Posted on
in Presentations
Should the privacy officer be involved in the development of your insider threat program? Should the communications department reach to the privacy office when they receive a media inquiry regarding an employee who was arrested over the weekend? Should the IT department have a privacy subject matter expert review the requirements for a new IT system they are planning to procure? Yes, yes and yes!
Learning Objectives:
1: Explore how to determine what projects and programs have privacy equities.
2: Learn how to get invited to the table to ensure privacy equities are addressed.
3: Discover how to make an impact and use privacy as a value-add/differentiator.
Learning Objectives:
1: Explore how to determine what projects and programs have privacy equities.
2: Learn how to get invited to the table to ensure privacy equities are addressed.
3: Discover how to make an impact and use privacy as a value-add/differentiator.
Share With Your Community