SlideShare a Scribd company logo
© 2024 TrustArc Inc. Proprietary and Confidential Information.
Unified Trust Center for Privacy,
Security, Compliance, and Legal
2
Legal Disclaimer
The information provided during this webinar does
not, and is not intended to, constitute legal advice.
Instead, all information, content, and materials presented during
this webinar are for general informational purposes only.
3
Speakers
Cathleen Doyel
Deputy General Counsel
TrustArc
Ian Runyon
VP, Product
TrustArc
Agenda
● What is “Trust” in 2024?
● Why Do Trust and Legal Centers Matter?
● Building trust with TrustArc Trust Center
5
The State of Trust in 2024
Enforcement and customers demands for transparency necessitate continual updates to
privacy policies, trust and safety practices, especially regarding AI usage
In today's digital landscape, trust serves as the bedrock of customer engagement and loyalty.
Trust increases the likelihood of purchases by 91% (PWC)
43% of customers report that a positive privacy experience can increase brand preference (Google/IPSOS)
72% say knowing a companyʼs AI policy matters before purchasing (McKinsey)
SEC and FTC fines, like the $400k against Delphia for AI misrepresentations, highlight the importance of transparency
(FTC v. Delphia)
Privacy, security, and trust are the default
Ongoing regulatory developments also require transparency, accountability, etc.
By the end of 2024, 75% of the worldʼs population will have its personal data covered by modern privacy
regulations (Gartner)
6
Being a privacy/legal leader is hard and stressful
Integrating privacy by design
principles into product
development Never-ending policy updates are a
logistical nightmare
Managing vendor risk
assessments and conducting
PIAs & DPIAs is time consuming Building and maintaining a
robust privacy program across
jurisdictions
Managing reputational and
legal risks related to privacy
incidents
Rapidly changing global laws
intensify compliance challenges
7
Trust centers are born out of…
Service
agreements
Terms of
use
Accessibility
policy
PenTest
report
PCI DSS
Cookie
policies
Privacy
policies
DPAs
Sub-processor
agreements
SOC2 report
Encryption
policy
AI
disclosures
?
?
8
It can take months to create a microsite to host your content
Identify the
purpose, goals,
and required
content/feature
s of the Trust
Center.
Determine key
departments
involved: Privacy,
Legal, Security,
Marketing, IT,
Sales,
Compliance,
C-suite.
Collect detailed
requirements for
content, policies,
disclosures, and
technical
specifications
from each
department.
Plan
architecture,
content
structure, user
interface, and
experience.
Draft, publish,
and maintain
policies, legal
terms, privacy,
and security
notices.
Execute
front-end and
back-end
development.
Ensure proper
categorization
and accessibility
of all trust
content.
Officially release
the Trust Center to
stakeholders and
users.
Still depend on
marketing and IT
for ongoing
support, updates,
and enhancements
based on feedback
and regulatory
changes.
Week
1-3
Week
4-7
Week
8-10
Week
11-14
Week
15-19
Week
20-25
Week
26+
Scoping Stakeholder
Identification
Requirements
gathering
Design &
development
planning
Content
creation &
curation
Development
& testing
Launch and
maintenance
9
…and requires the active participation of teams across the business
Week
1-3
Week
4-7
Week
8-10
Week
11-14
Week
15-19
Week
20-25
Week
26+
Scoping Stakeholder
Identification
Requirements
gathering
Design &
development
planning
Content
creation &
curation
Development
& testing
Launch and
maintenance
Privacy
Marketing
Legal
Security
IT
Web
10
← Cathleen
(and privacy professionals
everywhere)
11
OVERWHELMED
with constantly fielding the
same legal and security
requests from Sales and wish
there was an easier way to
manage?
TIRED
of the logistical nightmare when
it comes to updating policies,
subprocessors, or just simple
text on the legal, privacy, and
security section of your
organization's website?
DONʼT HAVE THE TIME
to effectively advocate, lead,
and project manage internal
efforts (e.g. marketing, web
development, IT) to build out a
unified Trust Center?
12
Build customer trust
in days,
not months
Unify scattered trust
information into a one
stop shop (privacy,
legal, security,
compliance)
Reduce legal and
regulatory risk with
ability to update
policies, terms, and
disclosures instantly.
Speed up the sales
cycle with private and
public document
sharing
✓ ✓ ✓ ✓
13
14
Introducing Trust Center by TrustArc
A unified no-code Trust Center streamlines your efforts with legal
disclosures, while showcasing your safety practices,
accountability, and transparency-building trust.
Say goodbye to scattered information,
hello to a one stop trust solution.
No coding required!
Reduce time to compliance
Eliminate 2-6 week delays on routine updates for policies,
terms, disclosures, or sub-processor adjustments.
Save time and costs
Remove bottlenecks and create efficiency, saving 34%+ of
privacy, legal, security, and compliance teamsʼ time with
updates. Eliminate pure-play web development and
maintenance costs of ~$15,000-$30,000.
Save pre-sale time
Make information readily available for pre-sales, RFP, trust
building and due diligence, and enable private document
sharing for technical measures, SOC reports, and more.
Reduce legal and regulatory risk
With user-friendly privacy policies that are easy and quick to
keep up-to-date, you can reduce non-compliance and avoid
hefty fines (such as a recent $400k fine by SEC for misleading
statements about AI that were not updated in time).
Security
Availability
Privacy
Legal
15
Modern Trust Center, Modern Experience
No-Code Admin View Published View
Easy configuration with no coding
required
● Go live in days, and update in minutes
● Fully optimized for mobile and web
● Leverage default formats for displaying
privacy policies and subprocessor
disclosures.
● Easily customize content and visuals
(pages, font, colors, images, buttons, etc.)
with just a few clicks
● Enable public or private-facing
documents in a single click
● Part of your single TrustArc experience
Simplify policy and legal
management
● Easily draft, publish, preview, and
maintain up-to-date policies and legal
terms (e.g., Terms of Service, Data
Processing Addendum, etc.)
● Leverage version history
● Use pre-built templates for ease of
subprocessor disclosures
● Make timely updates to disclosure and
compliance information
16
Showcase organizational
commitment to trust and safety
Centralize and be transparent with
your security reports, privacy and
security certifications, attestations
and more in one easy-to-find place.
Build trust and shorten sales cycles
Enable efficient public and private
document sharing
Expedite sales cycles with a self-service
portal to request and access public (SOC 2
report) or private (Pentest report)
documents, saving time for buyers,
sellers, and vendors
Real-time updates to subscribers
Allow users to subscribe to Trust Center
updates. When youʼve updated a policy or
sub-processor, go the extra mile to allow
end users to stay current - demonstrating
commitment to privacy and security
matters.
Offer real-time product status
information
Offer centralized transparency by
linking to your existing product status
and system availability pages,
ensuring users are always informed as
part of Service Level Agreements.
17
Centralize privacy requests for site visitors
Manage Cookie Preferences
Manage Marketing Communication
Preferences
Do not share or sell my information
18
Achieve balance
Risk
Exposure
➔ Legal and Regulatory Actions
(fines, non-compliance, contractual commitments)
➔ Money
➔ Work
➔ Time
➔ Real-time updates
➔ Efficiency
➔ Transparency
➔ Accountability
Consumer
Trust
19
Trust is an business accelerator
9/10
people say they would
buy more from a
company that gained
their trust (pwc).
43%
of customers say
providing a positive
privacy experience can
increase brand
preference
(Google/IPSOS).
72%
of respondents say that
knowing a companyʼs AI
policy is important
before making a
purchase (McKinsey).
Customers who trust you, buy from you.
20
Thank You!

More Related Content

Similar to TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, and Legal

How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023
Search Engine Journal
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
EY
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Doeren Mayhew
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
Career Communications Group
 
Escrow Presentation
Escrow PresentationEscrow Presentation
Escrow Presentation
lucydavidson
 

Similar to TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, and Legal (20)

How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023
 
Institute for the entrepreneur v1r3
Institute for the entrepreneur v1r3Institute for the entrepreneur v1r3
Institute for the entrepreneur v1r3
 
Navigating the SOC 2 Certification Maze: What You Need to Know
Navigating the SOC 2 Certification Maze: What You Need to KnowNavigating the SOC 2 Certification Maze: What You Need to Know
Navigating the SOC 2 Certification Maze: What You Need to Know
 
Demystifying SOC 2 Certification: Enhancing Trust in Data Security
Demystifying SOC 2 Certification: Enhancing Trust in Data SecurityDemystifying SOC 2 Certification: Enhancing Trust in Data Security
Demystifying SOC 2 Certification: Enhancing Trust in Data Security
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
ThingsCon: Trustable Tech mark (26 Sept 2018)
ThingsCon: Trustable Tech mark (26 Sept 2018)ThingsCon: Trustable Tech mark (26 Sept 2018)
ThingsCon: Trustable Tech mark (26 Sept 2018)
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
 
Michael Josephs
Michael JosephsMichael Josephs
Michael Josephs
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
 
Why should I do SOC2?
Why should I do SOC2?Why should I do SOC2?
Why should I do SOC2?
 
2016 01-05 csr css non-confidential slide deck
2016 01-05 csr  css non-confidential slide deck2016 01-05 csr  css non-confidential slide deck
2016 01-05 csr css non-confidential slide deck
 
ThingsCon: Trustable Tech Mark (10 Oct 2018)
ThingsCon: Trustable Tech Mark (10 Oct 2018)ThingsCon: Trustable Tech Mark (10 Oct 2018)
ThingsCon: Trustable Tech Mark (10 Oct 2018)
 
Escrow Presentation
Escrow PresentationEscrow Presentation
Escrow Presentation
 
CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...
CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...
CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...
 
Privacera Databricks CCPA Webinar Feb 2020
Privacera Databricks CCPA Webinar Feb 2020Privacera Databricks CCPA Webinar Feb 2020
Privacera Databricks CCPA Webinar Feb 2020
 
CIS 2015- User-centric Privacy of Identity- Jenn Behrens
CIS 2015- User-centric Privacy of Identity- Jenn BehrensCIS 2015- User-centric Privacy of Identity- Jenn Behrens
CIS 2015- User-centric Privacy of Identity- Jenn Behrens
 
Creating Trust for the Internet of Things
Creating Trust for the Internet of ThingsCreating Trust for the Internet of Things
Creating Trust for the Internet of Things
 
Escrow Presentation2010
Escrow Presentation2010Escrow Presentation2010
Escrow Presentation2010
 

More from TrustArc

TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
TrustArc
 

More from TrustArc (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
 
TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI Innovations
 
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
 
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
 
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
 
Nymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 States
 
CBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceCBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy Compliance
 
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfEverything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
 
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
 
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsPrivacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
 
Building Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsBuilding Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy Certifications
 
The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...
 
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
 
Artificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceArtificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI Governance
 
How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023
 
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act:  Using Consumer Data and Maintaining TrustThe Ultimate Balancing Act:  Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust
 

Recently uploaded

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 

Recently uploaded (20)

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, and Legal

  • 1. © 2024 TrustArc Inc. Proprietary and Confidential Information. Unified Trust Center for Privacy, Security, Compliance, and Legal
  • 2. 2 Legal Disclaimer The information provided during this webinar does not, and is not intended to, constitute legal advice. Instead, all information, content, and materials presented during this webinar are for general informational purposes only.
  • 3. 3 Speakers Cathleen Doyel Deputy General Counsel TrustArc Ian Runyon VP, Product TrustArc
  • 4. Agenda ● What is “Trust” in 2024? ● Why Do Trust and Legal Centers Matter? ● Building trust with TrustArc Trust Center
  • 5. 5 The State of Trust in 2024 Enforcement and customers demands for transparency necessitate continual updates to privacy policies, trust and safety practices, especially regarding AI usage In today's digital landscape, trust serves as the bedrock of customer engagement and loyalty. Trust increases the likelihood of purchases by 91% (PWC) 43% of customers report that a positive privacy experience can increase brand preference (Google/IPSOS) 72% say knowing a companyʼs AI policy matters before purchasing (McKinsey) SEC and FTC fines, like the $400k against Delphia for AI misrepresentations, highlight the importance of transparency (FTC v. Delphia) Privacy, security, and trust are the default Ongoing regulatory developments also require transparency, accountability, etc. By the end of 2024, 75% of the worldʼs population will have its personal data covered by modern privacy regulations (Gartner)
  • 6. 6 Being a privacy/legal leader is hard and stressful Integrating privacy by design principles into product development Never-ending policy updates are a logistical nightmare Managing vendor risk assessments and conducting PIAs & DPIAs is time consuming Building and maintaining a robust privacy program across jurisdictions Managing reputational and legal risks related to privacy incidents Rapidly changing global laws intensify compliance challenges
  • 7. 7 Trust centers are born out of… Service agreements Terms of use Accessibility policy PenTest report PCI DSS Cookie policies Privacy policies DPAs Sub-processor agreements SOC2 report Encryption policy AI disclosures ? ?
  • 8. 8 It can take months to create a microsite to host your content Identify the purpose, goals, and required content/feature s of the Trust Center. Determine key departments involved: Privacy, Legal, Security, Marketing, IT, Sales, Compliance, C-suite. Collect detailed requirements for content, policies, disclosures, and technical specifications from each department. Plan architecture, content structure, user interface, and experience. Draft, publish, and maintain policies, legal terms, privacy, and security notices. Execute front-end and back-end development. Ensure proper categorization and accessibility of all trust content. Officially release the Trust Center to stakeholders and users. Still depend on marketing and IT for ongoing support, updates, and enhancements based on feedback and regulatory changes. Week 1-3 Week 4-7 Week 8-10 Week 11-14 Week 15-19 Week 20-25 Week 26+ Scoping Stakeholder Identification Requirements gathering Design & development planning Content creation & curation Development & testing Launch and maintenance
  • 9. 9 …and requires the active participation of teams across the business Week 1-3 Week 4-7 Week 8-10 Week 11-14 Week 15-19 Week 20-25 Week 26+ Scoping Stakeholder Identification Requirements gathering Design & development planning Content creation & curation Development & testing Launch and maintenance Privacy Marketing Legal Security IT Web
  • 10. 10 ← Cathleen (and privacy professionals everywhere)
  • 11. 11 OVERWHELMED with constantly fielding the same legal and security requests from Sales and wish there was an easier way to manage? TIRED of the logistical nightmare when it comes to updating policies, subprocessors, or just simple text on the legal, privacy, and security section of your organization's website? DONʼT HAVE THE TIME to effectively advocate, lead, and project manage internal efforts (e.g. marketing, web development, IT) to build out a unified Trust Center?
  • 12. 12 Build customer trust in days, not months Unify scattered trust information into a one stop shop (privacy, legal, security, compliance) Reduce legal and regulatory risk with ability to update policies, terms, and disclosures instantly. Speed up the sales cycle with private and public document sharing ✓ ✓ ✓ ✓
  • 13. 13
  • 14. 14 Introducing Trust Center by TrustArc A unified no-code Trust Center streamlines your efforts with legal disclosures, while showcasing your safety practices, accountability, and transparency-building trust. Say goodbye to scattered information, hello to a one stop trust solution. No coding required! Reduce time to compliance Eliminate 2-6 week delays on routine updates for policies, terms, disclosures, or sub-processor adjustments. Save time and costs Remove bottlenecks and create efficiency, saving 34%+ of privacy, legal, security, and compliance teamsʼ time with updates. Eliminate pure-play web development and maintenance costs of ~$15,000-$30,000. Save pre-sale time Make information readily available for pre-sales, RFP, trust building and due diligence, and enable private document sharing for technical measures, SOC reports, and more. Reduce legal and regulatory risk With user-friendly privacy policies that are easy and quick to keep up-to-date, you can reduce non-compliance and avoid hefty fines (such as a recent $400k fine by SEC for misleading statements about AI that were not updated in time). Security Availability Privacy Legal
  • 15. 15 Modern Trust Center, Modern Experience No-Code Admin View Published View Easy configuration with no coding required ● Go live in days, and update in minutes ● Fully optimized for mobile and web ● Leverage default formats for displaying privacy policies and subprocessor disclosures. ● Easily customize content and visuals (pages, font, colors, images, buttons, etc.) with just a few clicks ● Enable public or private-facing documents in a single click ● Part of your single TrustArc experience Simplify policy and legal management ● Easily draft, publish, preview, and maintain up-to-date policies and legal terms (e.g., Terms of Service, Data Processing Addendum, etc.) ● Leverage version history ● Use pre-built templates for ease of subprocessor disclosures ● Make timely updates to disclosure and compliance information
  • 16. 16 Showcase organizational commitment to trust and safety Centralize and be transparent with your security reports, privacy and security certifications, attestations and more in one easy-to-find place. Build trust and shorten sales cycles Enable efficient public and private document sharing Expedite sales cycles with a self-service portal to request and access public (SOC 2 report) or private (Pentest report) documents, saving time for buyers, sellers, and vendors Real-time updates to subscribers Allow users to subscribe to Trust Center updates. When youʼve updated a policy or sub-processor, go the extra mile to allow end users to stay current - demonstrating commitment to privacy and security matters. Offer real-time product status information Offer centralized transparency by linking to your existing product status and system availability pages, ensuring users are always informed as part of Service Level Agreements.
  • 17. 17 Centralize privacy requests for site visitors Manage Cookie Preferences Manage Marketing Communication Preferences Do not share or sell my information
  • 18. 18 Achieve balance Risk Exposure ➔ Legal and Regulatory Actions (fines, non-compliance, contractual commitments) ➔ Money ➔ Work ➔ Time ➔ Real-time updates ➔ Efficiency ➔ Transparency ➔ Accountability Consumer Trust
  • 19. 19 Trust is an business accelerator 9/10 people say they would buy more from a company that gained their trust (pwc). 43% of customers say providing a positive privacy experience can increase brand preference (Google/IPSOS). 72% of respondents say that knowing a companyʼs AI policy is important before making a purchase (McKinsey). Customers who trust you, buy from you.