Purchase PDF Download: Member US $50 | Non-Member US $90 Purchase PDF Download in Chinese: Member US $50 | Non-Member US $90 Purchase in Book Format: Member US $60 | Non-Member US $100 Special Savings! Purchase the Book Format at the regular price and buy the eBook for just: Member US $15 | Non-Member US $30
Special Offer for 2 Privacy Books!
Purchase this pdf/book and its predecessor, ISACA Privacy Principles and Program Management Guide, in English and enjoy the following special pricing for both!
Purchase both in PDF Format: Member US $75 | Non-Member US $150 Purchase both in Book Format: Member US $95 | Non-Member US $180
Provide feedback on this document Visit the Privacy/Data Protection Knowledge Center community
Free Infographic: Connecting Privacy Activities with COBIT 5 Principles Free Infographic: Privacy Behaviors at the Individual and Organizational Levels ISACA Privacy Principles and Program Management Guide FREE Infographic: The Seven Categories of Privacy That Every Enterprise Must Address
Privacy breaches can lead to a series of troubling outcomes for enterprises, as well as causing significant harm to the people and relationships affected. Enterprises may suffer financial loss and reputational damage, be charged with failure to comply with regulations and legislation, and alienate key stakeholders who demand safety of personal information. The best way to avoid or mitigate the fallout from these breaches is to establish and maintain a formal privacy protection program within the enterprise.
ISACA’s Implementing a Privacy Protection Program: Using COBIT 5 Enablers With the ISACA Privacy Principles outlines core principles that individuals and organizations can use to optimize a privacy program based on the COBIT 5 framework for governance of enterprise IT. Comprehensive application of the COBIT 5 enablers helps to build a privacy program that conforms with ISACA’s privacy principles, which align with the most commonly used privacy standards, frameworks and good practices, as well as fill in the gaps that exist among these standards.
This book continues the work begun in ISACA’s publication ISACA Privacy Principles and Program Management Guide. That volume laid the groundwork for understanding the critical need for and the purpose, roles and responsibilities of an effective enterprise privacy program. This publication, which functions as a “volume 2” to ISACA Privacy Principles and Program Management Guide, takes the implementation phase of establishing a privacy program one step further by focusing on the role of the COBIT 5 enablers in the implementation process. Enablers support a holistic approach to identifying, implementing and monitoring all the components in processes and systems.
In addition, ISACA has created two companion infographics. To provide a better understanding of the interaction between COBIT 5 principles and standard privacy activities in an organization, the free infographic. Connecting Privacy Activities with COBIT 5 Principles, offers a convenient way to understand COBIT’s role in developing a privacy program. Another free infographic, Privacy Behaviors at the Individual and Enterprise Levels, shows how privacy programs impact the cultures of an organization. Download your free copies today!