• Cyber incident Response Checklist - DES

    Tag: Data security

    Help for state agencies dealing with a cybersecurity incident. Private citizens will likely find “So You Think You’ve Been Hacked” more useful.

    start checklist
  • Determining Whether There is a Data Breach Checklist

    Tag: Personal information (PI)

    Breaches are becoming more common because of the collection and storage of mass amounts of data.

    start checklist
  • Threat modeling

    Tag: Threat modeling

    Threat modeling is an approach for analyzing the security of an application.

    start checklist
  • Data Sharing

    Tag: Informed consent

    Although not all organizations rely on data sharing as a core process to their business models, most organizations need to share some amount of personal information to operate efficiently. For example, data is often shared with third-parties who supply tools for HR processes.

    start checklist

The Office of Privacy and Data Protection is also the sponsor for “Privacy Modeling,” a web application that identifies the privacy laws relevant to the product or service you wish to create.

Go to Privacy Modelling App

Something went wrong. Please try again.