Sunday, April 18, 2021
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Leadership and Career
  • Vendor News
  • Jobs
    • Compliance & Risk
    • Information Security
  • Events
    • Calendar
    • On-Demand Webinars
    • Submit an Event
  • Downloads
    • eBooks
    • Whitepapers
  • Podcasts
  • Videos
  • Subscribe
No Result
View All Result
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Leadership and Career
  • Vendor News
  • Jobs
    • Compliance & Risk
    • Information Security
  • Events
    • Calendar
    • On-Demand Webinars
    • Submit an Event
  • Downloads
    • eBooks
    • Whitepapers
  • Podcasts
  • Videos
  • Subscribe
No Result
View All Result
Corporate Compliance Insights
Home Uncategorized

ISACA Provides Privacy Guidance as Key Technologies Become Common

by Corporate Compliance Insights
January 25, 2017
in Uncategorized
ISACA Provides Privacy Guidance as Key Technologies Become Common

Robust privacy programs needed to deal with growing set of challenges

Rolling Meadows, IL (January 25, 2017) — Waves of new data – from new technologies and various regulations across the global economy – call for heightened enterprise vigilance to deal with privacy concerns, according to new guidance from global business technology and information security association ISACA.

A wide array of business scenarios – from scanning devices at airports to police body cameras to visual-recording drones – must put privacy among the central considerations, according to the new publication, ISACA Privacy Principles and Program Management Guide. It provides extensive direction on how practitioners and their organizations can effectively govern their privacy programs.

ISACA identified seven categories of privacy every enterprise must address:

  1. Privacy of person, including the right for a person’s body to be free of unauthorized invasion
  2. Privacy of behavior and action, including personal activities, orientations and preferences
  3. Privacy of communication, including telephone conversations, emails and other forms of correspondence
  4. Privacy of data and image, including personal information
  5. Privacy of thoughts and feelings, including religious beliefs and political views
  6. Privacy of location and space, including being free from intrusion
  7. Privacy of association, including the ability for people to freely get together with groups of their choosing

The guide provides a set of privacy principles aligned with the most commonly used privacy standards, frameworks and good practices while filling existing gaps among them to deliver a harmonized privacy framework. Special instruction on how to use the COBIT 5 framework to implement a more robust privacy program is included.

“By establishing a robust privacy governance and management program, organizations around the world can address and successfully mitigate privacy risk throughout the entire enterprise,” said Christos Dimitriadis, Ph.D. CISA, CISM, CRISC, chair of ISACA’s Board of Directors and Group Director of Information Security for INTRALOT.

The release anticipates attention given these and other issues, as Saturday is Data Privacy Day, and ISACA is an International Data Privacy Day champion.

The privacy guide is available for purchase at www.isaca.org/privacy-principles. Additional privacy insights can be found on the ISACA Now blog.

About ISACA

ISACA® (isaca.org) helps professionals around the globe realize the positive potential of technology in an evolving digital world. By offering industry-leading knowledge, standards, credentialing and education, ISACA enables professionals to apply technology in ways that instill confidence, address threats, drive innovation and create positive momentum for their organizations. Established in 1969, ISACA is a global association with more than 140,000 members and certification holders in 187 countries. ISACA is the creator of the COBIT framework, which helps organizations effectively govern and manage their information and technology. Through its Cybersecurity Nexus (CSX), ISACA helps organizations develop skilled cyber workforces and enables individuals to grow and advance their cyber careers.


Previous Post

Oversight Systems and Mastercard Align on Data Analytics and Fraud Detection for Government Agencies

Next Post

What is Your Ethical Culture?

Corporate Compliance Insights

Related Posts

A Holistic Approach to Compliance: Key Focus Areas

March 24, 2021

Thinking Outside the Tick Box

February 22, 2021

Integrated IT Compliance and IT Policy Management

February 4, 2021
Fear Vs. Cost: Overcoming Compliance’s Dual Challenges

Fear Vs. Cost: Overcoming Compliance’s Dual Challenges

December 10, 2020
Next Post
smiling woman cupping her ear to hear better

What is Your Ethical Culture?

2Behavox and CCI webinar: Power of Ai in F
OneTrust offers download to demonstrate privacy management leadership
Top 10 Risk and Compliance Trends

Jump to a Topic:

anti-corruption anti-money laundering/AML Artificial Intelligence/A.I. automation banks board of directors board risk oversight bribery CCPA/California Consumer Privacy Act Cloud Compliance communications management Coronavirus/COVID-19 corporate culture crisis management culture of ethics cyber crime cyber risk data analytics data breach data governance decision-making diversity DOJ due diligence ESG fcpa enforcement actions financial crime GDPR GRC HIPAA information security KYC machine learning monitoring regtech reputation risk risk assessment Sanctions SEC social media risk technology third party risk management tone at the top training whistleblowing
No Result
View All Result

Privacy Policy

Follow Us

  • Facebook
  • Twitter
  • LinkedIn
  • RSS Feed

Category

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Whitepapers

© 2021 Corporate Compliance Insights

No Result
View All Result
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Leadership and Career
  • Vendor News
  • Jobs
    • Compliance & Risk
    • Information Security
  • Events
    • Calendar
    • On-Demand Webinars
    • Submit an Event
  • Downloads
    • eBooks
    • Whitepapers
  • Podcasts
  • Videos
  • Subscribe

© 2021 Corporate Compliance Insights