Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

Category: Compliance
You are here: Home \ Compliance
Big Data Privacy_Hitachi Systems Security
Posted on Tuesday, December 11th, 2018 by
Whatever else it may bring, 2019 will be a breakout year for online privacy, as the EU’s GDPR takes root and other nations follow suit. But not everyone is on board. Who will be the privacy leaders and laggards in the New Year?

Topics: Compliance, Privacy & Security, Uncategorized

GDPR Privacy by Design
Posted on Tuesday, June 5th, 2018 by
The GDPR imposes Privacy by Design and privacy as the default setting to all controllers. This does not translate in a to do list for the controller. Instead, the controller is expected to implement “appropriate” technical and organizational measures that are designed to implement data protection principles in an effective manner and to ensure that, by default, only personal data is processed that is necessary for each specific purpose of the processing.

Topics: Compliance, Privacy & Security

GDPR Canada
Posted on Friday, May 18th, 2018 by
Canadian companies, even those located outside of the EU, must comply with GDPR requirements if they are controlling or processing data from EU residents. Performing assessments or better yet, building a comprehensive compliance program, does not only help Canadian organizations achieve GDPR compliance but also help align with other compliance requirements on an ongoing basis.

Topics: Compliance, Privacy & Security

cis controls and gdpr compliance
Posted on Tuesday, May 15th, 2018 by
The Center for Information Security (CIS) provides some highly-effective and adequate security controls that help organizations comply with GDPR. The following sections describe some top CIS controls as well as their benefits for GDPR compliance.

Topics: CISO, Compliance, Controls, Privacy & Security

Facts Myths - GDPR
Posted on Tuesday, May 8th, 2018 by
Understand what GDPR compliance is really about, why ticking a checkbox is not enough, and how you can approach your GDPR compliance efforts for lasting success.

Topics: Compliance, Privacy & Security

Data Protection Officer
Posted on Tuesday, April 17th, 2018 by
How to determine whether you need to hire, promote or assign a Data Protection Officer; and how to choose your DPO efficiently.

Topics: Compliance, Privacy & Security

Incident Response Planning - Hitachi Systems Security
Posted on Tuesday, April 3rd, 2018 by
Each jurisdiction imposes data protection standards with regards to when and how organizations should or must disclose data breaches. This allows individuals whose personal information has been compromised to take remedial steps to avoid potential adverse consequences, such as financial losses or identity theft. As part of our 5-part series, this article dives deeper into the different jurisdictions that organizations in today’s globalized world may be subject to.

Topics: Compliance, Cyber Law, Incident Response

GDPR - FAQ
Posted on Tuesday, December 19th, 2017 by
The GDPR came into effect on May 25, 2018 and has been raising numerous questions among organizations that handle data in Europe. We gathered the questions and answers from our customers: 1. Are Organizations Ready for GDPR Compliance? 2. Backup and Right to Be Forgotten 3. GDPR Challenges 4. Cloud Partners and GDPR Compliance 5. GDPR Penalties 6. GDPR 72 Hour Breach Notification 7. Data Portability

Topics: Compliance, Security Practices

Posted on Wednesday, December 6th, 2017 by
How Uber breach impacted 57 million customer records, and how to prevent it from happening to your business. Here are 5 defensive tactics that would have been effective in preventing Uber’s loss of customer data.

Topics: Cloud Security, Compliance, Control Assessment, Security Practices, Threat Risk Assessments

data breach
Posted on Tuesday, October 31st, 2017 by
Third-party vendors with lax security can pose significant risks to your network and data. Here are the data breach risks and how to reduce them.

Topics: Compliance, Managed Security Services, Security Practices

Subscribe

Recent Videos

What is Penetration Testing?

What is a Vulnerability Assessment?

What is a Control Assessment?


More