IAPP CIPT – Lawful Processing of HR Data, Contracts & Recruiting Part 2
5. Legitimate interests Hi guys. Let’s discuss about legitimate interest. Another frequently relied on basis for lawful processing of HR data is that it is in the legitimate interest of the business to do so. Under the GDPR processing will be lawful where it is necessary for the purposes of the legitimate interest pursued by… Read More »
IAPP CIPT – Lawful Processing of HR Data, Contracts & Recruiting
1. Where do privacy and HR meet? Hi guys. Let’s discuss about HR and privacy. Maintaining the balance between the protection of the privacy of the workers and the prerogatives of the employer can be tricky in several circumstances, such as in the case of body searches on workers, camera surveillance, geolocation interrogation of workers,… Read More »
IAPP CIPT – Privacy in Systems and Applications Part 2
4. Data Encryption Crypto design and Implementation Considerations deploying encryption for an organization is not an easy task. Different types of encryption may be deployed depending on the scenario, contractual agreements, or regulatory requirements. Encryption size may increase the number of bytes needed for storing the data. When using block chippers such as RSA or… Read More »
IAPP CIPT – Privacy in Systems and Applications
1. Identity and Access Management (IAM) Hi guys. In this lesson, we’ll discuss about identity and access management. Identity management includes the process involved in verifying the identity of an individual, group, process, or device. Identification via most computer systems consists of a person typing her credentials, user ID, and password into an authentication screen.… Read More »
IAPP CIPT – Privacy Considerations & Techniques Part 2
4. Retention Hi, guys. In this lesson, we’ll discuss about retention. Retention refers to the persistence of data by an organization after its collection. Organizations should have policies that govern the retention of data to comply with regulatory requirements, reduce the risks that come from holding too much data for too long, and show their… Read More »
IAPP CIPT – Privacy Considerations & Techniques
1. Collection Hi, guys. In this lesson, we’ll discuss about collection. Collection in the context of this lesson is the process of receiving data from a user, device, or entity. For the most part, collection occurs via an organization’s Web server, though it can occur via download from a third party site or media shipped… Read More »
IAPP CIPT – How Technology can help in achieving GDPR compliance Part 4
7. Security in cloud infrastructure environment demo Hi guys. In this lesson we’ll discuss about securing our cloud infrastructures. So your client or your company already has virtual machines in a cloud platform. Just for this example I will use again microsoft Asia. So you have your virtual machines in cloud and you want to… Read More »
IAPP CIPT – How Technology can help in achieving GDPR compliance Part 3
5. Classification, Labelling and Protection of Information demo (AIP) Hi guys. In this lesson we will discuss about information protection and how we can classify, label and protect the data in files and also in emails. I’ve chosen for this lesson Azure Information Protection. Another tenant from the Azure Cloud platform that I’m using for… Read More »
IAPP CIPT – How Technology can help in achieving GDPR compliance Part 2
3. Privileged Identity Management demo (PIM) Hi guys. In this lesson, we’ll discuss about Privilege Identity management. Asia active directory. Privilege Identity Management allows you to manage, control, and monitor access within your organization. This includes access to resources in Asia Active Directory or all Asia resources that you may see over here. So your… Read More »
IAPP CIPT – How Technology can help in achieving GDPR compliance
1. What you will going to see in this section Hi guys. In this lesson we’ll discuss what you’re going to see in this whole section number eight. And after we manage to fill in and to see all the documents you need to create and use in order to become GDPR compliance, either your… Read More »