ISACA Privacy Principles and Program Management Guide 

 

   Purchase the PDF Download:  Member US $35 | Non-Member US $70
Bookstore  Purchase the Book:  Member US $35 | Non-Member US $70

  Provide feedback on this document
  View News Release
Knowledge Center  Visit the Privacy/Data Protection Knowledge Center community

Related Item

  FREE Infographic: The Seven Categories of Privacy That Every Enterprise Must Address

 

As connected devices proliferate and the volume of data about individual users continues to increase, individuals are understandably increasingly concerned about their personal and online privacy. In response, numerous governments throughout the world have drafted legislation governing how individual privacy is treated. Navigating this landscape can be a challenging exercise – particularly given an increasingly interdependent global economy.

The ISACA Privacy Principles and Program Management Guide outlines core principles that individuals and organizations can use to ensure data privacy protection. Specifically, you’ll discover the latest privacy best practices, governing regulation, and explore topics such as:

  • An overview of the legal models, privacy protection concepts, and the regulatory frameworks in place impacting privacy throughout the world
  • Privacy issues arising from new technologies including IoT, wearables, big data, mobile, and other emerging areas
  • The ISACA privacy principles – a set of principles designed with consideration to privacy models throughout the world and designed to provide a practical resource for organizations wishing to develop a robust privacy model
  • Information on privacy principle integration with - and harmonization to – the COBIT 5 framework
  • Practical guidance on establishing and maintaining a privacy protection program

The Seven Categories of Privacy

When considering approaches to address potential privacy threats, you must acknowledge that privacy has multiple dimensions, and those dimensions can be used to define taxonomies of privacy problems, intrusions or categories. Enterprises must consider and address these seven categories of privacy with security controls and with appropriate privacy practices. Keep in mind that these categories are not mutually exclusive; many of the examples and real-life situations, in general, will fall into more than one category. Risk related to each privacy category can be identified with the use of an effective privacy impact assessment (PIA).

To illustrate these important privacy considerations, ISACA has developed a FREE Infographic: The Seven Categories of Privacy Every Enterprise Must Address. Offering explanations and examples of the seven privacy dimensions defined by ISACA in their new publication, this chart is available for FREE download today!