Singapore's Personal Data Protection Commission released new guidelines for data protection associated with deploying blockchain applications that process personal information. The guidance seeks to cover data-protection-by-design principles and potential accountability management measures to ensure safeguards within blockchain apps.
Guide on Personal Data Protection Considerations for Blockchain Design

CDPO, CDPO/BR, CDPO/FR, CIPM, CIPP/A, CIPP/C, CIPP/E, CIPP/G, CIPP/US, CIPT, LGPD
Credits: 2
Related Stories
GDPR at Five
As privacy pros look toward the future, the GDPR’s influence looms large. For privacy pros looking back over the past five years, it is clear that policymakers, companies, and regulators have zeroed in on the importance of privacy to businesses, citizens, and societies. These statistics point to the...
2023 IAPP Privacy Professionals Salary Survey
This report explores the compensation, both financial and nonfinancial, offered to privacy professionals, with a focus on understanding key impacts on compensation, such as education, experience, motivation and job satisfaction, as well as the nature and size of employers. This report aims to provid...
2023 IAPP Privacy Professionals Salary Survey – Executive Summary
This report explores the compensation, both financial and nonfinancial, offered to privacy professionals, with a focus on understanding key impacts on compensation, such as education, experience, motivation and job satisfaction, as well as the nature and size of employers. This report aims to provid...
US State Privacy Legislation Tracker
This tool tracks proposed comprehensive US state privacy bills from across the country to aid our members' efforts to stay abreast of the changing state-privacy landscape....
Web Conference: The building blocks for managing privacy risks at Square Enix
Original broadcast date: 11 May 2023
In this web conference, panelists will address how to collaborate with data owners across the organization to complete privacy and data protection impact assessments, how to mitigate privacy risk by operationalizing remediation efforts, how to map business pro...