PRIVACY INNOVATION IN CANADIAN LAW, TECHNOLOGY, AND CORPORATE CULTURE I invite you and other privacy leaders to join me in […]
Latest Blogs
5 hints can help you recognize a fake LinkedIn profile
We received great feedback on our recently about hacking on LinkedIn . LinkedIn, as a business social network, offers a forum for members to post […]
The Startup’s Guide to Privacy: Turning Privacy into a Competitive Advantage – MaRS Best Practices MaRS Discovery District, Toronto, ON
This is an event announcement. Register Here On January 28, 2016, Canada, along with many countries, will celebrate Data Privacy Day. Recognized […]
Canada’s Security Agency Issues:Top 10 Actions to Take to Eliminate Cyber Threats
In this series of posts, we review recommendations for workplace cyber security published by the Communications Security Establishment Canada. Today, […]
Agile Privacy for Modern Software Development
With the increasing popularity of agile IT, privacy officers responsible for assessing new software programs are finding it difficult to […]
The Best Encryption ceases to work upon the first authorized access
Has encryption protect google and yahoo against NSA snooping, simply not. Was the NSA protected against data extract by an […]
IAM Maturity Model
Identity and Access Management (IAM) has two seemingly opposed purposes: to enable user access to information, and to block user […]
Governance Analysis Method – PhD Thesis Waël Hassan
Governance Analysis is a logic-based, computer assisted framework for validating legal compliance of enterprise governance models. This framework is intended […]
De-Identification Maturity Model
Recently I have been working on a formal framework for evaluating the maturity of de-identification services within an organization. The […]
An Enterprise Legal Reference Model
We have developed an enterprise reference model used to conceptualize enterprise elements. The model suggests three planes: Subject and role-grouping […]