Read more: Data in the Cloud - Explicit consent, Right of portability, Right to be forgotten
- Details
- Written by Robin Basham
- Parent Category: Regulatory and Compliance
- Category: GDPR European Union Data Protection Directive
- Hits: 1692
Here are some laws that come up frequently in technology conversation and are also most often among questions on security exams.
Read more: Laws - most frequently asked in CISSP exam
Read more: Description Criteria - AICPA Guidance for Cybersecurity Risk Management Program
New York State Department of Financial Services (DFS) first-in-the-nation cybersecurity regulation to protect New York State from the ever-growing threat of cyber-attacks is now in effect. DFS Cybersecurity requires banks, insurance companies, and other financial services institutions regulated by DFS to establish and maintain a cybersecurity program designed to protect consumers and ensure the safety and soundness of New York State’s financial services industry.
Read more: New York Department of Financial Services (“DFS”) Cybersecurity Regulation
Read more: UK Cyber Essential in Brief
We just got our daily update from JDSupra (still LOVE THEM!) titled "California's Shine the Light Law: Latest Class Action Threat for Online Retailers and Electronic Commerce Companies", under the topic of Retail Industry Alert. Here's a link to get you started, because it's important business compliance reading, but that's not why I'm sending you all this letter.
Read more: Are we ready to be a society in the cloud?
While 15% of EU citizens report not trusting businesses with their information, they also lack the tools to securely manage their own private information.
Read more: Data Centric Security and EU General Data Protection Regulation (GDPR)
Me Tarzan, You Jane is my way of reminding everyone that we can't get far without some common language. This month, GDPR and NIST 171 are top of mind around our office. Here's what we found helpful.
Read more: Me Tarzan, You Jane: NIST SP800-171 & GDPR Glossary
Risks in Life Logging - ENISA, because Europe saw it coming
Read more: Privacy Resources - Facts, not Fiction
In order to propose controls that would implement the requirements of the GDPR in UK governed business, EnterpriseGRC Solutions has embarked on mapping the The General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679), a regulation by which the European Parliament, the Council of the European Union and the European Commission intend to strengthen and unify data protection for all individuals within the European Union (EU), to the both NIST 800 53 r4 control enhancements and the HM Government (Her Majesty's) NATIONAL CYBER SECURITY STRATEGY 2016-2021. Please download the National Cyber Security document here National Cyber Security Strategy 2016-2021 - Gov.uk
Read more: National Cyber Security Strategy 2016-2021 - Gov UK
Keith Lipman, Esq. is an outstanding writer and contributor at JDSupra
Read more: Decision 2010/87/EU
Privacy by Design, presented by Marc Vael, President ISACA Belgium
Read more: Marc Vael - Kibersahs 2016
How old is your facebook picture? (No, don't tell me, I don't care.) How much of our privacy obsession is related to truth? For example, the weight on your driver's license was absolutely true, twenty-five years ago. Is misrepresenting ourselves part of privacy or an American obsession with creating an illusion of identity.
In an honest society, what harm can really come of truth?
Read more: Data in the Cloud - Explicit consent, Right of portability, Right to be forgotten
History of controls harmonization is really the history of managing conversations about risk. Cyber Risk Recap: What could go wrong?
Making Process Real, a seminar in preparing to meet new regulations for controls as proposed by the Sarbanes-Oxley Law was presented by Robin Basham, in Boston, MA 2003, while participating on the board of the Association for Women in Computing. This marked the first use of "Maturity Through Process", and was the basis for preparing ISO 9000 compliant companies to map to their needed SOX CobiT controls. The work was implemented through SamePage Software, which would later be branded "Facilitated Compliance Management". The model would be donated to open source and to this day would remain free.
Read more: Maturity vs. Compliance
HIPAA – HITECH, Aligning Secure Host Baselines According to Common Security Framework CSF
Read more: Security, Privacy, Breach Notification and HIPAA
Tools approach to automating ISO27002 ISMS Policy aligned continuous monitoring
Read more: Why Align With ISO/IEC 27002:2013?
I like this privacy policy.
Read more: Example of a Great Web Privacy Policy
Read more: ISO/IEC 27001 Compliance Readiness
Navigating PCI DSS: Understanding the Intent of the Requirements, PCI DSS v3.2