![Law / Computer law / Data privacy / Social issues / Computing / Internet privacy / Gramm–Leach–Bliley Act / Personally identifiable information / Information privacy / Ethics / Privacy law / Privacy Law / Computer law / Data privacy / Social issues / Computing / Internet privacy / Gramm–Leach–Bliley Act / Personally identifiable information / Information privacy / Ethics / Privacy law / Privacy](https://www.pdfsearch.io/img/794222eb1b56f2172a5629262590a50c.jpg) Date: 2013-12-05 15:08:03Law Computer law Data privacy Social issues Computing Internet privacy Gramm–Leach–Bliley Act Personally identifiable information Information privacy Ethics Privacy law Privacy | | NIST Framework Privacy Comments (Appendix B) Asset Mgt: good that you call out knowing dataflow. But it’s not just PII data, organizations should
have a dictionary
of types of privacy
data,
which is datAdd to Reading ListSource URL: csrc.nist.govDownload Document from Source Website File Size: 49,37 KBShare Document on Facebook
|