Excerpt from Securitysystemsnews Article, Published on Jun 17, 2025.
Compliance is undergoing a major transformation as new state-level data privacy laws take effect across the U.S., leaving businesses with increasingly complex regulations to navigate. Without a unified federal framework, states like Delaware, Iowa, Nebraska, and New Hampshire have already enacted new privacy laws in 2025, with Tennessee and Minnesota following in July. For companies handling consumer data, this patchwork of regulations means heightened compliance risks. Simon Randall, CEO of Pimloc, warns that compliance is no longer just a concern for tech giants. “Insurers, retailers, health care providers, and especially organizations reliant on video and audio data are now under pressure. Even mid-sized and local businesses handling biometric data, health records, or location information must prioritize compliance,” he stated.
In the new regulatory climate, manual approaches won’t cut it. Compliance must be built into data practices from the ground up. Randall advocates for privacy-first technologies that enable protection at scale. “You need automation to keep up. Relying solely on policies or manual redaction just won’t suffice anymore,” he emphasized. Maurice Uenuma, VP & GM at Blancco, echoes this sentiment, highlighting the role of data sanitization in compliance. “Sanitizing data not only helps manage sensitive information more securely but also reduces the risk of leaks by eliminating redundant data,” he said. “When data is truly erased, it can’t be stolen, making it one of the few definitive security measures for compliance.”
Both experts agree that compliance demands a proactive, integrated approach. “Security and privacy can no longer function independently,” Randall said. “Compliance now requires full lifecycle data protection. It’s a boardroom priority that determines how trusted a business will be in the eyes of consumers and regulators alike.” As 2025 progresses, compliance will continue to define the future of cybersecurity and data management.
To delve deeper into this topic, please read the full article Securitysystemsnews.




