Chapter
Licensed
Unlicensed
Requires Authentication
38 Quebec Law 25: Canada’s sharpest privacy reform yet
You are currently not able to access this content.
You are currently not able to access this content.
Chapters in this book
- Frontmatter I
- Preface V
- Contents VII
-
Part I HIPAA, HITECH, and HITRUST
- 1 HIPAA foundations: What it is and what it isn’t 3
- 2 The HIPAA security rule: Safeguards and framework mapping 18
- 3 The HITECH act: Enforcement, breach response, and access rights 26
- 4 Breach notification and incident response 36
- 5 Administrative and physical safeguards 47
- 6 HITRUST – From compliance to assurance at scale 62
- 7 Bringing it all together: Operationalizing HIPAA compliance 76
-
Part II NIST cybersecurity and privacy
- 8 The NIST landscape: Foundations of cybersecurity and privacy 85
- 9 The NIST cybersecurity framework: From strategy to practice 92
- 10 NIST SP 800-53: Control families in focus 101
- 11 NIST SP 800-171: Protecting CUI in non-federal systems 109
- 12 Implementing NIST in practice: Use cases across sectors 119
- 13 NIST maturity models and self-assessments 124
-
Part III ISO/IEC 27001
- 14 ISO/IEC 27001: Layered security architecture and control mapping 133
- 15 Designing secure architecture with compliance in mind 147
- 16 Identity, access, and authentication models 171
- 17 Logging, monitoring, and system integrity 184
- 18 Compliance-ready incident response 196
- 19 System hardening and secure configuration management 206
- 20 Putting it all together: ISO/IEC 27001 in action 215
-
Part IV PCI DSS and payment security
- 21 PCI DSS 4.0: Foundations of payment security 229
- 22 Deep dive: PCI requirements 1–6 236
- 23 Deep dive: PCI requirements 7–12 249
- 24 PCI reporting, SAQs, and certification pathways 262
- 25 Part IV recap: PCI DSS in practice 272
-
Part V GDPR and global privacy laws
- 26 GDPR foundations: Scope, principles, and applicability 277
- 27 Lawful basis and consent management 292
- 28 Rights of the data subject 306
- 29 Security of processing (Article 32) 314
- 30 Breach notification under GDPR (Articles 33–34) 320
- 31 International data transfers and schrems II 330
- 32 Operationalizing GDPR: DPIAs, DPOs, and records of processing 338
- 33 GDPR enforcement and risk-based accountability 346
-
Part VI Global privacy atlas
- 34 California CPRA: US state-level privacy done big 357
- 35 Brazil LGPD: Latin America’s GDPR-inspired framework 366
- 36 India’s DPDP act: Data empowerment in the world’s largest democracy 378
- 37 China’s PIPL: Privacy with Chinese characteristics 392
- 38 Quebec Law 25: Canada’s sharpest privacy reform yet 410
- 39 UK GDPR: Post-Brexit privacy and the “British way” 426
- 40 HIPAA and the new security rule 440
-
Part VII Mapping and crosswalks
- 41 Unified compliance architecture: A cross-framework blueprint 465
- 42 Unified incident response and breach handling 474
- 43 The unified risk register: A strategic approach to multi-framework compliance 483
- 44 Harmonized policy sets and centralized documentation 490
- 45 Compliance evidence strategy and control libraries 497
- 46 Cross-framework audit prep and storytelling 506
- 47 Harmonized training, awareness, and culture 512
- 48 Multi-framework tabletop exercises and red team simulations 520
- 49 The future of compliance 527
-
Part VIII Privacy engineering and control automation
- 50 Architecting for compliance: Embedding privacy in systems design 533
- 51 Policy-as-code and compliance automation pipelines 543
- 52 GRC-as-code, operationalizing compliance in real time 554
- 53 Control libraries, compliance SDKs, and reusable governance patterns 573
- 54 Simulation playbooks: Stress-testing your compliance in the real world 588
- 55 Global data protection frameworks: GDPR, ISO 27001, and beyond 599
- 56 Operationalizing NIST – Controls, profiles, and use cases 616
-
Part IX AI and global compliance
- 57 Privacy blueprints for AI and machine learning systems 637
- 58 AI governance, privacy, and risk – Frameworks for responsible deployment 663
- 59 The compliance singularity, AI, trust, and the end of policies 683
- 60 Global AI governance models 691
-
Part X Templates, labs, and appendices
- A Templates and forms: Compliance in action 701
- B Multi-framework audit checklists 705
- C Simulation playbooks and tabletop exercises 707
- D Compliance evidence index 711
- E Glossary of terms and acronyms 713
- F Control crosswalk appendix 718
- G Resources and further reading 719
- Index 721
Chapters in this book
- Frontmatter I
- Preface V
- Contents VII
-
Part I HIPAA, HITECH, and HITRUST
- 1 HIPAA foundations: What it is and what it isn’t 3
- 2 The HIPAA security rule: Safeguards and framework mapping 18
- 3 The HITECH act: Enforcement, breach response, and access rights 26
- 4 Breach notification and incident response 36
- 5 Administrative and physical safeguards 47
- 6 HITRUST – From compliance to assurance at scale 62
- 7 Bringing it all together: Operationalizing HIPAA compliance 76
-
Part II NIST cybersecurity and privacy
- 8 The NIST landscape: Foundations of cybersecurity and privacy 85
- 9 The NIST cybersecurity framework: From strategy to practice 92
- 10 NIST SP 800-53: Control families in focus 101
- 11 NIST SP 800-171: Protecting CUI in non-federal systems 109
- 12 Implementing NIST in practice: Use cases across sectors 119
- 13 NIST maturity models and self-assessments 124
-
Part III ISO/IEC 27001
- 14 ISO/IEC 27001: Layered security architecture and control mapping 133
- 15 Designing secure architecture with compliance in mind 147
- 16 Identity, access, and authentication models 171
- 17 Logging, monitoring, and system integrity 184
- 18 Compliance-ready incident response 196
- 19 System hardening and secure configuration management 206
- 20 Putting it all together: ISO/IEC 27001 in action 215
-
Part IV PCI DSS and payment security
- 21 PCI DSS 4.0: Foundations of payment security 229
- 22 Deep dive: PCI requirements 1–6 236
- 23 Deep dive: PCI requirements 7–12 249
- 24 PCI reporting, SAQs, and certification pathways 262
- 25 Part IV recap: PCI DSS in practice 272
-
Part V GDPR and global privacy laws
- 26 GDPR foundations: Scope, principles, and applicability 277
- 27 Lawful basis and consent management 292
- 28 Rights of the data subject 306
- 29 Security of processing (Article 32) 314
- 30 Breach notification under GDPR (Articles 33–34) 320
- 31 International data transfers and schrems II 330
- 32 Operationalizing GDPR: DPIAs, DPOs, and records of processing 338
- 33 GDPR enforcement and risk-based accountability 346
-
Part VI Global privacy atlas
- 34 California CPRA: US state-level privacy done big 357
- 35 Brazil LGPD: Latin America’s GDPR-inspired framework 366
- 36 India’s DPDP act: Data empowerment in the world’s largest democracy 378
- 37 China’s PIPL: Privacy with Chinese characteristics 392
- 38 Quebec Law 25: Canada’s sharpest privacy reform yet 410
- 39 UK GDPR: Post-Brexit privacy and the “British way” 426
- 40 HIPAA and the new security rule 440
-
Part VII Mapping and crosswalks
- 41 Unified compliance architecture: A cross-framework blueprint 465
- 42 Unified incident response and breach handling 474
- 43 The unified risk register: A strategic approach to multi-framework compliance 483
- 44 Harmonized policy sets and centralized documentation 490
- 45 Compliance evidence strategy and control libraries 497
- 46 Cross-framework audit prep and storytelling 506
- 47 Harmonized training, awareness, and culture 512
- 48 Multi-framework tabletop exercises and red team simulations 520
- 49 The future of compliance 527
-
Part VIII Privacy engineering and control automation
- 50 Architecting for compliance: Embedding privacy in systems design 533
- 51 Policy-as-code and compliance automation pipelines 543
- 52 GRC-as-code, operationalizing compliance in real time 554
- 53 Control libraries, compliance SDKs, and reusable governance patterns 573
- 54 Simulation playbooks: Stress-testing your compliance in the real world 588
- 55 Global data protection frameworks: GDPR, ISO 27001, and beyond 599
- 56 Operationalizing NIST – Controls, profiles, and use cases 616
-
Part IX AI and global compliance
- 57 Privacy blueprints for AI and machine learning systems 637
- 58 AI governance, privacy, and risk – Frameworks for responsible deployment 663
- 59 The compliance singularity, AI, trust, and the end of policies 683
- 60 Global AI governance models 691
-
Part X Templates, labs, and appendices
- A Templates and forms: Compliance in action 701
- B Multi-framework audit checklists 705
- C Simulation playbooks and tabletop exercises 707
- D Compliance evidence index 711
- E Glossary of terms and acronyms 713
- F Control crosswalk appendix 718
- G Resources and further reading 719
- Index 721