Privacy is not just the right to be left alone, but also the right to autonomy, control, and access to your personal data. The employment of new technologies over the last three decades drives personal data to play an increasingly important role in our economies, societies, and everyday lives. Personal information has become an increasingly valuable commodity in the digital age.
At the same time, the abundance and persistence of personal data have elevated the risks to individuals' privacy. In the age of Big Data, the Internet of Things, Biometrics, and Artificial Intelligence, it is becoming increasingly difficult for individuals to fully comprehend, let alone control, how and for what purposes organizations collect, use, and disclose their personal information. Consumers are growing increasingly concerned about their privacy, making the need for strong privacy champions ever more acute.
With a veritable explosion of data breaches highlighted almost daily across the globe, and the introduction of heavy-handed privacy laws and regulatory frameworks, privacy has taken center stage for businesses. Businesses today are faced with increasing demands for privacy protections, ever-more complex regulations, and ongoing cybersecurity challenges that place heavy demands on scarce resources. Senior management and executives now acknowledge privacy as some of the biggest risks to the business.
Privacy, traditionally, has existed in a separate realm, resulting in an unintentional and problematic barrier drawn between the privacy team and the rest of the organization. With many regulatory frameworks to consider, building an all-encompassing data privacy program becomes increasingly challenging. Effective privacy protection is essential to maintaining consumer trust and enabling a robust and innovative digital economy in which individuals feel they may participate with confidence.
This book aims at helping organizations in establishing aunified, integrated, enterprise-wide privacy program. This book is aiming to help privacy leaders and professionals to bridge the privacy program and business strategies, transform legal terms and dead text to live and easy-to-understand essential requirements which organizations can easily implement, identify and prioritize privacy program gap initiatives and promote awareness and embed privacy into the everyday work of the agency and its staff.
At the same time, the abundance and persistence of personal data have elevated the risks to individuals' privacy. In the age of Big Data, the Internet of Things, Biometrics, and Artificial Intelligence, it is becoming increasingly difficult for individuals to fully comprehend, let alone control, how and for what purposes organizations collect, use, and disclose their personal information. Consumers are growing increasingly concerned about their privacy, making the need for strong privacy champions ever more acute.
With a veritable explosion of data breaches highlighted almost daily across the globe, and the introduction of heavy-handed privacy laws and regulatory frameworks, privacy has taken center stage for businesses. Businesses today are faced with increasing demands for privacy protections, ever-more complex regulations, and ongoing cybersecurity challenges that place heavy demands on scarce resources. Senior management and executives now acknowledge privacy as some of the biggest risks to the business.
Privacy, traditionally, has existed in a separate realm, resulting in an unintentional and problematic barrier drawn between the privacy team and the rest of the organization. With many regulatory frameworks to consider, building an all-encompassing data privacy program becomes increasingly challenging. Effective privacy protection is essential to maintaining consumer trust and enabling a robust and innovative digital economy in which individuals feel they may participate with confidence.
This book aims at helping organizations in establishing aunified, integrated, enterprise-wide privacy program. This book is aiming to help privacy leaders and professionals to bridge the privacy program and business strategies, transform legal terms and dead text to live and easy-to-understand essential requirements which organizations can easily implement, identify and prioritize privacy program gap initiatives and promote awareness and embed privacy into the everyday work of the agency and its staff.
"This book serves as a valuable resource for anyone seeking to understand and navigate the complexities of data privacy. Its comprehensive approach and clear explanations make it an essential guide for organizations of all sizes working to establish and maintain robust data protection practices."
- Dr Mike Brass (CISSP, CIPPE/E, CISM, CRISC)
See Mike's full review at: https://www.linkedin.com/pulse/review-privacy-practice-dr-mike-brass-cissp-cippe-e-cism-crisc--qfqie/?trackingId=CJypYojXzvq1GpauDJH13A%3D%3D
Privacy is a slippery term that people drag out for various reasons, some of which can be misleading. For instance, most American citizens believe that the Fourth Amendment guarantees their right to privacy and will cite it as such. Newsflash, it doesn't. The Fourth Amendment protects citizens from unreasonable search and seizure by the United States government. It does not guarantee that - for instance - your personal data won't be harvested and used for all sorts of nefarious purposes by shadowy entities in the data mining industry. Thus, for the sake of self-protection, if for no other reason, everybody in the digital age needs to know what privacy is, its implications, and its applications.
The problem arises from the fact that most of the concepts about privacy are rooted in the universe that existed prior to the commercial Internet. That world doesn't exist anymore, and it hasn't for some time. The other problem is simple ignorance. We don't understand the many vital nuances of privacy or what it means to us in terms of personal impacts. But, fear not... Alan Tang has covered the waterfront in "Privacy in Practice." This comprehensive guide doesn't simply discuss the general concept of privacy. It defines it from every possible cultural perspective and then proceeds to summarize its various incarnations in worldwide regulations and standards, leaving no stone unturned.
Then Tang gets serious about operationalizing the term. In effect, privacy has always been one of those lightweight concepts that everybody agrees is a good idea, but nobody has the slightest notion about how to substantively implement. The book provides a complete and highly credible, holistic architecture of standard real-world controls that can be handily tailored into a governance framework suitable to any general organizational application. The beauty of this book is that it provides nine chapters of explicit operational implementation advice, which ought to be sufficient to assure privacy in any organization of any size. Then, if you still aren't getting the picture, he provides case examples to illustrate how this can be done in various settings, as well as the practical operational steps to ensure it. So, when you finish this book, you will be as knowledgeable about privacy as any of the world's leading experts, which Tang just happens to be. Is that a coincidence? I think not.
- Dan Shoemaker, PhD - Distinguished Visitor of the Institute of Electrical and Electronics Engineers (IEEE) & Member of the Editorial Board, Computers and Security
- Dr Mike Brass (CISSP, CIPPE/E, CISM, CRISC)
See Mike's full review at: https://www.linkedin.com/pulse/review-privacy-practice-dr-mike-brass-cissp-cippe-e-cism-crisc--qfqie/?trackingId=CJypYojXzvq1GpauDJH13A%3D%3D
Privacy is a slippery term that people drag out for various reasons, some of which can be misleading. For instance, most American citizens believe that the Fourth Amendment guarantees their right to privacy and will cite it as such. Newsflash, it doesn't. The Fourth Amendment protects citizens from unreasonable search and seizure by the United States government. It does not guarantee that - for instance - your personal data won't be harvested and used for all sorts of nefarious purposes by shadowy entities in the data mining industry. Thus, for the sake of self-protection, if for no other reason, everybody in the digital age needs to know what privacy is, its implications, and its applications.
The problem arises from the fact that most of the concepts about privacy are rooted in the universe that existed prior to the commercial Internet. That world doesn't exist anymore, and it hasn't for some time. The other problem is simple ignorance. We don't understand the many vital nuances of privacy or what it means to us in terms of personal impacts. But, fear not... Alan Tang has covered the waterfront in "Privacy in Practice." This comprehensive guide doesn't simply discuss the general concept of privacy. It defines it from every possible cultural perspective and then proceeds to summarize its various incarnations in worldwide regulations and standards, leaving no stone unturned.
Then Tang gets serious about operationalizing the term. In effect, privacy has always been one of those lightweight concepts that everybody agrees is a good idea, but nobody has the slightest notion about how to substantively implement. The book provides a complete and highly credible, holistic architecture of standard real-world controls that can be handily tailored into a governance framework suitable to any general organizational application. The beauty of this book is that it provides nine chapters of explicit operational implementation advice, which ought to be sufficient to assure privacy in any organization of any size. Then, if you still aren't getting the picture, he provides case examples to illustrate how this can be done in various settings, as well as the practical operational steps to ensure it. So, when you finish this book, you will be as knowledgeable about privacy as any of the world's leading experts, which Tang just happens to be. Is that a coincidence? I think not.
- Dan Shoemaker, PhD - Distinguished Visitor of the Institute of Electrical and Electronics Engineers (IEEE) & Member of the Editorial Board, Computers and Security