Implementing a Privacy Protection Program: Using COBIT 5 Enablers With the ISACA Privacy Principles 

Special Offer for 2 Privacy Books!

Related Items

Privacy breaches can lead to a series of troubling outcomes for enterprises, as well as causing significant harm to the people and relationships affected. Enterprises may suffer financial loss and reputational damage, be charged with failure to comply with regulations and legislation, and alienate key stakeholders who demand safety of personal information. The best way to avoid or mitigate the fallout from these breaches is to establish and maintain a formal privacy protection program within the enterprise.

ISACA’s Implementing a Privacy Protection Program: Using COBIT 5 Enablers With the ISACA Privacy Principles outlines core principles that individuals and organizations can use to optimize a privacy program based on the COBIT 5 framework for governance of enterprise IT. Comprehensive application of the COBIT 5 enablers helps to build a privacy program that conforms with ISACA’s privacy principles, which align with the most commonly used privacy standards, frameworks and good practices, as well as fill in the gaps that exist among these standards.