Use this template to develop digital safety guidelines for international travel.
|
|
Use this template to develop guidelines for compliance with local security and privacy laws.
|
|
Use this Excel tool as the repository for security and privacy risks in high-risk jurisdictions. Describe the risk profile of key risk scenarios, analyze your risk...
|
|
Use this storyboard to build a process that will identify, assess, and address information security and privacy risks in high-risk jurisdictions.
|
|
In January, Microsoft announced what it’s calling “the largest expansion of its Canadian-based cloud computing infrastructure” since 2016. Additional availability zones...
|
|
Osano recently released its SaaS privacy solution aimed at simplifying compliance and vendor assessments. The product feels familiar, but Osano’s ethical commitment sets...
|
|
Read this Executive Brief to understand why data protection by design will help you demonstrate your commitment to privacy.
|
|
This phase of the blueprint, Demonstrate Data Protection by Design for IT Systems, will help you use the PbD and DPbD frameworks and help you understand how they apply to...
|
|
Privacy is fast becoming a non-negotiable part of information security. Being able to demonstrate how your organization designs its systems for privacy will give you an...
|
|
Privacy is now considered an integral part of information security. In fact, consumers often want more than a company’s word that their data is secure; they want to see...
|
|