{"id":4333,"date":"2023-07-11T09:20:00","date_gmt":"2023-07-11T08:20:00","guid":{"rendered":"https:\/\/www.calligo.io\/insights\/\/"},"modified":"2023-11-03T12:52:16","modified_gmt":"2023-11-03T12:52:16","slug":"data-privacy-rosetta-stone-ebook","status":"publish","type":"post","link":"https:\/\/www.calligo.io\/insights\/resource-library\/data-privacy-rosetta-stone-ebook\/","title":{"rendered":"The Data Privacy Rosetta Stone | eBook"},"content":{"rendered":"\n\n\n\n\n\n\n<section id=\"\" class=\"block-content-image  theme--light   pad-bottom--3  \">\n\t<div class=\"container\">\n\t\t<div class=\"row block-content-image-inner flex_row\">\n\n\t\t\t<div class=\"col-12 col-lg-5\">\n\t\t\t\t\n\t\t\t\t<div class=\"block-content-image__heading\" data-aos=\"fade-up\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t<div class=\"block-content-image__copy\" data-aos=\"fade-up\">\n\t\t\t\t\t\t<p>The Data Privacy Rosetta Stone explores the symbiotic relationship between the <a href=\"https:\/\/www.calligo.io\/services\/data-strategy\/\">Privacy<\/a>, IT and information security teams inside a business.<\/p>\n<p>For any relationship to flourish, there needs to be openness and mutual understanding \u2014 in essence,<strong> a common language<\/strong>.<\/p>\n<p>In this ebook, we help CISOs and CIOs build relationships with Privacy professionals to understand them better, and to be able to communicate and collaborate better, starting with an assessment of your current relationship.<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"block-content-image__buttons\" data-aos=\"fade-up\">\n\t\t\t\t\t\t<a href=\"https:\/\/share.hsforms.com\/1A7dcl7FDQhyxSkh4wAmZhQ1pxn6\" class=\"btn btn--solid btn--primary\" target=\"_blank\" rel=\"noopener\">Download eBook<\/a>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t<div class=\"col-12 col-lg-6\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/section>\n\n\n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":34,"featured_media":4410,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[33,45],"tags":[89,90,86,83,84,51,87,88],"post_format_type":[41],"class_list":["post-4333","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-privacy","category-resource-library","tag-cio","tag-ciso","tag-compliance","tag-data-privacy","tag-data-protection","tag-data-security","tag-governance","tag-information-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Data Privacy Rosetta Stone | eBook | Calligo<\/title>\n<meta name=\"description\" content=\"The Data Privacy Rosetta Stone explores the symbiotic relationship between the Privacy, IT and information security teams inside a business.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.calligo.io\/insights\/resource-library\/data-privacy-rosetta-stone-ebook\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Data Privacy Rosetta Stone | eBook | Calligo\" \/>\n<meta property=\"og:description\" content=\"The Data Privacy Rosetta Stone explores the symbiotic relationship between the Privacy, IT and information security teams inside a business.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.calligo.io\/insights\/resource-library\/data-privacy-rosetta-stone-ebook\/\" \/>\n<meta property=\"og:site_name\" content=\"Calligo\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-11T08:20:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-03T12:52:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/07\/Rosetta-Stone.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Cynthia Hoza\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@calligocloud\" \/>\n<meta name=\"twitter:site\" content=\"@calligocloud\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cynthia Hoza\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.calligo.io\/insights\/resource-library\/data-privacy-rosetta-stone-ebook\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.calligo.io\/insights\/resource-library\/data-privacy-rosetta-stone-ebook\/\"},\"author\":{\"name\":\"Cynthia Hoza\",\"@id\":\"https:\/\/www.calligo.io\/#\/schema\/person\/3a89e8c6dff018d5a89199959070b25f\"},\"headline\":\"The Data Privacy Rosetta Stone | eBook\",\"datePublished\":\"2023-07-11T08:20:00+00:00\",\"dateModified\":\"2023-11-03T12:52:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.calligo.io\/insights\/resource-library\/data-privacy-rosetta-stone-ebook\/\"},\"wordCount\":6,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.calligo.io\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.calligo.io\/insights\/resource-library\/data-privacy-rosetta-stone-ebook\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/07\/Rosetta-Stone.png\",\"keywords\":[\"CIO\",\"CISO\",\"compliance\",\"data privacy\",\"data protection\",\"data security\",\"governance\",\"information security\"],\"articleSection\":[\"Data Privacy\",\"Resource Library\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.calligo.io\/insights\/resource-library\/data-privacy-rosetta-stone-ebook\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.calligo.io\/insights\/resource-library\/data-privacy-rosetta-stone-ebook\/\",\"url\":\"https:\/\/www.calligo.io\/insights\/resource-library\/data-privacy-rosetta-stone-ebook\/\",\"name\":\"The Data Privacy Rosetta Stone | eBook | Calligo\",\"isPartOf\":{\"@id\":\"https:\/\/www.calligo.io\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.calligo.io\/insights\/resource-library\/data-privacy-rosetta-stone-ebook\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.calligo.io\/insights\/resource-library\/data-privacy-rosetta-stone-ebook\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/07\/Rosetta-Stone.png\",\"datePublished\":\"2023-07-11T08:20:00+00:00\",\"dateModified\":\"2023-11-03T12:52:16+00:00\",\"description\":\"The Data Privacy Rosetta Stone explores the symbiotic relationship between the Privacy, IT and information security teams inside a business.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.calligo.io\/insights\/resource-library\/data-privacy-rosetta-stone-ebook\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.calligo.io\/insights\/resource-library\/data-privacy-rosetta-stone-ebook\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.calligo.io\/insights\/resource-library\/data-privacy-rosetta-stone-ebook\/#primaryimage\",\"url\":\"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/07\/Rosetta-Stone.png\",\"contentUrl\":\"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/07\/Rosetta-Stone.png\",\"width\":1200,\"height\":628,\"caption\":\"the data privacy rosetta stone\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.calligo.io\/insights\/resource-library\/data-privacy-rosetta-stone-ebook\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.calligo.io\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Data Privacy Rosetta Stone | eBook\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.calligo.io\/#website\",\"url\":\"https:\/\/www.calligo.io\/\",\"name\":\"Calligo\",\"description\":\"Building value through data\",\"publisher\":{\"@id\":\"https:\/\/www.calligo.io\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.calligo.io\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.calligo.io\/#organization\",\"name\":\"Calligo\",\"url\":\"https:\/\/www.calligo.io\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.calligo.io\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/04\/calligo-og.jpg\",\"contentUrl\":\"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/04\/calligo-og.jpg\",\"width\":1200,\"height\":630,\"caption\":\"Calligo\"},\"image\":{\"@id\":\"https:\/\/www.calligo.io\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/calligocloud\",\"https:\/\/www.linkedin.com\/company\/calligo-limited\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.calligo.io\/#\/schema\/person\/3a89e8c6dff018d5a89199959070b25f\",\"name\":\"Cynthia Hoza\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.calligo.io\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/905b41cc3a17c6a46ed078778724625e6b131732c17ff59874c3214b06b985a1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/905b41cc3a17c6a46ed078778724625e6b131732c17ff59874c3214b06b985a1?s=96&d=mm&r=g\",\"caption\":\"Cynthia Hoza\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Data Privacy Rosetta Stone | eBook | Calligo","description":"The Data Privacy Rosetta Stone explores the symbiotic relationship between the Privacy, IT and information security teams inside a business.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.calligo.io\/insights\/resource-library\/data-privacy-rosetta-stone-ebook\/","og_locale":"en_GB","og_type":"article","og_title":"The Data Privacy Rosetta Stone | eBook | Calligo","og_description":"The Data Privacy Rosetta Stone explores the symbiotic relationship between the Privacy, IT and information security teams inside a business.","og_url":"https:\/\/www.calligo.io\/insights\/resource-library\/data-privacy-rosetta-stone-ebook\/","og_site_name":"Calligo","article_published_time":"2023-07-11T08:20:00+00:00","article_modified_time":"2023-11-03T12:52:16+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/07\/Rosetta-Stone.png","type":"image\/png"}],"author":"Cynthia Hoza","twitter_card":"summary_large_image","twitter_creator":"@calligocloud","twitter_site":"@calligocloud","twitter_misc":{"Written by":"Cynthia Hoza"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.calligo.io\/insights\/resource-library\/data-privacy-rosetta-stone-ebook\/#article","isPartOf":{"@id":"https:\/\/www.calligo.io\/insights\/resource-library\/data-privacy-rosetta-stone-ebook\/"},"author":{"name":"Cynthia Hoza","@id":"https:\/\/www.calligo.io\/#\/schema\/person\/3a89e8c6dff018d5a89199959070b25f"},"headline":"The Data Privacy Rosetta Stone | eBook","datePublished":"2023-07-11T08:20:00+00:00","dateModified":"2023-11-03T12:52:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.calligo.io\/insights\/resource-library\/data-privacy-rosetta-stone-ebook\/"},"wordCount":6,"commentCount":0,"publisher":{"@id":"https:\/\/www.calligo.io\/#organization"},"image":{"@id":"https:\/\/www.calligo.io\/insights\/resource-library\/data-privacy-rosetta-stone-ebook\/#primaryimage"},"thumbnailUrl":"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/07\/Rosetta-Stone.png","keywords":["CIO","CISO","compliance","data privacy","data protection","data security","governance","information security"],"articleSection":["Data Privacy","Resource Library"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.calligo.io\/insights\/resource-library\/data-privacy-rosetta-stone-ebook\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.calligo.io\/insights\/resource-library\/data-privacy-rosetta-stone-ebook\/","url":"https:\/\/www.calligo.io\/insights\/resource-library\/data-privacy-rosetta-stone-ebook\/","name":"The Data Privacy Rosetta Stone | eBook | Calligo","isPartOf":{"@id":"https:\/\/www.calligo.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.calligo.io\/insights\/resource-library\/data-privacy-rosetta-stone-ebook\/#primaryimage"},"image":{"@id":"https:\/\/www.calligo.io\/insights\/resource-library\/data-privacy-rosetta-stone-ebook\/#primaryimage"},"thumbnailUrl":"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/07\/Rosetta-Stone.png","datePublished":"2023-07-11T08:20:00+00:00","dateModified":"2023-11-03T12:52:16+00:00","description":"The Data Privacy Rosetta Stone explores the symbiotic relationship between the Privacy, IT and information security teams inside a business.","breadcrumb":{"@id":"https:\/\/www.calligo.io\/insights\/resource-library\/data-privacy-rosetta-stone-ebook\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.calligo.io\/insights\/resource-library\/data-privacy-rosetta-stone-ebook\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.calligo.io\/insights\/resource-library\/data-privacy-rosetta-stone-ebook\/#primaryimage","url":"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/07\/Rosetta-Stone.png","contentUrl":"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/07\/Rosetta-Stone.png","width":1200,"height":628,"caption":"the data privacy rosetta stone"},{"@type":"BreadcrumbList","@id":"https:\/\/www.calligo.io\/insights\/resource-library\/data-privacy-rosetta-stone-ebook\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.calligo.io\/"},{"@type":"ListItem","position":2,"name":"The Data Privacy Rosetta Stone | eBook"}]},{"@type":"WebSite","@id":"https:\/\/www.calligo.io\/#website","url":"https:\/\/www.calligo.io\/","name":"Calligo","description":"Building value through data","publisher":{"@id":"https:\/\/www.calligo.io\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.calligo.io\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.calligo.io\/#organization","name":"Calligo","url":"https:\/\/www.calligo.io\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.calligo.io\/#\/schema\/logo\/image\/","url":"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/04\/calligo-og.jpg","contentUrl":"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/04\/calligo-og.jpg","width":1200,"height":630,"caption":"Calligo"},"image":{"@id":"https:\/\/www.calligo.io\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/calligocloud","https:\/\/www.linkedin.com\/company\/calligo-limited\/"]},{"@type":"Person","@id":"https:\/\/www.calligo.io\/#\/schema\/person\/3a89e8c6dff018d5a89199959070b25f","name":"Cynthia Hoza","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.calligo.io\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/905b41cc3a17c6a46ed078778724625e6b131732c17ff59874c3214b06b985a1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/905b41cc3a17c6a46ed078778724625e6b131732c17ff59874c3214b06b985a1?s=96&d=mm&r=g","caption":"Cynthia Hoza"}}]}},"_links":{"self":[{"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/posts\/4333","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/comments?post=4333"}],"version-history":[{"count":0,"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/posts\/4333\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/media\/4410"}],"wp:attachment":[{"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/media?parent=4333"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/categories?post=4333"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/tags?post=4333"},{"taxonomy":"post_format_type","embeddable":true,"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/post_format_type?post=4333"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}