Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Privacy/Data Protection

Welcome to the Privacy/Data Protection topic!

Collaborate, contribute, consume and create knowledge around topics such as privacy frameworks and governance (OECD), protection of data, data leaks and data communicated across borders

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
1303 Members
1 Online
12559 Visits

Community Leader



Badge: Social

Marc Vael

Marc Vael

Title: Chief Audit Executive

Badge: Energizer



Badge: Observer


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 121 total

Must be a Topic member to contribute
View All »
We finally have the Guidelines on Data Protection Officers, BY Art. 29 WP (EU). Document here: Suggestions and analysis are welcomed.
Amedeo808 | 2/23/2017 12:22:42 PM | COMMENTS(4)
Hi All, Few days ago, a new proposal affecting the privacy field has been published by the European Commission. The title of the document is quite self explanatory: Proposal for a Regulation on Privacy and Electronic Communications and it can be consu...
Amedeo808 | 2/15/2017 3:59:25 AM | COMMENTS(12)
This year, again, Data Privacy Day passed with a very little focus on it:
Karoly Arnhoffer | 2/15/2017 3:54:34 AM | COMMENTS(6)
Volume I is available The ISACA Privacy Principles and Program Management Guide outlines core principles that individual...
yves_le_roux | 2/1/2017 1:51:29 PM | COMMENTS(1)
Hello All, I was asked a question by our senior counsel that has me running in circles: How do we limit/restrict what a 3rd Party can do with our data once we send it to them? Historically, they share documents with external partners and other law offices...
Kyle430 | 1/11/2017 10:30:40 AM | COMMENTS(7)
Recently the Spanish Data Protection Authority (AEPD) considerably boosted the Amazon IaaS services in Europe, by declaring “adequate” the guarantees provided by Mr. Bezos’s company for international personal data transfers from Europe to USA. From now on...
Amedeo808 | 12/29/2016 3:40:00 PM | COMMENTS(5)

Documents & Publications: 41 total

Must be a Topic member to contribute
View All »
Information Systems Assurance and Control Guideline for Verifing Compliance with Personal Data Protection Act [POLAND]
Posted by JoannaK 1120 days ago
Posted by ISACA 406 days ago
Posted by ISACA 459 days ago
Posted by ISACA 752 days ago

Events & Online Learning: 9 total

21 Sep 2015
ISACA International Event
06010 Mexico City, Panama
La Conferencia Latinoamericana CACS/ISRM
9 Nov 2015
ISACA International Event
Copenhagen, Denmark
Stay on top of the trends and opportunities of the dynamic technology industry at EuroCACS/ISRM —the leading European conference for IT audit, assurance, security and risk professionals.
16 May 2016
ISACA International Event
Los Angeles, CA, USA
17 Oct 2016
ISACA International Event
Las Vegas, NV, US

Journal Articles: 81 total

Volume 1, 2017
by Rodney Piercy, CISSP, CEH
As enterprises become more dependent on technology and data, it becomes increasingly important to protect the data and ensure the security of the systems.
Volume 1, 2017
by Richard Hoesl, CISSP, SCF, Martin Metz, CISA, Joachim Dold and Stefan Hartung
The average total cost of a data breach is about US $4 million, whereas the average cost for a stolen record increased slightly from US $154 in 2015 to US $158 in 2016.
Volume 6, 2016
by Eva Sweet, CISA, CISM
What are the benefits and impacts of the GDRP on enterprises that are in the EU and those that are outside of the EU and doing business with EU nations?
Volume 6, 2016
by Wanbil W. Lee, DBA, FBCS, FHKCS, FHKIE, FIMA, Wolfgang Zankl, Ph.D. and Henry Chang, CISM, CIPT, CISSP, DBA, FBCS
Privacy breaches disturb trust and run the risk of diluting or losing security; it is a show of disrespect to the law and a violation of ethical principles.
Volume 6, 2016
by Craig Krivin, Sanjay Bhide, Sandeep Desai, Ravi Dhaval, Joe Norris, Amanthi D. Pendegraft, Susan E. Snow and Dan Wagner
The ISACA Phoenix (Arizona, USA) Chapter research committee set out to learn more about the wave of wearable devices and understand the ISACA community’s attitudes toward wearables’ potential risk and security impacts in the workplace.
Volume 6, 2016
by Ilya Kabanov, Ph.D.
On 4 May 2016, after four years in the making, the European Union (EU) General Data Protection Regulation (GDPR) was published in the Official Journal of the European Union and officially set an application date.

Wikis: 2 total

Blog Posts: 27 total

La demanda de servicios bancarios a través de Internet, producto del surgimiento de nuevas necesidades en los consumidores atraídos por el auge tecnológico, mantiene a las entidades financieras inmersas en una encrucijada en la cual deben equilibrar el ni...
Posted By : Gerardo Zuñiga | 0 comments
'Data Privacy Day (known in Europe as Data Protection Day)  is an international holiday that occurs every 28 January.' [ ]   [ ]   ...
Posted By : Karoly Arnhoffer | 5 comments
Following BREXIT some may have thought we could avoid the upcoming EU General Data Protection Regulations (GDPR) but that is essentially not the case. If we want to continue with a close as possible business relationship with our EU friends then we nee...
Posted By : Adail703 | 0 comments
Let us have positive inspirational slogans for every situation. Last week I started the project meeting like this: I don't know you are all so good at tuning the website. The performance is now is wonderful. I could witness reduction of stress, anxiety an...
Posted By : Jayakumar Sundaram | 1 comments
Yesterday’s security technology will not keep your network safe today, nor will today’s solutions protect you tomorrow. Network security must evolve. And at a rate that keeps it always one step ahead of the threats. These could include factors such as you...
Posted By : rasoolirfan | 1 comments
11 Feb 2016
The Author of this blog is not a Lawyer, and even if he was, he is not YOUR lawyer. Nothing that is written here should be considered Legal advice or opinion. The information presented hereafter represents the author's personal opinion and current under...
Posted By : HPMahan | 0 comments