[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"author_20352":3,"$fui3YiulfMOixEYZ7g9dehKmTXdiBcb3iYCmWobQRVnI":11},{"id":4,"displayName":5,"username":6,"familyName":6,"givenName":6,"bio":6,"dateCreation":7,"blogUrl":6,"color":8,"avatarUrl":9,"inTenant":10},20352,"Leïla Sayssa",null,"0001-01-01T00:00:00","#87753B","https://static.dastra.eu/tenant-3/avatar/20352/TDYeY3C8Rz1lLE/dpo-avatar-h01-150.png",false,{"items":12,"total":271,"size":272,"page":273},[13,51,74,97,124,147,171,194,217,240],{"title":14,"nbDownloads":15,"excerpt":6,"lang":16,"url":17,"intro":18,"featured":10,"state":19,"author":20,"authorId":4,"datePublication":22,"dateCreation":23,"dateUpdate":24,"mainCategory":25,"categories":41,"metaDatas":47,"imageUrl":48,"imageThumbUrls":49,"id":50},"Understanding the NIST AI RMF (AI Risk Management Framework)",0,"en","understanding-the-nist-ai-risk-management-framework","Understand the NIST AI Risk Management Framework designed to assist organisations in the responsible design, development and deployment of AI technologies. ","Published",{"id":4,"displayName":5,"avatarUrl":9,"bio":6,"blogUrl":6,"color":6,"userId":4,"creationDate":21},"2025-03-03T11:08:22","2026-03-24T09:23:00","2026-03-24T09:23:02.5609409","2026-03-24T13:31:02.1769992",{"id":26,"name":27,"description":28,"url":29,"color":30,"parentId":6,"count":6,"imageUrl":6,"parent":6,"order":15,"translations":31},2,"Blog","A list of curated articles provided by the community","blog","#28449a",[32,35,38],{"lang":33,"name":27,"description":34},"fr","Une liste d'articles rédigés par la communauté",{"lang":36,"name":27,"description":37},"es","Una lista de artículos escritos por la comunidad",{"lang":39,"name":27,"description":40},"de","Eine Liste von Artikeln, die von der Community verfasst wurden",[42],{"id":26,"name":27,"description":28,"url":29,"color":30,"parentId":6,"count":6,"imageUrl":6,"parent":6,"order":15,"translations":43},[44,45,46],{"lang":33,"name":27,"description":34},{"lang":36,"name":27,"description":37},{"lang":39,"name":27,"description":40},[],"https://static.dastra.eu/content/d569eabe-51a0-456c-b874-1e91160f50cd/visuel-article-30-original.jpg",[],59940,{"title":52,"nbDownloads":15,"excerpt":6,"lang":16,"url":53,"intro":54,"featured":10,"state":19,"author":55,"authorId":4,"datePublication":56,"dateCreation":57,"dateUpdate":58,"mainCategory":59,"categories":64,"metaDatas":70,"imageUrl":71,"imageThumbUrls":72,"id":73},"Understanding AI Risks: types, challenges & management strategy","understanding-ai-risks-types-challenges-management-strategy","AI-related risks explained.",{"id":4,"displayName":5,"avatarUrl":9,"bio":6,"blogUrl":6,"color":6,"userId":4,"creationDate":21},"2026-03-18T14:49:00","2026-03-24T14:49:21.4817034","2026-03-24T15:01:43.9175814",{"id":26,"name":27,"description":28,"url":29,"color":30,"parentId":6,"count":6,"imageUrl":6,"parent":6,"order":15,"translations":60},[61,62,63],{"lang":33,"name":27,"description":34},{"lang":36,"name":27,"description":37},{"lang":39,"name":27,"description":40},[65],{"id":26,"name":27,"description":28,"url":29,"color":30,"parentId":6,"count":6,"imageUrl":6,"parent":6,"order":15,"translations":66},[67,68,69],{"lang":33,"name":27,"description":34},{"lang":36,"name":27,"description":37},{"lang":39,"name":27,"description":40},[],"https://static.dastra.eu/content/d8f9c47f-99ef-42cb-9f7d-6139f078172b/visuel-article-32-original.jpg",[],59944,{"title":75,"nbDownloads":15,"excerpt":6,"lang":16,"url":76,"intro":77,"featured":10,"state":19,"author":78,"authorId":4,"datePublication":79,"dateCreation":80,"dateUpdate":81,"mainCategory":82,"categories":87,"metaDatas":93,"imageUrl":94,"imageThumbUrls":95,"id":96},"The CCPA is not the only privacy law in California","ccpa-is-not-the-only-privacy-law-in-california","One of the most common misconceptions among companies entering the California market, is treating the CCPA/CPRA as the only California privacy law. ",{"id":4,"displayName":5,"avatarUrl":9,"bio":6,"blogUrl":6,"color":6,"userId":4,"creationDate":21},"2026-03-11T13:48:00","2026-03-11T13:48:25.4683284","2026-03-11T13:55:13.4447136",{"id":26,"name":27,"description":28,"url":29,"color":30,"parentId":6,"count":6,"imageUrl":6,"parent":6,"order":15,"translations":83},[84,85,86],{"lang":33,"name":27,"description":34},{"lang":36,"name":27,"description":37},{"lang":39,"name":27,"description":40},[88],{"id":26,"name":27,"description":28,"url":29,"color":30,"parentId":6,"count":6,"imageUrl":6,"parent":6,"order":15,"translations":89},[90,91,92],{"lang":33,"name":27,"description":34},{"lang":36,"name":27,"description":37},{"lang":39,"name":27,"description":40},[],"https://static.dastra.eu/content/d5c5c47d-d60a-4a5f-973e-6ec60f4c3289/visuel-article-29-original.jpg",[],59921,{"title":98,"nbDownloads":99,"excerpt":6,"lang":16,"url":100,"intro":101,"featured":10,"state":19,"author":102,"authorId":4,"datePublication":103,"dateCreation":104,"dateUpdate":105,"mainCategory":106,"categories":111,"metaDatas":117,"imageUrl":121,"imageThumbUrls":122,"id":123},"U.S. Privacy Laws Comparison Chart [PDF]",4,"us-privacy-laws-comparaison-chart","New U.S. privacy laws are emerging every year. Our chart compares the most important state frameworks in one clear document.",{"id":4,"displayName":5,"avatarUrl":9,"bio":6,"blogUrl":6,"color":6,"userId":4,"creationDate":21},"2026-03-10T10:27:00","2026-03-10T10:27:50.9093944","2026-03-10T11:09:19.6983738",{"id":26,"name":27,"description":28,"url":29,"color":30,"parentId":6,"count":6,"imageUrl":6,"parent":6,"order":15,"translations":107},[108,109,110],{"lang":33,"name":27,"description":34},{"lang":36,"name":27,"description":37},{"lang":39,"name":27,"description":40},[112],{"id":26,"name":27,"description":28,"url":29,"color":30,"parentId":6,"count":6,"imageUrl":6,"parent":6,"order":15,"translations":113},[114,115,116],{"lang":33,"name":27,"description":34},{"lang":36,"name":27,"description":37},{"lang":39,"name":27,"description":40},[118],{"typeMetaDataId":99,"value":119,"id":120},"https://static.dastra.eu/backofficefilescontainer/73f81782-06b4-4732-a563-2553b74d58f7/US_Privacy_Laws_Comparison_Chart_2026 update.pdf",117335,"https://static.dastra.eu/content/b9dc6bd9-d609-41de-bace-ced8f00c0823/visuel-article-27-original.jpg",[],59917,{"title":125,"nbDownloads":15,"excerpt":6,"lang":16,"url":126,"intro":127,"featured":10,"state":19,"author":128,"authorId":4,"datePublication":129,"dateCreation":130,"dateUpdate":131,"mainCategory":132,"categories":137,"metaDatas":143,"imageUrl":144,"imageThumbUrls":145,"id":146},"Minnesota's Data Inventory Requirement: why this matters for every business ","minnesota-data-inventory-requirement-why-this-matters-for-every-business","Minnesota's privacy law is the first US state to explicitly require a data inventory by statute. Learn why the obligation matters for every business, even outside Minnesota.",{"id":4,"displayName":5,"avatarUrl":9,"bio":6,"blogUrl":6,"color":6,"userId":4,"creationDate":21},"2026-03-10T09:23:00","2026-03-10T09:23:29.3463239","2026-03-10T09:47:24.1085102",{"id":26,"name":27,"description":28,"url":29,"color":30,"parentId":6,"count":6,"imageUrl":6,"parent":6,"order":15,"translations":133},[134,135,136],{"lang":33,"name":27,"description":34},{"lang":36,"name":27,"description":37},{"lang":39,"name":27,"description":40},[138],{"id":26,"name":27,"description":28,"url":29,"color":30,"parentId":6,"count":6,"imageUrl":6,"parent":6,"order":15,"translations":139},[140,141,142],{"lang":33,"name":27,"description":34},{"lang":36,"name":27,"description":37},{"lang":39,"name":27,"description":40},[],"https://static.dastra.eu/content/02ea0a94-0f9a-4393-96f0-53b1cf96ec42/visuel-article-26-original.jpg",[],59916,{"title":148,"nbDownloads":15,"excerpt":149,"lang":16,"url":150,"intro":151,"featured":10,"state":19,"author":152,"authorId":4,"datePublication":153,"dateCreation":154,"dateUpdate":155,"mainCategory":156,"categories":161,"metaDatas":167,"imageUrl":168,"imageThumbUrls":169,"id":170},"The Global Privacy Control (GPC): one signal to rule them all ","A browser header that tells every website you visit not to sell your data. Here is everything you need to know about the GPC.","what-is-the-global-privacy-control-gpc-mechanism","A browser header that tells every website you visit not to sell your data. Here is everything you need to know.",{"id":4,"displayName":5,"avatarUrl":9,"bio":6,"blogUrl":6,"color":6,"userId":4,"creationDate":21},"2026-03-09T09:00:00","2026-03-05T13:30:12.8458522","2026-03-09T15:56:53.6429058",{"id":26,"name":27,"description":28,"url":29,"color":30,"parentId":6,"count":6,"imageUrl":6,"parent":6,"order":15,"translations":157},[158,159,160],{"lang":33,"name":27,"description":34},{"lang":36,"name":27,"description":37},{"lang":39,"name":27,"description":40},[162],{"id":26,"name":27,"description":28,"url":29,"color":30,"parentId":6,"count":6,"imageUrl":6,"parent":6,"order":15,"translations":163},[164,165,166],{"lang":33,"name":27,"description":34},{"lang":36,"name":27,"description":37},{"lang":39,"name":27,"description":40},[],"https://static.dastra.eu/content/1e679fcc-5962-4bb2-840e-32019a05200c/visuel-article-21-original.jpg",[],59909,{"title":172,"nbDownloads":15,"excerpt":6,"lang":16,"url":173,"intro":174,"featured":10,"state":19,"author":175,"authorId":4,"datePublication":176,"dateCreation":177,"dateUpdate":178,"mainCategory":179,"categories":184,"metaDatas":190,"imageUrl":191,"imageThumbUrls":192,"id":193},"Multi-state privacy compliance in the U.S: stop managing privacy by ZIP code","multistate-privacy-compliance-strategy","New privacy laws continue to roll out across U.S. states. The challenge is no longer purely legal, rather increasingly operational.",{"id":4,"displayName":5,"avatarUrl":9,"bio":6,"blogUrl":6,"color":6,"userId":4,"creationDate":21},"2026-03-05T13:35:00","2026-03-05T13:35:10.1111418","2026-03-09T17:35:12.1949927",{"id":26,"name":27,"description":28,"url":29,"color":30,"parentId":6,"count":6,"imageUrl":6,"parent":6,"order":15,"translations":180},[181,182,183],{"lang":33,"name":27,"description":34},{"lang":36,"name":27,"description":37},{"lang":39,"name":27,"description":40},[185],{"id":26,"name":27,"description":28,"url":29,"color":30,"parentId":6,"count":6,"imageUrl":6,"parent":6,"order":15,"translations":186},[187,188,189],{"lang":33,"name":27,"description":34},{"lang":36,"name":27,"description":37},{"lang":39,"name":27,"description":40},[],"https://static.dastra.eu/content/8fcbd896-8704-45b5-8402-b23d88576f8a/visuel-article-25-original.jpg",[],59910,{"title":195,"nbDownloads":15,"excerpt":6,"lang":16,"url":196,"intro":197,"featured":10,"state":19,"author":198,"authorId":4,"datePublication":199,"dateCreation":200,"dateUpdate":201,"mainCategory":202,"categories":207,"metaDatas":213,"imageUrl":214,"imageThumbUrls":215,"id":216},"Privacy Impact Assessments under U.S. Privacy Laws: triggers & process","privacy-impact-assessments-under-us-privacy-laws","Discover when a Privacy Impact Assessment is required under U.S. state privacy laws and how to conduct one using a practical multi-state compliance checklist.",{"id":4,"displayName":5,"avatarUrl":9,"bio":6,"blogUrl":6,"color":6,"userId":4,"creationDate":21},"2026-03-02T09:00:00","2026-03-09T13:36:25.162162","2026-04-20T14:47:23.0630508",{"id":26,"name":27,"description":28,"url":29,"color":30,"parentId":6,"count":6,"imageUrl":6,"parent":6,"order":15,"translations":203},[204,205,206],{"lang":33,"name":27,"description":34},{"lang":36,"name":27,"description":37},{"lang":39,"name":27,"description":40},[208],{"id":26,"name":27,"description":28,"url":29,"color":30,"parentId":6,"count":6,"imageUrl":6,"parent":6,"order":15,"translations":209},[210,211,212],{"lang":33,"name":27,"description":34},{"lang":36,"name":27,"description":37},{"lang":39,"name":27,"description":40},[],"https://static.dastra.eu/content/c3247ab2-5410-49bb-be50-65ec16c3ac56/visuel-article-19-original.jpg",[],59913,{"title":218,"nbDownloads":15,"excerpt":6,"lang":16,"url":219,"intro":220,"featured":10,"state":19,"author":221,"authorId":4,"datePublication":222,"dateCreation":223,"dateUpdate":224,"mainCategory":225,"categories":230,"metaDatas":236,"imageUrl":237,"imageThumbUrls":238,"id":239},"Privacy Laws: understanding the difference in EU & US approaches","privacy-laws-understanding-the-difference-in-eu-us-approaches","Learn how EU and US privacy laws differ in philosophy, enforcement, and compliance requirements. ",{"id":4,"displayName":5,"avatarUrl":9,"bio":6,"blogUrl":6,"color":6,"userId":4,"creationDate":21},"2026-02-28T09:00:00","2026-03-03T14:17:20.9580638","2026-03-10T08:59:39.4610986",{"id":26,"name":27,"description":28,"url":29,"color":30,"parentId":6,"count":6,"imageUrl":6,"parent":6,"order":15,"translations":226},[227,228,229],{"lang":33,"name":27,"description":34},{"lang":36,"name":27,"description":37},{"lang":39,"name":27,"description":40},[231],{"id":26,"name":27,"description":28,"url":29,"color":30,"parentId":6,"count":6,"imageUrl":6,"parent":6,"order":15,"translations":232},[233,234,235],{"lang":33,"name":27,"description":34},{"lang":36,"name":27,"description":37},{"lang":39,"name":27,"description":40},[],"https://static.dastra.eu/content/5aa744db-8a5a-4ccc-93db-f1e8ec35eaea/visuel-article-24-original.jpg",[],59906,{"title":241,"nbDownloads":242,"excerpt":6,"lang":16,"url":243,"intro":244,"featured":10,"state":19,"author":245,"authorId":4,"datePublication":246,"dateCreation":247,"dateUpdate":248,"mainCategory":249,"categories":256,"metaDatas":264,"imageUrl":268,"imageThumbUrls":269,"id":270},"Your Checklist to Multi-State Privacy Impact Assessments ",7,"your-checklist-to-multi-state-privacy-impact-assessment-compliance","Master multi-state Privacy Impact Assessments by downloading this checklist.",{"id":4,"displayName":5,"avatarUrl":9,"bio":6,"blogUrl":6,"color":6,"userId":4,"creationDate":21},"2026-02-23T10:07:00","2026-02-23T10:07:01.6114712","2026-02-24T15:38:38.0037058",{"id":250,"name":251,"description":6,"url":252,"color":253,"parentId":6,"count":6,"imageUrl":6,"parent":6,"order":254,"translations":255},70,"Livre blanc","white-papers","#1795d3",3,[],[257,262],{"id":26,"name":27,"description":28,"url":29,"color":30,"parentId":6,"count":6,"imageUrl":6,"parent":6,"order":15,"translations":258},[259,260,261],{"lang":33,"name":27,"description":34},{"lang":36,"name":27,"description":37},{"lang":39,"name":27,"description":40},{"id":250,"name":251,"description":6,"url":252,"color":253,"parentId":6,"count":6,"imageUrl":6,"parent":6,"order":254,"translations":263},[],[265],{"typeMetaDataId":99,"value":266,"id":267},"https://static.dastra.eu/backofficefilescontainer/6c9c6770-09f5-44d2-ac35-466a87c40426/US PIA Cross State Checklist Best Practices.pdf",117305,"https://static.dastra.eu/content/a321130b-375a-4a3f-b9d5-e9d9afea648e/visuel-article-18-original.jpg",[],59886,43,10,1]