The increasing use of AI and ML is raising new questions around privacy, ethics, and regulation. Workday’s Jim Shaughnessy talked with Amie Stepanovich from the University of Colorado, Boulder to learn more.
Following the Court of Justice of the European Union’s (CJEU) decision in the “Schrems II” case, some wondered what it would mean for cross-border data transfers and whether they remained valid. Upon more analysis, they remain intact—with some caveats.
Today, an update regarding the validity of data transfer mechanisms was announced by the Court of Justice of the European Union (CJEU) as a result of what has become known as the “Schrems II” case. To provide clarity on what this ruling means, and what to expect from Workday in our ongoing commitment to data privacy protections, we're sharing this brief FAQ.
Discover what Workday has been doing in the area of privacy protections—including industry collaborations, global compliance, and ethical AI—and learn more about our perspectives around privacy in a new paper.
We're proud to announce Workday is the first company to be certified by TrustArc to the APEC Privacy Recognition for Processors (PRP) System. The PRP System is intended to strengthen privacy protections and trust across the Asia-Pacific region.
With GDPR fast approaching, data protection is top of mind for Workday’s customers. Today we're sharing that we’ve obtained approval for global Binding Corporate Rules for Processors (BCRs) that focus on safeguarding customer data. Read more from Workday Chief Privacy Officer Barbara Cosgrove.
As Workday’s chief trust officer, Josh DeFigueiredo's responsibility is to build and grow the relationship of trust between Workday and its customers. DeFigueiredo shares how Workday continues to explore ways to help our customers keep their data safe, including our recently announced partnership with Duo Security around multi-factor authentication.
In this episode, Josh DeFigueiredo, Workday’s chief trust officer, talks with host David Clarke about why companies should evaluate on-premise and cloud technology providers differently, and how to build and maintain a “culture of security” within your organization.