PRIVACY MANAGEMENT ACTIVITIES

Size: px
Start display at page:

Download "PRIVACY MANAGEMENT ACTIVITIES"

Transcription

1 PRIVACY MANAGEMENT ACTIVITIES Designed for the privacy office to take privacy management to the next level, Nymity Templates offers a wide range of downloadable resources. Publication Date: June 2014

2 1. Maintain Governance Structure Ensure that there are individuals responsible for data privacy, accountable management, and management reporting procedures Conduct a Privacy Risk Assessment Audit Risk Analysis Toolkit Real World Examples and Supporting References Sample Privacy Risk Assessment Plan Sample Self-Assessment Questions Steps for Implementation and Management of the Privacy Risk Assessment - Maintain a Privacy Strategy Frameworks for Maturing the Privacy Program List of Measures to Meet the Privacy Strategy Steps for Implementation and Maintenance Types of Privacy Strategies - Maintain a privacy program charter/mission statement Real World Samples Topics to Include in a Privacy Mission Statement - Maintain job descriptions for individuals responsible for data privacy (e.g. data protection officers) Nymity Privacy Job Description Template Real World Sample Job Description for Data Protection Manager Real World Sample Job Description for Information Authority DPO Real World Sample Job Description for DPO and Information Officer - Assign accountability for data privacy at a senior level Accountability Check List References that Support the PMA - Allocate resources to adequately implement and support the privacy program (e.g. budget, personnel) Assign Resources Checklist Privacy Office Budget Template - Assign responsibility for data privacy Checklist of Steps and Considerations for Assigning Responsibility for Privacy Example Organizational Chart of a Hybrid Privacy Function - Appoint a representative in member states where the organization does not maintain a physical presence Chart of Representatives References that Support this Privacy Management Activity Sample Language for Processor Agreements to Appoint a Data Processor as a Representative Steps to Implement and Maintain Appointing Representatives - Conduct regular communication between individuals accountable and responsible for data privacy Sample Privacy Committee Meeting Minutes - Alternative Sample Privacy Committee Meeting Minutes Steps to Implement and Maintain Regular Communication Template Agenda - Consult with stakeholders throughout the organization on data privacy matters Ad Hoc Communication Protocols Checklist for Fostering Ad Hoc Communication Steps for Implementation and Maintenance - Report, on a scheduled basis, on the status of the privacy program (e.g. board of directors, management board) Potential Reporting Elements and Metrics Reporting Content Template Sample Board Report Presentation Steps for Reporting on the Status of the Privacy Program - Integrate data privacy into business risk assessment/reporting Checklist of Privacy Risks to Include in a Business Risk Assessment Steps to Implement and Maintain Privacy as part of Business Risk Assessments - Maintain a Code of Conduct Checklist for Integrating Data Privacy into Code of Conduct Real World Sample Privacy Phrases for the Corporate Code of Conduct References to Support the PMA Steps to Implement and Maintain Privacy as Part of a Code of Conduct - Maintain ethics guidelines Real World Examples of Ethics Guidelines Steps for Implementing and Maintaining Data Privacy as Part of Ethics Guidelines Top Considerations when Writing Ethics Guidelines for Data Privacy - Maintain a strategy to align Activities with legal requirements (e.g., address conflicts, differences in standards, creating rationalized rule sets) - Require employees to acknowledge and agree to adhere to the data privacy policies Sample Data Privacy Acknowledgement Wording Steps for Implementation and Maintenance - Report periodically on the status of the privacy program to external stakeholders, as appropriate (e.g. annual reports, third parties, clients) Potential Reporting Elements and Metrics Steps for Reporting on the Status of the Privacy Program Template for Reporting Status

3 2. Maintain Personal Data Inventory Maintain an inventory of the location of key personal data storage or personal data flows with defined classes of personal data Maintain an inventory of key personal data holdings (what personal data is held and where) Sample Questionnaire about Personal Data Holdings Steps for Implementation and Maintenance Template Personal Data Holdings Inventory Classify personal data holdings by type (e.g. sensitive, confidential, public) Data Classification Template Sample Protective Marking Table Steps for Implementation and Maintenance Obtain approval for data processing (where prior approval is required) Checklist for Seeking DPA Approval List of Data Protection Authority Contact Details by Country Register databases with data protection authority (where registration is required) Spreadsheet of Registration Details Steps for Implementation and Maintenance Table of Registration Details per Country Maintain documentation for all cross-border data flows (e.g. country, mechanism used as a basis for the transfer such as Safe Harbor, model clauses, binding corporate rules, or approvals from data protection authorities) Log of Cross-Border Transfer Details Maintain flow charts for key data flows (e.g. between systems, between processes, between countries) Data Flow Worksheet Steps for Maintaining Flow Charts for Key Data Flows Use Binding Corporate Rules as a Data transfer mechanism Article 29 Working Party BCR Application Form for Controllers Article 29 Working Party BCR Application Form for Processors Article 29 Working Party Framework of Elements for BCRs and Application Form for Data Controllers Article 29 Working Party Framework of Elements for BCRs and Application Form for Data Processors Nymity BCR Readiness Assessment Template Dealing with a Lead Authority Nymity BCR Cost Benefit Webinar Nymity BCR Rule Source Nymity BCR Tool Webinar on BCR Implementation Accompanying Slides Webinar on BCR Implementation at Johnson Controls - a Case Study - Use Standard Contractual Rules as a data transfer mechanism EC Decision EC - Clauses Between Data Controllers - Establishes Joint and Several Liability to the Data Subject EC Decision EC - Clauses between Data Controllers - Limits Liability EC Decision EU - Clauses between a Processor and Subcontractor European Commission Decision EU - Clauses Between a Controller and a Processor Real World Samples for Standard Contractual Clauses Steps for Implementation and Maintenance of Model Clauses for Standard Contractual Clauses - Use Cross-Border Privacy Rules as a data transfer mechanism CBPR Data Privacy Accountability Scorecard Template CBPR Intake Questionnaire Checklist of Documentation for Accountability Agent Approval - Use the Safe Harbor framework as a data transfer mechanism Nymity Safe Harbor Tool Nymity Safe Harbor Data Privacy Accountability Scorecard Template Steps for Implementation and Maintenance of Safe Harbor Certification - Use Data Protection Authority approval as a data transfer mechanism Checklist for Seeking DPA Approval for Data Transfers References that Support this How to Guide - Use adequacy or one of the derogations from adequacy as a data transfer mechanism Checklist of Adequate Countries and Derogations Log of Derogations Relied on References that Support this How To Guide

4 3. Maintain Data Privacy Policy Maintain a data privacy policy that meets legal requirements and addresses operational risk Maintain a data privacy policy Annotated Privacy Policy Privacy Policy Content Checklist Privacy Policy Lifecycle Real World Samples Maintain a separate employee data privacy policy Annotated Employee Privacy Policy Employee Privacy Policy Creation and Maintenance Checklist Steps to Implement and Maintain Employee Privacy Policies Obtain board approval for data privacy policy Privacy Policy Approval Checklist and Template Presentation Boardroom Guidance Document legal basis for processing personal data Guidance and Checklist for Documenting Legal Basis for Processing Log of the Legal Basis for Processing Personal Data for Documenting Legal Basis for Processing Document guiding principles for consent Considerations for Documenting Guiding Principles of Consent

5 4. Embed Data Privacy Into Operations Maintain operational policies and procedures consistent with the data privacy policy, legal requirements, and operational risk management objectives Maintain policies/procedures for collection and use of sensitive personal data (including biometric data) Checklist of Considerations for Processing Sensitive Personal Data Do s and Don ts of Handling Sensitive Personal Data Real world Samples of Policy Language Sample Protective Marking Table - Maintain policies/procedures for maintaining data quality Real World Examples of Data Quality Comics and Posters Sample Data Quality Policy Maintain policies procedures for pseudonymization anonymization of personal data - Maintain policies/procedures for pseudonymization/anonymization of personal data Checklist for Anonymizing or Pseudonymizing personal data Steps to Implement and Maintain Anonymization Policies - Maintain policies/procedures to review processing conducted wholly or partially by automated means - Maintain policies/procedures for secondary uses of personal data Sample Consents for Secondary Uses Sample Real World Secondary Use Policy White Paper on Secondary Uses of Personal Data - Maintain policies/procedures for collecting consent preferences Log of Consents Sample Consent Form Sample Third-Party Authorization Form Steps for Implementation and Maintenance of Consent Preferences - Maintain policies procedures for secure destruction of personal data Data Destruction Checklist Data Destruction Log Template Sample Destruction Policy and Procedure Steps for Implementation and Maintenance - Integrate data privacy into use of cookies and tracking mechanisms Checklist to Integrate Data Privacy into Online Tracking Real World Samples and References that support the template Steps for Implementation and Management - Integrate data privacy into records retention practices Checklist for Incorporating Privacy into Retention Practices European Document Retention Guide 2013 by Iron Mountain Steps to Implement and Maintain Retention Schedules - Integrate data privacy into direct marketing practices Buying a marketing list- what you should be asking Checklist for Direct Marketing Direct Marketing Privacy Overview Hybrid Direct Marketing and Online Behavioral Advertising Cases - Integrate data privacy into direct marketing practices Buying a marketing list- what you should be asking Checklist for Direct Marketing Direct Marketing Privacy Overview Hybrid Direct Marketing and Online Behavioral Advertising Cases - Integrate data privacy into marketing practices Buying a marketing list - what you should be asking Consent and Unsubscribe Options for Marketing Practice Tips for Marketing for Marketing White Paper on Marketing - Integrate data privacy into telemarketing practices - Integrate data privacy into behavioural advertising practices Consumer Control of Targeted Advertising Hybrid Direct Marketing and Online Behavioral Advertising Cases Online Behavioral Advertising Privacy Considerations Checklist White Paper on Privacy and Behavioral Advertising - Integrate data privacy into hiring practices Data Privacy Hiring Do s and Don ts Hiring Practice Steps to Implement and Maintain this PMA HR example of HR forms that collect personal data in a privacyprotective manner HR example of privacy-protective job descriptions Real World Examples of Hiring Practices Sample interview questions framed in a privacy-protective manner Sample reference checking questions that are framed in a privacy-protective manner

6 - Integrate data privacy into employee background check practices Checklist for Integrating Data Privacy into Background Checking Procedures.docm Real World Samples - Integrate data privacy into social media practices Real World Samples for Social Media Policies Sample Social Media Policy Topics and Language Steps to Integrate Data Privacy into Social Media Practices for Social Media Template Privacy Impact Assessment for Use of Social Media - Integrate data privacy into Bring Your Own Device (BYOD) policies/procedures Checklist for Considerations in Mobile Device Policy Development - Integrate data privacy into health and safety practices Health and Safety Policy and Practice Checklist - Integrate data privacy into interactions with works councils Checklist for working with Works Councils Steps to Implement and Maintain Work with Works Councils - Integrate data privacy into practices for monitoring employees Checklist for Integrating Privacy into Employee Monitoring Processes - Integrate data privacy into monitoring practices Checklist for Integrating Privacy into Monitoring - Integrate data privacy into use of CCTV/video surveillance Checklist for Use of CCTV in General Checklist for use of CCTV in the Workplace Real World Samples and References that support the Template Steps for Implementation and Management - Integrate data privacy into use of geo-location (tracking and or location) devices Geolocation Whitepaper and Checklist for Geolocation Steps for Implementing the Template - Integrate data privacy into delegate access to employees' company accounts (e.g. vacation, LOA, termination) Checklist of Considerations for Delegate Access to Access Log Sample Delegate Authorization Sample Access Request Form - Integrate data privacy into ediscovery practices - Integrate data privacy into conducting internal investigations Internal Investigation Process Overview Real World Samples of Investigation Policies Sample Internal Investigations Policy Steps to Implement and Maintain Privacy in Conducting Internal Investigations for Conducting Internal Investigations - Integrate data privacy into practices for disclosure to and for law enforcement purposes Considerations for Law Enforcement Requests Law Enforcement Request Policy Law Enforcement Request Procedure Real world samples and supporting references - Integrate data privacy into customer patient citizen facing practices - Integrate data privacy into back office/administrative procedures (e.g. facilities management) Examples of Product Life Cycle Processes and Procedures Key Considerations Steps for Integrating Privacy into Back Office Procedures - Integrate data privacy into financial operations (e.g. credit, billing, processing transactions) - Integrate data privacy into research practices

7 5. Maintain Training and Awareness Program Provide ongoing training and awareness to promote compliance with the data privacy policy and to mitigate operational risk Conduct data privacy training needs analysis by position job responsibilities References that Support the Template Steps for Implementation and Maintenance of Training Needs Assessment Training Needs Assessment Template Training Needs Inventory Spreadsheet Template Maintain a core training program for all employees Checklist of Considerations for Training Programs List of Training Providers and Materials Websites Steps for Implementation and Maintenance of Core Training Conduct training for newly appointed employees upon assignment to privacy-sensitive positions Checklist of Considerations for Training Programs Flow Chart for Training Requirements on New Assignments Steps for Implementation and Maintenance of Training for Privacy Sensitive Positions Maintain a second level training program reflecting job specific content Second Level Privacy Training Guidance Steps for Implementation and Maintenance of Second Level Training Conduct regular refresher training to reflect new developments Checklist for Conducting Refresher Training Refresher Training Resources Steps for Implementing Privacy Refresher Training Integrate data privacy into other training programs such as HR security call centre retain operations training Measure participation in data privacy training activities (e.g. numbers of participants, scoring) Certificate of Training Data Privacy Training Feedback Form Data Privacy Training Sign-in Sheet Manager Attestation re Training Completion Steps for Implementing and Maintaining Measurements of Training Participation Require completion of data privacy training as part of performance reviews Options for Integrating Privacy Training into Performance Reviews Steps for Implementing Privacy Training as Part of Performance Reviews Deliver a privacy newsletter, or incorporate privacy into existing corporate communications Newsletter Generator Privacy Newsletter Guidance and Checklist Sample Corporate Newsletter that Includes Privacy Sample Privacy-Specific Newsletter Steps for Generating and Delivering Privacy Newsletters Maintain ongoing awareness material ( e.g. posters, intranet, and videos) Steps for Implementation and Maintenance of Awareness Materials Maintain an internal data privacy intranet privacy log or repository of privacy FAQs and information Case Study - Maintaining an Internal Data Privacy Intranet Steps for Implementing and Maintaining a Privacy Intranet Types of Content for a Privacy Intranet Hold an annual data privacy day/week Possible Data Privacy Day or Week Events and Activities Steps for Implementing and Holding a Data Privacy Day or Week Measure comprehension of data privacy concepts using exams Guidance for Measuring Comprehension of Data Privacy Concepts Steps for Implementing and Maintaining Measurements of Privacy Training Comprehension Provide data privacy information on system logon screens Sample Data Privacy Logon Screen Banner Wording Steps for Implementation and Maintenance Maintain certification for individuals responsible for data privacy including continuing professional education Privacy and Security Qualifications and Certification Programs Sample Continuing Professional Education Policy Steps for Implementation and Maintenance of Privacy Certifications Template Continuing Privacy Education Log Conduct one-off one-time tactical training and communication dealing with specific highly relevant issues topics Checklist for One-Off and One-Time Tactical Training Example of a One-Time Tactical Training Message Steps for Implementation and Maintenance of One-Time Tactical Data Privacy Training Provide ongoing education and training for the privacy office (e.g. conferences, webinars, guest speakers) In House Conference and Event Benefits Steps for Implementation and Maintenance of Privacy Office Education and Training

8 6. Manage Information Security Risk Maintain an information security program based on legal requirements and ongoing risk assessments Conduct a security risk assessment which considers data privacy risk Overview of the Security Risk Assessment Process for the Privacy Office Sample Security Risk Assessment Plan Maintain an information security policy Security Policy Review Checklist Maintain technical security measures (e.g. intrusion detection, firewalls, monitoring) Checklist of Common Ways to Mitigate Common Threats Common Technical Security Considerations Maintain administrative and technical measures to encrypt personal data in transmission and at rest including removable media Checklist of Privacy Considerations for Encryption Generic Use of Encryption Policy Glossary of Commonly Used Encryption Terminology Real World Samples Relating to Encryption for Encryption Maintain procedures to restrict access to personal information (e.g. role based access, segregation duties) Privacy Considerations in Restricting User Access Maintain a corporate security policy (protection of physical premises and hard assets) Common Physical Security Considerations Maintain human resource security measures (e.g. prescreening, performance appraisals) Processes to Vet Applicants for Privacy-Sensitive Roles Sample Behavioral Interview Questions Maintain backup and business continuity plans Business Continuity Plan Checklist Real World Samples and References for Business Continuity Plans Steps for Implementation of Maintaining Back Up and Business Continuity Plans Maintain a data loss prevention strategy Checklist of Common DLP Considerations Steps to Implement and Maintain a DLP Solution Maintain procedures to update security profile based on system updates and bug fixes Checklist for Integrating Privacy into System Updates and Bug Fixes Conduct regular testing of data security posture Checklist for Integrating Privacy into Security Testing Maintain a security verification

9 7. Manage Third-Party Risk Maintain contracts and agreements with third-parties and affiliates consistent with the data privacy policy, legal requirements, and operational risk tolerance Maintain data privacy requirements for third parties (e.g., vendors, processors, affiliates) Draft Clauses used by the United States Federal Government Real World Samples and References that support the Template Sample Data Privacy and Security Clauses Sample Requirements that a Vendor has for its Clients Sample Vendor Agreement Privacy Clauses Steps to Ensure Privacy Language is included in All Appropriate Contracts - Maintain procedures to execute contracts or agreements with all processors Considerations for a Procedure for Executing Contracts - Maintain a vendor data privacy risk assessment process Invasion of Privacy Test Outsourcing Contract Risk Assessment Checklist Steps to Implement and Maintain a Vendor Privacy Risk Assessment Process - Conduct due diligence around the data privacy and security posture of potential vendors/processors 10 Steps to Take when Outsourcing Personal Data Processing Checklist of Screening Questions for Potential Vendors and Processors Privacy Questionnaire for Outsourcing Personal Data Processing for the PMA Vendor Privacy Risk Assessment Scorecard - Maintain a policy governing use of cloud providers Factors in Creating a Cloud Computing Policy Sample Cloud Computing Policy - Maintain procedures to address instances of noncompliance with contracts and agreements Procedures for Addressing Non-Compliance with Contracts - Conduct ongoing due diligence around the data privacy and security posture of vendors/processors based on a risk assessment 10 Steps to Take when Outsourcing Personal Data Processing Checklist of Screening Questions for Potential Vendors and Processors Privacy Questionnaire for Outsourcing Data Processing for the PMA - Review long term contracts for new or evolving data protection risks Catalogue Change Log Checklist for Reviewing Long-term Contracts for New Risks

10 8. Maintain Notices Maintain notices to individuals consistent with the data privacy policy, legal requirements, and operational risk tolerance Maintain a data privacy notice that details the organization s personal data handling policies Annotated Privacy Notice Checklist for Data Privacy Notice considerations Sample condensed notice Sample just in time notice Sample privacy notice in table form Sample short notice Steps for Implementation and Maintenance of Privacy Notices Withdrawal of Consent Form - Provide data privacy notice at all points where personal data is collected Acknowledgement of Notice Checklist for Providing a Data Privacy Notice References that support this Privacy Management Activity Sample Notice Distribution Log Steps for Implementation and Maintenance of Privacy Notices - Provide notice by means of on-location signage, posters HIPAA Notice of Privacy Practices - Sample Notice American Medical Association Physical Notice and Signage Guidance and Checklist Sample CCTV Sign Sample Notice Brochure Steps for Implementation and Maintenance of On-location signage and posters for On-location Notice - Provide notice in marketing communications (e.g. s, flyers, offers) Checklist for Providing a Data Privacy Notice References that support this How to Guide Sample Privacy Disclosure or Opt-Out Language Steps for Implementation and Maintenance of Privacy Notices - Provide notice in all forms, contracts, and terms Checklist for Privacy Notices in Forms Contracts and Terms Real World Samples for Privacy Notices in Forms and Contracts Steps for Implementing and Maintaining Privacy Notices in Forms and Contracts for Privacy Notices in Forms and Contracts - Maintain scripts for use by employees to provide the data privacy notice Checklist for Maintaining Scripts to provide Notice Sample Phrasing for Privacy Notice Scripts - Maintain a data privacy notice for employees (processing of employee personal data) Annotated Privacy Notice Employee Privacy Notice Creation and Maintenance Checklist Real World Samples Steps for Implementation and Maintenance of Employee Privacy Notices - Maintain a privacy seal or trustmark to increase customer trust Key Considerations for Adopting a Seal or Trustmark Potential Privacy or Trust Seals or Trustmarks Steps for Implementation and Maintenance of a Privacy Seal or Trustmark - Provide data privacy education to individuals (e.g. preventing identity theft) Checklist on Providing Data Privacy Education Real World Samples for Data Privacy Education

11 9. Maintain Procedures for Inquiries and Complaints Maintain effective procedures for interactions with individuals about their personal data Maintain procedures to address complaints Complaint Log Complaint Mechanism Checklist Sample Complaint Procedure Sample Complaint Response Letter Steps for Implementation and Maintenance of Addressing Privacy Complaints Tracking Individual Complaints or Requests Maintain procedures to respond to access requests Access Request Checklist Acknowledgement of Request Letter Log of all Access Requests Real World Samples and Supporting Guidance Sample Access Request Form Sample Access Request Procedure Sample Response Letter Steps for Implementation and Maintenance of Access Requests Tracking Individual Requests Form - Maintain procedures to respond to requests to update or revise personal data Acknowledgement of Request Correction or Rectification Request Checklist Correction or Rectification Request Log Real World Samples Sample Rectification Procedure Sample Response Letter Steps for Implementation and Maintenance of Correction Requests Tracking Individual Requests Form Maintain procedures to respond to requests to opt out Sample Opt-Out form Sample Opt-Out Procedures Steps for Implementation and Maintenance of Opt-Out Requests Maintain procedures to respond to requests for information Checklist for Responding to Requests for Information Information Request Log Template Sample Information Request Procedure Sample Request Tracking Form Sample Response Letter Maintain customer Frequently Asked Questions A List of Potential FAQs and Sample Text by Category A Sample Departmental Survey to Identify Potential FAQs Steps for Developing and Maintaining Privacy FAQs Maintain escalation procedures for serious complaints or complex access requests Checklist and Procedure for Escalating Serious Complaints Steps for Implementation and Maintenance of an Escalation Process Maintain procedures to investigate root causes of data protection complaints Sample Questions to Assist Identify Root Cause Steps for Implementation and Maintenance of Identifying Root Causes Maintain metrics for data protection complaints (e.g. number, root cause) Example of How to Generate Metrics Privacy Complaint Log Privacy Complaints Metrics Checklist

12 10. Monitor for New Operational Practices Monitor organizational practices to identify new processes or material changes to existing processes and ensure the implementation of Privacy by Design principles Maintain a Privacy by Design framework for all system and product development GSMA Privacy Design Guidelines for Mobile Application Development OASIS Making Privacy Operational - Introduction to the Privacy Management Reference Model Privacy by Design Interview - A Systems Architect Engineer and Designer Tool Privacy Management Reference Model and Methodology Version March OASIS Committee Specification Draft 01 for a PbD Framework - Maintain Privacy Impact Assessment guidelines and templates PIA Checklist PIA Template - Conduct PIAs for new programs systems processes Checklist on When to Conduct a PIA Steps for Implementation and Maintenance of Conducting PIAs Template Privacy Threshold Analysis Sample Privacy Risk Mitigation Table - Maintain a product sign-off procedure that involves the privacy office Examples of Product Sign-off Procedures Key Considerations for Maintaining a Product Sign-off Procedure Steps for Implementation and Maintenance of a Product Sign-off Procedure - Maintain a product life cycle process to address privacy impacts of changes to existing programs, systems, or processes Product Life Cycle Process Examples Steps for Implementation and Maintenance of a Product Lifecycle Process - Maintain metrics for PIAs (e.g. number completed, turnaround time) List of Privacy Impact Assessment Metrics Steps for Implementation and Maintenance of PIA Metrics - Maintain a procedure to address data protection issues identified during PIAs Checklist for Addressing Issues Identified in a PIA References that support this How to Guide

13 11. Maintain Data Privacy Breach Management Program Maintain an effective data privacy incident and breach management program Maintain a documented data privacy incident/breach response protocol Anticipated Questions from Law Enforcement and Regulators Checklist for Breach Response Protocol considerations Contact List for Response Team to use First 24 Hours Checklist Real World Samples References that Support this Template Steps for Implementation and Management - Maintain a breach notification (to affected individuals) and reporting (to regulators, credit agencies, law enforcement) and protocol Checklist for Notification Considerations Real-World Samples Steps for Implementation and Maintenance of Breach Notifications - Maintain a breach incident log to track nature/type of all breaches Breach Log Checklist Breach Log Template Steps for Implementation and Maintenance of a Breach Log - Maintain data privacy incident/breach metrics (e.g. nature of breach, risk, root cause) Example Creation of a Breach Metric Privacy Breach Metrics Checklist - Conduct periodic testing of breach protocol and document findings and changes made Issues Capture Workbook Steps to Implement and Maintain a Breach Testing Protocol - Engage a breach response remediation provider - Engage a forensic investigation team Checklist for Engaging a Forensic Investigation Team Steps for Implementation and Management of Engaging Forensics Teams - Obtain data privacy breach insurance coverage Cyber Insurance Checklist - Maintain a record preservation protocol to protect relevant log history 7. Manage Third-Party Risk Maintain contracts and agreements with third-parties and affiliates consistent with the data privacy policy, legal requirements, and operational risk tolerance

14 12. Monitor Data Handling Practices Verify operational practices comply with the data privacy policy and operational policies and procedures Conduct self-assessments managed by the privacy office Audit Risk Analysis Toolkit Data Privacy Accountability Scorecard Template with example Real World Samples of Privacy Self-Assessments and Supporting References Sample Self-Assessment Questions Scorecard Webinar Steps for Implementation and Maintenance of Privacy Self- Assessments The Privacy Office Guide to Demonstrating Accountability - Conduct ad-hoc audits/assessments based on complaints/inquiries/breaches Audit Phases and How to Conduct an Audit Sample Audit Questions Sample Error Classification Schedule - Conduct audits/assessments of the privacy program outside of the privacy office (e.g. internal audit) Example Audit Initiation Letter issued under Privilege Internal Auditing Approach to Privacy Audits and Assessments Privacy Office Role with Internal Auditing Top 10 Things Privacy can do to Support Internal Audit - Benchmark results of audits/assessments (e.g. comparison to previous audit, comparison to other business units) Privacy Management Activity Framework Privacy Planning and Benchmarking Methodology - Conduct ad-hoc walk-throughs Audit Risk Analysis Toolkit Error Classification Schedule Sample Audit Questions Steps for Conducting Ad Hoc Privacy Walk-throughs - Conduct assessments through use of an accountability agent or third-party verification Accountability Agents Approach to Privacy Assessments The Privacy Offices Role with Accountability Agent or Third Party Verification Third-Party Service Providers Approach to Privacy Assessments Top Ten Things the Privacy Office Can Do to Support the Use of an Accountability Agent or Third-Party Verification - Maintain privacy program metrics Potential Metrics for Reporting the Privacy Program Status Privacy Metrics Templates and Real Life Examples Steps for Implementing and Maintaining Privacy Program Metrics

15 13. Track External Criteria Track new compliance requirements, expectations, and best practices Conduct ongoing research on developments in law Considerations for How to Conduct Research - Maintain subscription to compliance reporting service/law firm updates to stay informed on new developments List of Potential Compliance Reporting Services and Law Firms Steps for Implementation and Maintenance of the PMA - Maintain records or evidence that alerts are read and actions are taken (e.g. read daily and forwarded to key individuals as required) Advanced User Features of Nymity References Checklist around Evidence that Alerts are Read and Actions Taken Template for a Log of Actions - Attend/participate in privacy conferences, industry associations, or think-tank events List of Privacy Conferences Industry Association and Think-Tank Events Steps for Implementation and Maintenance of the PMA - Record/report on the tracking of new Rule Sources or amendments to Rule Sources Reporting on the Tracking of New Rule Sources Sample Records for Tracking Rule Sources - Seek legal opinions regarding recent developments in law Considerations for Seeking Legal Opinions - Document that new requirements have been implemented (also document where a decision is made to not implement any changes, including reason) Checklist for Documenting that Requirements were Implemented Sample Change Request Form Sample Document Revision History Sample Project Implementation Plan Template for a Log of Actions - Review or participate in studies related to best practices in data privacy management Potential Studies related to best practices in data privacy management Steps for Implementation and Maintenance of Reviewing or participating in Privacy Studies

16 Privacy Management Accountability Framework The Nymity Privacy Management Accountability Framework ( Framework ) is a comprehensive listing of over 150 privacy management activities identified through Nymity s global data privacy accountability research. The privacy management activities are structured in 13 privacy management processes, and are jurisdiction and industry neutral. Copyright 2014 by Nymity Inc. All rights reserved. All text, images, logos, trademarks and information contained in this document are the intellectual property of Nymity Inc. unless otherwise indicated. Reproduction, modification, transmission, use, or quotation of any content, including text, images, photographs etc., requires the prior written permission of Nymity Inc. Requests may be sent to research@nymity.com.

Copyright 2014 Nymity Inc. All Rights Reserved.

Copyright 2014 Nymity Inc. All Rights Reserved. This sample Benchmarks Report represents a real-world example of Your Privacy Management Status Report based on a mature privacy program in a non-north American organization within the public sector. Copyright

More information

FRAMEWORKS & METHODOLOGIES

FRAMEWORKS & METHODOLOGIES FRAMEWORKS & METHODOLOGIES NYMITY PRIVACY MANAGEMENT ACCOUNTABILITY FRAMEWORK TM WHITE PAPER 2 Copyright 2014 by Nymity Inc. All rights reserved. All text, images, logos, trademarks and information contained

More information

The CIPM certification is comprised of two domains: Privacy Program Governance (I) and Privacy Program Operational Life Cycle (II).

The CIPM certification is comprised of two domains: Privacy Program Governance (I) and Privacy Program Operational Life Cycle (II). Page 1 of 7 The CIPM certification is comprised of two domains: Privacy Program Governance (I) and Privacy Program Operational Life Cycle (II). Domain I provides a solid foundation for the governance of

More information

Data Processing Agreement for Oracle Cloud Services

Data Processing Agreement for Oracle Cloud Services Data Processing Agreement for Oracle Cloud Services Version December 1, 2013 1. Scope and order of precedence This is an agreement concerning the Processing of Personal Data as part of Oracle s Cloud Services

More information

I. Introduction to Privacy: Common Principles and Approaches

I. Introduction to Privacy: Common Principles and Approaches I. Introduction to Privacy: Common Principles and Approaches A. A Modern History of Privacy a. Descriptions and definitions b. Historical and social origins c. Information types i. Personal and non-personal

More information

Cloud Security Trust Cisco to Protect Your Data

Cloud Security Trust Cisco to Protect Your Data Trust Cisco to Protect Your Data As cloud adoption accelerates, organizations are increasingly placing their trust in third-party cloud service providers (CSPs). But can you fully trust your most sensitive

More information

IAPP Privacy Certification

IAPP Privacy Certification IAPP Privacy Certification Program Introduction to the Certification Foundation copyright 2011, IAPP Overview Each candidate who seeks an IAPP privacy certification for the very first time must complete

More information

How To Ensure Health Information Is Protected

How To Ensure Health Information Is Protected pic pic CIHI Submission: 2011 Prescribed Entity Review October 2011 Who We Are Established in 1994, CIHI is an independent, not-for-profit corporation that provides essential information on Canada s health

More information

Johnson Controls Privacy Notice

Johnson Controls Privacy Notice Johnson Controls Privacy Notice Johnson Controls, Inc. and its affiliated companies (collectively Johnson Controls, we, us or our) care about your privacy and are committed to protecting your personal

More information

Binding Corporate Rules ( BCR ) Summary of Third Party Rights

Binding Corporate Rules ( BCR ) Summary of Third Party Rights Binding Corporate Rules ( BCR ) Summary of Third Party Rights This document contains in its Sections 3 9 all provision of the Binding Corporate Rules (BCR) for Siemens Group Companies and Other Adopting

More information

AIRBUS GROUP BINDING CORPORATE RULES

AIRBUS GROUP BINDING CORPORATE RULES 1 AIRBUS GROUP BINDING CORPORATE RULES 2 Introduction The Binding Corporate Rules (hereinafter BCRs ) of the Airbus Group finalize the Airbus Group s provisions on the protection of Personal Data. These

More information

Article 29 Working Party Issues Opinion on Cloud Computing

Article 29 Working Party Issues Opinion on Cloud Computing Client Alert Global Regulatory Enforcement If you have questions or would like additional information on the material covered in this Alert, please contact one of the authors: Cynthia O Donoghue Partner,

More information

INCIDENT RESPONSE CHECKLIST

INCIDENT RESPONSE CHECKLIST INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged

More information

Office 365 Data Processing Agreement with Model Clauses

Office 365 Data Processing Agreement with Model Clauses Enrollment for Education Solutions Office 365 Data Processing Agreement (with EU Standard Contractual Clauses) Amendment ID Enrollment for Education Solutions number Microsoft to complete 7392924 GOLDS03081

More information

Privacy Policy. February, 2015 Page: 1

Privacy Policy. February, 2015 Page: 1 February, 2015 Page: 1 Revision History Revision # Date Author Sections Altered Approval/Date Rev 1.0 02/15/15 Ben Price New Document Rev 1.1 07/24/15 Ben Price Verify Privacy Grid Requirements are met

More information

Processor Binding Corporate Rules (BCRs), for intra-group transfers of personal data to non EEA countries

Processor Binding Corporate Rules (BCRs), for intra-group transfers of personal data to non EEA countries Processor Binding Corporate Rules (BCRs), for intra-group transfers of personal data to non EEA countries Sopra HR Software as a Data Processor Sopra HR Software, 2014 / Ref. : 20141120-101114-m 1/32 1.

More information

OVERVIEW. stakeholder engagement mechanisms and WP29 consultation mechanisms respectively.

OVERVIEW. stakeholder engagement mechanisms and WP29 consultation mechanisms respectively. Joint work between experts from the Article 29 Working Party and from APEC Economies, on a referential for requirements for Binding Corporate Rules submitted to national Data Protection Authorities in

More information

Privacy Governance and Compliance Framework Accountability

Privacy Governance and Compliance Framework Accountability Privacy Governance and Framework Accountability Agenda Global Data Protection and Privacy (DPP) Organization Structure Privacy The 3 Lines of Defense (LOD) Model: Overview Privacy The 3 Lines of Defense

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

White Paper: The Seven Elements of an Effective Compliance and Ethics Program

White Paper: The Seven Elements of an Effective Compliance and Ethics Program White Paper: The Seven Elements of an Effective Compliance and Ethics Program Executive Summary Recently, the United States Sentencing Commission voted to modify the Federal Sentencing Guidelines, including

More information

CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:

CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: Privacy Responsibilities and Considerations Cloud computing is the delivery of computing services over the Internet, and it offers many potential

More information

Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID MOS10

Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID MOS10 Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID This Microsoft Online Services Security Amendment ( Amendment ) is between

More information

Privacy Management Program Toolkit Health Custodians Personal Health Information Act

Privacy Management Program Toolkit Health Custodians Personal Health Information Act Office of the Information and Privacy Commissioner for Nova Scotia Privacy Management Program Toolkit Health Custodians Personal Health Information Act Introduction: This toolkit was prepared by the Information

More information

Logging In: Auditing Cybersecurity in an Unsecure World

Logging In: Auditing Cybersecurity in an Unsecure World About This Course Logging In: Auditing Cybersecurity in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that

More information

Overview of Employment and Employee Privacy Laws and Key Trends in Austria

Overview of Employment and Employee Privacy Laws and Key Trends in Austria P a g e 1 Privacy Interviews with Experts August 2011 Toronto / Washington DC / Brussels www.nymity.com Rainer Knyrim Attorney and Partner Preslmayr Attorneys at Law Vienna, Austria Overview of Employment

More information

MEMORANDUM. Date: October 28, 2013. Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

MEMORANDUM. Date: October 28, 2013. Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance MEMORANDUM Date: October 28, 2013 To: Federally Regulated Financial Institutions Subject: Guidance The increasing frequency and sophistication of recent cyber-attacks has resulted in an elevated risk profile

More information

Data Protection HEADLINE PART Developments: Implications HEADLINE for the PART Insurance 2 Sector Strategies for Compliance

Data Protection HEADLINE PART Developments: Implications HEADLINE for the PART Insurance 2 Sector Strategies for Compliance Data Protection HEADLINE PART Developments: 1 Implications HEADLINE for the PART Insurance 2 Sector Strategies for Compliance Sub-headline Arial 18pt dark gray Optional Name Arial 13pt italic white Venue

More information

Manage Compliance with External Requirements

Manage Compliance with External Requirements Manage Compliance with External Requirements Description IT is subject to requirements that are highly complex and constantly changing. The school jurisdiction s senior leadership is ultimately accountable

More information

White Paper on Financial Institution Vendor Management

White Paper on Financial Institution Vendor Management White Paper on Financial Institution Vendor Management Virtually every organization in the modern economy relies to some extent on third-party vendors that facilitate business operations in a wide variety

More information

Personal Health Information Privacy Policy

Personal Health Information Privacy Policy Personal Health Information Privacy Policy Privacy Office Document ID: 2478 Version: 6.2 Owner: Chief Privacy Officer Sensitivity Level: Low Copyright Notice Copyright 2014, ehealth Ontario All rights

More information

TODAY S AGENDA. Trends/Victimology. Incident Response. Remediation. Disclosures

TODAY S AGENDA. Trends/Victimology. Incident Response. Remediation. Disclosures TODAY S AGENDA Trends/Victimology Incident Response Remediation Disclosures Trends/Victimology ADVERSARY CLASSIFICATIONS SOCIAL ENGINEERING DATA SOURCES COVERT INDICATORS - METADATA METADATA data providing

More information

Privacy Risk Assessments

Privacy Risk Assessments Privacy Risk Assessments Michael Hulet Principal November 8, 2012 Agenda Privacy Review Definition Trends Privacy Program Considerations Privacy Risk Assessment Risk Assessment Tools Generally Accepted

More information

Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 EES17 --------------

Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 EES17 -------------- w Microsoft Volume Licensing Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 Enrollment for Education Solutions number Microsoft to complete --------------

More information

<Choose> Addendum Windows Azure Data Processing Agreement Amendment ID M129

<Choose> Addendum Windows Azure Data Processing Agreement Amendment ID M129 Addendum Amendment ID Proposal ID Enrollment number Microsoft to complete This addendum ( Windows Azure Addendum ) is entered into between the parties identified on the signature form for the

More information

Compliance Management Systems

Compliance Management Systems Certification Scheme Y03 Compliance Management Systems ISO 19600 ONR 192050 Issue V2.1:2015-01-08 Austrian Standards plus GmbH Dr. Peter Jonas Heinestraße 38 A-1020 Vienna, Austria E-Mail: p.jonas@austrian-standards.at

More information

Accountable Privacy Management in BC s Public Sector

Accountable Privacy Management in BC s Public Sector Accountable Privacy Management in BC s Public Sector Contents Accountable Privacy Management In BC s Public Sector 2 INTRODUCTION 3 What is accountability? 4 Steps to setting up the program 4 A. PRIVACY

More information

Health information privacy and security. Norton Rose Fulbright US LLP October 6, 2015

Health information privacy and security. Norton Rose Fulbright US LLP October 6, 2015 Health information privacy and security Norton Rose Fulbright US LLP October 6, 2015 Speaker Mark Faccenda Mark Faccenda is a Partner in the Washington, D.C. office. As part of Norton Rose Fulbright's

More information

Cybersecurity The role of Internal Audit

Cybersecurity The role of Internal Audit Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government

More information

Align Technology. Data Protection Binding Corporate Rules Controller Policy. 2014 Align Technology, Inc. All rights reserved.

Align Technology. Data Protection Binding Corporate Rules Controller Policy. 2014 Align Technology, Inc. All rights reserved. Align Technology Data Protection Binding Corporate Rules Controller Policy Contents INTRODUCTION 3 PART I: BACKGROUND AND ACTIONS 4 PART II: CONTROLLER OBLIGATIONS 6 PART III: APPENDICES 13 2 P a g e INTRODUCTION

More information

Cloud Computing: Legal Risks and Best Practices

Cloud Computing: Legal Risks and Best Practices Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent

More information

Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices

Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices Over the course of this one hour presentation, panelists will cover the following subject areas, providing answers

More information

Information Integrity & Data Management

Information Integrity & Data Management Group Standard Information Integrity & Data Management Serco recognises its responsibility to ensure that any information and data produced meets customer, legislative and regulatory requirements and is

More information

OSRAM BCR Binding Corporate Rules ( BCR ) for OSRAM Group Companies and Adopting Companies for the protection of personal data

OSRAM BCR Binding Corporate Rules ( BCR ) for OSRAM Group Companies and Adopting Companies for the protection of personal data OSRAM BCR Binding Corporate Rules ( BCR ) for OSRAM Group Companies and Adopting Companies for the protection of personal data Terms Adopting company an OSRAM associated company in Germany or overseas

More information

Third Party Security Guidelines. e-governance

Third Party Security Guidelines. e-governance for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type of Information Document

More information

Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP

Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP Principal Systems Engineer Symantec LAMC Agenda 1 What DLP is and its purpose 2 Challenges

More information

Data Protection. Processing and Transfer of Personal Data in Kvaerner. Binding Corporate Rules Public Document

Data Protection. Processing and Transfer of Personal Data in Kvaerner. Binding Corporate Rules Public Document Data Protection Processing and Transfer of Personal Data in Kvaerner Binding Corporate Rules Public Document 1 of 19 1 / 19 Table of contents 1 Introduction... 4 1.1 Scope... 4 1.2 Definitions... 4 1.2.1

More information

Network Detective. HIPAA Compliance Module. 2015 RapidFire Tools, Inc. All rights reserved V20150201

Network Detective. HIPAA Compliance Module. 2015 RapidFire Tools, Inc. All rights reserved V20150201 Network Detective 2015 RapidFire Tools, Inc. All rights reserved V20150201 Contents Purpose of this Guide... 3 About Network Detective... 3 Overview... 4 Creating a Site... 5 Starting a HIPAA Assessment...

More information

Cyber, Security and Privacy Questionnaire

Cyber, Security and Privacy Questionnaire Cyber, Security and Privacy Questionnaire www.fbinsure.com Please note: This is an electronic application. When completed please save and email to: Ed McGuire emcguire@fbinsure.com Cyber, Security & Privacy

More information

Data Protection and Cloud Computing: an Overview of the Legal Issues

Data Protection and Cloud Computing: an Overview of the Legal Issues Data Protection and Cloud Computing: an Overview of the Legal Issues Christopher Kuner Partner, Hunton & Williams, Brussels Research Assistant, University of Copenhagen Nordic IT Law Conference Copenhagen,

More information

Information Security Program CHARTER

Information Security Program CHARTER State of Louisiana Information Security Program CHARTER Date Published: 12, 09, 2015 Contents Executive Sponsors... 3 Program Owner... 3 Introduction... 4 Statewide Information Security Strategy... 4 Information

More information

CISM (Certified Information Security Manager) Document version: 6.28.11

CISM (Certified Information Security Manager) Document version: 6.28.11 CISM (Certified Information Security Manager) Document version: 6.28.11 Important Note About CISM PDF techexams CISM PDF is a comprehensive compilation of questions and answers that have been developed

More information

Privacy and Electronic Communications Regulations

Privacy and Electronic Communications Regulations ICO lo Notification of PECR security breaches Privacy and Electronic Communications Regulations Contents Introduction... 2 Overview... 2 Relevant security breaches... 3 What is a service provider?... 3

More information

Identifying and Managing Third Party Data Security Risk

Identifying and Managing Third Party Data Security Risk Identifying and Managing Third Party Data Security Risk Legal Counsel to the Financial Services Industry Digital Commerce & Payments Series Webinar April 29, 2015 1 Introduction & Overview Today s discussion:

More information

Maintaining PCI-DSS compliance. Daniele Bertolotti daniele_bertolotti@symantec.com Antonio Ricci antonio_ricci@symantec.com

Maintaining PCI-DSS compliance. Daniele Bertolotti daniele_bertolotti@symantec.com Antonio Ricci antonio_ricci@symantec.com Maintaining PCI-DSS compliance Daniele Bertolotti daniele_bertolotti@symantec.com Antonio Ricci antonio_ricci@symantec.com Sessione di Studio Milano, 21 Febbraio 2013 Agenda 1 Maintaining PCI-DSS compliance

More information

The Importance of Privacy & Data Security in a Changing World

The Importance of Privacy & Data Security in a Changing World Cyber, PrivaCy & Data SeCurity 360 www.mpplaw.com about our PraCtiCe Data is the lifeblood of our global economy. Collected, stored and transmitted, digital data not only imparts great opportunities, but

More information

Transparency. Privacy. Compliance. Security. What does privacy at Microsoft mean? Are you using my data to build advertising products?

Transparency. Privacy. Compliance. Security. What does privacy at Microsoft mean? Are you using my data to build advertising products? Privacy Transparency What does privacy at Microsoft mean? Are you using my data to build advertising products? Where is my data? Who has access to my data? Compliance What certifications and capabilities

More information

Presentation by: Dr. Nathalie Moreno Partner. Cloud Computing and Data Protection: an Update 4 October 2012

Presentation by: Dr. Nathalie Moreno Partner. Cloud Computing and Data Protection: an Update 4 October 2012 Presentation by: Dr. Nathalie Moreno Partner Cloud Computing and Data Protection: an Update 4 October 2012 Our team Speechly Bircham is an ambitious, international mid-size fullservice law firm head-quartered

More information

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Melissa J. Krasnow, Dorsey & Whitney LLP A Note discussing written information security programs (WISPs)

More information

CPA Global North America LLC SAFE HARBOR PRIVACY POLICY. Introduction

CPA Global North America LLC SAFE HARBOR PRIVACY POLICY. Introduction CPA Global North America LLC SAFE HARBOR PRIVACY POLICY Introduction CPA Global North America LLC ( CPA Global ) is the US affiliate of the world's leading intellectual property (IP) management and IP

More information

Risk Management of Outsourced Technology Services. November 28, 2000

Risk Management of Outsourced Technology Services. November 28, 2000 Risk Management of Outsourced Technology Services November 28, 2000 Purpose and Background This statement focuses on the risk management process of identifying, measuring, monitoring, and controlling the

More information

ROHIT GROUP OF COMPANIES PRIVACY POLICY This privacy policy is subject to change without notice. It was last updated on July 23, 2014.

ROHIT GROUP OF COMPANIES PRIVACY POLICY This privacy policy is subject to change without notice. It was last updated on July 23, 2014. ROHIT GROUP OF COMPANIES PRIVACY POLICY This privacy policy is subject to change without notice. It was last updated on July 23, 2014. The Rohit Group of Companies ( Rohit Group, Company, our, we ) understands

More information

9/14/2015. Before we begin. Learning Objectives. Kevin Secrest IT Audit Manager, University of Pennsylvania

9/14/2015. Before we begin. Learning Objectives. Kevin Secrest IT Audit Manager, University of Pennsylvania Evaluating and Managing Third Party IT Service Providers Are You Really Getting The Assurance You Need To Mitigate Information Security and Privacy Risks? Kevin Secrest IT Audit Manager, University of

More information

T141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes

T141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes T141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes Synopsis of the Vocational Learning Outcomes * The graduate has reliably demonstrated the ability to 1. analyze and resolve information

More information

FINRA Publishes its 2015 Report on Cybersecurity Practices

FINRA Publishes its 2015 Report on Cybersecurity Practices Securities Litigation & Enforcement Client Service Group and Data Privacy & Security Team To: Our Clients and Friends February 12, 2015 FINRA Publishes its 2015 Report on Cybersecurity Practices On February

More information

FINAL DOCUMENT. Guidelines for Regulatory Auditing of Quality Management Systems of Medical Device Manufacturers Part 1: General Requirements

FINAL DOCUMENT. Guidelines for Regulatory Auditing of Quality Management Systems of Medical Device Manufacturers Part 1: General Requirements GHTF/SG4/N28R4:2008 FINAL DOCUMENT Title: Guidelines for Regulatory Auditing of Quality Management Systems of Medical Device Manufacturers Authoring Group: GHTF Study Group 4 Endorsed by: The Global Harmonization

More information

www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v8 2-25-14

www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v8 2-25-14 www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit (4:30-5:30) Draft v8 2-25-14 Common Myths 1. You have not been hacked. 2. Cyber security is about keeping the

More information

Privacy Level Agreement Outline for the Sale of Cloud Services in the European Union

Privacy Level Agreement Outline for the Sale of Cloud Services in the European Union Privacy Level Agreement Working Group Privacy Level Agreement Outline for the Sale of Cloud Services in the European Union February 2013 The PLA Outline has been developed within CSA by an expert working

More information

Data Breaches and Trade Secrets: What to Do When Your Client Gets Hacked

Data Breaches and Trade Secrets: What to Do When Your Client Gets Hacked Data Breaches and Trade Secrets: What to Do When Your Client Gets Hacked R. Mark Halligan, FisherBroyles, LLP Andreas Kaltsounis, Stroz Friedberg Amy L. Carlson, Stoel Rives LLP Moderated by David A. Bateman,

More information

DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY

DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY This Plan we adopted by member, partner, etc.) on Our Program Coordinator (date). (Board of Directors, owner, We have appointed

More information

PCI Policy Compliance Using Information Security Policies Made Easy. PCI Policy Compliance Information Shield Page 1

PCI Policy Compliance Using Information Security Policies Made Easy. PCI Policy Compliance Information Shield Page 1 PCI Policy Compliance Using Information Security Policies Made Easy PCI Policy Compliance Information Shield Page 1 PCI Policy Compliance Using Information Security Policies Made Easy By David J Lineman

More information

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION Information security is a critical issue for institutions of higher education (IHE). IHE face issues of risk, liability, business continuity,

More information

Attachment A. Identification of Risks/Cybersecurity Governance

Attachment A. Identification of Risks/Cybersecurity Governance Attachment A Identification of Risks/Cybersecurity Governance 1. For each of the following practices employed by the Firm for management of information security assets, please provide the month and year

More information

Outsourced Third Party Relationship Management/ Vendor Management. TTS Webinar July 15, 2015 Susan Orr CISA, CISM, CRISC, CRP

Outsourced Third Party Relationship Management/ Vendor Management. TTS Webinar July 15, 2015 Susan Orr CISA, CISM, CRISC, CRP Outsourced Third Party Relationship Management/ Vendor Management TTS Webinar July 15, 2015 Susan Orr CISA, CISM, CRISC, CRP 1 Risk Management Guidance 2 3 Appendix J: 4 - Key Elements Third Party Management

More information

Privacy vs Data Protection. PRESENTATION TITLE GOES HERE Eric A. Hibbard, CISSP, CISA Hitachi Data Systems

Privacy vs Data Protection. PRESENTATION TITLE GOES HERE Eric A. Hibbard, CISSP, CISA Hitachi Data Systems Privacy vs Data Protection PRESENTATION TITLE GOES HERE Eric A. Hibbard, CISSP, CISA Hitachi Data Systems Introduction The terms privacy and data protection are often used interchangeable In reality they

More information

OUTSOURCING, HOSTING AND DATA PRIVACY ISSUES

OUTSOURCING, HOSTING AND DATA PRIVACY ISSUES OUTSOURCING, HOSTING AND DATA PRIVACY ISSUES 4 April 2013 James Castro-Edwards Solicitor Monica Salgado Advogada / Portuguese Lawyer OUR TEAM Speechly Bircham is an ambitious, full-service law firm with

More information

Overview. What are operational policies? Development, adoption, implementation

Overview. What are operational policies? Development, adoption, implementation Practical Geospatial Policies: Resolving Operational Issues to Optimize Your SDI Ed Kennedy Hickling Arthurs Low Corporation and Cynthia Mitchell and Simon Riopel Division, Natural Resources Canada Overview

More information

Supplier Security Assessment Questionnaire

Supplier Security Assessment Questionnaire HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.

More information

The Impact of EU Data Protection Legislation. Thomas Rivera Hitachi Data Systems

The Impact of EU Data Protection Legislation. Thomas Rivera Hitachi Data Systems Privacy PRESENTATION vs Data TITLE Protection: GOES HERE The Impact of EU Data Protection Legislation Thomas Rivera Hitachi Data Systems SNIA Legal Notice The material contained in this tutorial is copyrighted

More information

Align Technology. Data Protection Binding Corporate Rules Processor Policy. 2014 Align Technology, Inc. All rights reserved.

Align Technology. Data Protection Binding Corporate Rules Processor Policy. 2014 Align Technology, Inc. All rights reserved. Align Technology Data Protection Binding Corporate Rules Processor Policy Confidential Contents INTRODUCTION TO THIS POLICY 3 PART I: BACKGROUND AND ACTIONS 4 PART II: PROCESSOR OBLIGATIONS 6 PART III:

More information

Cloud computing and personal data protection. Gwendal LE GRAND Director of technology and innovation CNIL

Cloud computing and personal data protection. Gwendal LE GRAND Director of technology and innovation CNIL Cloud computing and personal data protection Gwendal LE GRAND Director of technology and innovation CNIL 1 Data protection in Europe Directive 95/46/EC Loi 78-17 du 6 janvier 1978 amended in 2004 (France)

More information

Vendor Management Best Practices

Vendor Management Best Practices 23 rd Annual and One Day Seminar Vendor Management Best Practices Catherine Bruder CPA, CITP, CISA, CISM, CTGA Michigan Texas Florida Insight. Oversight. Foresight. SM Doeren Mayhew Bruder 1 $100 billion

More information

This interpretation of the revised Annex

This interpretation of the revised Annex Reprinted from PHARMACEUTICAL ENGINEERING The Official Magazine of ISPE July/August 2011, Vol. 31 No. 4 www.ispe.org Copyright ISPE 2011 The ISPE GAMP Community of Practice (COP) provides its interpretation

More information

Elements Of An Effective Export Compliance Program

Elements Of An Effective Export Compliance Program Elements Of An Effective Export Compliance Program Renee Osborne Export Management & Compliance Division Office of Exporter Services Bureau of Industry and Security U.S. Department of Commerce Effective

More information

GUIDANCE FOR MANAGING THIRD-PARTY RISK

GUIDANCE FOR MANAGING THIRD-PARTY RISK GUIDANCE FOR MANAGING THIRD-PARTY RISK Introduction An institution s board of directors and senior management are ultimately responsible for managing activities conducted through third-party relationships,

More information

7.08.2 Privacy Rules for Customer, Supplier and Business Partner Data. Directive 7.08 Protection of Personal Data

7.08.2 Privacy Rules for Customer, Supplier and Business Partner Data. Directive 7.08 Protection of Personal Data Akzo Nobel N.V. Executive Committee Rules 7.08.2 Privacy Rules for Customer, Supplier and Business Partner Data Source Directive Content Owner Directive 7.08 Protection of Personal Data AkzoNobel Legal

More information

SAFE HARBOR PRIVACY NOTICE EFFECTIVE: July 1, 2005 AMENDED: July 15, 2014

SAFE HARBOR PRIVACY NOTICE EFFECTIVE: July 1, 2005 AMENDED: July 15, 2014 SAFE HARBOR PRIVACY NOTICE EFFECTIVE: July 1, 2005 AMENDED: July 15, 2014 This Notice sets forth the principles followed by United Technologies Corporation and its operating companies, subsidiaries, divisions

More information

Security Overview. BlackBerry Corporate Infrastructure

Security Overview. BlackBerry Corporate Infrastructure Security Overview BlackBerry Corporate Infrastructure Published: 2015-04-23 SWD-20150423095908892 Contents Introduction... 5 History... 6 BlackBerry policies...7 Security organizations...8 Corporate Security

More information

Relevant COSO Principles. Policies and procedures are maintained. Policies and Procedures. Roles and responsibilities are identified

Relevant COSO Principles. Policies and procedures are maintained. Policies and Procedures. Roles and responsibilities are identified Accountability is unable to govern service processes No consistent or communicated policies procedures structure is inadequate Policies procedures are maintained Roles responsibilities are identified Policies

More information

State of Oregon. State of Oregon 1

State of Oregon. State of Oregon 1 State of Oregon State of Oregon 1 Table of Contents 1. Introduction...1 2. Information Asset Management...2 3. Communication Operations...7 3.3 Workstation Management... 7 3.9 Log management... 11 4. Information

More information

Critical Privacy Questions to Ask an HCM/CRM SaaS Provider

Critical Privacy Questions to Ask an HCM/CRM SaaS Provider Research Publication Date: 31 July 2009 ID Number: G00168488 Critical Privacy Questions to Ask an HCM/CRM SaaS Provider Carsten Casper, Thomas Otter, Arabella Hallawell The vast majority (probably greater

More information

by: Scott Baranowski Community Bank Auditors Group Best Practices in Auditing Record Retention, Safeguarding Paper Documents, GLBA and Privacy

by: Scott Baranowski Community Bank Auditors Group Best Practices in Auditing Record Retention, Safeguarding Paper Documents, GLBA and Privacy Community Bank Auditors Group Best Practices in Auditing Record Retention, Safeguarding Paper Documents, GLBA and Privacy June 10, 2015 MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT

More information

A Best Practice Guide

A Best Practice Guide A Best Practice Guide Contents Introduction [2] The Benefits of Implementing a Privacy Management Programme [3] Developing a Comprehensive Privacy Management Programme [3] Part A Baseline Fundamentals

More information

INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK

INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK Log / Control Sheet Responsible Officer: Chief Finance Officer Clinical Lead: Dr J Parker, Caldicott Guardian Author: Associate IG Specialist, Yorkshire

More information

Using AWS in the context of Australian Privacy Considerations October 2015

Using AWS in the context of Australian Privacy Considerations October 2015 Using AWS in the context of Australian Privacy Considerations October 2015 (Please consult https://aws.amazon.com/compliance/aws-whitepapers/for the latest version of this paper) Page 1 of 13 Overview

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

Information security controls. Briefing for clients on Experian information security controls

Information security controls. Briefing for clients on Experian information security controls Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face

More information

Anatomy of a Cloud Computing Data Breach

Anatomy of a Cloud Computing Data Breach Anatomy of a Cloud Computing Data Breach Sheryl Falk Mike Olive ACC Houston Chapter ITPEC Practice Group September 18, 2014 1 Agenda Ø Cloud 101 Welcome to Cloud Computing Ø Cloud Agreement Considerations

More information

Privacy Policy Last Modified: April 3, 2015 1

Privacy Policy Last Modified: April 3, 2015 1 Privacy Policy Last Modified: April 3, 2015 1 Introduction Jamberry Nails, LLC, a Utah limited liability company, U.S.A., (referred to herein as Jamberry, we, us and our ) understands the importance of

More information

www.pwc.com Third Party Risk Management 12 April 2012

www.pwc.com Third Party Risk Management 12 April 2012 www.pwc.com Third Party Risk Management 12 April 2012 Agenda 1. Introductions 2. Drivers of Increased Focus on Third Parties 3. Governance 4. Third Party Risks and Scope 5. Third Party Risk Profiling 6.

More information