Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Privacy/Data Protection

Welcome to the Privacy/Data Protection topic!

Collaborate, contribute, consume and create knowledge around topics such as privacy frameworks and governance (OECD), protection of data, data leaks and data communicated across borders

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
1012 Members
0 Online
10282 Visits

Community Leader

Marc Vael

Marc Vael

Title: Director Internal Audit & Risk Management

Badge: Influential

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 81 total

Must be a Topic member to contribute
View All »
The breach was found on Jan. 29, but Premera Blue Cross officials contacted state officials March 17. One question is: how quickly should people be informed of data breaches ? Thoughts ? Read more: http://www.seattletimes.com/opinion/editorials/...
M.Lambert | 3/31/2015 8:27:13 AM | COMMENTS(0)
Here' another artcle on the actual cost. Is there some benchmarking available for comaring the actual expenditures organizations have incured ? read more and share your thoughts http://ww2.cfo.com/data-security/2015/03/calculating-colossal-cost-d...
M.Lambert | 3/29/2015 12:14:22 PM | COMMENTS(0)
“Some of the data collected and transmitted for data-mining and market research is simply not necessary for services and applications to work,” said the report’s head researcher and privacy lawyer Pippa Lawson. Read more: http://www.itworldcanada.co...
M.Lambert | 3/27/2015 2:53:38 PM | COMMENTS(0)
A group of users claim that Google bypassed security settings on the Safari browser to install tracking cookies on their computers in order to target them with advertising. In the US, Google has already paid fines of over $40m related to this incident ...
M.Lambert | 3/27/2015 2:44:50 PM | COMMENTS(0)
“The country has always stored valuables for people all around Europe—even before money”.. When Deltalis acquired a bunker from the Swiss military, it was considering storage of gold bullion here. Instead, it now runs a farm of computer servers where data...
M.Lambert | 3/27/2015 7:43:36 AM | COMMENTS(0)
The issue is whether Facebook Ireland had breached EU data rules by transferring user data to the US where, according to whistleblower Edward Snowden, they were accessible to US intelligence via its “Prism” programme. Read more: http://www.irishtimes....
M.Lambert | 3/26/2015 2:17:40 PM | COMMENTS(0)

Documents & Publications: 53 total

Must be a Topic member to contribute
View All »
Information Systems Assurance and Control Guideline for Verifing Compliance with Personal Data Protection Act [POLAND]
Posted by JoannaK 424 days ago
Books
Posted by ISACA 14 days ago
Books
Posted by ISACA 56 days ago
In Google Spain v AEPD and Mario Costeja Gonzalez (C-131/12), the Court of Justice for the European Union (CJEU) ruled that Google must delete "inadequate, irrelevant or no longer relevant" data from its results when an individual requests it. This has generated a lot of discussion as the "right to be forgotte"n is a new right that is introduced in the Draft Proposal for a General Data Protection Regulation of 2012,
Posted by yves_le_roux 160 days ago
In this publication the four European data protection authorities from Poland, the Czech Republic, Croatia and Bulgaria tried to compare the different practices implemented in their countries and find the general rules which might be common for all or most of the EU countries in the field of data protection from the point of view of a natural person searching for a job or being employed in one of the EU countries.
Posted by yves_le_roux 160 days ago

Events & Online Learning: 9 total

19 Aug 2013
ISACA International Event
San Francisco, CA, USA
6 Nov 2013
ISACA International Event
Las Vegas, NV, USA
North America ISRM features relevant security and risk management topics presented by leading industry experts and practitioners.
29 Sep 2014
ISACA International Event
Barcelona, Spain
Stay on top of the trends and opportunities of the dynamic technology industry at EuroCACS/ISRM 2014—the leading European conference for IT audit, assurance, security and risk professionals.

Journal Articles: 120 total

Volume 2, 2015
by Marcelo Hector Gonzalez, CISA, CRISC, and Jana Djurica
There are a number of definitions of Internet of Things (IoT), with all of them having slightly different meanings.
Volume 1, 2015
Privacy is one area that has never been audited in my enterprise. Please provide your point of view on how privacy compliance can be assessed?
Volume 1, 2015
by Tieu Luu
In November 2013, the US Office of Management and Budget (OMB) issued memorandum M-14-03 requiring all federal departments and agencies to establish an information security continuous monitoring (ISCM) program.
Volume 1, 2015
by Dimitri Vlachos
On the one hand, user-based attacks—whether from hackers using stolen credentials, careless third-party vendors, or negligent or even malicious insiders—represent the largest IT security threat to organizations.
Volume 1, 2015
by John Nye, CISA, CISM, CRISC, CISSP
For some organizations, the decision to move to the cloud is both obvious and instant. For others, cloud solutions represent intolerable risk.
Volume 6, 2014
by Ed Gelbstein, Ph.D., and Viktor Polic, CISA, CRISC, CISSP
Understanding who owns data is not as simple as it appears at first. It is easy to say that all data belong to the organization.

Wikis: 2 total

Blog Posts: 21 total

Data Privacy in today's world has crossed over from a requirement dependent on one agency or organization to be the global phenomenon.  Today the data traverses across the countries as well as continents at the speed unimaginable in past. In a flash of se...
Posted By : Mayank | 0 comments
13 Nov 2014
Posted By : masarker | 4 comments
One of the many challenging risk management issues faced by organisations today is protecting the privacy of customers’ and employees’ personal information. When privacy is well managed, organisations earn the trust of their customers, employees, and othe...
Posted By : Patrick Soenen | 0 comments
13 Nov 2014
Now a days, you don’t need to be a IT guru or best software programmer to access /control other personal/organization data. If you follow below techniques, you can easily get confidential information.1. Masquerading2. Tailgeting (Piggy back)3. Dumpster di...
Posted By : Shaklain | 1 comments
On March 1st,  I was invited to speak at the CampIT conference on Enterprise Risk/Security Management at Rosemont Convention Center. Before me there were two speakers. The first presenter spent an hour presenting the story from the trenches of technolog...
Posted By : Umesh391 | 2 comments
26 Jun 2013
Aspectos de seguridad de informacion en BIG DATA
Posted By : Roque | 0 comments