Privacy by Design Setting a new standard for privacy certification
|
|
|
- Rose Lee Casey
- 10 years ago
- Views:
Transcription
1 Privacy by Design Setting a new standard for privacy certification
2 Privacy by Design is a framework based on proactively embedding privacy into the design and operation of IT systems, networked infrastructure, and business practices. 2
3 Privacy by Design Framework Organizations understand the need to both innovate and safeguard the personal and confidential data of their customers, employees, and business partners. This has become increasingly challenging in the era of big data for several reasons: Protecting privacy while meeting the regulatory requirements for data protection around the world is becoming an increasingly challenging task. Taking a comprehensive, properly implemented risk-based approach where globally defined risks are anticipated and countermeasures are built into systems and operations, by design can be far more effective, and more likely to respond to the broad range of requirements in multiple jurisdictions. Dr. Ann Cavoukian, Executive Director of the Privacy and Big Data Institute at Ryerson University, Three-term Information and Privacy Commissioner of Ontario, Creator of Privacy by Design Globalization has fostered an environment where knowledge workers feel the need to share information more readily, exposing organizations to a higher likelihood of information security breaches Organizational boundaries are no longer static, making it difficult to track how, where, and by whom information is being stored, managed, and accessed Collaboration and social networking tools promise new possibilities, but also come with potentially serious vulnerabilities if not proactively managed In this complex electronic business environment, a check the box compliance model leads to a false sense of security. That s why a risk-based approach to identifying digital vulnerabilities and closing privacy gaps becomes a necessity. Once you ve done the work to proactively ensure that your controls are implemented and your information is secure, having your privacy practices certified against a global privacy standard can take your privacy and security posture to the next level. And when you put privacy risk prevention and certification together, you have Privacy by Design Certification. A demonstrated ability to secure and protect digital data both your own and your customers is increasingly being recognized as a business imperative that yields a competitive advantage. Privacy by Design Setting a new standard for privacy certification 1
4 7 Foundational Principles Privacy by Design means building privacy into the design, operation, and management of a given system, business process, or design specification; it is based on adherence with the 7 Foundational Principles of Privacy by Design: Proactive not reactive preventative not remedial Anticipate, identify, and prevent invasive events before they happen; this means taking action before the fact, not afterward. Lead with privacy as the default setting Ensure personal data is automatically protected in all IT systems or business practices, with no added action required by any individual. Embed privacy into design Privacy measures should not be add-ons, but fully integrated components of the system. Retain full functionality (positive-sum, not zero-sum) Privacy by Design employs a win-win approach to all legitimate system design goals; that is, both privacy and security are important, and no unnecessary trade-offs need to be made to achieve both. Ensure end-to-end security Data lifecycle security means all data should be securely retained as needed and destroyed when no longer needed. Maintain visibility and transparency keep it open Assure stakeholders that business practices and technologies are operating according to objectives and subject to independent verification. Respect user privacy keep it user-centric Keep things user-centric; individual privacy interests must be supported by strong privacy defaults, appropriate notice, and user-friendly options. Any organization launching new services, products, or innovative technologies, or expanding into new geographies through mergers or acquisitions, can benefit immensely from privacy certification. 2
5 Benefits of Certification: Reap the rewards Ensuring privacy and security through every phase of the data lifecycle (e.g. collection, use, retention, storage, disposal or destruction) has become crucial to avoiding legal liability, maintaining regulatory compliance, protecting your brand, and preserving customer confidence. That s especially true for organizations that are increasingly subject to heightened scrutiny both internally by their boards and externally by their regulators and business partners. By taking a dynamic, proactive approach to privacy protection, Privacy by Design certification will give your organization the ability to: Cost of taking the reactive approach to privacy breaches: Class-action lawsuits Reactive Damage to one s brand Ensure compliance by getting ahead of the legislative curve and minimizing compliance risk Reduce the likelihood of fines and penalties, including financial losses and/or liability associated with privacy breaches Build your brand by fostering greater consumer confidence and trust thereby gaining a sustainable competitive advantage Loss of consumer confidence and trust Proactive Better manage post-breach incidents to regain consumer trust and confidence Maintain best practices by seeking independent testing of privacy and security controls rather than more self- reporting or testing Privacy by Design goes well beyond accepted fair information practices and privacy standards, virtually assuring regulatory compliance no matter where you operate. Privacy by Design Setting a new standard for privacy certification 3
6 Steps to Certification Implementing Privacy by Design: It starts with three steps Under our Privacy by Design framework, Ryerson University is responsible for certifying organizations that meet the necessary privacy criteria. To achieve certification, organizations must first undergo an initial assessment conducted by Deloitte. Using a set of well-defined assessment criteria, Deloitte s privacy and security professionals will test your product, service, or offering against the 7 Foundational Principles of Privacy by Design. We also assess the strength of your privacy practices relative to internationally recognized privacy principles, including privacy regulations, industry self-regulatory requirements, and industry best practices (e.g. FIPs, OECD, GAPP, CBR, and APEC Privacy Framework) using an assessment methodology based on harmonized privacy and security legal requirements. To this end, Deloitte operationalized the Privacy by Design framework by developing 30 measurable privacy criteria and 107 illustrative privacy controls that organizations will be assessed against, using a unique scorecard approach that maps back to each of the 7 Foundational Principles. Putting privacy front and centre: Deloitte relies on our global team of privacy and security experts who are Privacy by Design accredited, including a former privacy regulator, privacy lawyers, and IT and security specialists. Taking a holistic, risk-based approach, Deloitte will test your controls using a quantifiable scorecard technique to help provide the privacy certification your organization needs. 4
7 The upshot is a simple three-step process for certification: apply, assess, and certify: Step1: Apply Step 2: Assess Step 3: Certify Applicant Start Apply online via Ryerson s website Respond to assessment recommendations Certify Ryerson Refer to Deloitte Certify End Deloitte Refer prospects to Ryerson s website Conduct assessment; issue preliminary observations Finalize assessment report Step1: Notify Step 2: Attest Step 3: Renew Renew Applicant Attest to no significant changes Deloitte Start Notify applicant Renew annually, for up to 2 years End Organizations may pursue certification once the assessment is complete; any assessment rating below satisfactory will need to be addressed before receiving full certification. Privacy by Design Setting a new standard for privacy certification 5
8 Deloitte Assessment Approach Before you can be certified, you will be assessed according to this process: Scope We begin by working with you to identify the scope of your privacy review. The scope of your assessment can include: All types of personal information holdings and related business processes, including medical and employee information A defined part of the organization, line of business, function, system, or initiative Assess & Test Report Certify Our privacy and security professionals: Use a combination of manual reviews, sampling, and scorecard metrics to assess your current design controls and related information-handling practices Conduct company interviews, on-site visits (where required), and data discovery (where requested) to identify data collection and residency issues Evaluate whether a privacy or security control exists, and whether the privacy activities or controls have been properly designed Compare your solution architecture, related information-handling practices, and operational processes against control activities We deliver results in a restricted use, detailed Privacy Scorecard report that: Identifies any deficiencies or gaps in information system design, policies, and practices Includes an analysis of personal information and related privacy gaps across the data lifecycle Contains an analysis of your compliance requirements with all relevant policies, practices, laws, codes, and contracts Analyzes each element of your organization s privacy program, policies, and procedures Includes a gap analysis that highlights the gap between your desired state of risk management and the current as-is state Provides detailed observations and recommendations to management for closing identified privacy gaps As part of the certification process, Ryerson: Verifies that any gaps identified in your Privacy Scorecard have been addressed and closed Displays your company s name on its validation page to provide real-time verification that your certification is current and valid Once you receive certification, you can display your Privacy by Design certification on your website and/or product or offering, and share your assessment results and certification with your business partners. 6
9 Deloitte Data Protection and Privacy service catalogue Privacy by Design Certification is part of a full suite of Data Protection and Privacy (DPP) services offered by Deloitte: Privacy by Design Certification Privacy Internal Audits & Assurance CASL Compliance Assessments Data Discovery and Data Flow Mapping Privacy Controls Mapping Assess Advanced Privacy Monitoring GRC Privacy Management Privacy Incident Management Privacy Regulatory Affairs Privacy Staff Augmentation Sustain DPP Advise Cross-border Privacy Compliance Post-data Breach Response & Advisory Implement Design Data Leakage Prevention Data De-identification Privacy Programs & Frameworks Privacy Remediation Privacy Strategy & Program Design GLBA Risk Assessment Frameworks Breach Response & Handling Consent Frameworks Privacy & CASL Training BYOD Policies CPO Training Privacy by Design Setting a new standard for privacy certification 7
10 Contacts Sylvia Kingsmill, BA, LLB National Partner, Data Protection and Privacy Leader, Enterprise Risk Dr. Ann Cavoukian, Ph.D. Executive Director, Privacy and Big Data Institute About Sylvia Kingsmill Sylvia Kingsmill, BA, LLB, leads the Data Protection and Privacy practice for Deloitte Canada. She has 15 years experience in providing strategic, risk-based compliance and privacy advisory services, serving a diverse global client base. Her specialty is in advising executive teams on the development and implementation of data-driven digital strategies to support major IT and business transformation and alignment with regulatory requirements. She often deals with regulators, including Privacy Commissioners, on behalf of her clients in remediating regulatory findings and optimizing data management and governance practices. Sylvia recently developed the Privacy by Design Certification Program with Ryerson s Big Data and Privacy Institute to help clients launch new, privacy-enhancing technologies. She advises on innovative and ethical uses of big data while protecting privacy to help her clients manage not only their regulatory risks but also their branding and marketing strategy as they expand their digital footprint. About Dr. Ann Cavoukian Dr. Ann Cavoukian is recognized as one of the world s leading privacy experts. She is presently the Executive Director of the Privacy and Big Data Institute at Ryerson University. Appointed as the Information and Privacy Commissioner of Ontario, Canada, in 1997, Dr. Cavoukian served an unprecedented three terms as Commissioner. There she created Privacy by Design, a framework that seeks to proactively embed privacy into the design specifications of information technologies, networked infrastructure, and business practices, thereby achieving the strongest protection possible. In October 2010, regulators at the International Conference of Data Protection Authorities and Privacy Commissioners unanimously passed a Resolution recognizing Privacy by Design as an essential component of fundamental privacy protection. Since then, Privacy by Design has been translated into 37 languages. About Deloitte s National Data Protection and Privacy Practice Deloitte s national Data Protection and Privacy practice is comprised of multi-disciplinary professionals specializing in technology, policy, security, law, information governance and management, project management, communications, and privacy regulatory affairs. The practice has helped clients in both the public and private sectors, many of whom must manage sensitive financial, personal, and medical information in accordance with a myriad of regional and international standards and regulations. About Ryerson University and the Privacy and Big Data Institute Ryerson is Canada s leader in innovative, career-focused education. It is a distinctly urban university with a focus on innovation and entrepreneurship. Ryerson has a mission to serve societal need and a long-standing commitment to engaging its community. The Privacy and Big Data Institute at Ryerson was created to serve as a hub for Ryerson faculty, staff, and students engaged in data-driven research, innovation, and education. The Institute s mission is to pursue and promote collaborations with industry to address privacy, security, and/or data analytics challenges. Privacy by Design Certification is being offered by the Privacy and Big Data Institute at Ryerson University; it is not affiliated with the Information and Privacy Commissioner of Ontario nor does it signify compliance with Ontario s privacy laws.
11 This page has been intentionally left blank. Privacy by Design Setting a new standard for privacy certification 9
12 Deloitte, one of Canada s leading professional services firms, provides audit, tax, consulting, and financial advisory services. Deloitte LLP, an Ontario limited liability partnership, is the Canadian member firm of Deloitte Touche Tohmatsu Limited. Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee, and its network of member firms, each of which is a legally separate and independent entity. Please see for a detailed description of the legal structure of Deloitte Touche Tohmatsu Limited and its member firms. Deloitte LLP and affiliated entities. Designed and produced by the Deloitte Design Studio, Canada H
Privacy by Design The 7 Foundational Principles Implementation and Mapping of Fair Information Practices
Privacy by Design The 7 Foundational Principles Implementation and Mapping of Fair Information Practices Ann Cavoukian, Ph.D. Information & Privacy Commissioner, Ontario, Canada Purpose: This document
The 7 Foundational Principles. Implementation and Mapping of Fair Information Practices. Ann Cavoukian, Ph.D.
Privacy by Design The 7 Foundational Principles Implementation and Mapping of Fair Information Practices Ann Cavoukian, Ph.D. Information & Privacy Commissioner Ontario, Canada Purpose: This document provides
Managing the message. Businesses brace for new digital marketing compliance requirements
Managing the message Businesses brace for new digital marketing compliance requirements This page has been intentionally left blank. On December 4, Industry Canada released final regulations under Canada
Have it all Protecting privacy in the age of analytics
Have it all Protecting privacy in the age of analytics Acknowledgements: The authors wish to acknowledge Megan Brister, National Privacy Leader, Deloitte and Michelle Chibba, Director, Policy & Special
The Ontario Health Study s Assessment Centres: A Case Study for Privacy by Design
The Ontario Health Study s Assessment Centres: A Case Study for Privacy by Design Ann Cavoukian, Ph.D. Information & Privacy Commissioner Ontario, Canada and Pamela C. Spencer Cancer Care Ontario VP Corporate
Managing the message Canada s new anti-spam law sets a high bar
Managing the message Canada s new anti-spam law sets a high bar According to a recent Deloitte poll, only 13% of organizations say they understand CASL requirements and have begun to apply them to their
The Changing IT Risk Landscape Understanding and managing existing and emerging risks
The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015
Risk Considerations for Internal Audit
Risk Considerations for Internal Audit Cecile Galvez, Deloitte & Touche LLP Enterprise Risk Services Director Traci Mizoguchi, Deloitte & Touche LLP Enterprise Risk Services Senior Manager February 2013
Maximize the Value of Your Data and the Ability to Protect Privacy, by Design
Maximize the Value of Your Data and the Ability to Protect Privacy, by Design Ann Cavoukian, Ph.D. Executive Director Privacy and Big Data Institute Ryerson University Ontario University Registrar s Association
Strategies for optimizing your cash management
Part of the Deloitte working capital series Make your working capital work for you Strategies for optimizing your cash management The Deloitte working capital series Strategies for optimizing your accounts
Report of the Information & Privacy Commissioner/Ontario. Review of the Canadian Institute for Health Information:
Information and Privacy Commissioner of Ontario Report of the Information & Privacy Commissioner/Ontario Review of the Canadian Institute for Health Information: A Prescribed Entity under the Personal
Privacy and Security Framework, February 2010
Privacy and Security Framework, February 2010 Updated April 2014 Our Vision Better data. Better decisions. Healthier Canadians. Our Mandate To lead the development and maintenance of comprehensive and
IT audit updates. Current hot topics and key considerations. IT risk assessment leading practices
IT audit updates Current hot topics and key considerations Contents IT risk assessment leading practices IT risks to consider in your audit plan IT SOX considerations and risks COSO 2013 and IT considerations
FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES
FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES The implications for privacy and security in the emergence of HIEs The emergence of health information exchanges (HIE) is widely
Breaking Down the Silos: A 21st Century Approach to Information Governance. May 2015
Breaking Down the Silos: A 21st Century Approach to Information Governance May 2015 Introduction With the spotlight on data breaches and privacy, organizations are increasing their focus on information
Privacy & Big Data: Enable Big Data Analytics with Privacy by Design. Datenschutz-Vereinigung von Luxemburg Ronald Koorn DRAFT VERSION 8 March 2014
Privacy & Big Data: Enable Big Data Analytics with Privacy by Design Datenschutz-Vereinigung von Luxemburg Ronald Koorn DRAFT VERSION 8 March 2014 Agenda? What is 'Big Data'? Privacy Implications Privacy
From Chaos to Clarity: Embedding Security into the SDLC
From Chaos to Clarity: Embedding Security into the SDLC Felicia Nicastro Security Testing Services Practice SQS USA Session Description This session will focus on the security testing requirements which
An Executive Overview of GAPP. Generally Accepted Privacy Principles
An Executive Overview of GAPP Generally Accepted Privacy Principles Current Environment One of today s key business imperatives is maintaining the privacy of your customers personal information. As business
How To Respond To The Nti'S Request For Comment On Big Data And Privacy
Submission to the National Telecommunications and Information Administration (NTIA), U.S. Department of Commerce Docket No. 140514424 4424 01 RIN 0660 XC010 Comments of the Information Technology Industry
White Paper on Financial Institution Vendor Management
White Paper on Financial Institution Vendor Management Virtually every organization in the modern economy relies to some extent on third-party vendors that facilitate business operations in a wide variety
Cybersecurity in the States 2012: Priorities, Issues and Trends
Cybersecurity in the States 2012: Priorities, Issues and Trends Commission on Maryland Cyber Security and Innovation June 8, 2012 Pam Walker, Director of Government Affairs National Association of State
Blind spot Banks are increasingly outsourcing more activities to third parties. But they can t outsource the risks.
Blind spot Banks are increasingly outsourcing more activities to third parties. But they can t outsource the risks. For anyone familiar with the banking industry, it comes as no surprise that banks are
How To Ensure Health Information Is Protected
pic pic CIHI Submission: 2011 Prescribed Entity Review October 2011 Who We Are Established in 1994, CIHI is an independent, not-for-profit corporation that provides essential information on Canada s health
Supplier Relationship Management (SRM) Redefining the value of strategic supplier collaboration
Supplier Relationship Management (SRM) Redefining the value of strategic supplier collaboration As today s integrated supply chains require collaboration at many levels and from various functions, executives
WHITE PAPER. Automated IT Asset Management Maximize Organizational Value Using Numara Track-It! p: 813.227.4900 f: 813.227.4501 www.numarasoftware.
WHITE PAPER By Tony Thomas Senior Network Engineer and Product Manager Numara TM Software Inc. ADAPTING TO THE CONSTANTLY CHANGING IT ENVIRONMENT The challenge in controlling the corporate IT infrastructure
Introduction. By Santhosh Patil, Infogix Inc.
Enterprise Health Information Management Framework: Charting the path to bring efficiency in business operations and reduce administrative costs for healthcare payer organizations. By Santhosh Patil, Infogix
The Manitoba Child Care Association PRIVACY POLICY
The Manitoba Child Care Association PRIVACY POLICY BACKGROUND The Manitoba Child Care Association is committed to comply with the legal obligations imposed by the federal government's Personal Information
www.pwc.co.uk Cyber security Building confidence in your digital future
www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in
Part of the Deloitte working capital series. Make your working capital work for you. Strategies for optimizing your accounts payable
Part of the Deloitte working capital series Make your working capital work for you Strategies for optimizing your accounts payable The Deloitte working capital series Strategies for optimizing your accounts
Ann Cavoukian, Ph.D.
School Psychologists: What You Should Know about the Personal Health Information Protection Act Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario Psychological Services Northeast Toronto
Accountability: Data Governance for the Evolving Digital Marketplace 1
Accountability: Data Governance for the Evolving Digital Marketplace 1 1 For the past three years, the Centre for Information Policy Leadership at Hunton & Williams LLP has served as secretariat for the
White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA
White Paper Achieving GLBA Compliance through Security Information Management White Paper / GLBA Contents Executive Summary... 1 Introduction: Brief Overview of GLBA... 1 The GLBA Challenge: Securing Financial
Strategies for optimizing your inventory management
Part of the Deloitte working capital series Make your working capital work for you Strategies for optimizing your inventory management The Deloitte working capital series Strategies for optimizing your
Advisory services. Services beyond the audit
Advisory services Services beyond the audit Contents Solutions for a changing accounting landscape...1 Complex accounting advisory...3 Transaction advisory...4 Finance...5 Actuarial and insurance...6 Finance
U.S. CFO Program The Four Faces of the CFO. 2010 Deloitte Touche Tohmatsu
U.S. CFO Program The Four Faces of the CFO 2010 Deloitte Touche Tohmatsu CFOs Play Four Critical Roles in Companies Catalyze behaviors across the organization to execute strategic and financial objectives
3 rd Party Vendor Risk Management
3 rd Party Vendor Risk Management Session 402 Tuesday, June 9, 2015 (11 to 12pm) Session Objectives The need for enhanced reporting on vendor risk management Current outsourcing environment Key risks faced
Privacy Risk Assessments
Privacy Risk Assessments Michael Hulet Principal November 8, 2012 Agenda Privacy Review Definition Trends Privacy Program Considerations Privacy Risk Assessment Risk Assessment Tools Generally Accepted
Threat and Vulnerability Management (TVM) Protecting IT assets through a comprehensive program. Chicago IIA/ISACA
www.pwc.com Vulnerability Management (TVM) Protecting IT assets through a comprehensive program Chicago IIA/ISACA 2 nd Annual Hacking Conference Introductions Paul Hinds Managing Director Cybersecurity
Ann Cavoukian, Ph.D.
Protecting Privacy in an Era of Electronic Health Records Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario Barrie and Community Family Health Team Royal Victoria Hospital Georgian College
IBM Internet Security Systems October 2007. FISMA Compliance A Holistic Approach to FISMA and Information Security
IBM Internet Security Systems October 2007 FISMA Compliance A Holistic Approach to FISMA and Information Security Page 1 Contents 1 Executive Summary 1 FISMA Overview 3 Agency Challenges 4 The IBM ISS
University of Michigan Medical School Data Governance Council Charter
University of Michigan Medical School Data Governance Council Charter 1 Table of Contents 1.0 SIGNATURE PAGE 2.0 REVISION HISTORY 3.0 PURPOSE OF DOCUMENT 4.0 DATA GOVERNANCE PROGRAM FOUNDATIONAL ELEMENTS
Privacy by Design: Effective Privacy Management in the Victorian Public Sector
Privacy by Design: Effective Privacy Management in the Victorian public sector Release date: October 2014 The Commissioner for Privacy and Data Protection (CPDP) has formally adopted Privacy by Design
Privacy by Design Protecting privacy in the age of analytics
Privacy by Design Protecting privacy in the age of analytics The era of Big Data is here, and it isn t going away. The ability to use data to connect information, identify patterns and personalise interactions
White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI
White Paper Achieving PCI Data Security Standard Compliance through Security Information Management White Paper / PCI Contents Executive Summary... 1 Introduction: Brief Overview of PCI...1 The PCI Challenge:
Deloitte Analytics. Trusting big data: Perspective on data governance as a customer analytics investment
Deloitte Analytics Trusting big data: Perspective on data governance as a customer analytics investment Many companies are investing significant amounts in customer analytics to drive their business and
Privacy by Design. Ian Brown, Prof. of Information Security and Privacy Oxford Internet Institute, University of Oxford @IanBrownOII
Privacy by Design Ian Brown, Prof. of Information Security and Privacy Oxford Internet Institute, University of Oxford @IanBrownOII Privacy by Design principles 1. Proactive not Reactive; Preventative
Passenger Protect Program Transport Canada
AUDIT REPORT OF THE PRIVACY COMMISSIONER OF CANADA Passenger Protect Program Transport Canada Section 37 of the Privacy Act 2009 AUDIT OF PASSENGER PROTECT PROGRAM, TRANSPORT CANADA The audit work reported
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Continuous Monitoring 1. What is continuous monitoring? Continuous monitoring is one of six steps in the Risk Management Framework (RMF) described in NIST Special Publication
The ROI of Data Governance: Seven Ways Your Data Governance Program Can Help You Save Money
A DataFlux White Paper Prepared by: Gwen Thomas The ROI of Data Governance: Seven Ways Your Data Governance Program Can Help You Save Money Leader in Data Quality and Data Integration www.dataflux.com
What to do When Faced With a Privacy Breach: Guidelines for the Health Sector ANN CAVOUKIAN, PH.D. COMMISSIONER
What to do When Faced With a Privacy Breach: Guidelines for the Health Sector ANN CAVOUKIAN, PH.D. COMMISSIONER INFORMATION AND PRIVACY COMMISSIONER/ONTARIO Table of Contents What is a privacy breach?...1
IT risk management discussion 2013 PIAA Leadership Camp May 15, 2013
IT risk management discussion 2013 PIAA Leadership Camp May 15, 2013 Debbie Lew Agenda Review what is IT governance Review what is IT risk management A discussion of key IT risks to be aware of Page 2
Privacy Governance and Compliance Framework Accountability
Privacy Governance and Framework Accountability Agenda Global Data Protection and Privacy (DPP) Organization Structure Privacy The 3 Lines of Defense (LOD) Model: Overview Privacy The 3 Lines of Defense
The CIPM certification is comprised of two domains: Privacy Program Governance (I) and Privacy Program Operational Life Cycle (II).
Page 1 of 7 The CIPM certification is comprised of two domains: Privacy Program Governance (I) and Privacy Program Operational Life Cycle (II). Domain I provides a solid foundation for the governance of
Release Management: Effective practices for IT delivery
Release Management: Effective practices for IT delivery Introduction Today s health plans face a unique combination of technology challenges due to their complex IT environments. These environments serve
ISO/IEC 27001 Information Security Management. Securing your information assets Product Guide
ISO/IEC 27001 Information Security Management Securing your information assets Product Guide What is ISO/IEC 27001? ISO/IEC 27001 is the international standard for information security management and details
Generally Accepted Recordkeeping Principles
Generally Accepted Recordkeeping Principles Information Governance Maturity Model Information is one of the most vital strategic assets any organization possesses. Organizations depend on information to
MISSION VALUES. The guide has been printed by:
www.cudgc.sk.ca MISSION We instill public confidence in Saskatchewan credit unions by guaranteeing deposits. As the primary prudential and solvency regulator, we promote responsible governance by credit
Cloud Computing: Legal Risks and Best Practices
Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent
Medicaid Enterprise Data Governance Approach. MESConference August 21, 2012 Rashmi Menon, Deloitte Consulting LLP
Medicaid Enterprise Data Governance Approach MESConference August 21, 2012 Rashmi Menon, Deloitte Consulting LLP Agenda Session Objectives Common Barriers and Key Benefits to Data Governance A Framework
2/9/2012. 2012 HIPAA Privacy and Security Audit Readiness. Table of contents
2012 HIPAA Privacy and Security Audit Readiness Mark M. Johnson National HIPAA Services Director Table of contents Page Background 2 Regulatory Background and HITECH Impacts 3 Office of Civil Rights (OCR)
EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES
EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES Aligning information with business and operational objectives ESSENTIALS Leverage EMC Consulting as your trusted advisor to move your and compliance
Leveraging a Maturity Model to Achieve Proactive Compliance
Leveraging a Maturity Model to Achieve Proactive Compliance White Paper: Proactive Compliance Leveraging a Maturity Model to Achieve Proactive Compliance Contents Introduction............................................................................................
Investment Management: Rising to the Risk and Compliance Challenge kpmg.com
KPMG Regulatory Risk and Compliance Practice Investment Management: Rising to the Risk and Compliance Challenge kpmg.com CONTENTS New Regulatory Frontiers: Forging Ahead in a Changing Landscape 1 A Proactive
Compliance. Group Standard
Group Standard Compliance Serco is committed to good governance practices and the management of risks supported by a robust business compliance process SMS-GS-G2 Compliance July 2014 v1.0 Serco Public
Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Cyber Security Risk
Industrial Cyber Security Risk Manager Proactively Monitor, Measure and Manage Cyber Security Risk With Today s Cyber Threats, How Secure is Your Control System? Today, industrial organizations are faced
Infrastructure Information Security Assurance (ISA) Process
Infrastructure Information Security Assurance (ISA) Process Handbook AS-805-B March 2005 Transmittal Letter A. Explanation. As part of the Postal Service s efforts to enhance security across all technology
Question 2: Deloitte s Response:
Harmonized Sale Tax (HST) Frequently Asked Questions These questions are a follow up to the webinar presentation provided by Deloitte & Touche LLP on July 22, 2010. The purpose is to provide additional
Learning to drive your Ferrari
Learning to drive your Ferrari The Agenda empowers your most valuable asset Headline Content Do you need a Agenda?...1 Why the Agenda now?...2 The Agenda 3 phases to...5 ii The path to sustainability Creating
The Value of Vulnerability Management*
The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda
For Private circulation only www.deloitte.com/in. Creative. Clear. Focused. Forensic Services
For Private circulation only www.deloitte.com/in Creative. Clear. Focused. Forensic Services Do you conduct background checks on employees and vendors? Do you educate employees about the importance of
NCOE whitepaper Master Data Deployment and Management in a Global ERP Implementation
NCOE whitepaper Master Data Deployment and Management in a Global ERP Implementation Market Offering: Package(s): Oracle Authors: Rick Olson, Luke Tay Date: January 13, 2012 Contents Executive summary
Information Protection Framework: Data Security Compliance and Today s Healthcare Industry
Information Protection Framework: Data Security Compliance and Today s Healthcare Industry Executive Summary Today s Healthcare industry is facing complex privacy and data security requirements. The movement
Domain 1 The Process of Auditing Information Systems
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
How to Avoid Abandoned Records: Guidelines on the Treatment of Personal Health Information, in the Event of a Change in Practice
Information and Privacy Commissioner / Ontario How to Avoid Abandoned Records: Guidelines on the Treatment of Personal Health Information, in the Event of a Change in Practice Ann Cavoukian, Ph.D. Commissioner
Cybersecurity and internal audit. August 15, 2014
Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices
How To Protect Your Network From Attack From A Network Security Threat
Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your
Data Management: Considerations for Integrating Compliance Requirements At Home and Abroad. Toronto, Ontario June 14, 2005
Data Management: Considerations for Integrating Compliance Requirements At Home and Abroad Toronto, Ontario June 14, 2005 Outsourcing Update: New Contractual Options and Risks Lisa K. Abe June 14, 2005
How To Transform It Risk Management
The transformation of IT Risk Management kpmg.com The transformation of IT Risk Management The role of IT Risk Management Scope of IT risk management Examples of IT risk areas of focus How KPMG can help
Fujitsu Group s Information Security
Fujitsu Group s Information Under the corporate governance system, the Fujitsu Group promotes appropriate information management and information usage according to Group rules, as part of risk management.
Credit Union Board of Directors Introduction, Resolution and Code for the Protection of Personal Information
Credit Union Board of Directors Introduction, Resolution and Code for the Protection of Personal Information INTRODUCTION Privacy legislation establishes legal privacy rights for individuals and sets enforceable
Cyber security: everybody s imperative. A guide for the C-suite and boards on guarding against cyber risks
Cyber security: everybody s imperative A guide for the C-suite and boards on guarding against cyber risks Secure Enhance risk-prioritized controls to protect against known and emerging threats, and comply
www.pwc.com Third Party Risk Management 12 April 2012
www.pwc.com Third Party Risk Management 12 April 2012 Agenda 1. Introductions 2. Drivers of Increased Focus on Third Parties 3. Governance 4. Third Party Risks and Scope 5. Third Party Risk Profiling 6.
Software as a Service: Guiding Principles
Software as a Service: Guiding Principles As the Office of Information Technology (OIT) works in partnership with colleges and business units across the University, its common goals are to: substantially
WhiteHat Security White Paper. Evaluating the Total Cost of Ownership for Protecting Web Applications
WhiteHat Security White Paper Evaluating the Total Cost of Ownership for Protecting Web Applications WhiteHat Security October 2013 Introduction Over the past few years, both the sophistication of IT security
Key Cyber Risks at the ERP Level
Key Cyber Risks at the ERP Level Process & Industrial Products (P&IP) Sector December, 2014 Today s presenters Bhavin Barot, Sr. Manager Deloitte & Touche LLP Goran Ristovski, Manager Deloitte & Touche
RSA ARCHER OPERATIONAL RISK MANAGEMENT
RSA ARCHER OPERATIONAL RISK MANAGEMENT 87% of organizations surveyed have seen the volume and complexity of risks increase over the past five years. Another 20% of these organizations have seen the volume
PCI DSS READINESS AND RESPONSE
PCI DSS READINESS AND RESPONSE EMC Consulting Services offers a lifecycle approach to holistic, proactive PCI program management ESSENTIALS Partner with EMC Consulting for your PCI program management and
Information Governance and Management Standards for the Health Identifiers Operator in Ireland
Information Governance and Management Standards for the Health Identifiers Operator in Ireland 30 July 2015 About the The (the Authority or HIQA) is the independent Authority established to drive high
