VIDEO

Managing Privacy Risk and Safeguarding Personal Information


Published: 21 June 2022

Brought to you by Microsoft

In this web conference, panelists discuss how to identify personal information and critical privacy risks arising from data hoarding, overexposure and transfer, assess your privacy compliance against industry and Canadian regulatory bodies, such as the Personal Information Protection and Electronic Documents Act, automate risk mitigation and prevent privacy incidents, manage subject rights requests at scale and respond with confidence, and more.

Managing Privacy Risk and Safeguarding Personal Information

View upcoming IAPP web conferences
CPE credit badge

This content is eligible for Continuing Professional Education credits. Please self-submit according to CPE policy guidelines.

Submit for CPEs

Contributors:

Manny Sahota

Director, Privacy, Regulatory Risk and Compliance, Microsoft

Amrita Dwivedi

Data Privacy, Compliance & Risk Global Black Belt, Microsoft


Tags:

Data securityRisk managementStrategy and governancePrivacyCybersecurity law
VIDEO

Managing Privacy Risk and Safeguarding Personal Information

Published: 21 June 2022


Contributors:

Manny Sahota

Director, Privacy, Regulatory Risk and Compliance, Microsoft

Amrita Dwivedi

Data Privacy, Compliance & Risk Global Black Belt, Microsoft


Brought to you by Microsoft

In this web conference, panelists discuss how to identify personal information and critical privacy risks arising from data hoarding, overexposure and transfer, assess your privacy compliance against industry and Canadian regulatory bodies, such as the Personal Information Protection and Electronic Documents Act, automate risk mitigation and prevent privacy incidents, manage subject rights requests at scale and respond with confidence, and more.

Managing Privacy Risk and Safeguarding Personal Information

View upcoming IAPP web conferences
CPE credit badge

This content is eligible for Continuing Professional Education credits. Please self-submit according to CPE policy guidelines.

Submit for CPEs

Tags:

Data securityRisk managementStrategy and governancePrivacyCybersecurity law

Related resources