Monthly Archives: January 2023
ISTQB – CTFL Certified Tester Foundation Level – Static Techniques
1. Reviews And The Test Process [CC] Hi and welcome to the Static techniques section of our course. Let me first introduce you to the meaning and importance of a static techniques and its relation to the test process. Static techniques are often forgotten area of software testing. Static techniques test software without executing the… Read More »
ISTQB – CTFL Certified Tester Foundation Level – Finally
1. Independent Testing [CC] Levels of independent testing. Parents always think the best of their kids. They are the most cute, well behaved, polite, funny kids on earth. Even if most of us think that this kid is the ugliest kid on earth, same thing could happen with developers and their code. Developers sometimes cannot… Read More »
IAPP CIPT – Understanding the need for privacy in IT environment
1. Evolving compliance requirements Hi guys. In this lesson, we’ll discuss about evolving compliance requirements, regulatory activities, security threats, advances in technology, new software releases, and the increasing proliferation of social networks can have serious impacts on an It department’s approach to compliance. Not only must It professionals be able to respond to the needs… Read More »
IAPP CIPT – Lawful Processing of HR Data, Contracts & Recruiting Part 5
17. Create a privacy policy for recruiting Hi, guys. In terms of crossborder transfers, the general principles under the GDPR looks much the same as under the Data Protection Directive or DPD. The whole legislation data can be transferred under a Commission adequacy decision, like the one used to give effect to the European Union… Read More »
IAPP CIPT – Lawful Processing of HR Data, Contracts & Recruiting Part 4
13. Contracts of employment – what to look for Hi guys. Let’s discuss about the contracts and what to look for. The GDPR has introduced a new principle of accountability and employers now have a positive obligation to evidence their compliance with the data protection principles. As part of this exercise, employers should make time… Read More »
IAPP CIPT – Lawful Processing of HR Data, Contracts & Recruiting Part 3
9. DPOs and DPIAs from HR perspective Hi, guys. Let’s discuss about DPOs and data protection impact assessments. Again, DPOs are arguably a Franco German concept and something that German employers are probably more familiar with than their European Union counterparts. Under the GDPR, DPOs must be appointed by employers who are a public authority,… Read More »
IAPP CIPT – Lawful Processing of HR Data, Contracts & Recruiting Part 2
5. Legitimate interests Hi guys. Let’s discuss about legitimate interest. Another frequently relied on basis for lawful processing of HR data is that it is in the legitimate interest of the business to do so. Under the GDPR processing will be lawful where it is necessary for the purposes of the legitimate interest pursued by… Read More »
IAPP CIPT – Lawful Processing of HR Data, Contracts & Recruiting
1. Where do privacy and HR meet? Hi guys. Let’s discuss about HR and privacy. Maintaining the balance between the protection of the privacy of the workers and the prerogatives of the employer can be tricky in several circumstances, such as in the case of body searches on workers, camera surveillance, geolocation interrogation of workers,… Read More »
IAPP CIPT – Privacy in Systems and Applications Part 2
4. Data Encryption Crypto design and Implementation Considerations deploying encryption for an organization is not an easy task. Different types of encryption may be deployed depending on the scenario, contractual agreements, or regulatory requirements. Encryption size may increase the number of bytes needed for storing the data. When using block chippers such as RSA or… Read More »
IAPP CIPT – Privacy in Systems and Applications
1. Identity and Access Management (IAM) Hi guys. In this lesson, we’ll discuss about identity and access management. Identity management includes the process involved in verifying the identity of an individual, group, process, or device. Identification via most computer systems consists of a person typing her credentials, user ID, and password into an authentication screen.… Read More »