Purchase the PDF Download: Member US $35 | Non-Member US $70
Purchase the Book: Member US $45 | Non-Member US $90
Special Savings! Purchase the Book Format at the regular price and
buy the eBook for just: Member US $15 | Non-Member US $30
Special Offer for 2 Privacy Books!
Purchase this pdf/book and Implementing a Privacy Protection Program: Using COBIT 5 Enablers With the ISACA Privacy Principles, and enjoy the following special pricing for both!
Purchase both in PDF Format: Member US $75 | Non-Member US $150
Purchase both in Book Format: Member US $95 | Non-Member US $180
Provide feedback on this document
View News Release
Visit the Privacy/Data Protection Knowledge Center community
Implementing a Privacy Protection Program: Using COBIT 5 Enablers With the ISACA Privacy Principles
FREE Infographic: The Seven Categories of Privacy That Every Enterprise Must Address
As connected devices proliferate and the volume of data about individual users continues to increase, individuals are understandably increasingly concerned about their personal and online privacy. In response, numerous governments throughout the world have drafted legislation governing how individual privacy is treated. Navigating this landscape can be a challenging exercise – particularly given an increasingly interdependent global economy.
The ISACA Privacy Principles and Program Management Guide outlines core principles that individuals and organizations can use to ensure data privacy protection. Specifically, you’ll discover the latest privacy best practices, governing regulation, and explore topics such as:
- An overview of the legal models, privacy protection concepts, and the regulatory frameworks in place impacting privacy throughout the world
- Privacy issues arising from new technologies including IoT, wearables, big data, mobile, and other emerging areas
- The ISACA privacy principles – a set of principles designed with consideration to privacy models throughout the world and designed to provide a practical resource for organizations wishing to develop a robust privacy model
- Information on privacy principle integration with - and harmonization to – the COBIT 5 framework
- Practical guidance on establishing and maintaining a privacy protection program
The Seven Categories of Privacy
When considering approaches to address potential privacy threats, you must acknowledge that privacy has multiple dimensions, and those dimensions can be used to define taxonomies of privacy problems, intrusions or categories. Enterprises must consider and address these seven categories of privacy with security controls and with appropriate privacy practices. Keep in mind that these categories are not mutually exclusive; many of the examples and real-life situations, in general, will fall into more than one category. Risk related to each privacy category can be identified with the use of an effective privacy impact assessment (PIA).
To illustrate these important privacy considerations, ISACA has developed a FREE Infographic: The Seven Categories of Privacy Every Enterprise Must Address. Offering explanations and examples of the seven privacy dimensions defined by ISACA in their new publication, this chart is available for FREE download today!