Resources, guides, and how tos

Whether you're re-architecting your privacy infrastructure, looking to work more strategically across privacy teams, or get exposed to industry best practice—we've got you covered.

An image of a two pages in a report

Featured research

Report: The state of consent management

With modern privacy laws like Europe’s GDPR and California’s CCPA, companies must inform or secure consent before they can begin tracking users. Our latest research looks at how business leaders today are balancing their website's UX and consent requirements, and compliant tracking rates across organizations.

Access the report

How-to guides, interactive tools, and more.

Expert advice and resources for better data privacy.

PDF Guide—Building a future-proof privacy request system

Advice on what's involved in architecting a CCPA/GDPR privacy request system.

An image of a blue calculator on a yellow background.

Privacy Request Cost Calculator

Understand the costs of your organization's privacy request program.

A composite image of paper laptops and binders on a blue background.

Privacy Tech Stack, Decoded

PDF Guide—The 11 key engineering concepts to know for your data privacy program

A composite image of a website with the text 'California Privacy Rights Act'

Full text: California Privacy Rights Act

Interactive—Explore markups, highlight key sections, and easily navigate California's Privacy Rights Act.

An image of the cover and subsequent pages of Transcend's Data Privacy Feedback Loop.

Data Privacy Feedback Loop

Research—Findings from a study of 1,000 Americans and their attitudes to data privacy, data rights, and brand trust.

An image of a man sitting at a desk thinking.

Avoiding Dark Patterns: Critical Tools for Privacy Legal Counsel

CPO Magazine Op-Ed—How can privacy professionals counsel their organizations away from this common practice?

A screenshot of two pages from a book.

97 Things Every Information Security Professional Should Know

Book chapter—Transcend's Ben Brook on taking back control of privacy and security in third-party environments.

Tech talks

Privacy_Infra() by Transcend

Privacy_Infra() is a virtual event hosted by Transcend, where privacy engineers from leading brands and non-profits share their latest work.

A photo of the New York Times office with a taxi passing in front.

How The New York Times built a technical privacy system

Learn how the publisher built a technical system to honor user’s privacy rights.

How LinkedIn developed a differentially private data analytics API

Staff Software Engineer Ryan Rogers discusses how they built an audience engagement API that leverages differential privacy to protect user information.

Watch back: April 2021 event

With privacy tech talks from The New York Times and Vax.Codes

See more talks
Two boxes with the words "Privacy XFN" in it.

Email newsletter

Transcend's Privacy XFN Newsletter

Curating the must reads from the intersection of data privacy and tech, for working smarter cross-functionally. Delivered to your inbox every Thursday morning.

Subscribe now

From the Transcend Blog

Perspectives on privacy + data privacy infrastructure

An image of a map of California, with the words CCPA + GPC next to it.

Businesses must support Global Privacy Control

California’s Attorney General has clarified that businesses must honor the Global Privacy Control (GPC) browser signal.

An image of chess pieces falling off a chess board.

Defeating cookie banners

How we solved the core technical problem of user tracking consent.

An image of a person standing at a painted crossroads on a road.

Why poor privacy kills brand trust

Consumers are becoming increasingly vocal on their desire for more data respect.

An image of a blue dollar sign on a pink background.

The 5 hidden costs of your company's privacy request approach

There are a number of hidden costs unavoidable when humans are involved in processing privacy requests.

Building a great privacy program without a big tech budget

4 strategic learnings to help build user-centric data privacy without burning out your team.

A composite illustrated image showing a woman sitting on a laptop, using a phone.

Building for the future of data rights

We believe granting your users modern data rights today is good business, plain and simple.

Read more perspectives
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.