Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Privacy/Data Protection

Welcome to the Privacy/Data Protection topic!

Collaborate, contribute, consume and create knowledge around topics such as privacy frameworks and governance (OECD), protection of data, data leaks and data communicated across borders

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
838 Members
1 Online
9119 Visits

 Recent Discussions

para colegas hispanoparlantes: www.sistemasder... Posted by Graciela528.
Data anonymization program ?. Posted by mb.
Major privacy leak leads to interesting data analysis. Posted by Marc Vael.

Community Leader

Marc Vael
NEW! Participate in Discussions Via Email. 

You can now respond to discussions by simply replying to the email alert. Just enable this feature in discussions on this topic. Learn more

Discussions: 56 total

Must be a Topic member to contribute
View All »
Estimados colegas hispanoparlante, es un gusto invitarlos a visitar Encontraran artículos sobre seguridad de la información basada en COBIT e ISO 27002, privacy, cloud y sistemas de registros e incumbencias profesio...
Graciela528 | 3/21/2014 11:25:55 AM | COMMENTS(1)
Hi,I'm very new to Cobit, and I'd like to know if any of you  could share with me ideas about defining a data anonymization program or initiative using the Cobit 5 framework ? 
mb | 2/12/2014 9:53:14 AM | COMMENTS(2)
For those who live outside of Belgium, you might not have heard about it, but in Belgium all media jumped on a major data leak when someone found out that the Belgian Railway Company SNCB/NMBS posted mistakenly publicly a file on their web server containi...
Marc Vael | 1/10/2014 4:39:32 AM | COMMENTS(3)
Filmmaker Cullen Hoback spent 2,732 hours focusing on web privacy policies to produce “Terms and Conditions May Apply”, a new documentary that investigates what, exactly, we’re agreeing to when we click that button. ISACA interviews Cullen Hoback in a rec...
Nancy196 | 10/10/2013 9:48:54 AM | COMMENTS(0)
OECD published  on September  9th, 2013 a  revised Guidelines on the Protection of Privacy and Transborder Flows of Personal Data .This document  includes:The Recommendation of the OECD Council concerning Guidelines governing the Protection of Privacy and...
yves_le_roux | 9/19/2013 4:49:01 AM | COMMENTS(0)
EUROCACS/ISRM 2013 took place in London on September 16-18 In the field of privacy, we had the following sessions:Current Challenges in Data Privacy and IT Law by Peter Katko & Fabrice Naftalski (EY)Hot Topic—Information Commissioners Office (ICO) UK Comp...
yves_le_roux | 9/19/2013 4:28:51 AM | COMMENTS(0)

Documents & Publications: 45 total

Must be a Topic member to contribute
View All »
Information Systems Assurance and Control Guideline for Verifing Compliance with Personal Data Protection Act [POLAND]
Posted by JoannaK 81 days ago
Posted by ISACA 13 days ago
Posted by ISACA 13 days ago
Posted by ISACA 35 days ago

Events & Online Learning: 8 total

19 Aug 2013
ISACA International Event
San Francisco, CA, USA
6 Nov 2013
ISACA International Event
Las Vegas, NV, USA
North America ISRM features relevant security and risk management topics presented by leading industry experts and practitioners.
30 Apr 2014

Journal Articles: 105 total

Volume 2, 2014
by Vasant Raval, DBA, CISA, ACMA
With volumes of data emerging, work and home boundaries fading, and devices becoming more pervasive, is a viable defense of privacy possible?
Volume 2, 2014
by Tommie Singleton, CISA, CGEIT, CPA
Entities that maintain large databases of individuals and their PII should be prepared for a data breach by doing due diligence, as defined by cybersecurity professionals.
Volume 1, 2014
by Nageswaran Kumaresan, Ph.D., CISA, CRISC, CGMA, CIA
Protecting digital assets and intellectual property (IP) is becoming increasingly challenging for organizations.
Volume 1, 2014
by Derek Mohammed, Ph.D., CISA, CISM
To reduce the number of PII data security breaches, organizations must embrace the concept of auditing for regulatory compliance and security for PII so that issues can be addressed preemptively.
Volume 1, 2014
by Viktor Mayer-Schonberger and Kenneth Cukier | Reviewed by Upesh Parekh, CISA
In today’s digital age, there is an explosion of data everywhere.
Volume 1, 2014
by Stefan Beissel, Ph.D., CISA, CISSP
To prevent the compromise of systems that contain personal data, all personal data can be replaced by tokens.

Wikis: 2 total

Blog Posts: 25 total

15 Jan 2014
Posted By : masarker | 1 comments
On March 1st,  I was invited to speak at the CampIT conference on Enterprise Risk/Security Management at Rosemont Convention Center. Before me there were two speakers. The first presenter spent an hour presenting the story from the trenches of technolog...
Posted By : Umesh391 | 2 comments
26 Jun 2013
Aspectos de seguridad de informacion en BIG DATA
Posted By : Roque | 0 comments
Resumen El imparable crecimiento de internet en el mundo, y la integración de los diversos sistemas informáticos conectados a la red de Internet han hecho que la Seguridad de la Información alcance un papel de suma importancia actualmente. Desde el moment...
Posted By : ArthurHuamani | 0 comments
22 Feb 2013
It is disheartening in the extreme when privacy, security, audit, governance and legal professionals persist the self-fulfilling-prophetic chant that “privacy is dead.” It isn't dead—or even dying. Quite the opposite, in fact. Seven bills have come b...
Posted By : WLWells | 1 comments
მოგესალმებით, მოკლედ, იმდენი რამ მოხდა 2012-ში, რომ დავდექი რთული ამოცანის წინაშე, უბრალოდ ჩამომეთვალა საინტერესო უსაფრთხოების მოვლენები, თუ გამეცხრილა და ერთი-ორზე უფრო დეტალურად გვესაუბრა. გადავწყვიტე ნაზავით დავემშვიდობოთ 2012-ს, და 2013-ზე გადავერთოთ ...
Posted By : David190 | 0 comments