<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.privacydoesmatter.com/blogs/tag/ccpa/feed" rel="self" type="application/rss+xml"/><title>Privacy Does Matters - Blog #CCPA</title><description>Privacy Does Matters - Blog #CCPA</description><link>https://www.privacydoesmatter.com/blogs/tag/ccpa</link><lastBuildDate>Mon, 11 Aug 2025 14:41:04 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[The Right Tools for Effective Data Privacy Management]]></title><link>https://www.privacydoesmatter.com/blogs/post/the-right-tools-for-effective-data-privacy-management</link><description><![CDATA[<img align="left" hspace="5" src="https://www.privacydoesmatter.com/privacydoesmatter3.jpg"/>When it comes to accomplishing any task, whether building a house or protecting personal data, the right tools make all the difference . But what exactl ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_EyjrLdF9RZurL-9-zbaYFA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_-BbSye2tQUyXTT3Vf6KRMw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_xAMTg029TVe1oR0APs103g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_qbmNkLfaRv2UiXd5IzbSUw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span>Using the right tools is essential for building and managing effective data privacy compliance programs successfully</span></h2></div>
<div data-element-id="elm_hSyZBTqEQrOZwosgWvuz9w" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><div><p style="text-align:left;">When it comes to accomplishing any task, whether building a house or protecting personal data, <b><span style="color:rgb(48, 4, 234);">the right tools make all the difference</span></b>.</p><p style="text-align:left;">But what exactly do we mean by &quot;tools&quot; in the context of data privacy?</p><p style="text-align:left;">They can be <b><span style="color:rgb(48, 4, 234);">software platforms, frameworks, templates, systems, or mechanisms</span></b> that support you in planning, implementing, and maintaining privacy programs. Just like a carpenter needs a hammer and saw, <b><span style="color:rgb(48, 4, 234);">privacy professionals need the right digital tools</span></b> to comply with evolving privacy laws and ensure responsible data handling.</p><p style="text-align:left;"><b style="background-color:rgb(244, 244, 78);">Why You Need Tools for Privacy Management</b></p><p style="text-align:left;">As privacy regulations like GDPR, CCPA, and India's DPDP Act become more complex and demanding, <b><span>manual methods are no longer enough</span></b>. Organizations must adopt tools that streamline tasks, reduce risks, and improve operational efficiency.</p><p style="text-align:left;">Some of the key areas where tools are essential include:</p><ul><li><div style="text-align:left;"><b style="color:rgb(226, 128, 29);">Data Mapping &amp; Labeling</b></div><div style="text-align:left;">Know where personal data resides, how it flows, and who accesses it.</div></li><li><div style="text-align:left;"><b style="color:rgb(226, 128, 29);">Record of Processing Activities (RoPA)</b></div><div style="text-align:left;">Maintain structured, up-to-date RoPA to meet legal requirements.</div></li><li><div style="text-align:left;"><b style="color:rgb(226, 128, 29);">Data Flow Diagrams (DFD)</b></div><div style="text-align:left;">Visualize how data moves across your organization and systems.</div></li><li><div style="text-align:left;"><b style="color:rgb(226, 128, 29);">Data Subject Access Request (DSAR) Management</b></div><div style="text-align:left;">Automate and track DSAR responses in a secure and compliant way.</div></li><li><div style="text-align:left;"><b style="color:rgb(226, 128, 29);">Data Privacy Impact Assessments (DPIAs)</b></div><div style="text-align:left;">Conduct risk assessments for high-risk processing operations.</div></li><li><div style="text-align:left;"><b style="color:rgb(234, 119, 4);">Privacy Incident &amp; Breach Management</b></div><div style="text-align:left;">Quickly detect, assess, and respond to potential data breaches.</div></li><li><div style="text-align:left;"><b style="color:rgb(234, 119, 4);">Data Retention &amp; Deletion Policies</b></div><div style="text-align:left;">Implement lifecycle rules aligned with legal and business requirements.</div></li></ul><div align="center" style="text-align:center;"><hr size="2" width="100%" align="center" style="text-align:left;"/></div>
<p style="text-align:left;"><b><span style="background-color:rgb(244, 244, 78);">Choosing the Right Privacy Tools</span></b></p><p style="text-align:left;">There’s no one-size-fits-all solution. The right tool for your organization depends on:</p><ul><li style="text-align:left;">Your industry and data sensitivity</li><li style="text-align:left;">Regulatory jurisdictions</li><li style="text-align:left;">Organizational size and maturity</li><li style="text-align:left;">Integration needs with existing IT and security tools</li></ul><p style="text-align:left;"><span style="color:rgb(48, 4, 234);">Some widely used privacy management solutions include:</span></p><ul><li style="text-align:left;"><b style="color:rgb(48, 4, 234);">OneTrust</b></li><li style="text-align:left;"><b style="color:rgb(48, 4, 234);">TrustArc</b></li><li style="text-align:left;"><b style="color:rgb(48, 4, 234);">BigID</b></li><li style="text-align:left;"><b style="color:rgb(48, 4, 234);">Nymity (by TrustArc)</b></li><li style="text-align:left;"><b style="color:rgb(48, 4, 234);">Privado</b></li><li style="text-align:left;"><b style="color:rgb(48, 4, 234);">Collibra</b></li><li style="text-align:left;"><b style="color:rgb(48, 4, 234);">WireWheel</b></li></ul><p style="text-align:left;">These platforms offer varying capabilities — from consent management and vendor risk management to automated assessments and AI-driven data discovery.</p><p style="text-align:left;">In the digital age, data privacy is not just a legal obligation, it’s a strategic priority. To manage privacy effectively, <span style="color:rgb(48, 4, 234);"><b><span>you need more than policies, you need the right tools</span></b>.</span></p><p style="text-align:left;">By investing in the right privacy technologies, you not only ensure compliance but also build trust, reduce risk, and streamline operations.</p><p style="text-align:left;"><b><span style="font-size:24px;background-color:rgb(243, 206, 206);">Ready to upgrade your privacy program? Let’s explore these tools in detail in the upcoming blogs. Stay tuned!</span></b></p></div><p style="text-align:left;"><br/></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 06 Aug 2025 17:07:42 +0000</pubDate></item><item><title><![CDATA[Free Data Privacy Certification]]></title><link>https://www.privacydoesmatter.com/blogs/post/free-data-privacy-certification</link><description><![CDATA[<img align="left" hspace="5" src="https://www.privacydoesmatter.com/PrivacyDoesMatter2.jpg"/>There are FREE resources available to enhance and test your knowledge in Data Privacy Domain. I am giving here the list of few Certifications where yo ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_TPHoRcMNQ1udovsl0g-eTg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_c1mzmzOfSs-oO2EBf4g96A" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_rGx42mY-Q3a0iVJyqbSS3Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_GMQwfotHRXy5gHSdBpzCeA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Upgrade your CV and Skills with FREE Data Privacy Certifications</h2></div>
<div data-element-id="elm_peZWOf6GSt--H6z2Hw3-XQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><div style="color:inherit;"><p style="margin-bottom:25px;font-size:15.6px;">There are FREE resources available to enhance and test your knowledge in Data Privacy Domain. I am giving here the list of few Certifications where you need not to pay any fees to achieve these certifications.</p><p style="text-align:left;margin-bottom:25px;font-size:15.6px;"><span style="color:inherit;">1.&nbsp;</span><span style="color:inherit;"><a href="https://alison.com/course/general-data-protection-regulation-gdpr#event=login" title="General Data Protection Regulation (GDPR) " target="_blank" rel="">General Data Protection Regulation (GDPR) </a>by Alison</span><span style="color:inherit;">–<span style="font-size:14px;"><span style="font-size:16px;">This free online General Data Protection Regulation (GDPR) course will teach you everything you need to know about European data protection regulations</span>.</span></span></p><p style="text-align:left;margin-bottom:25px;font-size:15.6px;"><span style="color:inherit;text-align:center;">2.&nbsp;</span><span style="color:inherit;"><a href="https://alison.com/course/data-protection-officer-training" title="Data Protection Officer Training" target="_blank" rel="">Data Protection Officer Training</a></span><a href="https://alison.com/course/general-data-protection-regulation-gdpr#event=login" target="_blank" rel="" style="text-align:center;">&nbsp;</a><span style="color:inherit;text-align:center;">by Alison–</span><span style="color:inherit;">This data protection course takes an in-depth look at the basic skills and information you need to become a trained data protection officer who safeguards the information stored by organizations.&nbsp;</span><span style="color:inherit;text-align:center;font-size:14px;">&nbsp;</span><span style="color:inherit;text-align:center;">&nbsp;</span><span style="color:inherit;"><span style="font-size:14px;">&nbsp;</span>&nbsp;</span></p><p style="text-align:left;margin-bottom:25px;font-size:15.6px;"><span style="color:inherit;">3-&nbsp;<span style="text-align:center;"><a href="https://www.infosectrain.com/self-paced-learning/introduction-to-data-privacy-training/" target="_blank" rel="">Introduction of Data Privacy (GDPR, CCPA, CPPA, PDPB) Self Learning Course by&nbsp;</a></span><a href="https://www.infosectrain.com/self-paced-learning/introduction-to-data-privacy-training/" target="_blank" rel="">Infosec Train</a>&nbsp;–&nbsp;<span style="text-align:center;">This InfosecTrain course equips you with the necessary skills to implement and manage numerous data privacy frameworks such as GDPR, CCPA, CPPA, and PDPB.&nbsp;</span></span><span style="color:inherit;"></span></p><p style="text-align:left;margin-bottom:25px;font-size:15.6px;">4- <a href="https://education.securiti.ai/certifications/privacyops/" title="PrivacyOps" target="_blank" rel="">PrivacyOps</a>&nbsp;by&nbsp;<span style="color:inherit;text-align:center;font-size:16px;">Securiti.ai&nbsp;</span><span style="color:inherit;">–&nbsp;</span><span style="color:inherit;font-size:16px;">The PrivacyOps Certification program&nbsp; is an introductory course on global privacy requirements and PrivacyOps methodology and how to use PrivacyOps technology to meet these requirements.&nbsp;</span></p><p style="text-align:left;margin-bottom:25px;font-size:15.6px;">5-&nbsp;<span style="color:inherit;text-align:center;font-size:16px;"><a href="https://www.onetrust.com/certifications/technology-risk-and-compliance-certification/" title="Tech Risk &amp; Compliance Professional by&nbsp;Onetrust" target="_blank" rel="">Tech Risk &amp; Compliance Professional by&nbsp;</a></span><span style="color:inherit;"><a href="https://www.onetrust.com/certifications/technology-risk-and-compliance-certification/" title="Tech Risk &amp; Compliance Professional by&nbsp;Onetrust" target="_blank" rel="">Onetrust</a> – This is a combination of multiple Certifications which helps you to g</span><span style="color:inherit;text-align:center;font-size:16px;">et hands-on experience with IT &amp; Security Risk Management, Enterprise Policy Management, Incident Management, and Audit Management and using OneTrust Tools.</span></p><p style="text-align:left;margin-bottom:25px;font-size:15.6px;"><span style="color:inherit;">6- <a href="https://www.coursera.org/learn/northeastern-data-privacy" title="Data Privacy Fundamentals" target="_blank" rel="">Data Privacy Fundamentals</a>&nbsp; by Northeastern University –&nbsp;</span><span style="color:inherit;text-align:center;font-size:16px;">This course is designed to introduce data privacy to a wide audience and help each participant see how data privacy has evolved as a compelling concern to public and private organizations as well as individuals.</span></p><p style="text-align:left;margin-bottom:25px;font-size:15.6px;">7- <a href="https://freecoursesonline.co.uk/business/data-protection-and-data-security/" title="Data Protection and Data Security" target="_blank" rel="">Data Protection and Data Security</a> by NCFE –&nbsp;<span style="color:inherit;text-align:center;font-size:16px;">The purpose of this qualification is to allow learners to demonstrate an understanding of data protection and data security.&nbsp;</span><span style="color:inherit;text-align:center;font-size:16px;">Data protection compliance is an essential legal requirement for all organisations. Since the General Data Protection Regulation (GDPR) came into force in May 2018, it is more vital than ever that anyone who works with personal data understands the laws and acts in compliance.</span></p><p style="text-align:left;margin-bottom:25px;font-size:15.6px;"><span style="color:inherit;text-align:center;font-size:16px;">8.&nbsp;</span><span style="color:inherit;text-align:center;font-size:16px;"><a href="https://freecoursesinengland.co.uk/understanding-data-protection-and-data-security/" title="Understand current data regulation &amp; best practices" target="_blank" rel="">Understand current data regulation &amp; best practices</a>&nbsp;-&nbsp;</span><span style="color:inherit;text-align:center;font-size:16px;">The purpose of this free online course is to allow learners to demonstrate a an essential understanding of data protection and data security.</span></p></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 13 Jan 2025 19:16:14 +0000</pubDate></item><item><title><![CDATA[Data Privacy Certifications]]></title><link>https://www.privacydoesmatter.com/blogs/post/data-privacy-certifications</link><description><![CDATA[<img align="left" hspace="5" src="https://www.privacydoesmatter.com/images/pexels-photo-8177924.jpeg"/>Privacy professionals who understand data protection best practices and regulation compliance are often in high demand. In this article, we discuss th ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OoLhKU31Rci4e5YN6hZz9w" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Zdft6wbzRwq1vgI7QUcmng" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_x2qAnI-RTmyKiaaf8hAXMg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_YbS3ARijTYutIKCis_4G6Q" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true">Top Data Privacy Certifications to Boost Your Career</h2></div>
<div data-element-id="elm_BEuLGba4J_mnL3gY7yRwZQ" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_BEuLGba4J_mnL3gY7yRwZQ"] .zpimage-container figure img { width: 1095px !important ; height: 250px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_BEuLGba4J_mnL3gY7yRwZQ"] .zpimage-container figure img { width:723px !important ; height:250px !important ; } } @media (max-width: 767px) { [data-element-id="elm_BEuLGba4J_mnL3gY7yRwZQ"] .zpimage-container figure img { width:415px !important ; height:250px !important ; } } [data-element-id="elm_BEuLGba4J_mnL3gY7yRwZQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-custom zpimage-mobile-fallback-custom hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/pexels-photo-8177924.jpeg" width="415" height="250" loading="lazy" size="custom" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_fE7x0YH3Q6y9oipIZnYo-Q" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><p><span style="font-size:20px;color:inherit;">Privacy professionals who understand data protection best practices and regulation compliance are often in high demand. In this article, we discuss the importance and benefits of Data Privacy Certifications you can consider earning to advance your career.</span><br/></p><p style="text-align:left;"><span style="color:inherit;font-size:16px;">Companies seek to comply with privacy legislations and standards because protecting Personal Information encourages new consumers or clients to conduct business with organizations that have a qualified workforce and data privacy professionals.&nbsp; This also enhances their credibility and guarantees the legal and ethical usage of customer data.&nbsp;</span><span style="font-size:20px;color:inherit;"><br/></span></p><p style="text-align:left;"><span style="font-size:16px;"><span style="font-weight:700;">Who should do Privacy Certifications: </span>Existing privacy professionals, fresh law graduates, engineers or whoever wants to enhance his/her knowledge and to showcase their skills in their CV. Privacy Certifications</span><span style="font-size:14px;"><span style="font-size:16px;">&nbsp;always helps to boost your career prospect</span>.&nbsp;</span><br/></p><p style="text-align:left;"><span style="font-size:14px;"><br/></span></p><p style="text-align:left;"><span style="color:inherit;">The U.S. Bureau of Labor Statistics predicts that the demand for Data Privacy Professionals and information security analysts may grow by 33% from 2020 to 2030. This is faster than the average growth rate for all other occupations. Companies may seek more professionals in the field of data protection to help them manage and prevent cyber attacks.</span><font><span style="font-size:14px;"><br/></span></font></p><p style="text-align:left;"><span style="color:inherit;"><br/></span></p><p style="text-align:left;"><span style="color:inherit;font-weight:700;">I would like to divide all the Data Privacy Certifications in 2 categories :</span></p><p style="text-align:left;"><span style="color:inherit;"><span style="font-weight:900;">1. <a href="https://www.privacydoesmatter.com/blogs/post/free-data-privacy-certification" title="Free Data Privacy Certifications" target="_blank" rel="">Free Data Privacy Certifications</a> -</span> means to do these Certifications you need to study the given study material and then complete the assessment. The certification body will provide you an online certificate based on your performance.</span></p><p style="text-align:left;"><span style="color:inherit;"><span style="font-weight:900;">2. <a href="https://www.privacydoesmatter.com/blogs/post/all-paid-privacy-certificates" title="Paid&nbsp;Data Privacy Certifications" target="_blank" rel="">Paid</a>&nbsp;<a href="https://www.privacydoesmatter.com/blogs/post/all-paid-privacy-certificates" title="Paid&nbsp;Data Privacy Certifications" target="_blank" rel="">Data Privacy Certifications</a>-</span> You might have to pay the fees for some or all of the following items for the certification to the </span>certification<span style="color:inherit;">&nbsp;body:</span></p><ul><ul><li style="text-align:left;"><span style="color:inherit;text-align:center;">membership</span></li><li style="text-align:left;"><span style="color:inherit;text-align:center;">study material</span></li><li style="text-align:left;"><span style="color:inherit;text-align:center;">training</span></li><li style="text-align:left;"><span style="color:inherit;text-align:center;">examination</span></li><li style="text-align:left;"><span style="color:inherit;text-align:center;">certification maintenance&nbsp;</span></li></ul></ul></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 01 Dec 2024 04:50:00 +0000</pubDate></item><item><title><![CDATA[Paid Privacy Certificates]]></title><link>https://www.privacydoesmatter.com/blogs/post/all-paid-privacy-certificates</link><description><![CDATA[<img align="left" hspace="5" src="https://www.privacydoesmatter.com/images/PrivacyDoesMatter-Certificate-pic.png"/>Privacy certifications or compliance standards often relate to specific regulations, such as the European Union's General Data Protection Regulation ( ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_Es__TSwwSwuZ1ssepwjz0A" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_DemQJXRQSeunTm-HwOKj0Q" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_JVlyqZ-FQe-3-BRKRDTVeg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_5ET9haDcShq4H-mhSLV3zg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_5ET9haDcShq4H-mhSLV3zg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p style="color:inherit;">Privacy certifications or compliance standards often relate to specific regulations, such as the European Union's General Data Protection Regulation (GDPR), U.S. privacy laws and regulations, Canadian information privacy laws etc. Organizations can achieve compliance with these regulations by implementing the required privacy practices and safeguards, and to demonstrate their compliance with the privacy regulations they need the SME in those regulations and that can be you. </p><p style="color:inherit;">Keep in mind that the privacy landscape is continually evolving, and it's crucial to stay up to date with the latest regulations and best practices in your jurisdiction. To show your capabilities towards privacy you need to take a globally recognized certification.</p><p><span style="color:inherit;">If you're interested in privacy certifications, you should look into the specific privacy regulations that apply to your situation. Following organizations offer privacy-related certifications </span><span style="color:rgb(48, 4, 234);">but you need to pay membership and/or Examination Fees to give the exam and also then keep the certifications up to date.</span></p><p style="color:inherit;"><span style="color:inherit;">1.&nbsp; The most reputed and well accepted certifications in Privacy word are managed by&nbsp;</span><a href="https://iapp.org/" title="International Association of Privacy Professionals (IAPP)" target="_blank" rel="">International Association of Privacy Professionals (IAPP)</a>. Followings are their Certifications:<span style="color:inherit;">&nbsp;</span></p><ul style="color:inherit;"><li><a href="https://iapp.org/certify/cipp/">Certified Information Privacy Professional (CIPP)</a>&nbsp;</li><li><a href="https://iapp.org/certify/cipm/">Certified Information Privacy Manager (CIPM)</a></li><li><a href="https://iapp.org/certify/cipt/">Certified Information Privacy Technologists (CIPT)</a></li><li><a href="https://iapp.org/pls/">Privacy Law Specialist (PLS)</a></li><li><a href="https://iapp.org/certify/fip/">Fellow of Information Privacy (FIP)</a></li><li><a href="https://iapp.org/certify/aigp/" title="Artificial Intelligence Governance Professional (AIGP)" target="_blank" rel="">Artificial Intelligence Governance Professional (AIGP)</a></li></ul><p style="color:inherit;"><br/></p><p style="color:inherit;">2. <a href="https://www.dsci.in/" title="Data Security Council of India (DSCI)" target="_blank" rel="">Data Security Council of India (DSCI)</a>&nbsp;<span style="color:inherit;">&nbsp;is a not-for-profit, industry body on data protection in India, setup by NASSCOM, committed to making the cyberspace safe, secure and trusted by establishing best practices, standards and initiatives in cyber security and privacy. DSCI&nbsp;</span><span style="color:inherit;">offers some good certificate to show your competency towards the Indian Privacy law’s like&nbsp;</span></p><ul style="color:inherit;"><li><span style="color:inherit;"><a href="https://www.dsci.in/content/dsci-certified-data-protection-officer-dcdpo" title="DSCI Certified Data Protection Officer (DCDPO)" target="_blank" rel="">DSCI Certified Data Protection Officer (DCDPO)</a></span></li><li><a href="https://www.dsci.in/content/dsci-certified-privacy-professional-dcpp">DSCI Certified Privacy Professional (DCPP©)</a><span style="color:inherit;">,</span></li><li><a href="https://www.dsci.in/content/dsci-certified-privacy-lead-assessor-dcpla">DSCI Certified Privacy Lead Assessor (DCPLA©)</a></li><li><a href="https://www.dsci.in/content/dsci-certified-security-solution-engineer-dcsse">DSCI Certified Security Solution Engineer (DCSSE)</a></li><li><span style="color:inherit;"><a href="https://www.dsci.in/content/dsci-certified-ai-governance-professional-dcagp" title="DSCI Certiﬁed AI Governance Professional (DCAGP)&nbsp;" rel="">DSCI Certiﬁed AI Governance Professional (DCAGP)</a>&nbsp;</span></li></ul><p style="color:inherit;"><span style="color:inherit;"><br/></span></p><p style="color:inherit;"><span style="color:inherit;">These certifications demonstrate a strong understanding of privacy principles and can be beneficial for professionals in the privacy field.</span></p><p style="color:inherit;"></p><p style="color:inherit;">You may want to learn about the privacy certifications which are available free of cost, visit our blog <strong><span style="font-size:20px;"><a href="https://www.privacydoesmatter.com/blogs/post/free-data-privacy-certification" rel="">&quot;</a></span></strong><strong><span style="font-size:20px;"><a href="https://www.privacydoesmatter.com/blogs/post/free-data-privacy-certification" rel="">Free Data Privacy Certification&quot;</a></span></strong></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 22 Oct 2023 11:45:43 +0000</pubDate></item><item><title><![CDATA[Effect of AI in Data Privacy]]></title><link>https://www.privacydoesmatter.com/blogs/post/Effect-of-AI-in-Data-Privacy</link><description><![CDATA[<img align="left" hspace="5" src="https://www.privacydoesmatter.com/PrivacyDoesMatter AI-data-privacy.jpg"/> The increasing use of artificial intelligence (AI) technology is having a significant impact on data privacy. AI relies hea ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_Uk0KxrUlRQmrlz3Yl1eomg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_sigLOBU5T--ZBOxqmHaCzA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_K11g03fIQDGgPAp80UKNgw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_EnnVGHbYR36amaLVYTrjGA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_EnnVGHbYR36amaLVYTrjGA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">Contributed by&nbsp; - Om Parkash Dahiya</h2></div>
<div data-element-id="elm_UrN25cvsLbSg_N_qeNXYHQ" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_UrN25cvsLbSg_N_qeNXYHQ"] .zpimage-container figure img { width: 1200px !important ; height: 250.00px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_UrN25cvsLbSg_N_qeNXYHQ"] .zpimage-container figure img { width:1200px ; height:250.00px ; } } @media (max-width: 767px) { [data-element-id="elm_UrN25cvsLbSg_N_qeNXYHQ"] .zpimage-container figure img { width:1200px ; height:250.00px ; } } [data-element-id="elm_UrN25cvsLbSg_N_qeNXYHQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-custom zpimage-tablet-fallback-custom zpimage-mobile-fallback-custom hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/PrivacyDoesMatter%20AI-data-privacy.jpg" width="1200" height="250.00" loading="lazy" size="custom" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_VSj8fv-rSD-K12TKkiujCw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_VSj8fv-rSD-K12TKkiujCw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><p style="text-align:left;">The increasing use of artificial intelligence (AI) technology is having a significant impact on data privacy. AI relies heavily on data to learn and improve, and this often involves processing and analyzing large amounts of personal data, which can raise concerns about privacy.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">One of the main concerns with AI and data privacy is that personal data may be used without an individual's consent or knowledge. As AI algorithms become more sophisticated, they can identify patterns and make predictions about individuals based on their personal data, including sensitive information such as health records, financial information, and personal preferences.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">In addition, the use of AI in decision-making can also pose a threat to data privacy. For example, if an AI algorithm is used to determine creditworthiness or job prospects, individuals may not have access to the data used to make these decisions, making it difficult for them to challenge or dispute the outcome.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Furthermore, the storage and processing of personal data by AI systems can also create security risks. Hackers may attempt to access the data for nefarious purposes, and if a breach occurs, it could lead to the exposure of sensitive information.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">To address these concerns, regulations such as the General Data Protection Regulation (GDPR) in the European Union and the California Consumer Privacy Act (CCPA) in the United States have been put in place to protect individuals' data privacy. These regulations require organizations to be transparent about their use of personal data and to obtain explicit consent from individuals before collecting and processing their data. They also give individuals the right to access and control their personal data.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Overall, AI has the potential to greatly enhance our lives, but it is important to consider the impact it may have on data privacy and to take steps to mitigate any potential risks.</p><p>&nbsp;</p><p><span style="font-size:26px;font-weight:700;color:inherit;">Examples of Misuse of AI in Data Privacy</span><br></p><p>&nbsp;</p><p style="text-align:left;">There have been several instances of misuse of AI in data privacy, some of which have led to significant public concern and scrutiny. Here are a few examples:</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Facial recognition: Facial recognition technology uses AI to identify individuals from images or videos. However, this technology has been used without individuals' consent or knowledge in some instances, such as in surveillance programs, leading to concerns about privacy violations and potential misuse of data.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Algorithmic bias: AI algorithms can be biased if they are trained on biased data or designed with biased assumptions. This can lead to discrimination against certain groups, such as women or people of color, in areas like job recruitment, lending decisions, and criminal justice.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Predictive policing: AI algorithms have been used to predict crime hotspots and to make policing decisions, but there are concerns that these algorithms could be biased against certain communities or individuals, leading to discriminatory practices.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Health data breaches: With the increasing use of AI in healthcare, there is a risk that personal health data could be compromised in a data breach or used without consent. This could lead to sensitive information being exposed or used for malicious purposes.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Overall, these examples demonstrate the importance of responsible AI use and the need for regulations and ethical guidelines to protect individuals' data privacy.</p></div>
</div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 09 Apr 2023 09:34:56 +0000</pubDate></item><item><title><![CDATA[Impact of Privacy on Marketing]]></title><link>https://www.privacydoesmatter.com/blogs/post/Impact-of-Privacy-on-Marketing</link><description><![CDATA[<img align="left" hspace="5" src="https://www.privacydoesmatter.com/video2.PNG"/>Webinar -Impact of Privacy on Marketing Speakers : Kapil Dev Tyagi - PrivacyDoesMatter Urshila Pandit - Tsaaro #PrivacyDoesMatter]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_djAgRyEFSYyL4UOc8LpRKw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_MMbCP-EDTtaaEdEqLttdkg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_F2xRsfeyRo-FqswfWxmBuw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_loQcAdkGS0ecnCSAnRGOFw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_loQcAdkGS0ecnCSAnRGOFw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><h2>Privacy Webinar - Kapil Dev Tyagi and Urshila Pandit</h2></div></h2></div>
<div data-element-id="elm_zwpfO4ENHMJhrnS-sreaWg" data-element-type="video" class="zpelement zpelem-video "><style type="text/css"> [data-element-id="elm_zwpfO4ENHMJhrnS-sreaWg"].zpelem-video{ border-radius:1px; } </style><div class="zpvideo-container zpiframe-align-center zpiframe-mobile-align- zpiframe-tablet-align-"><iframe class="zpvideo " width="560" height="315" src="//www.youtube.com/embed/NKFVkj-OZrY" frameborder="0" allowfullscreen></iframe></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Sat, 28 Jan 2023 18:31:01 +0000</pubDate></item><item><title><![CDATA[Everyday AI and Privacy]]></title><link>https://www.privacydoesmatter.com/blogs/post/privacy-learning-at-youtube</link><description><![CDATA[<img align="left" hspace="5" src="https://www.privacydoesmatter.com/PrivacyDoesMatter-Kapil Webinar 2.PNG"/>Privacy Webinar - Everyday AI and Privacy Speakers : Kapil Dev Tyagi -PrivacyDoesMatter Akarsh Singh - CEO Tsaaro]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_-vJlxpTuSVmFjs1IggLbEw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm__vuT-4N2QJSMFftEFVlWPg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_-j5bDbE_QO-Batq112kQVQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_-j5bDbE_QO-Batq112kQVQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_qzyqzleSToihZSxV35-uHQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_qzyqzleSToihZSxV35-uHQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="background-color:rgb(243, 243, 206);">Privacy Webinar - Kapil Dev Tyagi and Akarsh Singh</span></h2></div>
<div data-element-id="elm_1JrO1dD2Q_esE-VxDFTxYQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_1JrO1dD2Q_esE-VxDFTxYQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><br></p></div>
</div><div data-element-id="elm_wASxLU9I4TbPep1NRzDBxg" data-element-type="video" class="zpelement zpelem-video "><style type="text/css"> [data-element-id="elm_wASxLU9I4TbPep1NRzDBxg"].zpelem-video{ border-radius:1px; } </style><div class="zpvideo-container zpiframe-align-center zpiframe-mobile-align- zpiframe-tablet-align-"><iframe class="zpvideo " width="560" height="315" src="//www.youtube.com/embed/D8NETCBLAJo" frameborder="0" allowfullscreen></iframe></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Sat, 28 Jan 2023 18:10:37 +0000</pubDate></item><item><title><![CDATA[Tips for Strong Password - Dos and Don'ts]]></title><link>https://www.privacydoesmatter.com/blogs/post/tips-for-strong-password-dos-and-don-ts</link><description><![CDATA[<img align="left" hspace="5" src="https://www.privacydoesmatter.com/images/password-2781614_960_720.jpg"/>In todays digital world security and privacy beaches are on the rise, password is your first line of defense. It is essential to keep your password st ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_rBHqQEKaRQKpNaa-FBDCRw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_GMopkvLfTkGHVDNXK7u9xQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_voyU4YmwTcSu_bK8yHZZig" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_voyU4YmwTcSu_bK8yHZZig"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_x5EY1LjYT12lr_RumOCmqQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_x5EY1LjYT12lr_RumOCmqQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:rgb(234, 119, 4);">Best Practices to Secure Your Password</span></h2></div>
<div data-element-id="elm_BCNUBzIiixk-H_WVJ2hlXg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_BCNUBzIiixk-H_WVJ2hlXg"] .zpimage-container figure img { width: 1200px !important ; height: 250px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_BCNUBzIiixk-H_WVJ2hlXg"] .zpimage-container figure img { width:1200px ; height:250px ; } } @media (max-width: 767px) { [data-element-id="elm_BCNUBzIiixk-H_WVJ2hlXg"] .zpimage-container figure img { width:1200px ; height:250px ; } } [data-element-id="elm_BCNUBzIiixk-H_WVJ2hlXg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-custom zpimage-tablet-fallback-custom zpimage-mobile-fallback-custom hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/password-2781614_640.jpg" width="1200" height="250" loading="lazy" size="custom" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_P3iTD7-QQAWzIReNIzyGQg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_P3iTD7-QQAWzIReNIzyGQg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div><p style="color:inherit;text-align:left;">In todays digital world security and privacy beaches are on the rise, password is your first line of defense. It is essential to keep your password strong. </p><p style="color:inherit;text-align:left;">&nbsp;</p><p style="color:inherit;text-align:left;">Following are some Dos and Don’t , which might help you in Password Management and minimize the risk of your data leing compromised.</p><p style="color:inherit;text-align:left;">&nbsp;</p><p style="text-align:left;"><b style="color:rgb(4, 234, 4);">Do</b></p><ul style="color:inherit;"><li style="text-align:left;">Do create complex and unique passwords for every account.</li><li style="text-align:left;">Do use two-factor authentication (2FA) as an extra layer of security.</li><li style="text-align:left;">Do make your passwords at least 8 characters long. Try for a minimum of 12-15 characters.</li><li style="text-align:left;">Use a combination of upper and lower case alphabets, numbers and special characters.</li><li style="text-align:left;">If you must store passwords somewhere else, know the risks.</li><li style="text-align:left;">Always logout after you are done.</li><li style="text-align:left;">Avoid Autosave</li></ul><p style="color:inherit;text-align:left;">&nbsp;</p><p style="color:inherit;text-align:left;">&nbsp;</p><p style="text-align:left;"><b style="color:rgb(234, 119, 4);">Don’t</b></p><ul style="color:inherit;"><li style="text-align:left;">Don’t use the most popular password &nbsp;“password,” or any combination of it. “P@ssword!”, “P@55w0rd”</li><li style="text-align:left;">Don’t use personal information of your family members including you, like name, birth date, anniversary date pincode etc.</li><li style="text-align:left;">Don’t use passwords as small, &nbsp;single word like king, morning, vegetable.</li><li style="text-align:left;">Don’t place special characters (@, !, 0, etc.) only at the beginning or the end.</li><li style="text-align:left;">Don’t share your passwords with anyone else.</li><li style="text-align:left;">Don’t keep one single password for all your accounts.</li><li style="text-align:left;">Don’t write your password on paper or write the ATM pin behind the ATM card..</li><li style="text-align:left;">Don’t use common keyboard patterns like qwertyui, or obvious patterns like 111111, abcd1234 or 09876543.</li><li style="text-align:left;">Don’t reuse the same password.</li></ul><p style="color:inherit;">&nbsp;</p></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 24 Mar 2022 03:48:06 +0000</pubDate></item><item><title><![CDATA[Why Your Privacy Does Matter]]></title><link>https://www.privacydoesmatter.com/blogs/post/why-your-privacy-does-matter</link><description><![CDATA[<img align="left" hspace="5" src="https://www.privacydoesmatter.com/PrivacyDoesMatter.png"/>Privacy is about respecting individuals.&nbsp; Privacy is about giving power to choose what we share and with whom we share. Privacy is a fundamental hu ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_4ih3qlrdSk-9rgtHKdOyPw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_EGt8GJLtRZm-E0dZME0QDg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_qPJYZFwoRkyaRl8JMBqNMA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_xrfvnzj1QGy3KGfZwkRZsw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_xrfvnzj1QGy3KGfZwkRZsw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><br></p><p>Privacy is about respecting individuals.&nbsp;</p><p>Privacy is about giving power to choose what we share and with whom we share.</p><p>Privacy is a fundamental human right in many jurisdictions.</p><p><br></p><p><span style="color:inherit;">Famous British mathematician and data science entrepreneur, Clive Humby , coined the phrase “Data is The New Oil” in 2006.<span style="font-size:16px;"> In today's&nbsp;</span></span><span style="font-size:16px;color:inherit;">digital economy, Data, especially, Personal Data is more valuable than ever.</span><br></p><p><span style="font-size:16px;color:inherit;"><br></span></p><p style="text-align:justify;"><span style="color:inherit;"><span style="color:inherit;">Data privacy means how every piece of Personal Information should be handled based on its relative importance. For example, you might only share&nbsp; your name and mobile number in process of giving some feedback at a restaurant. But to apply for a car loan, you will be sharing much more personal information with the Bank. Here Data Privacy is important as individuals</span><span style="color:inherit;">&nbsp;have to trust that their personal data will be handled with care by the organization or people that they are sharing it.&nbsp;</span><span style="font-size:16px;color:inherit;text-align:center;">Therefore organizations need to learn how to process personal information while protecting privacy preferences of individuals.</span><br></span></p><p style="text-align:left;"><span style="color:inherit;"><span style="font-size:16px;color:inherit;text-align:center;"><br></span></span></p><p style="text-align:left;"><span style="color:inherit;"><span style="font-size:16px;color:inherit;text-align:center;">Worldwide the governments are recognising the importance of privacy of every individual human being and this has resulted in numerous data privacy regulations and laws.</span></span></p><div style="color:inherit;"><div style="color:inherit;"><h2 style="text-align:left;margin-bottom:20px;font-weight:700;"><span style="font-size:20px;">How do I protect my privacy?</span></h2><div style="text-align:left;"><span style="font-size:16px;">An individual may improve the protection of his/her privacy by using many protection steps like:</span></div><div><div style="color:inherit;"><div style="color:inherit;"><ul><li style="text-align:left;"><span style="font-size:12pt;">Read the Terms and Conditions of the services you are going to opt for.</span></li><li style="text-align:left;"><span style="font-size:12pt;">Think before you share ANY Personal Information (is the sharing even necessary?)</span></li><li style="text-align:left;"><span style="font-size:12pt;">Secure your devices by using anti - virus software and update regularly.</span></li><li style="text-align:left;"><span style="font-size:12pt;">Take care when giving permission to any site to put cookies on your devices.</span></li><li style="text-align:left;"><span style="font-size:12pt;">Review your settings regularly and adjust sharing as per your wish.</span></li><li style="text-align:left;"><span style="font-size:12pt;">Enable &quot;Do Not Track&quot; in the web browsers you are using like Chrome, Microsoft Edge etc.</span></li><li style="text-align:left;"><span style="font-size:12pt;"><span style="font-size:7pt;">&nbsp;</span>Practice &quot;Safe Browsing&quot;, beware of clicking on links of bogus, fraud and unsafe websites.</span></li></ul></div></div></div></div></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 12 Jan 2022 08:37:00 +0000</pubDate></item></channel></rss>