{"id":90628,"date":"2023-08-24T10:22:31","date_gmt":"2023-08-24T15:52:31","guid":{"rendered":"https:\/\/www.whizlabs.com\/blog\/?p=90628"},"modified":"2024-04-30T17:25:50","modified_gmt":"2024-04-30T11:55:50","slug":"ensuring-privacy-microsoft-priva","status":"publish","type":"post","link":"https:\/\/www.whizlabs.com\/blog\/ensuring-privacy-microsoft-priva\/","title":{"rendered":"Ensuring Privacy with Microsoft Priva : SC-100 Certification Exam"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">In the digital age, a lot of personal information is stored online. This is a big worry for both people and businesses because they have to follow rules about privacy.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Certain laws like the European Union\u2019s General Data Protection Regulation GDPR compliance and the California Consumer Privacy Act CCPA requirements don&#8217;t just apply in one place \u2013 they affect how companies everywhere keep personal data. These laws also give people the power to control how their data is gathered.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Just like we care about <strong>cybersecurity<\/strong> and being cautious even when there&#8217;s a breach risk, it&#8217;s smart to be careful about privacy too. This means making sure privacy is built into everything from the start. Using <\/span><span style=\"font-weight: 400;\">Microsoft Priva<\/span><span style=\"font-weight: 400;\"> is a way to keep up these high standards for privacy.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This blog talks about what is Microsoft Priva, its capabilities, and how it helps to preserve privacy in a detailed manner.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Let\u2019s dig in!<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">If you want to clear the <a href=\"https:\/\/www.whizlabs.com\/microsoft-azure-certification-sc-100\/\" target=\"_blank\" rel=\"noopener\">SC-100 certification<\/a>, then enriching your knowledge in Microsoft Priva can help you out.<\/span><\/i><\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_76 ez-toc-wrap-left counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #ea7e02;color:#ea7e02\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #ea7e02;color:#ea7e02\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.whizlabs.com\/blog\/ensuring-privacy-microsoft-priva\/#What_is_Microsoft_Priva\" >What is Microsoft Priva?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.whizlabs.com\/blog\/ensuring-privacy-microsoft-priva\/#Why_Privacy_is_important\" >Why Privacy is important?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.whizlabs.com\/blog\/ensuring-privacy-microsoft-priva\/#How_Microsoft_Priva_help_in_Addressing_Privacy_Challenges\" >How Microsoft Priva help in Addressing Privacy Challenges?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.whizlabs.com\/blog\/ensuring-privacy-microsoft-priva\/#Capabilities_of_Microsoft_Priva\" >Capabilities of Microsoft Priva<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.whizlabs.com\/blog\/ensuring-privacy-microsoft-priva\/#FAQs\" >FAQs<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.whizlabs.com\/blog\/ensuring-privacy-microsoft-priva\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h3><span class=\"ez-toc-section\" id=\"What_is_Microsoft_Priva\"><\/span><span style=\"font-weight: 400;\">What is Microsoft Priva?<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Microsoft Priva<\/span><span style=\"font-weight: 400;\"> is one of the features introduced in the <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/products\/microsoft-priva\/?sort-by=newest-oldest&amp;date=any\" target=\"_blank\" rel=\"nofollow noopener\">Microsoft Compliance Centre<\/a> for data privacy compliance.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Companies are dealing with a lot of messy data that keeps growing. It&#8217;s so much that people can&#8217;t keep up. Figuring out which data is private and understanding the risks of personal data that companies store and share is just the beginning.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Employees need to be trained to handle data properly and to find problems in how things are done now. They also need to respond quickly to requests for data. But with so much data, doing things by hand is slow and can lead to mistakes. Microsoft Priva helps with this. It makes data privacy easier to manage.<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Why_Privacy_is_important\"><\/span><span style=\"font-weight: 400;\">Why Privacy is important?<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Changes in regulations concerning the collection and utilization of personal data by businesses have been significant throughout 2021. According to a Gartner report, these regulations will continue evolving into 2023. This will lead to multiple privacy laws that organizations need to decipher to ensure and demonstrate compliance.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Businesses are required to classify their data on a large scale, addressing several key questions:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">What kinds of personal data are in your records (like PII, PHI, PCI)?<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Where is this data located?<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">What level of personal security is necessary?<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Who can access it?<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">How will the data be employed?<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Do you have permission to use this data?<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">This challenge is especially pronounced for companies operating in North America. A significant number of states have either enacted or proposed legislation, which collectively encompasses over 85% of the U.S. population.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While regulations are expanding in a fragmented manner, many companies still rely on very traditional methods to manage privacy requirements. In terms of privacy risk management for unstructured data, the focus typically includes:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Concentrating on locating personal data for record-keeping purposes.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Depending largely on end users to identify personal data and demonstrate adherence to privacy rules.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Heavily relying on surveys and task assignments to compile one-time inventories or fulfill data subject requests.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">To earn and uphold the trust of customers and employees, and to conform to privacy regulations without impeding efficiency, organizations will need to make privacy an integral part of their business operations.<\/span><\/p>\n<blockquote><p>Also Read : Preparation Guide on <a href=\"https:\/\/www.whizlabs.com\/blog\/study-guide-microsoft-sc-100-exam\/\" target=\"_blank\" rel=\"noopener\">SC-100:Microsoft Cybersecurity Architect<\/a><\/p><\/blockquote>\n<h3><span class=\"ez-toc-section\" id=\"How_Microsoft_Priva_help_in_Addressing_Privacy_Challenges\"><\/span><span style=\"font-weight: 400;\">How Microsoft Priva help in Addressing Privacy Challenges?<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-90639\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/08\/how-microsoft-priva-helps-in-addressing-privacy-chalenges-01-2-1-1.webp\" alt=\"data privacy challenges\" width=\"1376\" height=\"1434\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/08\/how-microsoft-priva-helps-in-addressing-privacy-chalenges-01-2-1-1.webp 1376w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/08\/how-microsoft-priva-helps-in-addressing-privacy-chalenges-01-2-1-1-288x300.webp 288w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/08\/how-microsoft-priva-helps-in-addressing-privacy-chalenges-01-2-1-1-983x1024.webp 983w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/08\/how-microsoft-priva-helps-in-addressing-privacy-chalenges-01-2-1-1-768x800.webp 768w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/08\/how-microsoft-priva-helps-in-addressing-privacy-chalenges-01-2-1-1-150x156.webp 150w\" sizes=\"(max-width: 1376px) 100vw, 1376px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft Priva is found in the Microsoft 365 compliance center and offers various ways to deal with this challenge:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Policies: <\/b><span style=\"font-weight: 400;\">With Microsoft Priva, you can set up three types of privacy risk management rules. These rules can use ready-made templates for different types of sensitive information, like credit card data or addresses, which are made to follow specific privacy laws like GDPR and CCPA. You can also create your own rules to make sure you cover what you need. These rules help with:<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Data transfer Policy:<\/b><span style=\"font-weight: 400;\"> This rule spots when personal data goes from one place to another, like from one department to another. It suggests what to do to keep that data safe, and you can change it to fit where the data is and what kind of data it is.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Data minimization: <\/b><span style=\"font-weight: 400;\">This rule finds personal data that isn&#8217;t being used and doesn&#8217;t have any labels to say how long it should be kept.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Data overexposure: <\/b><span style=\"font-weight: 400;\">This rule catches risks when personal data is shared too much, with people who shouldn&#8217;t see it, or when it&#8217;s not being used.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Overview Dashboard:<\/b><span style=\"font-weight: 400;\"> The dashboard gives you a clear look at trends and useful information about personal data, privacy rules when the rules are followed or broken, and requests from people about their data. You can see the different types of personal data, where it&#8217;s kept (like in email or shared files), and where it&#8217;s located in.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Data Profile: <\/b><span style=\"font-weight: 400;\">This tool helps Privacy administrators check data that fits the rules. It lets them review matched content, where it&#8217;s saved, and who has access to it. This works like a tool you might already know called Content Explorer.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Subject Rights Requests:<\/b><span style=\"font-weight: 400;\"> Privacy Management makes it easier to answer requests from people about their data. It finds their data in Microsoft 365, even when there are other rules like legal holds. It also lets you add notes and hide some parts of the data if needed.<\/span><\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"Capabilities_of_Microsoft_Priva\"><\/span><span style=\"font-weight: 400;\">Capabilities of Microsoft Priva<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">The service offered by Microsoft Priva has been categorized into two major solutions such as:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Priva Privacy Risk Management \u2013<\/b><span style=\"font-weight: 400;\"> It is a template-based solution that contains sensitive data to frame the privacy risk management policies to find and resolve the privacy risks which include transfer of data, exposure of information, training data handling workers to work smartly, and data minimization methods.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Priva Subject Rights &#8211;<\/b><span style=\"font-weight: 400;\"> It simplifies and automates the process of handling data access requests from individuals and managing the related case workflows.<\/span><\/li>\n<\/ol>\n<h4><span style=\"font-weight: 400;\">Priva Privacy Risk Management<\/span><\/h4>\n<p><span style=\"font-weight: 400;\">This aspect of Priva strengthens privacy and lowers risks associated with unprotected information by bringing visibility to an organization&#8217;s data and policies. Administrators now have a far better understanding of how personal data is stored and moved inside their company due to this solution. They can also understand any problems with their data streams and trends through key analytics and insights.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You can identify privacy concerns using the tools of privacy risk management, and you can set up procedures and policies for addressing them. Users are explicitly informed of problems and specified advice on how to solve them. They are now better equipped to manage risk mitigation with better assurance and precision.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It empowers them to address privacy problems they might not have been aware of such as personal data being shared too much, data that doesn&#8217;t need to be kept, or when data moves between different parts of the company or to other places. You can create your own rules to handle these situations.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Once you&#8217;ve set up your rules, the system will keep checking the data regularly. If there are any issues, it will let you know through alerts and suggest how to fix them.<\/span><\/p>\n<h4><span style=\"font-weight: 400;\">Priva Subject Rights<\/span><\/h4>\n<p><span style=\"font-weight: 400;\">This offers more support on the operational side of things. It uses automation and tools to handle data requests. This saves employees time and prevents mistakes. When privacy laws let people ask to see or control the personal data that companies have, those requests have to be met. But with lots of unorganized data, finding and giving the right information can take a long time.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Priva Subject Rights Requests have adaptable steps that can make this process automatic. A simple search for someone&#8217;s information will gather the data let you see it and make reports much faster. These steps also allow colleagues to work together and finish these tasks more efficiently.<\/span><\/p>\n<div class=\"ast-oembed-container \" style=\"height: 100%;\"><iframe title=\"All you need to know about SC-100: Microsoft Cybersecurity Architect Certification Exam | Whizlabs\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/99Rkh8SnzJI?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div>\n<h3><span class=\"ez-toc-section\" id=\"FAQs\"><\/span><span style=\"font-weight: 400;\">FAQs<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><b>What are the capabilities and benefits of Microsoft Priva?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Priva offers tools that let you spot and safeguard against privacy dangers like collecting too much data, risky data transfers, and sharing more data than needed. Get a clear view of where personal data is stored and how it moves.<\/span><\/p>\n<p><b>What are Microsoft Priva Subject Rights Requests?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The Microsoft Priva Subject Rights Requests solution aims to simplify and reduce the time required to address data subject inquiries, easing the complexity involved.<\/span><\/p>\n<p><b>What advantages does Microsoft Purview offer?\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft Purview delivers a cohesive data governance solution for overseeing and controlling your data across on-premises, multi-cloud, and software-as-a-service (SaaS) platforms. Effortlessly generate a complete and current overview of your data environment through automated data detection, labeling sensitive information, and tracing data lineage from start to finish.<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span><span style=\"font-weight: 400;\">Conclusion<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Hope this article wraps up everything about Microsoft Priva, the challenges overcome by Microsoft Priva, its features, and why privacy is important.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Preserving data privacy is much required for the reputational firm and thus going for Microsoft Priva can help you out. To experience the real-time settings with Microsoft Priva, just explore our <\/span><a href=\"https:\/\/www.whizlabs.com\/labs\/library\"><span style=\"font-weight: 400;\">hands-on labs<\/span><\/a><span style=\"font-weight: 400;\"> and <\/span><a href=\"https:\/\/www.whizlabs.com\/labs\/sandbox\"><span style=\"font-weight: 400;\">sandboxes<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you have any questions about this blog post, feel free to comment to us!<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the digital age, a lot of personal information is stored online. This is a big worry for both people and businesses because they have to follow rules about privacy.\u00a0 Certain laws like the European Union\u2019s General Data Protection Regulation GDPR compliance and the California Consumer Privacy Act CCPA requirements don&#8217;t just apply in one place \u2013 they affect how companies everywhere keep personal data. These laws also give people the power to control how their data is gathered.\u00a0 Just like we care about cybersecurity and being cautious even when there&#8217;s a breach risk, it&#8217;s smart to be careful about [&hellip;]<\/p>\n","protected":false},"author":389,"featured_media":90632,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[3343],"tags":[1080,5050],"class_list":["post-90628","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-microsoft-azure-certification","tag-sc-100"],"uagb_featured_image_src":{"full":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/08\/ensuring-privacy-with-Microsoft-priva-01-scaled.webp",2560,1440,false],"thumbnail":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/08\/ensuring-privacy-with-Microsoft-priva-01-150x150.webp",150,150,true],"medium":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/08\/ensuring-privacy-with-Microsoft-priva-01-300x169.webp",300,169,true],"medium_large":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/08\/ensuring-privacy-with-Microsoft-priva-01-768x432.webp",768,432,true],"large":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/08\/ensuring-privacy-with-Microsoft-priva-01-1024x576.webp",1024,576,true],"1536x1536":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/08\/ensuring-privacy-with-Microsoft-priva-01-1536x864.webp",1536,864,true],"2048x2048":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/08\/ensuring-privacy-with-Microsoft-priva-01-2048x1152.webp",2048,1152,true],"profile_24":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/08\/ensuring-privacy-with-Microsoft-priva-01-scaled.webp",24,14,false],"profile_48":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/08\/ensuring-privacy-with-Microsoft-priva-01-scaled.webp",48,27,false],"profile_96":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/08\/ensuring-privacy-with-Microsoft-priva-01-scaled.webp",96,54,false],"profile_150":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/08\/ensuring-privacy-with-Microsoft-priva-01-scaled.webp",150,84,false],"profile_300":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/08\/ensuring-privacy-with-Microsoft-priva-01-scaled.webp",300,169,false],"tptn_thumbnail":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/08\/ensuring-privacy-with-Microsoft-priva-01-250x250.webp",250,250,true],"web-stories-poster-portrait":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/08\/ensuring-privacy-with-Microsoft-priva-01-640x853.webp",640,853,true],"web-stories-publisher-logo":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/08\/ensuring-privacy-with-Microsoft-priva-01-96x96.webp",96,96,true],"web-stories-thumbnail":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/08\/ensuring-privacy-with-Microsoft-priva-01-150x84.webp",150,84,true]},"uagb_author_info":{"display_name":"Karthikeyani Velusamy","author_link":"https:\/\/www.whizlabs.com\/blog\/author\/karthikeyani-velusamy\/"},"uagb_comment_info":0,"uagb_excerpt":"In the digital age, a lot of personal information is stored online. This is a big worry for both people and businesses because they have to follow rules about privacy.\u00a0 Certain laws like the European Union\u2019s General Data Protection Regulation GDPR compliance and the California Consumer Privacy Act CCPA requirements don&#8217;t just apply in one&hellip;","_links":{"self":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/90628","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/users\/389"}],"replies":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/comments?post=90628"}],"version-history":[{"count":9,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/90628\/revisions"}],"predecessor-version":[{"id":90667,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/90628\/revisions\/90667"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/media\/90632"}],"wp:attachment":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/media?parent=90628"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/categories?post=90628"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/tags?post=90628"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}