Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Privacy/Data Protection

Welcome to the Privacy/Data Protection topic!

Collaborate, contribute, consume and create knowledge around topics such as privacy frameworks and governance (OECD), protection of data, data leaks and data communicated across borders

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
1220 Members
4 Online
11882 Visits

Community Leader

Marc Vael

Marc Vael

Title: Chief Audit Executive

Badge: Influential

ShanShan

ShanShan

Badge: Social

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 115 total

Must be a Topic member to contribute
View All »
Every now and then an event happens that provides a great example of how not to run a major government initiative when it comes to privacy and security. Australia has just had one of it's periodic census which is vital for future planning to meet the cur...
B Hunter | 8/11/2016 6:47:01 PM | COMMENTS(0)
http://www.reuters.com/article/us-microsoft-usa-warrant-idUSKCN0ZU1RJInteresting this happened not long after the EU-US Privacy Shield was confirmed. What will be the impact or benefit to other corporation that this milestone case bring?
ShanShan | 7/14/2016 2:21:37 PM | COMMENTS(0)
Despite setting up stringent Privacy settings in Facebook to limit content view only to friends, contents 'liked' by friends are no more private such that it becomes visible to friends of friends or public based on the privacy settings on the friends prof...
ebenezerj | 6/15/2016 11:44:45 AM | COMMENTS(3)
"On Wednesday, the Administration took an important step to enhance privacy efforts across the Federal Government by convening privacy leaders from Federal agencies for the inaugural meeting of the Federal Privacy Council. Established by President Obama t...
M.Lambert | 3/16/2016 2:55:57 AM | COMMENTS(1)
Dear colleagues, Would you have a rough idea on when we could expect to see COBIT5 for Privacy? Considering that data privacy and protection is among every company's top priorities, it would be extremely handful to have a go at something as comprehensive...
Prakhar | 2/4/2016 2:32:27 PM | COMMENTS(4)
Yesterday, the EU has announced, that an agreement on the successor to the Safe Harbor Act has been reached with the new EU-US Privacy Shield: http://europa.eu/rapid/press-release_IP-16-216_en.htm Just recently I was attending ISACA's live webinar on the ...
Christoph N. | 2/4/2016 4:34:04 AM | COMMENTS(1)

Documents & Publications: 51 total

Must be a Topic member to contribute
View All »
Information Systems Assurance and Control Guideline for Verifing Compliance with Personal Data Protection Act [POLAND]
Posted by JoannaK 935 days ago
Books
Posted by ISACA 221 days ago
Books
Posted by ISACA 274 days ago
Books
Posted by ISACA 525 days ago
Books
Posted by ISACA 567 days ago

Events & Online Learning: 9 total

19 Aug 2013
ISACA International Event
San Francisco, CA, USA
21 Sep 2015
ISACA International Event
06010 Mexico City, Panama
La Conferencia Latinoamericana CACS/ISRM
9 Nov 2015
ISACA International Event
Copenhagen, Denmark
Stay on top of the trends and opportunities of the dynamic technology industry at EuroCACS/ISRM —the leading European conference for IT audit, assurance, security and risk professionals.
22 Aug 2016
ISACA International Event
Hollywood, Florida, US
2016 GRC Conference - 22-24 August , Fort Lauderdale, FL. Explore the future of Governance Risk and Control through expert-led workshops and sessions developed by the IIA and ISACA. Register early for our GRC learning tracks.

Journal Articles: 71 total

Volume 4, 2016
by C. Warren Axelrod, Ph.D., CISM, CISSP
This article examines this rapid loss of privacy and describes current approaches to mitigating risk of exposure of personal data and images.
Volume 4, 2016
by Aditya K. Sood, Ph.D., and Michael Rinehart, Ph.D.
There is no doubt that data science can be used as a core technology to secure and strengthen cloud applications by implementing algorithms that can detect threats through large-scale data mining.
Volume 3, 2016
by Michael Roseline Juliana and Subramaniam Srinivasan, Ph.D.
Data collection is a challenging task in wireless sensor networks (WSNs) due to the limitations in communication bandwidth and the energy budget.
Volume 3, 2016
by Eric H. Goldman, CISA, Security+
In recent years, many software products have begun offering built-in encryption capabilities that are more user-friendly and manageable.
Volume 2, 2016
by Rebecca Herold and Christine Hertzog | Reviewed by A. Krista Kivisild, CISA, CA, CPA
This book not only outlines the technology and the possible risk, it also walks readers through risk mitigation methods and how to address privacy.

Wikis: 2 total

Blog Posts: 24 total

Let us have positive inspirational slogans for every situation. Last week I started the project meeting like this: I don't know you are all so good at tuning the website. The performance is now is wonderful. I could witness reduction of stress, anxiety an...
Posted By : Jayakumar Sundaram | 1 comments
Yesterday’s security technology will not keep your network safe today, nor will today’s solutions protect you tomorrow. Network security must evolve. And at a rate that keeps it always one step ahead of the threats. These could include factors such as you...
Posted By : rasoolirfan | 1 comments
11 Feb 2016
The Author of this blog is not a Lawyer, and even if he was, he is not YOUR lawyer. Nothing that is written here should be considered Legal advice or opinion. The information presented hereafter represents the author's personal opinion and current under...
Posted By : HPMahan | 0 comments
During an audit you may find that shell scripts are used to connect to your Oracle database (these are often scheduled jobs).  In many instances this represents a security risk as the Oracle database password is hardcoded into the script.  This means th...
Posted By : Ian Cooke | 1 comments
Data Privacy in today's world has crossed over from a requirement dependent on one agency or organization to be the global phenomenon.  Today the data traverses across the countries as well as continents at the speed unimaginable in past. In a flash of se...
Posted By : Mayank | 0 comments
13 Nov 2014
Posted By : masarker | 4 comments