Category Archives: Uncategorized
IAPP CIPT – Lawful Processing of HR Data, Contracts & Recruiting Part 5
17. Create a privacy policy for recruiting Hi, guys. In terms of crossborder transfers, the general principles under the GDPR looks much the same as under the Data Protection Directive or DPD. The whole legislation data can be transferred under a Commission adequacy decision, like the one used to give effect to the European Union… Read More »
IAPP CIPT – Lawful Processing of HR Data, Contracts & Recruiting Part 4
13. Contracts of employment – what to look for Hi guys. Let’s discuss about the contracts and what to look for. The GDPR has introduced a new principle of accountability and employers now have a positive obligation to evidence their compliance with the data protection principles. As part of this exercise, employers should make time… Read More »
IAPP CIPT – Lawful Processing of HR Data, Contracts & Recruiting Part 3
9. DPOs and DPIAs from HR perspective Hi, guys. Let’s discuss about DPOs and data protection impact assessments. Again, DPOs are arguably a Franco German concept and something that German employers are probably more familiar with than their European Union counterparts. Under the GDPR, DPOs must be appointed by employers who are a public authority,… Read More »
IAPP CIPT – Lawful Processing of HR Data, Contracts & Recruiting Part 2
5. Legitimate interests Hi guys. Let’s discuss about legitimate interest. Another frequently relied on basis for lawful processing of HR data is that it is in the legitimate interest of the business to do so. Under the GDPR processing will be lawful where it is necessary for the purposes of the legitimate interest pursued by… Read More »
IAPP CIPT – Lawful Processing of HR Data, Contracts & Recruiting
1. Where do privacy and HR meet? Hi guys. Let’s discuss about HR and privacy. Maintaining the balance between the protection of the privacy of the workers and the prerogatives of the employer can be tricky in several circumstances, such as in the case of body searches on workers, camera surveillance, geolocation interrogation of workers,… Read More »
IAPP CIPT – Privacy in Systems and Applications Part 2
4. Data Encryption Crypto design and Implementation Considerations deploying encryption for an organization is not an easy task. Different types of encryption may be deployed depending on the scenario, contractual agreements, or regulatory requirements. Encryption size may increase the number of bytes needed for storing the data. When using block chippers such as RSA or… Read More »
IAPP CIPT – Privacy in Systems and Applications
1. Identity and Access Management (IAM) Hi guys. In this lesson, we’ll discuss about identity and access management. Identity management includes the process involved in verifying the identity of an individual, group, process, or device. Identification via most computer systems consists of a person typing her credentials, user ID, and password into an authentication screen.… Read More »
IAPP CIPT – Privacy Considerations & Techniques Part 2
4. Retention Hi, guys. In this lesson, we’ll discuss about retention. Retention refers to the persistence of data by an organization after its collection. Organizations should have policies that govern the retention of data to comply with regulatory requirements, reduce the risks that come from holding too much data for too long, and show their… Read More »
IAPP CIPT – Privacy Considerations & Techniques
1. Collection Hi, guys. In this lesson, we’ll discuss about collection. Collection in the context of this lesson is the process of receiving data from a user, device, or entity. For the most part, collection occurs via an organization’s Web server, though it can occur via download from a third party site or media shipped… Read More »
IAPP CIPT – How Technology can help in achieving GDPR compliance Part 4
7. Security in cloud infrastructure environment demo Hi guys. In this lesson we’ll discuss about securing our cloud infrastructures. So your client or your company already has virtual machines in a cloud platform. Just for this example I will use again microsoft Asia. So you have your virtual machines in cloud and you want to… Read More »