{"version":"1.0","provider_name":"","provider_url":"https:\/\/isigmaonline.org\/downstreamdata","author_name":"glentine","author_url":"https:\/\/isigmaonline.org\/downstreamdata\/author\/glentine\/","title":"Why Downstream Data is Different","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"4NL97xAobs\"><a href=\"https:\/\/isigmaonline.org\/downstreamdata\/home\/why-downstream-data-is-different\/\">Why Downstream Data is Different<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/isigmaonline.org\/downstreamdata\/home\/why-downstream-data-is-different\/embed\/#?secret=4NL97xAobs\" width=\"600\" height=\"338\" title=\"&#8220;Why Downstream Data is Different&#8221; &#8212; \" data-secret=\"4NL97xAobs\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/isigmaonline.org\/downstreamdata\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"How is Downstream Data Coverage Different?\u00a0 Not all professional liability policies are created\u00a0equal.\u00a0\u00a0Technology\u00a0is moving fast, and so is the increase in\u00a0financial and regulatory compliance liability\u00a0around data protection.\u00a0\u00a0 Professional Liability coverage written\u00a0specific\u00a0to\u00a0Data Destruction companies\u00a0and the risks they face.\u00a0 Exclusive Program\u00a0&#8211; Coverage is offered only to organizations who are NAID AAA certified, meeting the requirements of all [&hellip;]"}