Last Updated: September 23, 2021
When the IAPP released the inaugural “Privacy Tech Vendor Report” in 2017, the privacy technology marketplace was on the precipice of a major evolutionary shift. The EU General Data Protection Regulation was a little more than a year away from becoming law, and early tech vendors in the marketplace were only just starting to find their footing. The IAPP identified 44 vendors for the first report. The number was always expected to go up, but the scale of its growth curve was then unknown.
Since 2017, the privacy landscape underwent a metamorphosis. The emergence of the California Consumer Privacy Act, Brazilian General Data Protection Law and other privacy laws around the world have forced organizations to adhere to a new array of compliance requirements, and in response, the demand for privacy tech grew exponentially.
The IAPP is now releasing its fifth annual “Privacy Tech Vendor Report.” Each year, the report has chronicled the rise of privacy tech vendors in the marketplace, and this year is no different. The IAPP has identified 365 privacy tech vendors in 2021, all of which can be found in the directory section of this report.
Privacy tech has undergone a paradigm shift over the past five years, affecting everything from the development of privacy tech tools to the attitude toward privacy tech vendors. The five-year mark of the report’s existence is perhaps the proper time to look at how far the privacy tech market has gone and where it will go in the future.
GUIDELINES FOR SUBMISSION
To apply to be listed in the next publication of the IAPP “Tech Vendor Report,” please review these guideline submissions and send an email to IAPP Managing Editor Michelle Clarke, at firstname.lastname@example.org.
Include your company name, whether you are a new or existing vendor (in the report), year founded, number of employees, and whether you are a privately held or publicly traded company.
For the location of your company’s headquarters, please submit both the city and country you are located. For leadership, please separate each person’s name and title by a comma, and each person by a semicolon. Please limit your submissions to three. For example: Person A, CEO; Person B, Chief Financial Officer; Person C, Chief Technology Officer.
When filling out the description of your offerings, please limit it to 100 words and avoid using any marketing lingo. The IAPP reserves the right to edit all copy that does not adhere to this request.
Please include a high-resolution file of your logo and screenshot of the tech solution, then upload each individually with your company name in each file name. For the screenshot of the solution, dashboards and other interfaces are highly recommended. The only formats the IAPP will accept are .jpeg, .png, .tiff, .eps and .pdf.
As mentioned above, the IAPP will now accept submissions for vendors offering data subject request solutions, as well as our existing categories. If your solution fits any definition, please check off the corresponding box in the form.
PRIVACY TECH VENDOR CATEGORIES
Assessment managers tend to automate different functions of a privacy program, such as operationalizing privacy impact assessments, locating risk gaps, demonstrating compliance and helping privacy officers scale complex tasks requiring spreadsheets, data entry and reporting.
Consent managers help organizations collect, track, demonstrate and manage users’ consent.
Data mapping solutions can come in manual or automated form and help organizations determine data flows throughout the enterprise.
Data subject request solutions help organizations facilitate inquires made by individuals who wish to exercise their data rights. These can include requests involving the right to access, rectification, portability and erasure.
Incident response solutions help companies respond to a data breach incident by providing information to relevant stakeholders of what was compromised and what notification obligations must be met.
Privacy information managers provide organizations with extensive and often-automated information on the latest privacy laws around the world.
Website scanning is a service that primarily checks a client’s website to determine what cookies, beacons and other trackers are embedded to help ensure compliance with various cookie laws and other regulations.
Activity monitoring helps organizations determine who has access to personal data and when it is being accessed or processed. These solutions often come with controls to help manage activity.
Data discovery tends to be an automated technology that helps organizations determine and classify what kind of personal data they possess to help manage privacy risk and compliance.
Deidentification/pseudonymity solutions help data scientists, researchers and other stakeholders derive value from datasets without compromising the privacy of the data subjects in a given dataset.
Enterprise communications are solutions that help organizations communicate internally in a secure way to avoid embarrassing or dangerous leaks of employee communications.
Finally, vendors must put a working contact person and email address at the bottom of the form.
The IAPP “Privacy Tech Vendor Report” is one of the industry’s most widely read guides to privacy-related technology products. For advertising information, availability and pricing, please contact the sales team at email@example.com.
Thank you very much,
IAPP PublicationsClick to view full guidelines