Search
Data and Knowledge Manager
Thousand Currents
How to respectfully use and inform communities about Personal Identifiable Information (PII) collected about them
This guide covers key characteristics of PII, how to request it from communities through informed consent, and best practices in how to manage it without undue risk.
Tips for Writing Consent Forms
Overview
Informed consent is a process, not merely a form. The procedures used in obtaining informed consent should be designed to educate the subject population in terms that they can understand.
Texas A&M University
NIST Cybersecurity Framework
Overview
This framework offers a taxonomy of high-level cybersecurity outcomes that can be used by any organization — regardless of its size, sector, or maturity — to better understand, assess, prioritize, and communicate its cybersecurity efforts.
National Institute of Standards and Technology
What is a security audit?
Overview
Security audits are often used to determine compliance with regulations that specify how organizations must deal with information.
TechTarget
Choosing and configuring a KMS for secure key management in the cloud
Overview
Key management services (KMSs) are a common component in cloud services and provide functionality for secure storage of encryption keys and the use of encryption and digital signature algorithms.
National Cyber Security Centre
Principle of Least Privilege
Overview
The principle of least privilege (POLP) is a concept in computer security that limits users’ access rights to only what is strictly required to do their jobs.
TechTarget
Handbook for Safeguarding Sensitive PII
Overview
This handbook provides best practices and Department of Homeland Security policy requirements to prevent a privacy incident involving PII during all stages of the information lifecycle.
U.S. Department of Homeland Security
Senior Policy Adviser, Data
The Royal Society
Director of Data Strategy
BASTA
Data Analyst
Equip
Data Quality Engineer
Habitat for Humanity International