Cyber incident Response Checklist - DESTag: Data security
Help for state agencies dealing with a cybersecurity incident. Private citizens will likely find “So You Think You’ve Been Hacked” more useful.
Creating a Data Security PlanTag: Data map
Organizations sometimes wonder about the relationship between privacy and security. In some settings, good security may be viewed as conflicting with good privacy, especially when surveillance measures are required.
Risk Assessment When a Breach has OccurredTag: Data breach
Now that you have discovered a breach occurred what do you do.
The Office of Privacy and Data Protection is also the sponsor for “Privacy Modeling,” a web application that identifies the privacy laws relevant to the product or service you wish to create.