Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Privacy/Data Protection

Welcome to the Privacy/Data Protection topic!

Collaborate, contribute, consume and create knowledge around topics such as privacy frameworks and governance (OECD), protection of data, data leaks and data communicated across borders

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
1244 Members
1 Online
12062 Visits

Community Leader

Marc Vael

Marc Vael

Title: Chief Audit Executive

Badge: Influential



Badge: Social


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 115 total

Must be a Topic member to contribute
View All »
Every now and then an event happens that provides a great example of how not to run a major government initiative when it comes to privacy and security. Australia has just had one of it's periodic census which is vital for future planning to meet the cur...
B Hunter | 8/30/2016 4:35:11 AM | COMMENTS(1) this happened not long after the EU-US Privacy Shield was confirmed. What will be the impact or benefit to other corporation that this milestone case bring?
ShanShan | 7/14/2016 2:21:37 PM | COMMENTS(0)
Despite setting up stringent Privacy settings in Facebook to limit content view only to friends, contents 'liked' by friends are no more private such that it becomes visible to friends of friends or public based on the privacy settings on the friends prof...
ebenezerj | 6/15/2016 11:44:45 AM | COMMENTS(3)
"On Wednesday, the Administration took an important step to enhance privacy efforts across the Federal Government by convening privacy leaders from Federal agencies for the inaugural meeting of the Federal Privacy Council. Established by President Obama t...
M.Lambert | 3/16/2016 2:55:57 AM | COMMENTS(1)
Dear colleagues, Would you have a rough idea on when we could expect to see COBIT5 for Privacy? Considering that data privacy and protection is among every company's top priorities, it would be extremely handful to have a go at something as comprehensive...
Prakhar | 2/4/2016 2:32:27 PM | COMMENTS(4)
Yesterday, the EU has announced, that an agreement on the successor to the Safe Harbor Act has been reached with the new EU-US Privacy Shield: Just recently I was attending ISACA's live webinar on the ...
Christoph N. | 2/4/2016 4:34:04 AM | COMMENTS(1)

Documents & Publications: 50 total

Must be a Topic member to contribute
View All »
Information Systems Assurance and Control Guideline for Verifing Compliance with Personal Data Protection Act [POLAND]
Posted by JoannaK 996 days ago
Posted by ISACA 282 days ago
Posted by ISACA 335 days ago
Posted by ISACA 586 days ago
Posted by ISACA 628 days ago

Events & Online Learning: 9 total

21 Sep 2015
ISACA International Event
06010 Mexico City, Panama
La Conferencia Latinoamericana CACS/ISRM
9 Nov 2015
ISACA International Event
Copenhagen, Denmark
Stay on top of the trends and opportunities of the dynamic technology industry at EuroCACS/ISRM —the leading European conference for IT audit, assurance, security and risk professionals.
16 May 2016
ISACA International Event
Los Angeles, CA, USA
22 Aug 2016
ISACA International Event
Hollywood, Florida, US
2016 GRC Conference - 22-24 August , Fort Lauderdale, FL. Explore the future of Governance Risk and Control through expert-led workshops and sessions developed by the IIA and ISACA. Register early for our GRC learning tracks.

Journal Articles: 74 total

Volume 5, 2016
by Tom Pendergast, Ph.D.
Despite a wealth of preventive measures, employees remain one of the costliest vectors in a number of data breaches and security incidents, which are increasing at an alarming rate.
Volume 5, 2016
by John W. Lainhart IV, CISA, CISM, CGEIT, CRISC, CIPP/G, CIPP/US, Zhiwei Fu, Ph.D., CISA, CGEIT, CRISC, CFE, CISSP, ITIL, PMP and Christopher M. Ballister, CISM, CGEIT, CRISC
Organizations need to move toward a more holistic and proactive approach to addressing security threats and managing compliance requirements in today’s information-driven economy.
Volume 5, 2016
by Betsie Estes
Geolocation is a technology that uses data acquired from an individual’s computer or mobile device to identify or describe the user’s actual physical location.
Volume 4, 2016
by C. Warren Axelrod, Ph.D., CISM, CISSP
This article examines this rapid loss of privacy and describes current approaches to mitigating risk of exposure of personal data and images.
Volume 4, 2016
by Aditya K. Sood, Ph.D., and Michael Rinehart, Ph.D.
There is no doubt that data science can be used as a core technology to secure and strengthen cloud applications by implementing algorithms that can detect threats through large-scale data mining.

Wikis: 2 total

Blog Posts: 25 total

Following BREXIT some may have thought we could avoid the upcoming EU General Data Protection Regulations (GDPR) but that is essentially not the case. If we want to continue with a close as possible business relationship with our EU friends then we nee...
Posted By : Adail703 | 0 comments
Let us have positive inspirational slogans for every situation. Last week I started the project meeting like this: I don't know you are all so good at tuning the website. The performance is now is wonderful. I could witness reduction of stress, anxiety an...
Posted By : Jayakumar Sundaram | 1 comments
Yesterday’s security technology will not keep your network safe today, nor will today’s solutions protect you tomorrow. Network security must evolve. And at a rate that keeps it always one step ahead of the threats. These could include factors such as you...
Posted By : rasoolirfan | 1 comments
11 Feb 2016
The Author of this blog is not a Lawyer, and even if he was, he is not YOUR lawyer. Nothing that is written here should be considered Legal advice or opinion. The information presented hereafter represents the author's personal opinion and current under...
Posted By : HPMahan | 0 comments
During an audit you may find that shell scripts are used to connect to your Oracle database (these are often scheduled jobs).  In many instances this represents a security risk as the Oracle database password is hardcoded into the script.  This means th...
Posted By : Ian Cooke | 1 comments
Data Privacy in today's world has crossed over from a requirement dependent on one agency or organization to be the global phenomenon.  Today the data traverses across the countries as well as continents at the speed unimaginable in past. In a flash of se...
Posted By : Mayank | 0 comments