Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Privacy/Data Protection

Welcome to the Privacy/Data Protection topic!

Collaborate, contribute, consume and create knowledge around topics such as privacy frameworks and governance (OECD), protection of data, data leaks and data communicated across borders

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
1323 Members
2 Online
12765 Visits

Community Leader



Badge: Social

Marc Vael

Marc Vael

Title: Chief Audit Executive

Badge: Energizer



Badge: Observer


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 125 total

Must be a Topic member to contribute
View All »
What is the impact of social media on data privacy in business organisations? Can organisations ban social media  due some risks of sensitive data being shared across?
PRECIOUS785 | 4/20/2017 4:21:29 AM | COMMENTS(5)
Google analytics is a helpfull tool for webdevelopers to evaluate the use of their application. Google is also known to gather information for its own use. As security officer I think that using Google Analytics for an Health Care application is risky. Fo...
Gilbert van Zeijl | 4/6/2017 7:18:20 AM | COMMENTS(3)
Hello All, I was asked a question by our senior counsel that has me running in circles: How do we limit/restrict what a 3rd Party can do with our data once we send it to them? Historically, they share documents with external partners and other law offices...
Kyle430 | 3/14/2017 3:18:12 AM | COMMENTS(10)
Hi All, I've been asked to come up with an outline scope/plan for an Encryption audit for my org. We've never done one before. They aren't sure what the scope should be yet, and I have so many avenues - data at rest vs. data in transit, VPN security, desk...
Jeff Murfin | 3/13/2017 12:51:53 PM | COMMENTS(2)
what is the information security perspective if the customers reported receiving SMS for transactions they had not performed where this transactions for others customers and sent to them by system error ?
Tarek EL-Sherif | 3/12/2017 5:14:20 AM | COMMENTS(0)
We finally have the Guidelines on Data Protection Officers, BY Art. 29 WP (EU). Document here: Suggestions and analysis are welcomed.
Amedeo808 | 2/23/2017 12:22:42 PM | COMMENTS(4)

Documents & Publications: 39 total

Must be a Topic member to contribute
View All »
Information Systems Assurance and Control Guideline for Verifing Compliance with Personal Data Protection Act [POLAND]
Posted by JoannaK 1178 days ago
Posted by ISACA 464 days ago
Posted by ISACA 517 days ago
Posted by ISACA 810 days ago

Events & Online Learning: 13 total

21 Sep 2015
ISACA International Event
06010 Mexico City, Panama
La Conferencia Latinoamericana CACS/ISRM
9 Nov 2015
ISACA International Event
Copenhagen, Denmark
Stay on top of the trends and opportunities of the dynamic technology industry at EuroCACS/ISRM —the leading European conference for IT audit, assurance, security and risk professionals.
16 May 2016
ISACA International Event
Los Angeles, CA, USA
17 Oct 2016
ISACA International Event
Las Vegas, NV, US

Journal Articles: 82 total

Volume 2, 2017
by Ed Moyle
To understand how the business side of any organization intersects with technology, ask an internal auditor. This might sound counterintuitive at first, but think about what auditors need to know to do their job...
Volume 1, 2017
by Rodney Piercy, CISSP, CEH
As enterprises become more dependent on technology and data, it becomes increasingly important to protect the data and ensure the security of the systems.
Volume 1, 2017
by Richard Hoesl, CISSP, SCF, Martin Metz, CISA, Joachim Dold and Stefan Hartung
The average total cost of a data breach is about US $4 million, whereas the average cost for a stolen record increased slightly from US $154 in 2015 to US $158 in 2016.
Volume 6, 2016
by Eva Sweet, CISA, CISM
What are the benefits and impacts of the GDRP on enterprises that are in the EU and those that are outside of the EU and doing business with EU nations?
Volume 6, 2016
by Wanbil W. Lee, DBA, FBCS, FHKCS, FHKIE, FIMA, Wolfgang Zankl, Ph.D. and Henry Chang, CISM, CIPT, CISSP, DBA, FBCS
Privacy breaches disturb trust and run the risk of diluting or losing security; it is a show of disrespect to the law and a violation of ethical principles.
Volume 6, 2016
by Craig Krivin, Sanjay Bhide, Sandeep Desai, Ravi Dhaval, Joe Norris, Amanthi D. Pendegraft, Susan E. Snow and Dan Wagner
The ISACA Phoenix (Arizona, USA) Chapter research committee set out to learn more about the wave of wearable devices and understand the ISACA community’s attitudes toward wearables’ potential risk and security impacts in the workplace.

Wikis: 2 total

Blog Posts: 28 total

Senior Manager           ultimate responsibility Information security Officer          functional responsibility Security Analyst           Strategic, develops policies and guidelines Owner         - Responsible for asset         - Determine level of clas...
Posted By : Muhammad554 | 0 comments
La demanda de servicios bancarios a través de Internet, producto del surgimiento de nuevas necesidades en los consumidores atraídos por el auge tecnológico, mantiene a las entidades financieras inmersas en una encrucijada en la cual deben equilibrar el ni...
Posted By : Gerardo Zuñiga | 0 comments
'Data Privacy Day (known in Europe as Data Protection Day)  is an international holiday that occurs every 28 January.' [ ]   [ ]   ...
Posted By : Karoly Arnhoffer | 5 comments
Following BREXIT some may have thought we could avoid the upcoming EU General Data Protection Regulations (GDPR) but that is essentially not the case. If we want to continue with a close as possible business relationship with our EU friends then we nee...
Posted By : Adail703 | 0 comments
Let us have positive inspirational slogans for every situation. Last week I started the project meeting like this: I don't know you are all so good at tuning the website. The performance is now is wonderful. I could witness reduction of stress, anxiety an...
Posted By : Jayakumar Sundaram | 1 comments
Yesterday’s security technology will not keep your network safe today, nor will today’s solutions protect you tomorrow. Network security must evolve. And at a rate that keeps it always one step ahead of the threats. These could include factors such as you...
Posted By : rasoolirfan | 1 comments