Tagged - Privacy

Digital Safety Guidelines for International Travel

Use this template to develop digital safety guidelines for international travel.

Guidelines for Compliance With Local Security and Privacy Laws Template

Use this template to develop guidelines for compliance with local security and privacy laws.

Jurisdictional Risk Register and Heat Map Tool

Use this Excel tool as the repository for security and privacy risks in high-risk jurisdictions. Describe the risk profile of key risk scenarios, analyze your risk...

Secure Operations in High-Risk Jurisdictions – Phases 1-3

Use this storyboard to build a process that will identify, assess, and address information security and privacy risks in high-risk jurisdictions.

Microsoft Announces Expansion of Azure Canadian Infrastructure, Offers Data Residency and High Availability

In January, Microsoft announced what it’s calling “the largest expansion of its Canadian-based cloud computing infrastructure” since 2016. Additional availability zones...

Osano Applies for Certified-B Status

Osano recently released its SaaS privacy solution aimed at simplifying compliance and vendor assessments. The product feels familiar, but Osano’s ethical commitment sets...

Demonstrate Data Protection by Design for IT Systems – Executive Brief

Read this Executive Brief to understand why data protection by design will help you demonstrate your commitment to privacy.

Demonstrate Data Protection by Design for IT Systems – Phase 1: Determine What Data Protection by Design Means for You

This phase of the blueprint, Demonstrate Data Protection by Design for IT Systems, will help you use the PbD and DPbD frameworks and help you understand how they apply to...

Demonstrate Data Protection by Design for IT Systems – Phases 1-2

Privacy is fast becoming a non-negotiable part of information security. Being able to demonstrate how your organization designs its systems for privacy will give you an...

Demonstrate Data Protection by Design for IT Systems

Privacy is now considered an integral part of information security. In fact, consumers often want more than a company’s word that their data is secure; they want to see...
  • guided implementation icon
Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us