New Zealand Privacy Week 2021 was held recently; 10 – 14 May. This annual event is designed to help promote privacy awareness and to help inform people of their rights under the Privacy Act. A key event of the week was the Privacy Forum that was held here in Wellington on Friday 14 May. If you were unable to attend, the good news is that Axenic were there and the following blog is a review of some of the key insights from the event courtesy of Axenic Principal Consultant Lisa Zannino.
If you have been reading our blog series you will be following our journey to becoming ISO 27001 certified, which we achieved in February this year! In Part 3 we discussed how we utilised lockdown to get our advantage with some extra time on our hands. At that stage in our ISO journey, our ISMS was running with a high level of governance, however, it was not yet ready to get us ISO certified. There were still some pieces we needed to complete to get us over the line to achieve ISO 27001 certification. Let’s take a close look at the next stage we took on our journey to become ISO certified – one which involved a fair bit of documenting!
Recently I had an unpleasant privacy experience. I went to buy a concert ticket for my mother online and as part of the checkout process I was required to provide my date of birth and my gender! I was baffled and annoyed. What possible good reason could they have for this? It wasn’t an age-restricted gig and in any case, they didn’t ask for my mother’s date of birth but mine! I can think of plenty of bad reasons:
If you have been following our ISO 27001 blog series you will know that Axenic is now officially ISO 27001 certified! The team is extremely excited about this accomplishment, however, the journey to becoming certified has not been easy. We are going to continue talking you through our journey to certification and Part 3 discusses our lockdown experiences and how we used this to our advantage.
At the end of 2019, Axenic’s leadership team agreed to implement our strategy to achieve ISO 27001 certification. This took the form of setting aside resources to spend time on designing and implementing our Information Security Management System (ISMS). In this blog series, we will be taking you through Axenic’s journey to certification – to catch up on Part One of the series click here. In our second blog of the Axenic ISO 27001 certification journey, we take a look at the planning stage and what was involved in this important step.
Hot off the “virtual” press is our March newsletter. This month we discuss cyber news such as Accellion vulnerability and consider a use for blockchain and of course the associated risk that comes with this. We also highlight some useful resources such as the OPC’s Principle 12 tools and our very own flexible virtual roles to help you add some extra security muscle to your organisation. Click here to get the full picture.