CIPM Companion links

CIPM Companion links

“IAPP-EY Annual Privacy Governance Report of 2016.”

Australian Bankers Association (Association des banquiers australiens) :

Hong Kong Trade Development Council (HKTDC):

IAPP. “From Here to DPO.”

Shaw, Thomas. “What Skills Should Your DPD Absolutely Have?” The Privacy Advisor 24 janvier 2017.


WP29. “Guidelines on Data Protection Officers (‘DPDs’).”


Tech Donut. “Sample Data Protection Policy Template.” Consulté le 3 mai 2017.


Eric Dieterich et Ana Rodgers. “‘Best of’ the Canada Privacy Symposium 2015: Building a Privacy Practice from Ground Zero.”


IAPP. “2017 Privacy Tech Vendor Report.”

OCEG. “GRC Defined.” Consulté le 8 mars 2017.

Rodriguez, Deidre. “10 Etapes vers un programme de protection de la vie privée de qualité: Part One.” 24 juin 2013. Consulté le 4 mai 2017.

DPA overview

OPC. “Directives pour le traitement transfrontalier de données personnelles.”

Siegel, Bob. “For a Successful Privacy Program, Use These Three A’s.” The Privacy Advisor. IAPP.

IAPP et OneTrust. “DPIA and Data Mapping – Operationalizing GDPR and Privacy by Design.”

IAPP et TRUSTe. “Preparing for the GDPR: DP0s, DPIAs, and Data Mapping.” 2016.


WP29. “Guidelines on Data Protection Impact Assessment (DPIA).”

DPIA Template,-templates-and-forms


FDIC. “Privacy Impact Assessments.”


Siegel, Bob. “Accountability and Adaptability: Two of the Three ‘A’s of a Successful Privacy Program.” The Privacy Advisor. IAPP.

Royal, K. “Third-Party Vendor Management Means Managing Your Own Risk.” The Privacy Advisor. IAPP. 2015.

Pahl, Chris. “Building a Program that Provides Value: Making Your Communication Matter.” The Privacy Advisor. IAPP. 16 novembre 2017. Consulté le 23 mai 2017.

IAPP Organizational Privacy policies:

Michigan House of Representatives. “Guest Wireless Access Acceptable Use Policy.”


Berry, Megan. “Cloud Computing Policy Template.” IT Manager Daily

Loyola University. “Cloud Computing Policy.”

Perot, Trista. “Data Retention Policy Series.” Global Data Vault, June 2012.

Bustin, Kim. “Practical Strategies for Creating a Privacy Culture in Your Organization.” The Privacy Advisor. IAPP. 1er septembre 2010. Consulté le 22 mai 2017.

Bureau du Commissaire à l’information (Royaume-Uni). “Privacy Notices, Transparency and Control.” 7 octobre 2016. Consulté le 24 mai 2017.

Bureau du Commissaire à l’information (Royaume-Uni). “Consultation: Lignes directrices concernant le consentement dans la RGPD.”

Commissariat à la protection de la vie privée du Canada. “Guidelines for Online Consent.” Mai 2014. .

Bureau du Commissaire à l’information (Royaume-Uni). “Consultation: Lignes directrices concernant le consentement dans la RGPD.” 2-31 mars 2017.


Union européenne. Règlement général sur la protection des données.


IAPP et TRUSTe. “How IT and InfoSec Value Privacy.” Mars 2016.

Cronk, R Jason. “Embedding Privacy by Design.” Conférence Web enregistrée de l’IAPP 2 décembre 2016.

Thierer, Adam. “CES 2015 Dispatch: Challenges Multiply for Privacy Professionals. Privacy Perspectives. IAPP. 14 janvier 2015.

Ponemon Institute. “2017 Cost of Data Breach Study: Global Analysis.” IBM/Ponemon Institute LLC, juin 2017.

Verizon. “2017 Data Breach Investigations Report.” .

One Trust Alliance. “Data Protection and Breach Readiness Guide.” 2016. .

Bruemmer, Michael. “Top Five Company Fails in Prepping for a Breach” The Privacy Advisor. IAPP. 23 août 2016.

Holmes, Dennis. “Managing Your Data Breach: Seven Steps to Breach Preparedness.” IAPP.

Hogan Lovells. “Incident Response Plan Checklist.” 16 novembre 2016.

Hogan Lovells. “Read, set, respond.”


Holmes, Dennis. “Managing Your Data Breach: Maximizing the Relationships That Count to Manage Costs and Business Impact.” Centre de ressources de l’IAPP. Consulté le 13 juillet 2017.

FTC. “Data Breach Response: A Guide for Business.” Septembre 2016. Consulté le 5 juin 2017.

“Breach Incident Reporting Form” de l’IAPP. Consulté le 13 juillet 2017.

IAPP. “Sample Breach Notification Letters.” Consulté le 13 juillet 2017.

“Breach Incident Reporting Form” de l’IAPP. Consulté le 13 juillet 2017.

Gannon, Michael, Samanth Melnick, et Rebecca Rosati. “Predictive Data Breach Cost Model.” 13 décembre 2016. Consulté le 13 juillet 2017.

IBM/Ponemon. “Cost of a Data Breach Calculator.” 2017. Consulté le 13 juillet 2017.

Hayward, Rachel. “From Devastation to Salvation: How to Benefit from a Breach.” The Privacy Advisor. IAPP. 20 juin 2016. Consulté le 13 juillet 2017.

Carson, Angelique. “How to Measure Your Privacy Program, Step-by-Step.” The Privacy Advisor. IAPP. 16 mai 2014. Consulté le 20 juin 2017.

Pahl, Chris. “Building a Program that Provides Value: Using Meaningful Metrics.” The Privacy Advisor. IAPP. 26 septembre 2016. Consulté le 20 juin 2017.

IBM. “Business Resilience: The Best Defense Is a Good Offense.” Janvier 2009. Consulté le 13 juillet 2017.

OPC et OIPC d’Alberta et de Colombie britannique. “Getting Accountability Right with a Privacy Management Program.” Consulté le 25 avril 2017.