The IAPP
In the business world today, many customers are submitting their private information and data to organizations. The most typical forms of this very often include Social Security numbers, credit card information, banking, and other types of financial data, etc.
One of the primary reasons why do this is for the sake of convenience, especially when it comes to E-Commerce transactions. After all, if you frequent an online merchant on a regular basis, why keep entering the same information when it can be stored automatically and recalled again for subsequent use?
In this regard, you have established a certain baseline of trust: We assume that our credit card or banking information will be stored securely in the databases of the online merchant and used appropriately. This is where the concept of information privacy comes in. It can be specifically defined as:
“Information privacy is the privacy of personal information and usually relates to personal data stored on computer systems . . . [and] applies to collected personal information, such as medical records, financial data, criminal records, political records, business-related information or website data.”
(SOURCE: https://www.techopedia.com/definition/10380/information-privacy)
Thus, the protection of private information and data has become not only a top priority but even a must. Recognizing this long-standing fact, the International Association of Privacy Professionals (the IAPP) was created and offers a number of specialized certs in the area of information and data privacy.
The IAPP is actually a nonprofit agency which was created and founded in 2000. Apart from offering the various certs, it also serves a number of other functions as well, which include the following:
- The sharing of best practices and standards;
- The tracking of the latest trends with regards to information privacy;
- Be an advocate for the various managerial issues surrounding information privacy;
- Provide a common set of (Read more...)
*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Ravi Das (writer/revisions editor). Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/P_ZDAftbTkA/