Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Privacy/Data Protection

Welcome to the Privacy/Data Protection topic!

Collaborate, contribute, consume and create knowledge around topics such as privacy frameworks and governance (OECD), protection of data, data leaks and data communicated across borders

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
1408 Members
0 Online
13598 Visits

Community Leader

Amedeo808

Amedeo808

Badge: Social

Marc Vael

Marc Vael

Title: Chief Information Security Officer

Badge: Energizer

ShanShan

ShanShan

Badge: Social

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 129 total

Must be a Topic member to contribute
View All »
Hi all, Quick question: Should public authorities be fined for privacy laws violations? Current situations: In the UK, they are fined; in Spain, they are not. P.S. Happy Saint Valentine's Day
Amedeo808 | 2/16/2018 2:34:57 AM | COMMENTS(3)
Anew book titled “Cybersecurity: Hacking, the Dark Web and You” is beingreleased soon.  See the below links.  I wanted to share this informationin case you’re interested. https://view.email.fortune.com/?qs=ee9ffdefc23f39399acfc8f20920d4c42a77bd2b4622aa4f8...
Angela712 | 1/13/2018 4:04:41 PM | COMMENTS(0)
Hi all, I wish you an Happy 2018, the GDPR year... Quick question: In which area are you finding more difficulties in the implementation of the GDPR? A: Legal/Compliance B: Technical/Security C: Operations D: Awareness E: Other (Specify, please)
Amedeo808 | 1/12/2018 11:22:03 AM | COMMENTS(10)
Hello All, I was asked a question by our senior counsel that has me running in circles: How do we limit/restrict what a 3rd Party can do with our data once we send it to them? Historically, they share documents with external partners and other law offices...
Kyle430 | 1/6/2018 10:05:23 PM | COMMENTS(12)
What is the impact of social media on data privacy in business organisations? Can organisations ban social media  due some risks of sensitive data being shared across?
PRECIOUS785 | 1/3/2018 3:24:39 AM | COMMENTS(11)
what is the information security perspective if the customers reported receiving SMS for transactions they had not performed where this transactions for others customers and sent to them by system error ?
Tarek EL-Sherif | 8/21/2017 6:59:54 PM | COMMENTS(3)

Documents & Publications: 39 total

Must be a Topic member to contribute
View All »
Information Systems Assurance and Control Guideline for Verifing Compliance with Personal Data Protection Act [POLAND]
Posted by JoannaK 1480 days ago
Books
Posted by ISACA 31 days ago
Books
Posted by ISACA 766 days ago
Books
Posted by ISACA 819 days ago

Events & Online Learning: 12 total

Journal Articles: 95 total

Volume 1, 2018
by Mike Van Stone, CISA, CISSP, CPA, and Ben Halpert
Ever-changing laws continue to increase the risk and cost of noncompliance when unintentional data losses occur.
Volume 1, 2018
by Sunil Bakshi, CISA, CRISC, CISM, CGEIT, ABCI, AMIIB, BS 25999 LI, CEH, CISSP, ISO 27001 LA, MCA, PMP
GDPR (Regulation [EU] 2016/679) is a regulation by which the European Parliament, the Council of the European Union and the European Commission intend to strengthen and unify data protection for all individuals within the European Union.
Volume 1, 2018
by Ed Moyle
There are, literally, hundreds (if not thousands) of tools that can be purchased, adapted or applied to forwarding data protection.
Volume 1, 2018
by ISACA | Reviewed by Diana M. Hamono, CISA, CGEIT, COBIT 5 Foundation
This guide explains, in a clear and easy-to-follow manner, the variety of privacy protection legislation and different legal models that exist in many regions of the world.
Volume 1, 2018
by Josh Joy
State-of-the-art cryptographic techniques and methods to protect data owners’ personal data have pros and cons and are continually evolving.
Volume 1, 2018
by William Emmanuel Yu, Ph.D., CRISC, CISM, CISSP, CSSLP
Large amounts of personal data can be exploited to initiate profiling and implement a surveillance economy, which also raises the risk of information leakage, cyberstalking and identify theft.

Wikis: 2 total

Blog Posts: 32 total

My personal thoughts after listening to C-level executives at the CxO Roundtable Series sponsored by Intel, IBM, HyTrust & ReedSmith. For an invite, please reach out to me. Data Protection under the GDPR For past few months, I’ve been helping to org...
Posted By : Thomas152 | 0 comments
Have you experienced ransomware attack so far and, if yes, what did you do to resolve? I set up Twitter poll here: https://twitter.com/DPleskonjic/status/953608717399941120 It lasts for seven days. Thank you for taking part in the poll.
Posted By : Dragan Pleskonjic | 1 comments
Information Security and Privacy is hot issue at present time. Number of security breaches is rapidly increasing.  In case of late detection, costs of breaches are skyrocketing. In the same time Artificial Intelligence (AI), Machine Learning (ML) are fast...
Posted By : Dragan Pleskonjic | 0 comments
My previous blog under name "Dragan on Security" was at location: http://conwex.info/blog/. It was active from August 28, 2005 to October 3, 2012. By beginning of 2017 it is moved to new location http://www.dragan-pleskonjic.com/blog/. With possibility to...
Posted By : Dragan Pleskonjic | 0 comments
La demanda de servicios bancarios a través de Internet, producto del surgimiento de nuevas necesidades en los consumidores atraídos por el auge tecnológico, mantiene a las entidades financieras inmersas en una encrucijada en la cual deben equilibrar el ni...
Posted By : Gerardo Zuñiga | 1 comments
Senior Manager           ultimate responsibility Information security Officer          functional responsibility Security Analyst           Strategic, develops policies and guidelines Owner         - Responsible for asset         - Determine level of clas...
Posted By : Muhammad554 | 0 comments