CIPM Companion links
“IAPP-EY Annual Privacy Governance Report of 2016.”
https://iapp.org/news/a/2016-annual-iapp-ey-privacy-governance-report-released-2/
Australian Bankers Association (Association des banquiers australiens) : http://www.bankers.asn.au/Privacy-Policy
Hong Kong Trade Development Council (HKTDC): http://www.hktdc.com/mis/pps/en/Privacy-Policy-Statement.html
IAPP. “From Here to DPO.” https://iapp.org/resources/article/from-here-to-dpo-building-a-data-protection-officer/
Shaw, Thomas. “What Skills Should Your DPD Absolutely Have?” The Privacy Advisor 24 janvier 2017. https://iapp.org/news/a/what-skills-should-your-dpo-absolutely-have/
WP29. “Guidelines on Data Protection Officers (‘DPDs’).” http://ec.europa.eu/newsroom/article29/item-detail.cfm?item_id=612048
Tech Donut. “Sample Data Protection Policy Template.” Consulté le 3 mai 2017. https://iapp.org/resources/article/sample-data-protection-policy-template-2/
Eric Dieterich et Ana Rodgers. “‘Best of’ the Canada Privacy Symposium 2015: Building a Privacy Practice from Ground Zero.” https://iapp.org/resources/article/building-a-privacy-program-from-ground-zero
IAPP. “2017 Privacy Tech Vendor Report.” https://iapp.org/resources/article/2017-privacy-tech-vendor-report/
OCEG. “GRC Defined.” Consulté le 8 mars 2017. http://www.oceg.org/about/what-is-grc/
Rodriguez, Deidre. “10 Etapes vers un programme de protection de la vie privée de qualité: Part One.” 24 juin 2013. Consulté le 4 mai 2017. https://iapp.org/news/a/10-steps-to-a-quality-privacy-program-part-one1/
DPA overview
https://iapp.org/resources/dpa/
OPC. “Directives pour le traitement transfrontalier de données personnelles.” https://www.priv.gc.ca/en/privacy-topics/personal-information-transferred-across-borders/gl_dab_090127/
Siegel, Bob. “For a Successful Privacy Program, Use These Three A’s.” The Privacy Advisor. IAPP. https://iapp.org/news/a/for-a-successful-privacy-program-use-these-three-as/
IAPP et OneTrust. “DPIA and Data Mapping – Operationalizing GDPR and Privacy by Design.” https://iapp.org/resources/article/pias-and-data-mapping-operationalizing-gdpr-and-privacy-by-design/
IAPP et TRUSTe. “Preparing for the GDPR: DP0s, DPIAs, and Data Mapping.” 2016. https://iapp.org/resources/article/preparing-for-the-gdpr-dpos-pias-and-data-mapping/
https://iapp.org/media/pdf/resource_center/Tech-Vendor-Directory-1.3-electronic.pdf
WP29. “Guidelines on Data Protection Impact Assessment (DPIA).” http://ec.europa.eu/newsroom/article29/item-detail.cfm?item_id=611236
DPIA Template https://iapp.org/resources/topics/privacy-impact-assessment-2/#samples,-templates-and-forms
FDIC. “Privacy Impact Assessments.” https://www.fdic.gov/about/privacy/assessments.html
Siegel, Bob. “Accountability and Adaptability: Two of the Three ‘A’s of a Successful Privacy Program.” The Privacy Advisor. IAPP. https://iapp.org/news/a/accountability-and-adaptability-two-of-the-three-as-of-a-successful-privacy-program/
Royal, K. “Third-Party Vendor Management Means Managing Your Own Risk.” The Privacy Advisor. IAPP. 2015. https://iapp.org/resources/article/third-party-vendor-management-means-managing-your-own-risk-3/
Pahl, Chris. “Building a Program that Provides Value: Making Your Communication Matter.” The Privacy Advisor. IAPP. 16 novembre 2017. Consulté le 23 mai 2017. https://iapp.org/news/a/building-a-program-that-provides-value-making-your-communication-matter/
IAPP Organizational Privacy policies: https://iapp.org/resources/topics/organizational-privacy-policies/
Michigan House of Representatives. “Guest Wireless Access Acceptable Use Policy.” http://house.michigan.gov/wifi_policy.asp
- Université Northwestern: http://www.it.northwestern.edu/policies/dataaccess.html
- Association of Washington Public Hospital Districts : https://iapp.org/resources/article/information-systems-access-policy/
Berry, Megan. “Cloud Computing Policy Template.” IT Manager Daily. http://www.itmanagerdaily.com/cloud-computing-policy-template/
Loyola University. “Cloud Computing Policy.”
Perot, Trista. “Data Retention Policy Series.” Global Data Vault, June 2012. https://www.globaldatavault.com/blog/data-backup-developing-an-effective-data-retention-policy/
http://www.luc.edu/its/itspoliciesguidelines/cloud_computing_policy.shtml
Bustin, Kim. “Practical Strategies for Creating a Privacy Culture in Your Organization.” The Privacy Advisor. IAPP. 1er septembre 2010. Consulté le 22 mai 2017. https://iapp.org/news/a/2010-08-24-strategies-for-creating-a-privacy-culture-in-your-organization/
Bureau du Commissaire à l’information (Royaume-Uni). “Privacy Notices, Transparency and Control.” 7 octobre 2016. Consulté le 24 mai 2017. https://ico.org.uk/media/for-organisations/guide-to-data-protection/privacy-notices-transparency-and-control-1-0.pdf
Bureau du Commissaire à l’information (Royaume-Uni). “Consultation: Lignes directrices concernant le consentement dans la RGPD.”
Commissariat à la protection de la vie privée du Canada. “Guidelines for Online Consent.” Mai 2014. . https://www.priv.gc.ca/media/2105/gl_oc_201405_e.pdf
Bureau du Commissaire à l’information (Royaume-Uni). “Consultation: Lignes directrices concernant le consentement dans la RGPD.” 2-31 mars 2017. https://iapp.org/media/pdf/resource_center/ICO-gdpr-consent-guidance.pdf
https://iapp.org/media/pdf/resource_center/ICO-gdpr-consent-guidance.pdf
Union européenne. Règlement général sur la protection des données. http://data.consilium.europa.eu/doc/document/ST-5419-2016-REV-1/en/pdf
IAPP et TRUSTe. “How IT and InfoSec Value Privacy.” Mars 2016. https://iapp.org/resources/article/how-it-and-infosec-value-privacy/
Cronk, R Jason. “Embedding Privacy by Design.” Conférence Web enregistrée de l’IAPP 2 décembre 2016. https://iapp.org/store/webconferences/a0l1a000002m05dAAA/
Thierer, Adam. “CES 2015 Dispatch: Challenges Multiply for Privacy Professionals.” Privacy Perspectives. IAPP. 14 janvier 2015. https://iapp.org/news/a/ces-2015-dispatch-challenges-multiply-for-privacy-professionals-part-one/
Ponemon Institute. “2017 Cost of Data Breach Study: Global Analysis.” IBM/Ponemon Institute LLC, juin 2017. https://www.ibm.com/security/data-breach
Verizon. “2017 Data Breach Investigations Report.” . http://www.verizonenterprise.com/verizon-insights-lab/dbir/2017/
One Trust Alliance. “Data Protection and Breach Readiness Guide.” 2016. . https://iapp.org/resources/article/2016-data-protection-breach-readiness-guide/
Bruemmer, Michael. “Top Five Company Fails in Prepping for a Breach” The Privacy Advisor. IAPP. 23 août 2016. https://iapp.org/news/a/top-five-company-fails-in-prepping-for-a-breach/
Holmes, Dennis. “Managing Your Data Breach: Seven Steps to Breach Preparedness.” IAPP. https://iapp.org/resources/article/managing-your-data-breach-seven-steps-to-breach-preparedness/
Hogan Lovells. “Incident Response Plan Checklist.” 16 novembre 2016. https://iapp.org/resources/article/ready-set-respond-incident-response-plan-checklist/
Hogan Lovells. “Read, set, respond.” http://www.hoganlovellsreadysetrespondtool.com/
Holmes, Dennis. “Managing Your Data Breach: Maximizing the Relationships That Count to Manage Costs and Business Impact.” Centre de ressources de l’IAPP. Consulté le 13 juillet 2017. https://iapp.org/resources/article/managing-your-data-breach/
FTC. “Data Breach Response: A Guide for Business.” Septembre 2016. Consulté le 5 juin 2017. https://iapp.org/media/pdf/resource_center/FTC-data-breach-response-guide-for-business.pdf
“Breach Incident Reporting Form” de l’IAPP. Consulté le 13 juillet 2017. https://iapp.org/resources/article/breach-incident-reporting-form/
IAPP. “Sample Breach Notification Letters.” Consulté le 13 juillet 2017. https://iapp.org/resources/article/2012-07-03-sample-breach-notification-letters/
“Breach Incident Reporting Form” de l’IAPP. Consulté le 13 juillet 2017. https://iapp.org/resources/article/breach-incident-reporting-form/
Gannon, Michael, Samanth Melnick, et Rebecca Rosati. “Predictive Data Breach Cost Model.” 13 décembre 2016. Consulté le 13 juillet 2017. http://privacyref.com/downloads.php#
IBM/Ponemon. “Cost of a Data Breach Calculator.” 2017. Consulté le 13 juillet 2017. https://databreachcalculator.mybluemix.net/
Hayward, Rachel. “From Devastation to Salvation: How to Benefit from a Breach.” The Privacy Advisor. IAPP. 20 juin 2016. Consulté le 13 juillet 2017. https://iapp.org/news/a/from-devastation-to-salvation-how-to-benefit-from-a-breach/
Carson, Angelique. “How to Measure Your Privacy Program, Step-by-Step.” The Privacy Advisor. IAPP. 16 mai 2014. Consulté le 20 juin 2017. https://iapp.org/news/a/how-to-measure-your-privacy-program-step-by-step/
Pahl, Chris. “Building a Program that Provides Value: Using Meaningful Metrics.” The Privacy Advisor. IAPP. 26 septembre 2016. Consulté le 20 juin 2017. https://iapp.org/news/a/building-a-program-that-provides-value-using-meaningful-metrics/
IBM. “Business Resilience: The Best Defense Is a Good Offense.” Janvier 2009. Consulté le 13 juillet 2017. https://www-935.ibm.com/services/uk/en/it-services/Business_resilience_the_best_defence_is_a_good_offence.pdf
OPC et OIPC d’Alberta et de Colombie britannique. “Getting Accountability Right with a Privacy Management Program.” Consulté le 25 avril 2017. https://iapp.org/media/pdf/knowledge_center/Canada-Getting_Accountability_Right(Apr2012).pdf