Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

Category: Compliance
You are here: Home \ Compliance
Cybersecurity Crossword Puzzle
Posted on Tuesday, March 12th, 2019 by
Here is our new crossword puzzle for your entertainment, this time about the topic of data privacy! Put your data privacy knowledge to the test and let us know if you'll be able to crack it in less than 3 minutes... Good luck!

Topics: Compliance, Privacy & Security, Tips & Tricks

Posted on Tuesday, March 5th, 2019 by
Similar to what is currently being applied by the European Union via the General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA) brings to the United States a new set of data privacy rights and compliance obligations. What does this mean for organizations? In short, businesses inside and outside of California may be affected by this new privacy legislation. Business owners, executives and privacy professionals should therefore prepare for January 1, 2020.

Topics: Compliance, Cyber Law, Privacy & Security, Tips & Tricks, Uncategorized

Posted on Tuesday, February 19th, 2019 by
In today’s digital world, companies of all types and sizes need to protect their critical data assets against cyberattacks and data breaches. Privacy obligations such as GDPR, CCPA and PIPEDA have required organizations to step up their privacy game to demonstrate compliance with mandatory privacy breach notification, reporting and record-keeping. Although more and more organizations have implemented basic compliance exercises, many are still at a loss when it comes to managing, monitoring and reporting on their privacy obligations. This blog article answers key questions about how organizations can leverage strategic reporting frameworks to understand their inherent risks, determine their target maturity and report effectively on their various data privacy obligations.

Topics: Compliance, Cyber Law, Cybersecurity Posture, IoT Security, Managed Security Services, Privacy & Security, Security Practices

nymity_privacy_webinar
Posted on Tuesday, February 5th, 2019 by
If you look at the title of this blog article and aren’t sure what to answer, you’re not alone. Even industry veterans find it hard to disentangle cybersecurity and data privacy. There is a good reason for this. They are associated, even intrinsically linked, and they both have to deal with nefarious elements that would do...

Topics: Cloud Security, Compliance, Cybersecurity Posture, Digital Transformation, ICS Security, Internet of Things, Managed Security Services, Office 365 Security, Penetration Testing, Phishing, Privacy & Security, Security Practices, Vulnerability Assessment

Data privacy is the fundamental right of us
Posted on Tuesday, January 29th, 2019 by
Is Data Privacy Beneficial to the Business or Just the Customer?   2019 has started with a data privacy bang. The French National Data Protection Commission (CNIL) has fined Google around $57 million for privacy violations under the GDPR. The ruling was based on non-compliance with consent to process data as outlined in the General...

Topics: BIg Data, Compliance, Cyber Law, Enterprise Security Architecture, Managed Security Services, Penetration Testing, Security Practices, Tips & Tricks

Digital Privacy Act Canada
Posted on Tuesday, January 8th, 2019 by
In order to harmonize the Canadian requirements to the General Data Protection Regulation (GDPR) in the European Union, the Government of Canada issued final provisions on the mandatory reporting and recording of privacy breaches according to Canada’s PIPEDA. The new regulations, also known as the Digital Privacy Act, came into force on November 1st, 2018. Under the Digital Privacy Act, Canadian and non-Canadian organizations subject to PIPEDA will need to take necessary steps for compliance. This amendment to Canadian federal law primarily relates to three areas: 1. Data breach record keeping, 2. Data breach reporting and 3. Data breach notification.

Topics: Compliance, Cyber Law, Privacy & Security

Big Data Privacy_Hitachi Systems Security
Posted on Tuesday, December 11th, 2018 by
Whatever else it may bring, 2019 will be a breakout year for online privacy, as the EU’s GDPR takes root and other nations follow suit. But not everyone is on board. Who will be the privacy leaders and laggards in the New Year?

Topics: Compliance, Privacy & Security, Uncategorized

GDPR Privacy by Design
Posted on Tuesday, June 5th, 2018 by
The GDPR imposes Privacy by Design and privacy as the default setting to all controllers. This does not translate in a to do list for the controller. Instead, the controller is expected to implement “appropriate” technical and organizational measures that are designed to implement data protection principles in an effective manner and to ensure that, by default, only personal data is processed that is necessary for each specific purpose of the processing.

Topics: Compliance, Privacy & Security

GDPR Canada
Posted on Friday, May 18th, 2018 by
Canadian companies, even those located outside of the EU, must comply with GDPR requirements if they are controlling or processing data from EU residents. Performing assessments or better yet, building a comprehensive compliance program, does not only help Canadian organizations achieve GDPR compliance but also help align with other compliance requirements on an ongoing basis.

Topics: Compliance, Privacy & Security

cis controls and gdpr compliance
Posted on Tuesday, May 15th, 2018 by
The Center for Information Security (CIS) provides some highly-effective and adequate security controls that help organizations comply with GDPR. The following sections describe some top CIS controls as well as their benefits for GDPR compliance.

Topics: CISO, Compliance, Controls, Privacy & Security

Latest Webinars | Watch Now

 

The Next Generation of Managed Security, in collaboration with PCM.

Watch Now

Reporting Data Privacy Obligations to the Board: A Practical Approach to Ongoing Compliance, in collaboration with Nymity.

Watch Now

Subscribe

Recent Videos

What is Penetration Testing?

What is a Vulnerability Assessment?

What is a Control Assessment?


More