CIPM Companion links

CIPM Companion links

“IAPP-EY Annual Privacy Governance Report of 2016.”

https://iapp.org/news/a/2016-annual-iapp-ey-privacy-governance-report-released-2/

Australian Bankers Association (Association des banquiers australiens) : http://www.bankers.asn.au/Privacy-Policy

Hong Kong Trade Development Council (HKTDC): http://www.hktdc.com/mis/pps/en/Privacy-Policy-Statement.html

IAPP. “From Here to DPO.”  https://iapp.org/resources/article/from-here-to-dpo-building-a-data-protection-officer/

Shaw, Thomas. “What Skills Should Your DPD Absolutely Have?” The Privacy Advisor 24 janvier 2017.  https://iapp.org/news/a/what-skills-should-your-dpo-absolutely-have/

 

WP29. “Guidelines on Data Protection Officers (‘DPDs’).” http://ec.europa.eu/newsroom/article29/item-detail.cfm?item_id=612048

 

Tech Donut. “Sample Data Protection Policy Template.” Consulté le 3 mai 2017. https://iapp.org/resources/article/sample-data-protection-policy-template-2/

 

Eric Dieterich et Ana Rodgers. “‘Best of’ the Canada Privacy Symposium 2015: Building a Privacy Practice from Ground Zero.” https://iapp.org/resources/article/building-a-privacy-program-from-ground-zero

 

IAPP. “2017 Privacy Tech Vendor Report.”  https://iapp.org/resources/article/2017-privacy-tech-vendor-report/

OCEG. “GRC Defined.” Consulté le 8 mars 2017. http://www.oceg.org/about/what-is-grc/

Rodriguez, Deidre. “10 Etapes vers un programme de protection de la vie privée de qualité: Part One.” 24 juin 2013. Consulté le 4 mai 2017. https://iapp.org/news/a/10-steps-to-a-quality-privacy-program-part-one1/

DPA overview

https://iapp.org/resources/dpa/

OPC. “Directives pour le traitement transfrontalier de données personnelles.” https://www.priv.gc.ca/en/privacy-topics/personal-information-transferred-across-borders/gl_dab_090127/

Siegel, Bob. “For a Successful Privacy Program, Use These Three A’s.” The Privacy Advisor. IAPP.  https://iapp.org/news/a/for-a-successful-privacy-program-use-these-three-as/

IAPP et OneTrust. “DPIA and Data Mapping – Operationalizing GDPR and Privacy by Design.”  https://iapp.org/resources/article/pias-and-data-mapping-operationalizing-gdpr-and-privacy-by-design/

IAPP et TRUSTe. “Preparing for the GDPR: DP0s, DPIAs, and Data Mapping.” 2016.  https://iapp.org/resources/article/preparing-for-the-gdpr-dpos-pias-and-data-mapping/

https://iapp.org/media/pdf/resource_center/Tech-Vendor-Directory-1.3-electronic.pdf

 

WP29. “Guidelines on Data Protection Impact Assessment (DPIA).” http://ec.europa.eu/newsroom/article29/item-detail.cfm?item_id=611236

DPIA Template https://iapp.org/resources/topics/privacy-impact-assessment-2/#samples,-templates-and-forms

 

FDIC. “Privacy Impact Assessments.”  https://www.fdic.gov/about/privacy/assessments.html

 

Siegel, Bob. “Accountability and Adaptability: Two of the Three ‘A’s of a Successful Privacy Program.” The Privacy Advisor. IAPP.  https://iapp.org/news/a/accountability-and-adaptability-two-of-the-three-as-of-a-successful-privacy-program/

Royal, K. “Third-Party Vendor Management Means Managing Your Own Risk.” The Privacy Advisor. IAPP. 2015.  https://iapp.org/resources/article/third-party-vendor-management-means-managing-your-own-risk-3/

Pahl, Chris. “Building a Program that Provides Value: Making Your Communication Matter.” The Privacy Advisor. IAPP. 16 novembre 2017. Consulté le 23 mai 2017. https://iapp.org/news/a/building-a-program-that-provides-value-making-your-communication-matter/

IAPP Organizational Privacy policies: https://iapp.org/resources/topics/organizational-privacy-policies/

Michigan House of Representatives. “Guest Wireless Access Acceptable Use Policy.”  http://house.michigan.gov/wifi_policy.asp

 

Berry, Megan. “Cloud Computing Policy Template.” IT Manager Daily http://www.itmanagerdaily.com/cloud-computing-policy-template/

Loyola University. “Cloud Computing Policy.”

Perot, Trista. “Data Retention Policy Series.” Global Data Vault, June 2012.  https://www.globaldatavault.com/blog/data-backup-developing-an-effective-data-retention-policy/

http://www.luc.edu/its/itspoliciesguidelines/cloud_computing_policy.shtml

Bustin, Kim. “Practical Strategies for Creating a Privacy Culture in Your Organization.” The Privacy Advisor. IAPP. 1er septembre 2010. Consulté le 22 mai 2017. https://iapp.org/news/a/2010-08-24-strategies-for-creating-a-privacy-culture-in-your-organization/

Bureau du Commissaire à l’information (Royaume-Uni). “Privacy Notices, Transparency and Control.” 7 octobre 2016. Consulté le 24 mai 2017. https://ico.org.uk/media/for-organisations/guide-to-data-protection/privacy-notices-transparency-and-control-1-0.pdf

Bureau du Commissaire à l’information (Royaume-Uni). “Consultation: Lignes directrices concernant le consentement dans la RGPD.”

Commissariat à la protection de la vie privée du Canada. “Guidelines for Online Consent.” Mai 2014. . https://www.priv.gc.ca/media/2105/gl_oc_201405_e.pdf

Bureau du Commissaire à l’information (Royaume-Uni). “Consultation: Lignes directrices concernant le consentement dans la RGPD.” 2-31 mars 2017.  https://iapp.org/media/pdf/resource_center/ICO-gdpr-consent-guidance.pdf

https://iapp.org/media/pdf/resource_center/ICO-gdpr-consent-guidance.pdf

 

Union européenne. Règlement général sur la protection des données. http://data.consilium.europa.eu/doc/document/ST-5419-2016-REV-1/en/pdf

 

IAPP et TRUSTe. “How IT and InfoSec Value Privacy.” Mars 2016.  https://iapp.org/resources/article/how-it-and-infosec-value-privacy/

Cronk, R Jason. “Embedding Privacy by Design.” Conférence Web enregistrée de l’IAPP 2 décembre 2016.  https://iapp.org/store/webconferences/a0l1a000002m05dAAA/

Thierer, Adam. “CES 2015 Dispatch: Challenges Multiply for Privacy Professionals. Privacy Perspectives. IAPP. 14 janvier 2015.  https://iapp.org/news/a/ces-2015-dispatch-challenges-multiply-for-privacy-professionals-part-one/

Ponemon Institute. “2017 Cost of Data Breach Study: Global Analysis.” IBM/Ponemon Institute LLC, juin 2017.  https://www.ibm.com/security/data-breach

Verizon. “2017 Data Breach Investigations Report.” . http://www.verizonenterprise.com/verizon-insights-lab/dbir/2017/

One Trust Alliance. “Data Protection and Breach Readiness Guide.” 2016. . https://iapp.org/resources/article/2016-data-protection-breach-readiness-guide/

Bruemmer, Michael. “Top Five Company Fails in Prepping for a Breach” The Privacy Advisor. IAPP. 23 août 2016.  https://iapp.org/news/a/top-five-company-fails-in-prepping-for-a-breach/

Holmes, Dennis. “Managing Your Data Breach: Seven Steps to Breach Preparedness.” IAPP.  https://iapp.org/resources/article/managing-your-data-breach-seven-steps-to-breach-preparedness/

Hogan Lovells. “Incident Response Plan Checklist.” 16 novembre 2016.  https://iapp.org/resources/article/ready-set-respond-incident-response-plan-checklist/

Hogan Lovells. “Read, set, respond.”  http://www.hoganlovellsreadysetrespondtool.com/

 

Holmes, Dennis. “Managing Your Data Breach: Maximizing the Relationships That Count to Manage Costs and Business Impact.” Centre de ressources de l’IAPP. Consulté le 13 juillet 2017. https://iapp.org/resources/article/managing-your-data-breach/

FTC. “Data Breach Response: A Guide for Business.” Septembre 2016. Consulté le 5 juin 2017. https://iapp.org/media/pdf/resource_center/FTC-data-breach-response-guide-for-business.pdf

“Breach Incident Reporting Form” de l’IAPP. Consulté le 13 juillet 2017. https://iapp.org/resources/article/breach-incident-reporting-form/

IAPP. “Sample Breach Notification Letters.” Consulté le 13 juillet 2017. https://iapp.org/resources/article/2012-07-03-sample-breach-notification-letters/

“Breach Incident Reporting Form” de l’IAPP. Consulté le 13 juillet 2017. https://iapp.org/resources/article/breach-incident-reporting-form/

Gannon, Michael, Samanth Melnick, et Rebecca Rosati. “Predictive Data Breach Cost Model.” 13 décembre 2016. Consulté le 13 juillet 2017. http://privacyref.com/downloads.php#

IBM/Ponemon. “Cost of a Data Breach Calculator.” 2017. Consulté le 13 juillet 2017. https://databreachcalculator.mybluemix.net/

Hayward, Rachel. “From Devastation to Salvation: How to Benefit from a Breach.” The Privacy Advisor. IAPP. 20 juin 2016. Consulté le 13 juillet 2017. https://iapp.org/news/a/from-devastation-to-salvation-how-to-benefit-from-a-breach/

Carson, Angelique. “How to Measure Your Privacy Program, Step-by-Step.” The Privacy Advisor. IAPP. 16 mai 2014. Consulté le 20 juin 2017. https://iapp.org/news/a/how-to-measure-your-privacy-program-step-by-step/

Pahl, Chris. “Building a Program that Provides Value: Using Meaningful Metrics.” The Privacy Advisor. IAPP. 26 septembre 2016. Consulté le 20 juin 2017. https://iapp.org/news/a/building-a-program-that-provides-value-using-meaningful-metrics/

IBM. “Business Resilience: The Best Defense Is a Good Offense.” Janvier 2009. Consulté le 13 juillet 2017. https://www-935.ibm.com/services/uk/en/it-services/Business_resilience_the_best_defence_is_a_good_offence.pdf

OPC et OIPC d’Alberta et de Colombie britannique. “Getting Accountability Right with a Privacy Management Program.” Consulté le 25 avril 2017. https://iapp.org/media/pdf/knowledge_center/Canada-Getting_Accountability_Right(Apr2012).pdf