Data Protection by Design in Data Privacy Governance

System analysis in information governance

In last week’s article, I gave a granular description of data privacy by design and shared the foundational principle. In this article, I focus on data protection by design. Again, it’s worth reiterating that these concepts are nuanced in their functional technicalities and definitions. A good privacy professional or serious company should be able to […]

Data protection by design and data privacy by design

System analysis in information governance

Ear-my-eyes’ is an app that allows users to stream music free. They gather data of users and use those particular data sets to randomly suggest music to users. However, when they were building the app they didn’t consider the privacy implications that could spring from their data processing methodology. After enjoying good reviews from users, […]

Managing risk response and mitigation in information security

System analysis in information governance

To fully manage risk within an organisation and to track the mitigation strategies, a focused approach is required. Most organisations want a positive response to any risk assessment findings. Yet, many IT professionals and consultants approach risk response from a negative standpoint. Let’s start with a case. A particular consulting firm carries out an information […]

More on data subject access requests

System analysis in information governance

After the implementation of the General Data Protection Regulation(GDPR) in Europe, individuals realised the power given back to them. They can ask companies to remove their data, correct information about their data, or stop processing their data. This particular process made companies pour various resources into handling data subject access requests(DSARs). What’s more, the regulation […]

TECH: Mapping controls in data privacy/information security

System analysis in information governance

Trust, but verify.” That’s a Russian proverb that has been used in various business facets. The phrase is self-explanatory. One can trust but one should also take further steps to verify truths. In the information and data privacy space, the phrase has gained prominence. If company XYZ claims that after one-year, particular datasets will be […]

Turning challenges into opportunities: From Israel with hope

Turning challenges into opportunities: From Israel with hope

By Anthony Kila   Abuja was the centre stage, penultimate week, of an international public finance strategy workshop hosted by CIAPS that brought together senior civil servants and other major policy makers from various states across the country to discuss ideas for managing and solving challenges with limited resources and writhing institutions. To each its […]