Skip to content
Menu
Cloud Gal 42
  • Home
Cloud Gal 42

Category: compliance

Data Privacy: Standard Requirements

June 19, 2021June 11, 2021 by admin

Previous article in series – Data Privacy: Jurisdictional Differences When an organization embarks upon a path designed to improve its security posture, operational efficiency, or cultural behavior, there are many established codes of practice that can be utilized. Some of these codes of practice or guidelines come with the capability of certification. ISO/IEC 27018:2019 ISO/IEC…

Read More

Data Privacy: Jurisdictional Differences

June 18, 2021June 11, 2021 by admin

Previous article in series – Data Privacy: EU–U.S. Privacy Shield, HIPAA, GLBA Jurisdictional variances become evident during cases involving cross-border data requests or cases of contention. Even between states in the same country there can be differences in data privacy. Section 2511 of Title 18 of the U.S. Federal Government’s legal code prohibits the unauthorized…

Read More

Data Privacy: EU–U.S. Privacy Shield, HIPAA, GLBA

June 17, 2021June 18, 2021 by admin

Previous article in series – Data Privacy: Australia and New Zealand Privacy Principles The EU–U.S. Privacy Shield decision was adopted on July 12, 2016, and the Privacy Shield framework became operational on August 1, 2016. This framework protects the fundamental rights of anyone in the EU whose personal data is transferred to the United States…

Read More

Data Privacy: Australia and New Zealand Privacy Principles

June 16, 2021June 16, 2021 by admin

Previous article in series – Data Privacy: African & Asia-Pacific Legislations Regulations in Australia and New Zealand make it extremely difficult for enterprises to move sensitive information to cloud service providers that store data outside of Australian/New Zealand borders. The Office of the Australian Information Commissioner (OAIC) provides oversight and governance on data privacy regulations…

Read More

Data Privacy: African & Asia-Pacific Legislations

June 15, 2021June 16, 2021 by admin

Previous article in series – Data Privacy: Contractual and Regulated Private Data African Personal Data Protection Nearly two-thirds of the 54 nations of the African continent has data privacy protection as a regulation, is in process of making it, or has it as part of their constitutions. For the nations that have data protection mechanisms,…

Read More

Data Privacy: Contractual and Regulated Private Data

June 14, 2021June 4, 2021 by admin

Previous article in series – Data Privacy: Evolution and History of Modern Data Privacy Contractual and regulated data may coexist within a single complementary context; a contract may be formulated to enforce the adherence to a regulation or set of regulations and a regulation may define the need to have contractual relationships between provider and…

Read More

Data Privacy: Evolution and History of Modern Data Privacy

June 13, 2021June 4, 2021 by admin

Modern data privacy has a history that goes back to a time before the World Wide Web and when the internet was more a nascent concept than a global tool. The First Data Protection Law In 1970 the German state of Hesse enacted the first data protection act in the world known as Datenschutzgesetz (DSG;…

Read More

Digital Forensics: Chain of Custody & Nonrepudiation

June 12, 2021June 4, 2021 by admin

Previous article in series – Digital Forensics: Evidence Management Chain of custody of evidence refers to the chronological documentation or paper trail, showing the seizure, custody, control, transfer, analysis, and disposition of physical or electronic evidence. Chain of custody should clearly depict how the evidence was collected, analyzed, and preserved so it can be presented…

Read More

Digital Forensics: Evidence Management

June 11, 2021June 22, 2021 by admin

Previous article in series – Digital Forensics: Identification, Collection, and Preservation of Digital Evidence Maintaining evidence from collection to trial is a critical part of digital forensics. You should have policies and procedures in place for the collection and management of evidence. In some cases, you may need to collect digital evidence on short notice….

Read More

Digital Forensics: Identification, Collection, and Preservation of Digital Evidence

June 10, 2021June 11, 2021 by admin

Previous article in series – Digital Forensics: E-Discovery Service Types & Legal Terms ISO/IEC 27037 offers guidance on identifying potential data sources and acquiring the data from the sources. Data acquisition should be performed using a three-step process: Develop a plan to acquire the data: Developing a plan is an important first step in most…

Read More
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • Next

Recent Posts

  • Role of AI/ML in Cybersecurity
  • QuickGuide: Security on OCI
  • The Cloud Management Plane
  • Secure Installation and Configuration of Virtualized Cloud Datacenters
  • Cloud Datacenter: Hardware-specific Security Configuration Requirements

Recent Comments

  • Rafael on Installing Debian on OCI
  • Jorge on Installing Debian on OCI
  • admin on Installing Debian on OCI
  • Andreas on Installing Debian on OCI
  • admin on Installing Debian on OCI

Archives

  • December 2022
  • February 2022
  • September 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • February 2021
  • January 2021
  • November 2020
  • October 2020

Categories

  • aws
  • bcdr
  • cloud
  • cloudsecurity
  • compliance
  • informationsecurity
  • oracle
  • pci
  • QuickGuide
  • security
©2025 Cloud Gal 42 | Powered by WordPress and Superb Themes!