Implementing a Privacy Protection Program: Using COBIT 5 Enablers With the ISACA Privacy Principles 

 

   Purchase the PDF Download:  Member US $50 | Non-Member US $90
Bookstore  Purchase in Book Format:  Member US $60 | Non-Member US $100
Bookstore Special Savings! Purchase the Book Format at the regular price and 
        buy the eBook for just:  Member US $15 | Non-Member US $30

Special Offer for 2 Privacy Books!

Purchase this pdf/book and its predecessor, ISACA Privacy Principles and Program Management Guide, and enjoy the following special pricing for both!

   Purchase both in PDF Format:  Member US $75 | Non-Member US $150
Bookstore  Purchase both in Book Format:  Member US $95 | Non-Member US $180


  Provide feedback on this document
Knowledge Center  Visit the Privacy/Data Protection Knowledge Center community

Related Items

  Free Infographic: Connecting Privacy Activities with COBIT 5 Principles
  Free Infographic: Privacy Behaviors at the Individual and Organizational Levels 
  ISACA Privacy Principles and Program Management Guide 
  FREE Infographic: The Seven Categories of Privacy That Every Enterprise Must Address

Privacy breaches can lead to a series of troubling outcomes for enterprises, as well as causing significant harm to the people and relationships affected. Enterprises may suffer financial loss and reputational damage, be charged with failure to comply with regulations and legislation, and alienate key stakeholders who demand safety of personal information. The best way to avoid or mitigate the fallout from these breaches is to establish and maintain a formal privacy protection program within the enterprise.

ISACA’s Implementing a Privacy Protection Program: Using COBIT 5 Enablers With the ISACA Privacy Principles outlines core principles that individuals and organizations can use to optimize a privacy program based on the COBIT 5 framework for governance of enterprise IT. Comprehensive application of the COBIT 5 enablers helps to build a privacy program that conforms with ISACA’s privacy principles, which align with the most commonly used privacy standards, frameworks and good practices, as well as fill in the gaps that exist among these standards.

This book continues the work begun in ISACA’s publication ISACA Privacy Principles and Program Management Guide. That volume laid the groundwork for understanding the critical need for and the purpose, roles and responsibilities of an effective enterprise privacy program. This publication, which functions as a “volume 2” to ISACA Privacy Principles and Program Management Guide, takes the implementation phase of establishing a privacy program one step further by focusing on the role of the COBIT 5 enablers in the implementation process. Enablers support a holistic approach to identifying, implementing and monitoring all the components in processes and systems.

In addition, ISACA has created two companion infographics. To provide a better understanding of the interaction between COBIT 5 principles and standard privacy activities in an organization, the free infographic. Connecting Privacy Activities with COBIT 5 Principles, offers a convenient way to understand COBIT’s role in developing a privacy program. Another free infographic, Privacy Behaviors at the Individual and Enterprise Levels, shows how privacy programs impact the cultures of an organization. Download your free copies today!