Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Privacy/Data Protection

Welcome to the Privacy/Data Protection topic!

Collaborate, contribute, consume and create knowledge around topics such as privacy frameworks and governance (OECD), protection of data, data leaks and data communicated across borders

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
1106 Members
1 Online
11083 Visits

Community Leader

Marc Vael

Marc Vael

Title: Director Internal Audit & Risk Management

Badge: Influential



Badge: Social


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 107 total

Must be a Topic member to contribute
View All »
Very interesting topic. 
ShanShan | 11/10/2015 1:38:03 PM | COMMENTS(0)
What are this group's thoughts on this? See more at:
M.Lambert | 10/22/2015 12:28:46 PM | COMMENTS(5)
Bavarian Data Protection Authority (DPA) fined two companies for Transfer of Customer Data in an M&A Asset Deal. Read more and comment:
M.Lambert | 10/20/2015 3:41:08 PM | COMMENTS(2)
I would like to have a career in Ethical Hacking. Is anyone aware of any types of clubs for ethical hacking or pen-testing? I would rather join some sort of club with constant support where you could continually learn from peers rather than spend a few ...
Warren980 | 10/8/2015 1:40:31 PM | COMMENTS(4)
Based on a very interesting and clear reading article about Windows 10 and its handling of privacy, I wonder what you think about this? And would you now wait or still press ahead installing Win10?
Marc Vael | 8/26/2015 2:59:08 AM | COMMENTS(8)
This is amongst the 6 scariest hacks revealed at 2015 DefCon hacker conference. Article points out that: " One of the most illuminating presentations from DefCon 23 came from a computer security expert who warned about the ease of falsely declari...
M.Lambert | 8/26/2015 2:58:21 AM | COMMENTS(3)

Documents & Publications: 50 total

Must be a Topic member to contribute
View All »
Information Systems Assurance and Control Guideline for Verifing Compliance with Personal Data Protection Act [POLAND]
Posted by JoannaK 663 days ago
Posted by ISACA 2 days ago
Posted by ISACA 253 days ago
Posted by ISACA 295 days ago

Events & Online Learning: 11 total

19 Aug 2013
ISACA International Event
San Francisco, CA, USA
6 Nov 2013
ISACA International Event
Las Vegas, NV, USA
North America ISRM features relevant security and risk management topics presented by leading industry experts and practitioners.
17 Aug 2015
ISACA International Event
Phoenix, Arizona, US
2015 GRC Conference - August 17-19, Phoenix, AZ. Explore the future of Governance Risk and Control through expert-led workshops and sessions developed by the IIA and ISACA. Register early for our GRC learning tracks.

Journal Articles: 127 total

Volume 6, 2015
by Angelique Schouten
Cloud technology helps SMEs run and coordinate large external workforces, support operational management, and enable the building of new developments to ensure that they stay up to speed and futureproof within their markets.
Volume 6, 2015
by Doron Rotman, CIPP, Chris Kypreos, CIPP, and Sarah Pipes, CIPP
The Internet of Things (IoT) represents an unknown set of forces. However, one known is that IoT-connected devices will generate exponential levels of new data that will lead to powerful insights...
Volume 4, 2015
by Mohammed J. Khan, CISA, CRISC, CIPM
This article will align the UK Data Protection Act of 1998 and the American Institute of Certified Public Accountants Generally Accepted Privacy Principles in order to help global companies with a presence in both the US and the UK.
Volume 4, 2015
by Sivarama Subramanian, CISM, Varadarajan Vellore Gopal, CEH, and Marimuthu Muthusamy
The Internet of Things (IoT) is captivating organizations because of its potential to rapidly transform businesses and people’s lives.
Volume 3, 2015
by Brett van Niekerk, Ph.D., and Pierre Jacobs
According to a survey by Infonetics Research, companies operating their own data centers spent an average of US $17 million on security products in 2013.
Volume 2, 2015
by Marcelo Hector Gonzalez, CISA, CRISC, and Jana Djurica
There are a number of definitions of Internet of Things (IoT), with all of them having slightly different meanings.

Wikis: 2 total

Blog Posts: 21 total

During an audit you may find that shell scripts are used to connect to your Oracle database (these are often scheduled jobs).  In many instances this represents a security risk as the Oracle database password is hardcoded into the script.  This means th...
Posted By : Ian Cooke | 1 comments
Data Privacy in today's world has crossed over from a requirement dependent on one agency or organization to be the global phenomenon.  Today the data traverses across the countries as well as continents at the speed unimaginable in past. In a flash of se...
Posted By : Mayank | 0 comments
13 Nov 2014
Posted By : masarker | 4 comments
One of the many challenging risk management issues faced by organisations today is protecting the privacy of customers’ and employees’ personal information. When privacy is well managed, organisations earn the trust of their customers, employees, and othe...
Posted By : Patrick Soenen | 0 comments
13 Nov 2014
Now a days, you don’t need to be a IT guru or best software programmer to access /control other personal/organization data. If you follow below techniques, you can easily get confidential information.1. Masquerading2. Tailgeting (Piggy back)3. Dumpster di...
Posted By : Shaklain | 1 comments
On March 1st,  I was invited to speak at the CampIT conference on Enterprise Risk/Security Management at Rosemont Convention Center. Before me there were two speakers. The first presenter spent an hour presenting the story from the trenches of technolog...
Posted By : appolloconsulting | 2 comments