Browse Topics

Recently Added Resources

Series: Benchmarking your privacy incident management program

This series written for The Privacy Advisor by the team at Radar is about establishing program metrics and benchmarking your privacy incident management program. Radar provides purpose-built software designed to guide users through a consistent, defensible process for incident management and risk assessment. A significant volume of incidents involving regulated personal data is processed through the Radar platform, and that number grows every day. The Radar team will provide analysis of data inc... Read More

U.S. State Responses to PACEI Voter Data Request

IAPP Westin Fellow Cobun Keegan, CIPP/US, CIPM, created this chart of U.S. state responses to letters sent by Kansas Secretary of State Kris Kobach of the Presidential Advisory Commission on Election Integrity asking for a broad set of "publicly available voter roll data." View Chart (PDF 125K)... Read More

WP29 opinion on data processing at work

This opinion, adopted June 8 by the Article 29 Working Party, makes a new assessment of the balance between legitimate interests of employers and the reasonable privacy expectations of employees, taking into consideration new technologies. While primarily concerned with the Data Protection Directive, the opinion looks toward obligations under the General Data Protection Regulation.Read Now (PDF 841K)... Read More

Consent Receipt API

This open source code for a consent receipt API was developed by the Kantara Initiative Consent and Information Sharing Work Group. Access API ... Read More

Bahrain

There is currently no specific data protection authority, however, the Information and e-Government Authority has certain responsibilities pertaining to data held by government entities.  Website: www.iga.gov.bh/ Law Information: Parliament is reviewing a draft law, however it has not yet been published. ... Read More

Write Once Read Many

A data storage device in which information, once written, cannot be modified. This protection offers assurance that the data originally written to the device has not been tampered with. The only way to remove data written to a WORM device is to physically destroy the device.Reference(s) in IAPP Certification Textbooks:T77Acronym(s): WORM... Read More