For those of you who don’t know that there are actual rules and policies that govern the organization and implementation of security policies within large organizations, let me introduce ISO 27001.

Now, mind you, these policies and their implementation don’t guarantee that any large organization will be able to prevent or eliminate breaches, intrusions, or compromises of their data.  But they do go a long way toward improving the information and data security climate.

Information Security Policy – How to structure the document(s) | 27001Academy.

Thanks to 27001 Academy

“Many mobile apps request too many permissions and don’t explain how they collect users’ personal information, a study of 1,211 popular apps by the Global Privacy Enforcement Network has found.

The majority of the apps reviewed did not adequately explain to users how they were collecting and using information, according to the study, carried out by 26 privacy enforcement authorities in 19 countries. It also found that a third of the tested mobile applications requested excessive permissions that were outside the scope of their functionality.”

Data protection authorities find privacy lapses in majority of mobile apps | CSO Online.

Thanks to CSO Online