Hitachi Group Global Network




Middle East and Africa



Privacy Resources: Cybersecurity and Privacy
You are here: Home \ Privacy & Security \ Privacy Resources: Cybersecurity and Privacy
Privacy Resources
Posted on Tuesday, January 17th, 2017 by

Protecting Your Online Privacy


There are different ways of approaching digital security from a legislative point of view. Indeed, cybersecurity legal frameworks are usually composed of:


  • System protection

System protection includes provisions that aim at protecting Information Technology (IT) infrastructure. Relevant examples of this are the directives and recommendations directed at the 16 critical infrastructures designated as such by the Obama administration in the Executive Order 13636. As for proprietary information protection, it is often covered by intellectual property regimes and contractual agreements.


  • Data protection

Data protection is widely addressed through the right to privacy, which entails significant restrictions on how personal information has to be stored by organizations.

Some industries are governed by general laws, such as PIPEDA, whereas highly regulated industries such as the financial and healthcare sectors have specific regulations.

For instance, American federal securities laws, and the Financial Industry Regulatory Authority (“FINRA”) rules require that business-related electronic records be kept in “write once, read many” (“WORM”) format, which prevents alteration or destruction. On December 21, 2016, FINRA sanctioned 12 firms based on this requirement, for a total fine of $14.4 million.


  • Proprietary information protection regulations

In this context, it is critical for executives and security professionals alike to understand their obligations in terms of information security under privacy regimes. We gathered a few resources to stay up to date on privacy and cybersecurity:


Privacy and Cybersecurity Resources to Bookmark





Twitter Accounts to Follow

Want to know more and be updated on privacy matters in real-time? Follow these Twitter accounts:







Of course, you can add us on Twitter as well: @HitachiSysSecurity !

Vanessa Henri
About author:
Vanessa Henri holds a Master’s of Law degree from McGill University in Montreal, Canada, and specializes in data security and privacy. Throughout her academic path, she has worked on topics such as cyber-espionage, and her studies on the Dark Web were funded by the Quebec Bar associations, prior to publication in the Canadian Journal for Law and Technologies. She has published a variety of other data privacy-related materials, and has contributed as a speaker to various conferences about data protection law and liabilities. As part of her current role as Director of Legal Affairs and Compliance at Hitachi Systems Security, Vanessa also specializes in the creation of privacy compliance programs for our clients.


Recent Videos

What is Penetration Testing?

What is a Vulnerability Assessment?

What is a Control Assessment?