Cyber incident Response Checklist - DESTag: Data security
Help for state agencies dealing with a cybersecurity incident. Private citizens will likely find “So You Think You’ve Been Hacked” more useful.
Determining Whether There is a Data Breach ChecklistTag: Personal information (PI)
Breaches are becoming more common because of the collection and storage of mass amounts of data.
Threat modelingTag: Threat modeling
Threat modeling is an approach for analyzing the security of an application.
Data SharingTag: Informed consent
Although not all organizations rely on data sharing as a core process to their business models, most organizations need to share some amount of personal information to operate efficiently. For example, data is often shared with third-parties who supply tools for HR processes.
The Office of Privacy and Data Protection is also the sponsor for “Privacy Modeling,” a web application that identifies the privacy laws relevant to the product or service you wish to create.