IT Governance, Risk, and Compliance:

May, 2013

1

May 25, 2013  11:51 PM

Revisiting the Safeguarding of Information Assets – Part XIX



Posted by: Robert Davis
Information Assets Protection, Information Security, Information Security Governance, Information Security Management, IT Controls, Security Frameworks

Since contracts, transactions and disputes relating to information assets can involve parties, actions and evidence in multiple distinct jurisdictions, it may be advantageous for entities to clarify existing rules or presumptions regarding the laws pertinent to IAP.  Additionally, assuming...

May 25, 2013  11:43 PM

Revisiting the Safeguarding of Information Assets – Part XVIII



Posted by: Robert Davis
Information Assets Protection, Information Security, Information Security Governance, Information Security Management, IT Controls, Security Frameworks

Intellectual property laws address something produced by the mind, of which the ownership or right to usage is legally protected. Intellectual property can denote knowledge-based assets as well as capital, including information or data that can result in intellectual capital extending to ideas,...


May 20, 2013  12:56 AM

Revisiting the Safeguarding of Information Assets – Part XVII



Posted by: Robert Davis
Information Assets Protection, Information Security, Information Security Governance, Information Security Management, IT Controls, Security Frameworks

Data privacy laws dictate adherence to trusts and obligations associated with any information connected to an identified or identifiable data subject. Personal data privacy generally refers to information that can be associated with a specific individual, or that has identifying characteristics...


May 17, 2013  1:49 AM

Revisiting the Safeguarding of Information Assets – Part XVI



Posted by: Robert Davis
Information Assets Protection, Information Security, Information Security Governance, Information Security Management, IT Controls, Security Frameworks

Security laws can decree the required degree of protection for property, usually based on governmental interest. Specifically, information security laws may outline control measures to prevent unauthorized access to devices that process sensitive data. Inclusively, directed data control measures...


May 12, 2013  4:48 PM

Revisiting the Safeguarding of Information Assets – Part XV



Posted by: Robert Davis
Information Assets Protection, Information Security, Information Security Governance, Information Security Management, IT Controls, Security Frameworks

Information systems may be of a public or private nature, and contain elements protected by various data security, data privacy, or intellectual property laws. Property classification into public and private categories is based on ownership. If the property is owned by the government or a political...


May 9, 2013  9:41 PM

Revisiting the Safeguarding of Information Assets – Part XIV



Posted by: Robert Davis
Information Assets Protection, Information Security, Information Security Governance, Information Security Management, IT Controls, Security Frameworks

Information systems related due care dictates appropriate data security due diligence activities. Interpretively, an entity’s information systems should represent resources committed to collecting data, processing transactions, and communicating operational results within defined legal limits. An...


May 5, 2013  7:14 PM

Revisiting the Safeguarding of Information Assets – Part XIII



Posted by: Robert Davis
Information Assets Protection, Information Security, Information Security Governance, Information Security Management, IT Controls, Security Frameworks

Prescriptively; utilizing security, privacy and intellectual property clauses in contractual agreements may aid in clarifying expectations as well as reduce adverse outcomes in post-facto legal disputes. Parties to information asset related contracts should consider documenting terms for: •...


May 2, 2013  10:18 PM

Revisiting the Safeguarding of Information Assets – Part XII



Posted by: Robert Davis
Information Assets Protection, Information Security, Information Security Governance, Information Security Management, IT Controls, Security Frameworks

Complicating laws and regulations alignment are trans-border communication requirements regarding information protection and confidentiality. The potentially costly task of obtaining data delivery consent from all affected parties may be the only enabling trans-border information flow baseline....


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: