Mitigating the Risk In this series, we’ve explored the legal and operational risks of piggy-back tags. We examined Equifax’s 2017 data breach caused by a supply chain attack and looked...
Continue ReadingMitigating the Risk In this series, we’ve explored the legal and operational risks of piggy-back tags. We examined Equifax’s 2017 data breach caused by a supply chain attack and looked...
Continue ReadingThe U.S. Data Privacy Legal Landscape is Highly Fragmented The US data privacy legal landscape is a patchwork of federal and state laws. At the federal level, data privacy laws vary by...
Continue ReadingWhat Are Tags? Every business website has “Tags” – they are the pixel or code mechanisms that facilitate the collection and sharing of data between your website and the services you rely...
Continue ReadingCopyright © 2021 Blue Triangle Technologies, Inc. All Rights Reserved. Privacy Policy | Terms of Use