IT Governance, Risk, and Compliance

May 20 2013   12:56AM GMT

Revisiting the Safeguarding of Information Assets – Part XVII



Posted by: Robert Davis
Tags:
Information Assets Protection
Information Security
Information Security Governance
Information Security Management
IT Controls
Security Frameworks

Data privacy laws dictate adherence to trusts and obligations associated with any information connected to an identified or identifiable data subject. Personal data privacy generally refers to information that can be associated with a specific individual, or that has identifying characteristics that might be combined with other information or data to identify a specific individual. Sensitive personal data may include items classified as individual preferences, habits, racial or ethnic origin as well as financial or medical condition.

Source:

ISACA. “Privacy.” In Information Systems Standards, Guidelines, and Procedures for Auditing and Control Professionals. Rolling   Meadows, IL: ISACA, September 2005. http://www.isaca.org/AMTemplate.cfm?Section=Standards2&Template=/ContentManagement/ContentDisplay.cfm&ContentID=40571  (accessed May 3, 2008).

Shackelford, Kerry. “eSAC: Privacy Principles.” ITAudit, July 1, 2002. http://www.theiia.org/ITAuditArchive/index.cfm?act=ITAudit.archive&fid=464 (accessed April 22, 2008).

 Comment on this Post

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: