The ultimate guide to learning IT security
This guide is intended for learners who are considering a career in some aspect of IT security. It offers guidance […]
This guide is intended for learners who are considering a career in some aspect of IT security. It offers guidance […]
This publication provides a set of procedures for conducting assessments of security and privacy controls employed within systems and organizations.
UK’s Information Commissioner’s Office (ICO) has published a (draft) guidance on pseudonimisation.
This paper aims to contribute to the ongoing assessment in the EU and globally of the unprecedented risks posed by this type of surveillance technology.
The report took a broader look into data protection engineering to support practical implementation of technical aspects of data protection by design and by default.
The book explores the social, political, and legal implications of the collection and use of personal information in computer databases.
Understanding the Data Flows and Privacy Risks of Brain-Computer Interfaces.
These guidelines provide a set of reference measures that should be applied to ensure that this technology does not adversely affect the human rights.
This panel will discuss the relationship between data protection regulations and enterprise organization’s work on Third Party Risk Management.
The present paper aims at providing more information on the context and way AI is developed and used in the banking sector.
This report aims to raise the awareness of the general audience and serve as a resource to policy shapers and practitioners in the public and private sectors to help frame the debate around data.