Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Privacy/Data Protection

Welcome to the Privacy/Data Protection topic!

Collaborate, contribute, consume and create knowledge around topics such as privacy frameworks and governance (OECD), protection of data, data leaks and data communicated across borders

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
1200 Members
1 Online
11735 Visits

Community Leader

Marc Vael

Marc Vael

Title: Chief Audit Executive

Badge: Influential

ShanShan

ShanShan

Badge: Social

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 114 total

Must be a Topic member to contribute
View All »
I'm providing assistance in implementing a data classification policy. The purpose is to classify sensitive data and establish security controls that are based on the level of sensitivity. Does anyone have experience in this area or have a methodology/pro...
david ho | 6/29/2016 10:23:58 AM | COMMENTS(6)
Despite setting up stringent Privacy settings in Facebook to limit content view only to friends, contents 'liked' by friends are no more private such that it becomes visible to friends of friends or public based on the privacy settings on the friends prof...
ebenezerj | 6/15/2016 11:44:45 AM | COMMENTS(3)
"On Wednesday, the Administration took an important step to enhance privacy efforts across the Federal Government by convening privacy leaders from Federal agencies for the inaugural meeting of the Federal Privacy Council. Established by President Obama t...
M.Lambert | 3/16/2016 2:55:57 AM | COMMENTS(1)
Dear colleagues, Would you have a rough idea on when we could expect to see COBIT5 for Privacy? Considering that data privacy and protection is among every company's top priorities, it would be extremely handful to have a go at something as comprehensive...
Prakhar | 2/4/2016 2:32:27 PM | COMMENTS(4)
Yesterday, the EU has announced, that an agreement on the successor to the Safe Harbor Act has been reached with the new EU-US Privacy Shield: http://europa.eu/rapid/press-release_IP-16-216_en.htm Just recently I was attending ISACA's live webinar on the ...
Christoph N. | 2/4/2016 4:34:04 AM | COMMENTS(1)
Does anyone have a good resource for what the technical guidelines are for data protection and privacy across the globe? I read the work from DL Piper, but I'm looking for something a little more technical. For Example, the encryption requirements in Ch...
Geeta167 | 1/18/2016 5:45:22 AM | COMMENTS(2)

Documents & Publications: 51 total

Must be a Topic member to contribute
View All »
Information Systems Assurance and Control Guideline for Verifing Compliance with Personal Data Protection Act [POLAND]
Posted by JoannaK 881 days ago
Books
Posted by ISACA 167 days ago
Books
Posted by ISACA 220 days ago
Books
Posted by ISACA 471 days ago
Books
Posted by ISACA 513 days ago

Events & Online Learning: 10 total

19 Aug 2013
ISACA International Event
San Francisco, CA, USA
21 Sep 2015
ISACA International Event
06010 Mexico City, Panama
La Conferencia Latinoamericana CACS/ISRM
9 Nov 2015
ISACA International Event
Copenhagen, Denmark
Stay on top of the trends and opportunities of the dynamic technology industry at EuroCACS/ISRM —the leading European conference for IT audit, assurance, security and risk professionals.

Journal Articles: 69 total

Volume 4, 2016
by Aditya K. Sood, Ph.D., and Michael Rinehart, Ph.D.
There is no doubt that data science can be used as a core technology to secure and strengthen cloud applications by implementing algorithms that can detect threats through large-scale data mining.
Volume 3, 2016
by Michael Roseline Juliana and Subramaniam Srinivasan, Ph.D.
Data collection is a challenging task in wireless sensor networks (WSNs) due to the limitations in communication bandwidth and the energy budget.
Volume 3, 2016
by Eric H. Goldman, CISA, Security+
In recent years, many software products have begun offering built-in encryption capabilities that are more user-friendly and manageable.
Volume 2, 2016
by Rebecca Herold and Christine Hertzog | Reviewed by A. Krista Kivisild, CISA, CA, CPA
This book not only outlines the technology and the possible risk, it also walks readers through risk mitigation methods and how to address privacy.
Volume 1, 2016
by Mark Johnston
In July 2015, CVS became the latest company to fall victim to an apparent breach, this one involving credit card data obtained via its web site for ordering and processing photos.
Volume 1, 2016
by Mohammed J. Khan, CISA, CRISC, CIPM
Data protection and cybersecurity go hand-in-hand due to the nature of the risk involved. The underlying assumption is that all data, whether they are stationary or in motion, are threatened to be compromised.

Wikis: 2 total

Blog Posts: 24 total

Yesterday’s security technology will not keep your network safe today, nor will today’s solutions protect you tomorrow. Network security must evolve. And at a rate that keeps it always one step ahead of the threats. These could include factors such as you...
Posted By : rasoolirfan | 0 comments
Let us have positive inspirational slogans for every situation. Last week I started the project meeting like this: I don't know you are all so good at tuning the website. The performance is now is wonderful. I could witness reduction of stress, anxiety an...
Posted By : Jayakumar Sundaram | 0 comments
11 Feb 2016
The Author of this blog is not a Lawyer, and even if he was, he is not YOUR lawyer. Nothing that is written here should be considered Legal advice or opinion. The information presented hereafter represents the author's personal opinion and current under...
Posted By : HPMahan | 0 comments
During an audit you may find that shell scripts are used to connect to your Oracle database (these are often scheduled jobs).  In many instances this represents a security risk as the Oracle database password is hardcoded into the script.  This means th...
Posted By : Ian Cooke | 1 comments
Data Privacy in today's world has crossed over from a requirement dependent on one agency or organization to be the global phenomenon.  Today the data traverses across the countries as well as continents at the speed unimaginable in past. In a flash of se...
Posted By : Mayank | 0 comments
13 Nov 2014
Posted By : masarker | 4 comments