Personal Data (Privacy Ordinance)

Hong Kong’s Personal Data (Privacy) Ordinance (PDPO) is the primary law governing data protection in Hong Kong, outlining the rights and obligations related to the collection, use, and transfer of personal data. The Personal Data (Privacy) Ordinance is managed by the Office of the Privacy Commissioner for Personal Data (PCPD) in Hong Kong. Further reading The Personal Data (Privacy) Ordinance

1 min

Personal Information Protection Law (PIPL)

The Personal Information Protection Law (PIPL) is a data privacy law that governs the collection, use, and transfer of personal information within China. It was passed by the National People’s Congress and came into effect on November 1, 2021. Further reading Mainland’s Personal Information Protection Law (PCPD) Related pages Personal Data Privacy Ordinance

1 min

Pig butchering scams

A Pig butchering scam (殺豬盤) (Yale: saat jyÅ« pùhn, Pinyin: shā zhÅ« pĆ”n) is a type of financial fraud in which scammers build long-term relationships with victims to gain their trust - fatten them up - before finally defrauding them of assets and money - butchering them. This scam gained global notoriety during the COVID-19 pandemic as criminals exploited the increased time people spent online. Scammers used social media, dating apps and messaging platforms to groom victims, or fatten them up, taking advantage of the internet’s borderless nature to operate across jurisdictions - making resolution of these crimes complex. ...

1 min

Post Quantum Cryptography (PQC)

Further reading NIST Releases First 3 Finalized Post-Quantum Encryption Standards (NIST News, August 2024) Post-quantum cryptography (Wikipedia) Post-Quantum Cryptography (NIST CSRC) Begin Transitioning to Post-Quantum Cryptography Now (Gartner); Sept 2024 Next steps in preparing for post-quantum cryptography (NCSC) Related pages Quantum Cryptography

1 min

Pre-mortem technique

Pre-mortem technique uses prospective hindsight to identify potential failures before they occur. By putting yourself into the place and time where a project has already failed, team members can then work backwards to determine what might lead to that failure and take proactive steps to mitigate those risks. Further reading Back to the future: Temporal perspective in the explanation of events - Journal of Behavioural Decision Making Pre-mortem: how to anticipate failure with prospective hindsight - Ness Labs Pre-mortem - Wikipedia The Power of Prospective Hindsight - Pennyworth Hindsight – it’s not just for past events - Oliver Burkeman/Guardian

1 min

Principles for Operational Resilience (POR) | BCBS

The Principles for Operational Resilience (POR) were published by the Basel Committee on Banking Supervision (BCBS) in March 2021. The POR defines operational resilience as the ability of a bank to continue to deliver critical operations while undergoing disruptive events. Further reading Principles for operational resilience (BIS)

1 min

Privacy Commissioner for Personal Data (PCPD)

The Office of the Privacy Commissioner for Personal Data (PCPD) is an independent statutory body in Hong Kong responsible for overseeing and enforcing the Personal Data (Privacy) Ordinance, the territory’s primary data protection law. Further reading PCPD website Six Data Protection Principles (PCPD)

1 min

Privileged Access Management

0 min

Prudential Regulation Authority (PRA)

The Prudential Regulation Authority (PRA) is responsible for the prudential regulation and supervision of financial institutions including banks in the UK. Related pages Bank of England Financial Conduct Authority (FCA)

1 min

Public Key Cryptography (PKC)

0 min

Public sector governance of emerging risks

IRGC worked in 2012 on how the public sector (governments and public sector agencies) can improve their governance of emerging risks. Project work included analysis of the risk management frameworks or other instruments of six participating governments and six case studies on managing emerging risk issues (good practices). An expert workshop was held to discuss transferable lessons and possible guidelines for how to improve risk management of emerging issues. Link ...

1 min

Qualys, Inc

Further reading Qualys website Qualys - Wikipedia Related Vulnerability management Enterprise TruRisk Platform

1 min

Quantivate GRC

Quantivate’s GRC software solution is designed for organisations to streamline GRC processes, improve decision-making, and ensure regulatory compliance. Related pages Quantivate (company) GRC

1 min

Quantivate, an Ncontracts Company

Quantivate is a provider of governance, risk, and compliance (GRC) software solutions designed to help organisations manage their risk and regulatory requirements. Further reading Quantivate - Crunchbase Quantivate - About company Related pages Quantivate GRC Leading GRC vendors

1 min

Quantum Cryptography

Also known as Quantum Encryption. Further reading What is quantum cryptography? (IBM) Quantum Cryptography (Wikipedia) Quantum Cryptography (Stanford University; Modern Cryptography Theory & Applications) Related pages Post Quantum Cryptography (PQC)

1 min