Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Privacy/Data Protection

Welcome to the Privacy/Data Protection topic!

Collaborate, contribute, consume and create knowledge around topics such as privacy frameworks and governance (OECD), protection of data, data leaks and data communicated across borders

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
892 Members
0 Online
9564 Visits

 Recent Discussions

European data protection. Posted by JayMIET927.
US to extend data privacy protections to non-US citizens. Posted by Fidel Santiago.
Gary Kovacs: Tracking our online trackers. Posted by Fidel Santiago.

Community Leader

Marc Vael

Marc Vael

Badge: Influential


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 60 total

Must be a Topic member to contribute
View All »
Does anyone have any ideas as to when the new EU data protection law will come into effect ? My personal view is 2016, but if anyone has a better insight please share. Secondly what do you think will be the key features of the new law and how to meet the ...
JayMIET927 | 9/18/2014 6:16:45 PM | COMMENTS(5)
Dear colleagues, According to The Guardian [1] "The White House has ordered that US data privacy protections will soon be extended to non-Americans [...] Officials will seek to make sure US government departments and companies treat data on foreigners wi...
Fidel Santiago | 8/26/2014 5:34:34 AM | COMMENTS(2)
Dear colleagues, I would like to share with you the presentation Gary Kovacs (Mozilla's CEO) did in Ted2012 about the tracking we suffer in our daily use of Internet and how Mozilla has developed a software for making that tracking visible: http://www.t...
Fidel Santiago | 8/26/2014 2:05:13 AM | COMMENTS(2)
Hi Everyone, I'm the chapter president of ISACA Ireland and would like to let members of this topic know that we are seeking innovative, practical and / or thought provoking session proposals for our conference on 3rd Oct 2014.  For knowledge center membe...
Neil_Curran | 8/2/2014 12:29:21 PM | COMMENTS(1)
Estimados colegas hispanoparlante, es un gusto invitarlos a visitar Encontraran artículos sobre seguridad de la información basada en COBIT e ISO 27002, privacy, cloud y sistemas de registros e incumbencias profesio...
Graciela528 | 3/21/2014 11:25:55 AM | COMMENTS(1)
Hi,I'm very new to Cobit, and I'd like to know if any of you  could share with me ideas about defining a data anonymization program or initiative using the Cobit 5 framework ? 
mb | 2/12/2014 9:53:14 AM | COMMENTS(2)

Documents & Publications: 55 total

Must be a Topic member to contribute
View All »
Information Systems Assurance and Control Guideline for Verifing Compliance with Personal Data Protection Act [POLAND]
Posted by JoannaK 233 days ago
Posted by ISACA 10 days ago

Events & Online Learning: 7 total

19 Aug 2013
ISACA International Event
San Francisco, CA, USA
6 Nov 2013
ISACA International Event
Las Vegas, NV, USA
North America ISRM features relevant security and risk management topics presented by leading industry experts and practitioners.
29 Sep 2014
ISACA International Event
Barcelona, Spain
Stay on top of the trends and opportunities of the dynamic technology industry at EuroCACS/ISRM 2014—the leading European conference for IT audit, assurance, security and risk professionals.

Journal Articles: 110 total

Volume 5, 2014
by Ashwin Chaudhary, CISA, CISM, CGEIT, CRISC, CISSP, CPA, PMP
Mobile computing and the bring your own device (BYOD) trend are revolutionizing end-user computing in many organizations.
Volume 3, 2014
Over the past few years, there has been a shift in the business world pertaining to assets that need to be protected.
Volume 3, 2014
by William Emmanuel Yu, Ph.D., CISM, CRISC, CISSP, CSSLP
With the advent of cost-effective technologies and solutions for longer-term storage of vast amounts of transaction data, more and more companies are investing in keeping more and more data for longer and longer periods.
Volume 3, 2014
by Haris Hamidovic, Ph.D., CIA, ISMS IA, and Amra Hamidovic
Certain legal requirements and obligations of institutions and legal entities need to be fulfilled to ensure the admissibility and reliability of electronic documents.
Volume 3, 2014
by Thomas Schaefer, CISA, CISM, CISSP, CEH, Michael Hofmann, CISA, CISM, CRISC, CGEIT, CCISO, CIRM, Peter Loos, Ph.D., and Peter Fettke, Ph.D.
According to recent publications, the cloud is the future for the provision of a wide range of IT services.
Volume 2, 2014
by Vasant Raval, DBA, CISA, ACMA
With volumes of data emerging, work and home boundaries fading, and devices becoming more pervasive, is a viable defense of privacy possible?

Wikis: 2 total

Blog Posts: 19 total

8 Sep 2014
Posted By : masarker | 3 comments
7 Sep 2014
Now a days, you don’t need to be a IT guru or best software programmer to access /control other personal/organization data. If you follow below techniques, you can easily get confidential information. 1. Masquerading 2. Tailgeting (Piggy back) 3. Dum...
Posted By : Shaklain | 0 comments
On March 1st,  I was invited to speak at the CampIT conference on Enterprise Risk/Security Management at Rosemont Convention Center. Before me there were two speakers. The first presenter spent an hour presenting the story from the trenches of technolog...
Posted By : Umesh391 | 2 comments
26 Jun 2013
Aspectos de seguridad de informacion en BIG DATA
Posted By : Roque | 0 comments
During an audit you may find that shell scripts are used to connect to your Oracle database (these are often scheduled jobs).  In many instances this represents a security risk as the Oracle database password is hardcoded into the script.  This means th...
Posted By : Ian Cooke | 0 comments
As with configurations the company you are auditing should have a policy on password controls.  We have previously discussed that SQL Server allows two methods of authenticating to the database – Mixed Mode and Windows Authentication (see http://www.isa...
Posted By : Ian Cooke | 0 comments