Introduction: The CIA Triad, which stands for Confidentiality, Integrity, and Availability, is a fundamental concept in information security...
Hong Kong Articles
Managing Child and Parental Data in International Schools
Managing child and parental data presents several challenges for international schools. Some of these challenges include: Obtaining and Managing...
How to Complete a Personal Data Breach Report
Not all data breaches need to be reported to the relevant supervisory authority (e.g. the Information Commissioner Office (ICO) in the UK).
Yes, Data Privacy Regulations Apply to IOT devices too
Many manufacturers and retailers of IoT devices don’t realise that these devices fall under the purview of data privacy regulations. As data...
Ransomware Attacks The new Big Threat Data Theft
The costs begin to accelerate as the attack progresses. Suppose you are lucky and have cyber protection insurance. In that case, your insurers will need to know the full extent of the breach, often calling expensive third parties to help with the exercise.
Malaysia (PDPA) Your Guide Part One
Malaysia’s first comprehensive personal data protection legislation, the Personal Data Protection Act 2010 (PDPA), was passed by the Malaysian Parliament on June 2, 2010