Tagged - PbD

Privacy Framework Tool

The key deliverable in the Data Privacy Program blueprint, the Data Privacy Framework takes into account the current state of privacy and provides you with the steps to...

Build a Data Privacy Program – Executive Brief

Read this Executive Brief to understand why Info-Tech's approach to Data Privacy is unique and how applying a quantitative lens to an often qualitative subject will help...

Build a Data Privacy Program – Phases 1-4

Sell privacy to the business by speaking a language they understand. Take a quantitative approach to integrating privacy within the scope of your organization and build a...

Build a Data Privacy Program – Phase 1: Collect Privacy Requirements

This phase of the blueprint, Build a Data Privacy Program, will help you to understand the key drivers and expectations of privacy from all areas of your organization.

Build a Data Privacy Program – Phase 2: Conduct a Privacy Gap Analysis

This phase of the blueprint, Build a Data Privacy Program, will help you to understand the current state of privacy, identify the target state, and develop gap-closing...

Privacy Analysis by Business Unit Tool

A condensed version of the Data Privacy Framework, this tool emphasizes four key areas of the data privacy framework that can be applied at a more granular, business-unit...

Build a Data Privacy Program – Phase 3: Build the Privacy Roadmap

This phase of the blueprint, Build a Data Privacy Program, will help you to prioritize initiatives based on a collective score that takes into account cost, effort,...

Demonstrate Data Protection by Design for IT Systems

Privacy is now considered an integral part of information security. In fact, consumers often want more than a company’s word that their data is secure; they want to see...
  • guided implementation icon

Demonstrate Data Protection by Design for IT Systems – Executive Brief

Read this Executive Brief to understand why data protection by design will help you demonstrate your commitment to privacy.

Demonstrate Data Protection by Design for IT Systems – Phases 1-2

Privacy is fast becoming a non-negotiable part of information security. Being able to demonstrate how your organization designs its systems for privacy will give you an...
Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us