0
Skip to Content
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Rules
Licensing
Account
Folder: Libaries
Back
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
A.18.1.4: Privacy and Protection of Personally Identifiable Information
Privacy, PII, Regulations, Contracts, Legislation Jeremy Pickett 2/28/25 Privacy, PII, Regulations, Contracts, Legislation Jeremy Pickett 2/28/25

A.18.1.4: Privacy and Protection of Personally Identifiable Information

Ensure compliance with relevant legislative, regulatory, and contractual requirements for privacy and the protection of personally identifiable information.

Read More
A.18.1.1: Identification of Applicable Legislation and Contractual Requirements
Legal, Contracts, Government, Legislation, Regulation Jeremy Pickett 2/25/25 Legal, Contracts, Government, Legislation, Regulation Jeremy Pickett 2/25/25

A.18.1.1: Identification of Applicable Legislation and Contractual Requirements

Identify and document the legislative, regulatory, and contractual requirements related to information security and the organization’s approach to meet these requirements.

Read More

Contact: jeremy@japhontech.com : : japhontech, LLC