Remove category cyber-insurance
article thumbnail

Security Compliance & Data Privacy Regulations

eSecurity Planet

Relatedly, PIPL outlines some categories of sensitive information that do not receive additional protection under GDPR. Also, health and financial data, among other categories of more sensitive data, is often treated as a more protected category of data under general data-privacy laws – subject to stricter protection requirements.

article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

Thus, common tools and techniques are risk matrices, risk registers, risk logs, risk breakdown structures, risk categories, Monte Carlo simulations, and sensitivity analyses. The business case must provide the rationale for the initiative, the problem definition, the current state, and the vision of the future state, for example.