Privacy in Design: A Practical Guide to Corporate Compliance
A series of articles offering a sneak peek into my e-book, Privacy in Design: A Practical Guide to Corporate Compliance.
The Best Encryption ceases to work upon the first authorized access
Has encryption protect google and yahoo against NSA snooping, simply not. Was the NSA protected against data extract by an ‘authorized’ user who threatened the nations security? not really. Hence we say that best encryption ceases to work upon the first authorized access.
Governance Analysis Method – PhD Thesis Waël Hassan
Governance Analysis is a logic-based, computer assisted framework for validating legal compliance of enterprise governance models. This framework is intended to help check whether governance systems are consistent with the law. My approach to Governance Analysis includes legal and enterprise models, a governance analysis method (GAM), a governance analysis language (GAL), and an implemented governance…