":1024,"summary":1025,"featured":12,"hero_image":1026,"author":1030,"categories":1031,"tags":1034},"d44eaab1-4cb6-46b5-b803-52e2c3743a53","Comprehensive Guide to Web Privacy Laws and Regulations","comprehensive-guide-to-web-privacy-laws-and-regulations","2024-08-20T02:00:00","This guide provides an overview of privacy laws often cited in web tracker lawsuits. We've noted the laws that include a private right of action, which allows individuals to file lawsuits when they believe their privacy rights were violated.",{"id":1027,"title":1028,"width":296,"height":1029},"ceaa15c6-8bc5-4825-9b9c-824100163d02","Invisible Web Trackers",791,{"name":941,"slug":942,"headshot":9},[1032],{"categories_id":1033},{"name":137,"slug":139},[1035],{"tags_id":1036},{"name":890,"slug":891},{"id":1038,"title":1039,"slug":1040,"publish_date":1041,"summary":1042,"featured":12,"hero_image":1043,"author":1047,"categories":1048,"tags":1051},"e95ca6bf-16e9-4b3b-ba13-815bd384a3f3","Digital Marketing and Privacy: What You Need to Know","privacy-implications-digital-marketers","2024-08-14T13:26:12","Data privacy has become a convoluted challenge for digital marketers. Digital platforms have streamlined the process of gathering data and insights at an unprecedented level. However, consumers (and governments, for that matter) are more concerned about the use of their data than ever before.",{"id":1044,"title":1045,"width":296,"height":1046},"6734f586-268c-48f2-9082-8589df34568b","Privacy Policy Document",718,{"name":941,"slug":942,"headshot":9},[1049],{"categories_id":1050},{"name":137,"slug":139},[1052],{"tags_id":1053},{"name":1054,"slug":1055},"Marketing and Ad Tech","marketing-and-ad-tech",{"id":1057,"title":1058,"slug":1059,"publish_date":1060,"summary":1061,"featured":12,"hero_image":1062,"author":1063,"categories":1064,"tags":1067},"f74e8b2f-136b-4e7b-bc82-2c5fe9334ab5","Three New Privacy Laws Go Into Effect, Including Texas and Oregon","three-new-privacy-laws-go-into-effect-including-texas-and-oregon","2024-06-15T12:54:02","Below are summaries of 3 new privacy laws in the news this week.    The first two in Texas and Oregon are going into effect soon   on July 1, 2024.  However, enforcement comes later. Read more.",{"id":355,"title":356,"width":296,"height":297},{"name":941,"slug":942,"headshot":9},[1065],{"categories_id":1066},{"name":137,"slug":139},[1068],{"tags_id":1069},{"name":890,"slug":891},{"id":1071,"title":1072,"slug":1073,"publish_date":1074,"summary":1075,"featured":12,"hero_image":1076,"author":1079,"categories":1080,"tags":1083},"b842d1f9-8231-499f-9813-ca8999077fbe","What’s Behind the Surge of Wiretapping Lawsuits?","whats-behind-the-surge-of-wiretapping-lawsuits","2024-05-14T11:59:56","The surge in lawsuits against companies due to third-party data collection on their websites comes from the growing concern over online privacy and data protection. Some attorneys see this as a new opportunity to provide their services. These lawsuits are often filed under wiretapping statutes, such as the federal Wiretap Act and state equivalents, which prohibit the interception of electronic communications without consent.",{"id":1077,"title":1078,"width":296,"height":367},"65209d0e-6126-4b43-9b15-53314a9e372e","Partnership Consent Agreement",{"name":923,"slug":924,"headshot":9},[1081],{"categories_id":1082},{"name":137,"slug":139},[1084],{"tags_id":1085},{"name":890,"slug":891},{"id":1087,"title":1088,"slug":1089,"publish_date":1090,"summary":1091,"featured":12,"hero_image":1092,"author":1095,"categories":1096,"tags":1099},"aeee48d1-dee7-42d8-be0d-589cfa4b2523","Consent Banner Compliance: Is Your Website's Consent Banner Meeting Privacy Regulations?","compliance-check-is-your-websites-consent-banner-meeting-privacy-regulations","2024-05-14T11:56:15","We're thrilled to introduce a new feature on our Privacy Edge platform: consent verification. We recently published a research report and uncovered something quite striking: over 90% of websites load cookies before any interaction with the consent banner (like accepting or rejecting all cookies), with an average of 18 third-party cookies loading before any interaction occurs.",{"id":1093,"title":1094,"width":296,"height":297},"ba3d6fd1-9ef9-40c7-aed1-4c5d99cb5539","Compliance Audit Report",{"name":941,"slug":942,"headshot":9},[1097],{"categories_id":1098},{"name":137,"slug":139},[],{"id":1101,"title":1102,"slug":1103,"publish_date":1104,"summary":1105,"featured":12,"hero_image":1106,"author":1109,"categories":1110,"tags":1113},"285e788e-5e4a-4d66-8613-bf1bc67123bc","Cerebral fined $7 million by the FTC, New Colorado Law Protects Neurological Data, a Federal Privacy Bill is Gaining Traction, and More","cerebral-fined-7-million-by-the-ftc-new-colorado-law-protects-neurological-data-a-federal-privacy-bill-is-gaining-traction-and-more","2024-04-19T10:00:13","This week has been buzzing with privacy-related news, especially on the legislative front. The U.S. House Committee on Energy and Commerce Innovation, Data and Commerce Subcommittee hearing discussed the drafted legislation for a new comprehensive federal privacy law, and we saw two state laws passed in Nebraska and Maryland, pending signatures from their Governors.",{"id":1107,"title":1108,"width":296,"height":367},"d322b39e-21a1-4369-8143-d89dce70630a","Tech Privacy Digital",{"name":941,"slug":942,"headshot":9},[1111],{"categories_id":1112},{"name":137,"slug":139},[1114],{"tags_id":1115},{"name":890,"slug":891},{"id":1117,"title":1118,"slug":1119,"publish_date":1120,"summary":1121,"featured":12,"hero_image":1122,"author":1123,"categories":1124,"tags":1127},"63e48a78-c68d-425c-8630-eaf73081b658","Website Privacy Audit: Steps Companies Should Take","website-privacy-compliance-10-steps-companies-should-take","2024-04-02T04:54:48","Our latest comprehensive analysis on “Website Privacy and Compliance Challenges” is now available.   While there are LOTS of interesting data in this report, it also highlights actions for web site owners in the continuous process that is privacy compliance.",{"id":335,"title":336,"width":296,"height":297},{"name":923,"slug":924,"headshot":9},[1125],{"categories_id":1126},{"name":137,"slug":139},[],{"id":1129,"title":1130,"slug":1131,"publish_date":1132,"summary":1133,"featured":12,"hero_image":1134,"author":1137,"categories":1138,"tags":1143},"ffa5481e-9f28-4491-b396-484d7a0b4cd4","Webinar: Privacy Compliance & Third-Party Tracking: An Ongoing Challenge","webinar-privacy-compliance-third-party-tracking-an-ongoing-challenge","2024-03-29T04:55:27","Listen to a lively discussion between Lokker's CEO Ian Cohen and FPF's CEO Jules Polonetsky on the current state of online privacy, including the prevalent privacy risks and compliance challenges that companies face today.",{"id":1135,"title":1136,"width":296,"height":297},"58ab410e-b52e-4886-97d3-d290d4896389","Gdpr Legal Compliance",{"name":941,"slug":942,"headshot":9},[1139,1141],{"categories_id":1140},{"name":137,"slug":139},{"categories_id":1142},{"name":863,"slug":864},[],{"id":1145,"title":1146,"slug":1147,"publish_date":1148,"summary":1149,"featured":12,"hero_image":1150,"author":1154,"categories":1155,"tags":1158},"1c440d36-f9ea-45c7-a0f0-00bddb5f59ca","Biden Issues Executive Order to Protect Sensitive Data, $23 Million Tax Act Settlement, FTC Fines Avast $16.5 Million, and More.","biden-issues-executive-order-to-protect-sensitive-data-23-million-tax-act-settlement-ftc-fines-avast-16-5-million-and-more","2024-03-01T12:57:56","This week, the privacy ecosystem has been buzzing with news ranging from the serious to, if we’re being honest, a little strange. Here's what we're keeping an eye on this week.",{"id":1151,"title":1152,"width":296,"height":1153},"619e5be5-3177-4b2b-a086-3ee6005eddc1","Tech Workspace Security",719,{"name":941,"slug":942,"headshot":9},[1156],{"categories_id":1157},{"name":137,"slug":139},[1159],{"tags_id":1160},{"name":890,"slug":891},{"id":1162,"title":1163,"slug":1164,"publish_date":1165,"summary":1166,"featured":12,"hero_image":1167,"author":1171,"categories":1172,"tags":1175},"b7e22045-ea85-4391-8d52-b316bb8f0107","Find Out Whether Your Website Is Breaching VPPA, HIPAA, and Other Privacy Regulations in Minutes","critical-privacy-alerts","2024-02-13T14:17:58","LOKKER is excited to announce the launch of a new critical privacy alert feature in their Privacy Edge platform that makes it extremely easy to tell if your site is in violation of prominent privacy laws, including the VPPA and HIPAA.",{"id":1168,"title":1169,"width":296,"height":1170},"6b457abd-93e8-42de-b5c5-d2caf3441201","Severity Level Dashboard",715,{"name":923,"slug":924,"headshot":9},[1173],{"categories_id":1174},{"name":137,"slug":139},[],{"id":1177,"title":1178,"slug":1179,"publish_date":1180,"summary":1181,"featured":12,"hero_image":1182,"author":1185,"categories":1186,"tags":1189},"3c8977b0-d288-425f-8918-7cfdbbfc688a","This Week’s Senate Hearings on Child Online Safety Underscore Need for A Higher Standard of Care For Online Privacy","this-weeks-senate-hearings-on-child-online-safety-underscore-need-for-a-higher-standard-of-care-for-online-privacy","2024-02-03T09:11:36","Senate hearings this week brought 5 key tech executives to Washington including Meta, Snap, Discord, X and TikTok to answer questions about harmful data collection and manipulation of children’s online experiences.",{"id":1183,"title":1184,"width":296,"height":297},"6b560810-27ea-473f-9cfe-b21db905225a","Data Minimization",{"name":923,"slug":924,"headshot":9},[1187],{"categories_id":1188},{"name":137,"slug":139},[1190],{"tags_id":1191},{"name":890,"slug":891},{"id":1193,"title":1194,"slug":1195,"publish_date":1196,"summary":1197,"featured":12,"hero_image":1198,"author":1201,"categories":1202,"tags":1205},"d8e01026-3845-4c6c-9dce-4ca0f53645a5","Sony Settles for $16 Million Showing Web Tracker Lawsuits Continue to Expand","sony-settles-for-16-million-showing-web-tracker-lawsuits-continue-to-expand","2023-11-30T08:18:16","Over 100 Video Privacy Protection Act (VPPA) cases brought for unauthorized use of web trackers. Protect your company from web tracker risks.",{"id":1199,"title":1200,"width":296,"height":297},"58893135-1245-4280-969e-d499eaf1eef6","Privacy Shield Security",{"name":941,"slug":942,"headshot":9},[1203],{"categories_id":1204},{"name":137,"slug":139},[1206],{"tags_id":1207},{"name":890,"slug":891},{"id":1209,"title":1210,"slug":1211,"publish_date":1212,"summary":1213,"featured":12,"hero_image":1214,"author":1217,"categories":1218,"tags":1221},"6be1fbb1-732e-4c5d-8a9f-e045e190949e","Streamline Data Protection Assessment Requirements With Privacy Edge","streamline-data-protection-assessment-dpa-requirements-with-privacy-edge","2023-08-10T08:40:00","Privacy Edge software by LOKKER can be a helpful tool to assist in the DPA process by streamlining and enhancing the assessment workflow.",{"id":1215,"title":1216,"width":296,"height":297},"8fa6c570-ca28-406f-bfdf-642d6bff154d","Privacy by Design",{"name":941,"slug":942,"headshot":9},[1219],{"categories_id":1220},{"name":137,"slug":139},[1222,1226],{"tags_id":1223},{"name":1224,"slug":1225},"Featured","featured",{"tags_id":1227},{"name":890,"slug":891},{"id":1229,"title":1230,"slug":1231,"publish_date":1232,"summary":1233,"featured":12,"hero_image":1234,"author":1237,"categories":1238,"tags":1241},"c32e04e6-3c0e-44ef-af7e-8b102ae93c4d","Webinar | Protect Your Clients’ Data From Unwanted Third-Party Tracking","webinar-protect-your-users-data-from-unwanted-third-party-tracking","2023-06-30T12:58:56","In this webinar, Jeremy Barnett, Chief Commercial Officer of LOKKER, and Al Saikali, Partner and Chair of the Privacy and Data Security Practice at Shook, Hardy and Bacon, discuss the issues and risks surrounding third-party tracking and its implications for companies from both a legal and regulatory perspective.",{"id":1235,"title":1236,"width":296,"height":297},"19d8ccd3-87fb-4261-9722-33c1c8778fdc","Retargeting Ads",{"name":941,"slug":942,"headshot":9},[1239],{"categories_id":1240},{"name":863,"slug":864},[1242,1244,1246],{"tags_id":1243},{"name":1016,"slug":1017},{"tags_id":1245},{"name":1054,"slug":1055},{"tags_id":1247},{"name":890,"slug":891},{"id":1249,"title":1250,"slug":1251,"publish_date":1252,"summary":1253,"featured":12,"hero_image":1254,"author":1255,"categories":1256,"tags":1259},"4051e4c5-1e53-48ce-be4c-1d906b04f16a","Five Issues With How We Approach Web Privacy, and How to Fix It","five-issues-with-how-we-approach-web-privacy-and-how-to-fix-it","2023-06-28T08:01:52","Protecting customers’ privacy online is getting increasingly complex. Companies are trying to balance complying with a patchwork of state and industry-specific laws against website technology that, at its core, encourages sharing information with other parties. Here are five reasons the approach to website privacy today is broken and a few recommendations to fix it.",{"id":680,"title":681,"width":296,"height":297},{"name":941,"slug":942,"headshot":9},[1257],{"categories_id":1258},{"name":137,"slug":139},[1260,1262],{"tags_id":1261},{"name":868,"slug":869},{"tags_id":1263},{"name":1054,"slug":1055},{"id":1265,"title":1266,"slug":1267,"publish_date":1268,"summary":1269,"featured":12,"hero_image":1270,"author":1274,"categories":1275,"tags":1278},"3c7e2e6b-c9f6-4f15-a0e4-572c07601ded","What You Need to Know About the Colorado Privacy Act and Connecticut Personal Data and Online Monitoring Act","starting-july-1-new-state-privacy-laws-will-go-into-effect-and-be-enforceable","2023-06-23T05:45:08","Two new state privacy laws, the Colorado Privacy Act (CPA) and the Connecticut Personal Data Privacy and Online Monitoring Act (CTDPA), both go into effect and are enforceable on July 1, while the California Privacy Acts went into effect on January 1, 2023, will be enforceable on July 1, 2023. Is your business ready for these laws?",{"id":1271,"title":1272,"width":296,"height":1273},"4b80aad9-ffb2-442a-8f9e-d24a1ff67907","Ccpa California Privacy",643,{"name":941,"slug":942,"headshot":9},[1276],{"categories_id":1277},{"name":137,"slug":139},[1279],{"tags_id":1280},{"name":890,"slug":891},{"id":1282,"title":1283,"slug":1284,"publish_date":1285,"summary":1286,"featured":12,"hero_image":1287,"author":1290,"categories":1291,"tags":1294},"7df6ebea-29d8-4920-b028-9944550e8553","Apple’s got it exactly right!","apples-got-it-exactly-right","2023-06-02T04:31:04","Companies need the equivalent to protect their customers.  LOKKER does that.",{"id":1288,"title":1289,"width":296,"height":297},"f41e160b-cba2-44ac-88ee-19ef4530f782","HTTPS Encryption Shield",{"name":923,"slug":924,"headshot":9},[1292],{"categories_id":1293},{"name":863,"slug":864},[],{"id":1296,"title":1297,"slug":1298,"publish_date":1299,"summary":1300,"featured":12,"hero_image":1301,"author":1304,"categories":1305,"tags":1308},"acf3bb50-065d-401a-b697-d85bc6340281","Protect Your Website from Privacy Risks: Insights from Scanning the SP 500 Websites","protect-your-website-from-privacy-risks-insights-from-scanning-the-sp-500-websites","2023-05-15T11:07:16","Alarmingly, we found significant privacy risks on 30% of SP 500 websites and learn how to safeguard your website from common privacy threats. Implement these tips to protect yourself and your company today.",{"id":1302,"title":1303,"width":296,"height":297},"31209be6-01cf-4132-921f-bc897e024a3d","Vppa Video Privacy",{"name":941,"slug":942,"headshot":9},[1306],{"categories_id":1307},{"name":137,"slug":139},[1309,1311],{"tags_id":1310},{"name":1016,"slug":1017},{"tags_id":1312},{"name":1054,"slug":1055},{"id":1314,"title":1315,"slug":1316,"publish_date":1317,"summary":1318,"featured":12,"hero_image":1319,"author":1320,"categories":1321,"tags":1324},"5ed772e9-6ed4-4cde-8a60-995d9ea58d6b","Federal Trade Commission Outlines How Pixel Tracking Can Share Sensitive Health Data after Recent Regulatory Actions","federal-trade-commission-outlines-how-pixel-tracking-can-share-sensitive-health-data-after-recent-regulatory-actions","2023-03-21T12:52:38","In recent months, the Federal Trade Commission has taken action against two digital health platforms; GoodRx and BetterHelp. Both actions responded to the misuse of hidden pixels sharing sensitive health data from their websites without their visitors’ consent.",{"id":662,"title":663,"width":296,"height":960},{"name":941,"slug":942,"headshot":9},[1322],{"categories_id":1323},{"name":137,"slug":139},[1325,1327],{"tags_id":1326},{"name":90,"slug":92},{"tags_id":1328},{"name":890,"slug":891},{"id":1330,"title":1331,"slug":1332,"publish_date":1333,"summary":1334,"featured":12,"hero_image":1335,"author":1338,"categories":1339,"tags":1342},"67c28638-20d2-4d32-95bf-86ca52ba33cc","New Bulletin by OCR Warns Online Tracking Technologies May Violate HIPAA","new-bulletin-by-ocr-warns-online-tracking-technologies-may-violate-hipaa","2022-12-06T22:34:18","The Office of Civil Rights (OCR) at the Department of Health and Human Services Issue a Bulletin to Warn HIPAA-Protected Entities that Online Tracking Technologies May be Sharing ePHI",{"id":1336,"title":1337,"width":296,"height":297},"a76894b7-7c20-4f25-a52d-8cc44e4ca6c7","Patient Health Portal",{"name":941,"slug":942,"headshot":9},[1340],{"categories_id":1341},{"name":137,"slug":139},[1343,1345,1347],{"tags_id":1344},{"name":1224,"slug":1225},{"tags_id":1346},{"name":90,"slug":92},{"tags_id":1348},{"name":890,"slug":891},{"id":1350,"title":1351,"slug":1352,"publish_date":1353,"summary":1354,"featured":12,"hero_image":1355,"author":1358,"categories":1361,"tags":1364},"1beacf29-8058-46d3-a261-77a93e02b697","Data Privacy – Individuals  Companies Waking up to the Threat","data-privacy-individuals-companies-waking-up-to-the-threat","2022-11-30T23:26:21","Americans are starting to pay more attention to these privacy-related issues in the digital world.  It feels like we are reaching some sort of tipping point.  Why?  Why now?  And how will these changes in perception and expectation affect American companies?",{"id":1356,"title":1357,"width":296,"height":960},"83d6d592-a547-4124-8216-10001f8fc8db","Data Map Inventory",{"name":1359,"slug":1360,"headshot":9},"Brian Ebert","brianebert",[1362],{"categories_id":1363},{"name":137,"slug":139},[1365],{"tags_id":1366},{"name":868,"slug":869},{"id":1368,"title":1369,"slug":1370,"publish_date":1371,"summary":1372,"featured":12,"hero_image":1373,"author":1376,"categories":1377,"tags":1382},"2ee72206-6709-41bc-bb31-5444949d7dcd","Why The Web Browser Is A Companys Greatest Vulnerability","why-the-web-browser-is-a-companys-greatest-vulnerability","2022-10-25T16:30:33","LOKKER recently analyzed more than 170,000 websites to get better understand the scope and scale of web privacy risks that exist, and published the findings in the second edition of LOKKERs biannual Online Data Privacy Report, published in October 2022.",{"id":1374,"title":1375,"width":296,"height":960},"0e872fd6-8022-43f0-988e-b80ded566dfa","Ad Tech Dashboard",{"name":941,"slug":942,"headshot":9},[1378],{"categories_id":1379},{"name":1380,"slug":1381},"Infographic","infographic",[1383],{"tags_id":1384},{"name":1054,"slug":1055},{"id":1386,"title":1387,"slug":1388,"publish_date":1389,"summary":1390,"featured":12,"hero_image":1391,"author":1394,"categories":1395,"tags":1398},"bcae501b-058b-4270-b94a-da867ac7cde1","Trackers, Pixels  Tags – Who’s Exploiting Your Website?","live-panel-upcoming-sept-21st-trackers-pixels-tags-whos-exploiting-your-website","2022-09-14T14:04:33","Facebook pixels, Twitter links, advertising cookies– most of these third-party scripts are also trackers that collect customer data and share it with a host of downstream partners. Join us for a deep dive into browser privacy risks and the emerging privacy laws that could wreak havoc with your web ops.",{"id":1392,"title":1393,"width":296,"height":367},"98b7ee04-aab3-409f-a23f-5d3c72110752","Session Replay Recording",{"name":941,"slug":942,"headshot":9},[1396],{"categories_id":1397},{"name":137,"slug":139},[1399],{"tags_id":1400},{"name":890,"slug":891},{"id":1402,"title":1403,"slug":1404,"publish_date":1405,"summary":1406,"featured":12,"hero_image":1407,"author":1410,"categories":1411,"tags":1414},"9615d547-fb25-416f-8fc1-bf35828a53a2","Privacy Regulations Are Heating Up","privacy-regulations-are-heating-up-this-august","2022-08-24T23:27:15","There’s been significant movement on the privacy regulation front in the past few weeks. We’re here to break it down for you, so that if you’re impacted, you can prepare and take action.",{"id":1408,"title":1409,"width":296,"height":297},"4a949cf5-505d-434a-b198-416dd210a231","Consumer Privacy Rights",{"name":941,"slug":942,"headshot":9},[1412],{"categories_id":1413},{"name":137,"slug":139},[1415],{"tags_id":1416},{"name":890,"slug":891},{"id":1418,"title":1419,"slug":1420,"publish_date":1421,"summary":1422,"featured":12,"hero_image":1423,"author":1424,"categories":1425,"tags":1428},"45e813b0-7f95-4935-81a3-8ebe34e96820","Data Compliance in 2024: Are You Doing Enough to Protect Your Customers Data?","are-you-doing-enough-to-protect-your-customers-data","2022-07-10T20:34:00","Last spring, KPMG conducted a survey, “Corporate data responsibility: Bridging the consumer trust gap,” which digs into the sentiments and behaviors of both the general population and business leaders when it comes to data protection and privacy.",{"id":768,"title":769,"width":296,"height":297},{"name":941,"slug":942,"headshot":9},[1426],{"categories_id":1427},{"name":137,"slug":139},[1429],{"tags_id":1430},{"name":868,"slug":869},{"id":1432,"title":1433,"slug":1434,"publish_date":1435,"summary":1436,"featured":12,"hero_image":1437,"author":1440,"categories":1441,"tags":1444},"99285c25-026b-4a59-b8d7-fa5b6bb39d45","LOKKER Web Privacy Tools [Video]","lokker-web-privacy-tools-video","2022-07-10T16:04:42","Privacy is a team effort. Give your team the power of visibility and control with LOKKER. LOKKERS web privacy platform empowers all stakeholders  marketing, information security, legal and executive teams  with a solution to make their website fast, compliant, private and safe.",{"id":1438,"title":1439,"width":296,"height":297},"45d8b5d1-3583-457e-85b2-51944dba857c","Healthcare Data Protection",{"name":941,"slug":942,"headshot":9},[1442],{"categories_id":1443},{"name":863,"slug":864},[1445],{"tags_id":1446},{"name":868,"slug":869},{"id":1448,"title":1449,"slug":1450,"publish_date":1451,"summary":1452,"featured":12,"hero_image":1453,"author":1456,"categories":1457,"tags":1460},"57c014c4-d1f0-44c1-a9c5-ea38f2f94537","Lokker’s All New Guide to Privacy Terminology","lokkers-all-new-guide-to-privacy-terminology","2022-07-03T22:46:00","To help us all better understand what we’re dealing with this Data Privacy Week, we’ve decided to create a clear and simple explanation of the web",{"id":1454,"title":1455,"width":296,"height":297},"f8cf4588-e697-4592-abb1-49a0168f4671","Behavioral Tracking Online",{"name":941,"slug":942,"headshot":9},[1458],{"categories_id":1459},{"name":137,"slug":139},[1461],{"tags_id":1462},{"name":868,"slug":869},{"id":1464,"title":1465,"slug":1466,"publish_date":1467,"summary":1468,"featured":12,"hero_image":1469,"author":1472,"categories":1473,"tags":1476},"6c8226dd-9ca8-4952-8a8b-0519b1f23914","Cyber Privacy Risk Management Survey [INFOGRAPHIC]","cyber-privacy-risk-management-survey-infographic","2021-12-10T22:54:00","We surveyed 100 IT leaders to see how they managed client-side user data access by third parties and discovered widely accepted operational practices that seem at odds with common sense privacy standards.",{"id":1470,"title":1471,"width":296,"height":297},"2a5533b4-7384-4590-a039-e48468c448df","Behavioral Profile Data",{"name":941,"slug":942,"headshot":9},[1474],{"categories_id":1475},{"name":137,"slug":139},[1477],{"tags_id":1478},{"name":1054,"slug":1055},{"id":1480,"title":1481,"slug":1482,"publish_date":1483,"summary":1484,"featured":12,"hero_image":1485,"author":1488,"categories":1489,"tags":1492},"9b2b2cf6-1555-4b4f-8880-afa85ff2b8f2","How Does AI Invade Privacy?","help-ai-is-invading-my-privacy","2021-07-06T14:05:00","It’s easy to compartmentalize the idea of digital privacy. “Whatever,” we may think. “No one is interested in my life.”\nThen we watch something like The Social Dilemma that explains how companies — and Russian hackers  — use AI",{"id":1486,"title":1487,"width":296,"height":367},"cec7d275-36f8-44d9-9abb-691aaacc0f79","Data Minimization Principle",{"name":941,"slug":942,"headshot":9},[1490],{"categories_id":1491},{"name":137,"slug":139},[1493],{"tags_id":1494},{"name":868,"slug":869},{"id":1496,"title":1497,"slug":1498,"publish_date":1499,"summary":1500,"featured":12,"hero_image":1501,"author":1502,"categories":1503,"tags":1506},"f6f0fc71-64f8-42be-a989-e82bf82ae577","Surveillance Ad Tech  Web Privacy","surveillance-ad-tech-web-privacy","2021-07-04T14:19:00","According to this highly useful resource page from the IAPP, most international privacy laws mandate that companies give their users the right to access, correct, delete, and opt-out of any personal",{"id":831,"title":832,"width":296,"height":960},{"name":941,"slug":942,"headshot":9},[1504],{"categories_id":1505},{"name":137,"slug":139},[1507],{"tags_id":1508},{"name":1054,"slug":1055},{"id":1510,"title":1511,"slug":1512,"publish_date":1513,"summary":1514,"featured":12,"hero_image":1515,"author":1518,"categories":1519,"tags":1522},"21eade83-3a86-480d-8cdc-40cf8a8073d1","What is Device Fingerprinting?","what-is-device-fingerprinting","2021-06-06T14:34:00","Device fingerprinting sounds like a term used to describe how to unlock your phone or laptop using your finger. But that’s not what we are talking",{"id":1516,"title":1517,"width":296,"height":297},"2c40ff19-2f13-4621-a0f1-9842b5d4cad6","Cross Border Data Flow",{"name":941,"slug":942,"headshot":9},[1520],{"categories_id":1521},{"name":137,"slug":139},[1523],{"tags_id":1524},{"name":868,"slug":869},{"id":1526,"title":1527,"slug":1528,"publish_date":1529,"summary":1530,"featured":12,"hero_image":1531,"author":1534,"categories":1535,"tags":1538},"a8aa2604-e98d-4af3-a76c-53c2f7222ddf","The Privacy Risks of Session Recording Tools","the-privacy-risks-of-session-recording-tools","2021-05-03T14:41:00","Session recording tools are wildly popular today. There should be no doubt about the allure and potential business benefits of utilizing session recording tools to help website operators, marketers, and UX/UI professionals see how users interact with their websites.",{"id":1532,"title":1533,"width":296,"height":297},"bb957be0-b834-4f9c-931f-be8e2c95e718","Session Recording Screen",{"name":941,"slug":942,"headshot":9},[1536],{"categories_id":1537},{"name":137,"slug":139},[1539],{"tags_id":1540},{"name":868,"slug":869},{"id":1542,"title":1543,"slug":1544,"publish_date":1545,"summary":1546,"featured":12,"hero_image":1547,"author":1550,"categories":1551,"tags":1554},"14a2eb8e-9bfe-4dd9-a1c4-9be0bd88c753","Are schools leaking personal data on their students?","are-schools-leaking-personal-data-on-their-students","2021-04-06T14:45:00","The latest research indicates most are. And the data they are leaking flows to third parties through remote learning apps and school websites. As a society, we have underestimated the threat to children’s privacy presented by online learning applications used by most schools today.",{"id":1548,"title":1549,"width":296,"height":297},"aec7f64e-be68-478a-b177-d5a3f694da98","End to End Encryption",{"name":941,"slug":942,"headshot":9},[1552],{"categories_id":1553},{"name":137,"slug":139},[1555],{"tags_id":1556},{"name":868,"slug":869},{"id":1558,"title":1559,"slug":1560,"publish_date":1561,"summary":1562,"featured":12,"hero_image":1563,"author":1566,"categories":1567,"tags":1570},"b8db39fc-8cad-4e8b-a5e0-20439aa6aa58","How Do Proxy Technologies Enhance Security  Privacy?","how-do-proxy-technologies-enhance-security-privacy","2020-07-06T14:56:00","On the internet, proxy servers act as filters, passing requests from one server to another while making modifications to the communications more or less transparently. The basic principle of a proxy server is that it lets you interact with the internet while avoiding some of the risks or lightening the load because it’s standing between you and the rest of the world and looking out for you.",{"id":1564,"title":1565,"width":296,"height":960},"328b5f6a-2114-4f3a-8e2b-cd62af0bf154","Secure Data Storage",{"name":941,"slug":942,"headshot":9},[1568],{"categories_id":1569},{"name":137,"slug":139},[1571],{"tags_id":1572},{"name":1573,"slug":1574},"Web and Cloud Architecture","web-and-cloud-architecture",{"left":300,"top":300,"width":301,"height":301,"rotate":300,"vFlip":12,"hFlip":12,"body":1576},"\u003Cpath fill=\"currentColor\" d=\"M4 11V4h7v7zm0 9v-7h7v7zm9-9V4h7v7zm0 9v-7h7v7z\"/>",{"left":300,"top":300,"width":301,"height":301,"rotate":300,"vFlip":12,"hFlip":12,"body":1578},"\u003Cpath fill=\"currentColor\" d=\"M8.5 17.5h7v-1h-7zm0-4h7v-1h-7zM6.616 21q-.691 0-1.153-.462T5 19.385V4.615q0-.69.463-1.152T6.616 3H14.5L19 7.5v11.885q0 .69-.462 1.153T17.384 21zM14 8h4l-4-4z\"/>",{"left":300,"top":300,"width":301,"height":301,"rotate":300,"vFlip":12,"hFlip":12,"body":1580},"\u003Cpath fill=\"currentColor\" d=\"M3 20v-1h18v1zm1-2.77V12h2v5.23zm4.654 0V7h2v10.23zm4.673 0V10h2v7.23zm4.673 0V4h2v13.23z\"/>",{"left":300,"top":300,"width":301,"height":301,"rotate":300,"vFlip":12,"hFlip":12,"body":1582},"\u003Cpath fill=\"currentColor\" d=\"M17.923 12.5v-1h3.23v1zm1.085 6.462l-2.585-1.939l.623-.792l2.585 1.938zm-2.039-11.27l-.623-.792l2.585-1.939l.623.793zM5.5 17.962v-3.808H4.462q-.671 0-1.144-.472t-.472-1.143v-1.077q0-.671.472-1.144t1.143-.472h3.731L12.154 7.5v9l-3.962-2.346H6.5v3.808zm8.423-3.073V9.112q.502.465.809 1.222T15.038 12t-.306 1.666t-.809 1.222\"/>",{"left":300,"top":300,"width":301,"height":301,"rotate":300,"vFlip":12,"hFlip":12,"body":1584},"\u003Cpath fill=\"currentColor\" d=\"M4 20v-2.52L17.18 4.288q.155-.137.34-.212T17.907 4t.39.064q.19.063.35.228l1.067 1.074q.165.159.226.35q.06.19.06.38q0 .204-.068.39q-.069.185-.218.339L6.519 20zM17.504 7.589L19 6.111L17.889 5l-1.477 1.496z\"/>",{"left":300,"top":300,"width":301,"height":301,"rotate":300,"vFlip":12,"hFlip":12,"body":1586},"\u003Cg fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\">\u003Cpath d=\"M14 3v4a1 1 0 0 0 1 1h4\"/>\u003Cpath d=\"M17 21H7a2 2 0 0 1-2-2V5a2 2 0 0 1 2-2h7l5 5v11a2 2 0 0 1-2 2M9 9h1m-1 4h6m-6 4h6\"/>\u003C/g>",{"left":300,"top":300,"width":301,"height":301,"rotate":300,"vFlip":12,"hFlip":12,"body":1588},"\u003Cpath fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M3 13a1 1 0 0 1 1-1h4a1 1 0 0 1 1 1v6a1 1 0 0 1-1 1H4a1 1 0 0 1-1-1zm12-4a1 1 0 0 1 1-1h4a1 1 0 0 1 1 1v10a1 1 0 0 1-1 1h-4a1 1 0 0 1-1-1zM9 5a1 1 0 0 1 1-1h4a1 1 0 0 1 1 1v14a1 1 0 0 1-1 1h-4a1 1 0 0 1-1-1zM4 20h14\"/>",{"left":300,"top":300,"width":301,"height":301,"rotate":300,"vFlip":12,"hFlip":12,"body":1590},"\u003Cg fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\">\u003Cpath d=\"M14 3v4a1 1 0 0 0 1 1h4\"/>\u003Cpath d=\"M17 21H7a2 2 0 0 1-2-2V5a2 2 0 0 1 2-2h7l5 5v11a2 2 0 0 1-2 2\"/>\u003C/g>",{"left":300,"top":300,"width":301,"height":301,"rotate":300,"vFlip":12,"hFlip":12,"body":1592},"\u003Cpath fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M4 20h4L18.5 9.5a2.828 2.828 0 1 0-4-4L4 16zm9.5-13.5l4 4\"/>"]