Loading...
You are here:  Home  >  'PIA'
Latest

So, What is Data Mapping and Why is it the Key to GDPR Compliance?

By   /  April 25, 2018  /  Data Blogs | Information From Enterprise Leaders, Data Education, Data Governance & Data Quality | News & Articles, Data Governance Blogs, Enterprise Information Management, Information Management Blogs  /  No Comments

Click to learn more about author Richard Macaskill. The first three posts in this series on GDPR are: So, What is GDPR and Why Should Database Administrators Care? So, What is GDPR, and Why Should Your Customers Care? So, What is a Data Protection Impact Assessment and Why Should Organizations Care? I’ve read a lot about […]

Read More →
Latest

So, What is a Data Protection Impact Assessment and Why Should Organizations Care?

By   /  February 13, 2018  /  Data Blogs | Information From Enterprise Leaders, Data Education, Data Governance & Data Quality | News & Articles, Data Governance Blogs, Enterprise Information Management, Information Management Blogs  /  No Comments

Click to learn more about author Richard Macaskill. The first two posts in this series on GDPR are: So, What is GDPR and Why Should Database Administrators Care? So, What is GDPR, and Why Should Your Customers Care? If you’ve read anything about the upcoming General Data Protection Regulation (GDPR), you’ll probably have seen the phrase […]

Read More →
Latest

Privacy Impact Assessments: Why and When to Do Them

By   /  October 25, 2017  /  Big Data Blogs, Big Data News, Articles, & Education, Data Blogs | Information From Enterprise Leaders, Data Education, Database Blogs, Database News, Articles, & Education, Enterprise Information Management, Information Management Articles  /  No Comments

Click to learn more about author Cathy Nolan. What is a Privacy Impact Assessment? A Privacy Impact Assessment, or PIA, is an analysis of how personally identifiable information (PII) is collected, used, shared, and maintained. Why do it?  If your organization needs to comply with the GDPR, a PIA will demonstrate that program managers and system […]

Read More →
We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept