Privacy Risk Assessments



Similar documents
An Executive Overview of GAPP. Generally Accepted Privacy Principles

Privacy Maturity Model

ES ET DE LA VIE PRIVÉE E 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS

E-COMMERCE GOES MOBILE: SEEKING COMPETITIVENESS THROUGH PRIVACY

Implementing Privacy Compliant Hybrid Cloud Solutions

3/17/2015. Overview HIPAA. Who s Covered? Who s Not Covered? PRIVACY & SECURITY. Regulatory Patchwork: Mobile Health

HEALTHCARE SECURITY AND PRIVACY CATALOG OF SERVICES

The HR Skinny: Effectively managing international employee data flows

Policy Implications: Privacy, Security and Liability Big Data in Telecom. June TIA 2012: INSIDE THE NETWORK Dallas TX

The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v

Privacy Law in Canada

SSAE 16 for Transportation & Logistics Companies. Chris Kradjan Kim Koch

Threat and Vulnerability Management (TVM) Protecting IT assets through a comprehensive program. Chicago IIA/ISACA

The CIPM certification is comprised of two domains: Privacy Program Governance (I) and Privacy Program Operational Life Cycle (II).

Accountable Privacy Management in BC s Public Sector

PIPEDA and Online Backup White Paper

Considerations for Outsourcing Records Storage to the Cloud

Protecting Personal Information: The Massachusetts Data Security Regulation (201 CMR 17.00)

Privacy Policy. February, 2015 Page: 1

Australia s unique approach to trans-border privacy and cloud computing

CASRO Digital Research Conference Data Security: Don t Risk Being the Weak Link

Generally Accepted Privacy Principles. August 2009

Credit Union Board of Directors Introduction, Resolution and Code for the Protection of Personal Information

Privacy and Data Breach Issues

CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

Our Commitment to Information Security

HCCA Compliance Institute 2013 Privacy & Security

SAS No. 70, Service Organizations

New Ross Credit Union Web Site Statement

Data Privacy & Security: Essential Questions Every Business Must Ask

Do you know your privacy risks? How new technologies, changing business models, and emerging regulations are changing the data-protection landscape

National Association of Pharmacy Regulatory Authority s Privacy Policy for Pharmacists' Gateway Canada

A Privacy and Data Security Checklist for All

BUSINESS ASSOCIATE AGREEMENT

Credit Union Code for the Protection of Personal Information

WELCOME. Data Security Seminar November 7, 2012

(a) the kind of data and the harm that could result if any of those things should occur;

2/9/2012. The Third International Conference on Technical and Legal Aspects of the e-society CYBERLAWS 2012

Third-Party Cybersecurity and Data Loss Prevention

Doing Business. A Practical Guide. casselsbrock.com. Canada. Dispute Resolution. Foreign Investment. Aboriginal. Securities and Corporate Finance

Cloud Computing. Introduction

Article 29 Working Party Issues Opinion on Cloud Computing

HIPAA in the Cloud. How to Effectively Collaborate with Cloud Providers

2014 Financial Services Industry Compliance Benchmark Study

THE PERSONAL INFORMATION PROTECTION AND ELECTRONIC DOCUMENTS ACT (PIPEDA) PERSONAL INFORMATION POLICY & PROCEDURE HANDBOOK

Information Security, Privacy and Compliance Convergence

Privacy and Security Framework, February 2010

IAPP Global Privacy Summit Protecting Privacy Under the Cybersecurity Microscope

Auditing your institution's cybersecurity incident/breach response plan. Baker Tilly Virchow Krause, LLP

HIPAA Privacy Rule Policies

The Legal Pitfalls of Failing to Develop Secure Cloud Services

Rowan University Data Governance Policy

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

The potential legal consequences of a personal data breach

Online Lead Generation: Data Security Best Practices

Personal Information Protection and Electronic Documents Act

HIPAA in the Cloud How to Effectively Collaborate with Cloud Providers

Information Protection Framework: Data Security Compliance and Today s Healthcare Industry

Wearables and Big Data and Drones, Oh My! How to Manage Privacy Risk in the Use of Newer Technologies 1

BUSINESS ASSOCIATE ADDENDUM

9/14/2015. Before we begin. Learning Objectives. Kevin Secrest IT Audit Manager, University of Pennsylvania

Overview of Topics Covered

CANADIAN PRIVACY AND DATA RESIDENCY REQUIREMENTS. White Paper

RPM INTERNATIONAL INC. AND ITS SUBSIDIARIES AND OPERATING COMPANIES SAFE HARBOR PRIVACY NOTICE. EFFECTIVE AS OF: August 12, 2015

HIPAA BUSINESS ASSOCIATE AGREEMENT

Business Associate Agreement

Align Technology. Data Protection Binding Corporate Rules Controller Policy Align Technology, Inc. All rights reserved.

Data Processing Agreement for Oracle Cloud Services

Effectively using SOC 1, SOC 2, and SOC 3 reports for increased assurance over outsourced operations. kpmg.com

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

How To Ensure Health Information Is Protected

PROTECTION OF PERSONAL INFORMATION

SOC Readiness Assessments. SOC Report - Type 1. SOC Report - Type 2. Building Trust and Confidence in Third-Party Relationships

BBB Wise Giving Alliance & The International Committee of Fundraising Organizations Advancing Trust in the Charitable Sector Federal Trade

Data Breach Response Planning: Laying the Right Foundation

Legal Ethics in the Information Age: Unique Data Privacy Issues Faced by Law Firms. v , rev

Data Privacy & Security in the Cloud: Legal Basics and New Developments

Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know

THE BEST PRACTICES FOR DATA SECURITY AND PRIVACY IN VENDOR/ CLIENT RELATIONSHIPS

Privacy Statement. What Personal Information We Collect. Australia

SCHEDULE "C" to the MEMORANDUM OF UNDERSTANDING BETWEEN ALBERTA HEALTH SERVICES AND THE ALBERTA MEDICAL ASSOCIATION (CMA ALBERTA DIVISION)

Personal Information Collection and the Privacy Impact Assessment (PIA)

Cyberprivacy and Cybersecurity for Health Data

Personal Information Protection and Electronic Documents Act (PIPEDA)

Sempra Energy Utilities response Department of Commerce Inquiry on Cyber Security Incentives APR

March 12th, 2009 Chapter Meeting - HIPAA, SOX, PCI, GLBA Presented by LogiSolve

Privacy for the Pharmaceutical and Medical Device Industry: An Introduction

A LIST OF PRIVACY AND DATA SECURITY TRAINING REQUIREMENTS

Data Management: Considerations for Integrating Compliance Requirements At Home and Abroad. Toronto, Ontario June 14, 2005

Social Marketing & Liability

Cyber Risk Checklist: Compliance with Legal Obligations Grand Rapids Cyber Security Conference April 23, 2014

005ASubmission to the Serious Data Breach Notification Consultation

INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013

Information for Management of a Service Organization

Cloud Service Agreements: Avoiding the Pitfalls of the Cloud as a Commodity. Amy Mushahwar, Esq.

Mitigating and managing cyber risk: ten issues to consider

FIRST DATA CORPORATION PROCESSOR DATA PROTECTION STANDARDS

Privacy Impact Assessment

Third Party Risk Management 12 April 2012

Transcription:

Privacy Risk Assessments Michael Hulet Principal November 8, 2012

Agenda Privacy Review Definition Trends Privacy Program Considerations Privacy Risk Assessment Risk Assessment Tools Generally Accepted Privacy Principles AICPA Privacy Tools Privacy Maturity Model Other Resources

Privacy Review

What is Privacy? No Single Definition... the rights and obligations of individuals and organizations with respect to the collection, use, retention, disclosure, and disposal of personal information.

What is Privacy? Examples of Customer Data: Email addresses Customer name Social Security Number Address Telephone number Drivers license number Credit card number Credit data Bank account number

What is Privacy? Examples of Employee Data: Ethnic & Gender Info Physical Address Social Security Number Salary & Position Health Information Phone Numbers Name Date of birth Retirement & Other financial data (e.g. bank account numbers for employee direct deposit)

Privacy Trends Regulators more proactive & aggressive Shift from consumer responsibility to organizational accountability Increasing collection & Use of information More than consumers know Customers more willing to provide personal information, expecting that corporations will be accountable for its safekeeping Sharing data with third parties is increasing Services can be outsourced but accountability cannot

Regulatory Trends Regulatory Landscape Since 1998, over 200 laws in over 150 countries Since Jan 1, 2003, over 75 new privacy laws in the U.S. 46 State Breach Notification Laws, plus U.S. territories Three leading states: security privacy security

Regulatory Trends Federal enforcements are on the rise: FTC: Stop Unfair and Deceptive Practices HHS-OCR: Audit Review of Technical, Physical, and Administrative Safeguards FCC: Telephone Consumers Protection Act (TCPA) CFPB: Dodd-Frank Act 1033 SEC: Guidance - Cybersecurity Risks and Cyber Incidents

Technology Trends Technology leads to changes in security Cloud technologies Mobile technology Social networking Online behavioral advertising Privacy by design

Privacy Program Considerations

Privacy Program Considerations Challenges to Privacy Program Success An ineffective governance structure Lack of a strong culture and attitude at all levels Lack of resources committed to building and sustaining a privacy program Lack of a single global framework to address all rules and requirements Incomplete or partially completed Data Inventory

10 Keys to a Successful Program Effective governance structure Strong culture and attitude at all levels Effective risk assessment process Complete, dynamic, current lifecycle data inventory that includes third parties Controls aligned with a selected framework Effective training and awareness program Effective team that ensures compliance with laws and regulations

10 Keys to a Successful Program An effective auditing and monitoring function Current, communicated and followed policies and procedures Effective, documented and tested incident response plan Designing, implementing, maintaining and monitoring a solid privacy and information security program requires effective support, resources, skills, time and discipline

Role for Internal Audit Function Ongoing independent monitoring of a company s privacy program could include: Completing a privacy and security gap assessment Evaluating the company s periodic privacy risk assessment process Evaluating compliance with established privacy policies and procedures Evaluating data protection and privacy training and awareness programs Ensuring data protection and privacy-related remediation is in place Reviewing third party/vendor privacy practices

Privacy Risk Assessment

Privacy Risk Assessment Approach Phased Approach 1 2 Scope Objectives Assess and Test 3 Develop Assessment Report Identify key data privacy objectives (principles and criteria) and define the scope Assess and/or test the people, process and technology against the defined business objectives. Identify areas of improvement. Document results of the assessment and testing to be used to support company s privacy policies.

GAPP Framework Generally Accepted Privacy Principles (GAPP) Developed from a business perspective Referenced significant privacy regulations Created single privacy objective Supported by 10 privacy principles Created objective, measurable criteria for each principle

GAPP Framework Overall Privacy Objective Personal information is collected, used, retained, disclosed, and disposed of in conformity with the commitments in the entity s privacy notice and with criteria set forth in Generally Accepted Privacy Principles issued by the AICPA and CICA.

GAPP Framework Privacy Principles Management Notice Choice and consent Collection Use, retention, and disposal

GAPP Framework Privacy Principles (continued) Access Disclosure to third parties Security for privacy Quality Monitoring and enforcement

GAPP Alignment with Regulations How does GAPP map to US regulations? Generally Accepted U.S. U.S. U.S. U.S. Privacy Principles FTC Safe Harbor HIPAA GLBA Management Administrative requirements Notice Notice Notice Notice Privacy and Opt Out Notices, Exceptions Choice and Consent Choice Choice Consent, Uses and Disclosures Privacy and Opt Out Notices Collection Data Integrity Use, Retention, and Disposal (Implied but not specified in the principles) Uses and Disclosures Limits on Disclosures Access Access Access Disclosure to Third Parties Onward Transfer Uses and Disclosures, Accounting of Disclosures Limits on Disclosures Security for Privacy Security Security Security Rule Quality Integrity Data Integrity Amendment Security Guidelines mandated by section 501(b) of GLBA Monitoring and Enforcement Enforcement Enforcement Compliance and Enforcement by Enforcement by financial the Department of Health and services industry regulators, Human Services the FTC, and SEC

GAPP Alignment with Regulations How does GAPP map to international regulations? Generally Accepted Australia Canada E.U. OECD Privacy Principles Privacy Act PIPEDA Directive Guidelines Management Accountability Notification Accountability Notice Openness Choice and Consent Use and Disclosure Consent Collection Collection, Sensitive Information, Anonymity Identifying Purposes, Openness Limiting Collection Information to Be Given to the Data Subject Purpose Specification, Openness Criteria for Making Data Processing Legitimate, Data Subject's Right to Object Collection Limitation Principles Relating to Data Quality, Exemptions and Restrictions Collection (including consent) Limitation Use, Retention, and Disposal Identifiers, Use and Disclosure Limiting Use, Disclosure, and Retention Access Access and Correction Individual Access Use and Disclosure, Disclosure to Third Parties Transborder Data Flows Limiting Use, Disclosure, and Retention Making Data Processing Legitimate, Special Categories of Processing, Principles Relating to Data Quality, Exemptions and Restrictions, The Data Subject's Right to Object The Data Subject's Right of Access to Data Transfer of Personal Data to Third Countries Use Limitation (including disclosure limitation) Individual Participation Use Limitation (including disclosure limitation) Security for Privacy Data Security Safeguards Confidentiality and Security of Processing Security Safeguards Quality Data Quality Accuracy Principles Relating to Data Quality Data Quality Monitoring and Enforcement Enforcement by the Office of the Privacy Commissioner Challenging Compliance Judicial Remedies, Liability and Sanctions, Codes of Conduct, Supervisory Authority and Working Party on the Protection of Individuals with Regard to the Processing of Personal Data Individual Participation (including challenging compliance)

AICPA Privacy Tool Based on GAPP Scores risk for 73 GAPP criteria based on Likelihood of control failure Business impact Effort/cost to mitigate Not intended as a plug-and-play tool Requires understanding of Entity s privacy programs and initiatives Privacy environment in which entity operates Legislative, regulatory, industry, jurisdictional privacy requirements

AICPA Privacy Tool Sample Input Template GAPP - 73 Criteria 1.0 MANAGEMENT (14 criteria) Privacy Policies (1.1.0) Communications to Internal Personnel (1.1.1) Responsibility and Accountability for Policies (1.1.2) Criteria Description The entity defines, documents, communicates, and assigns accountability for its privacy policies and procedures. Policies are defined for: notice, choice/consent, collection, use/retention/disposal, access, disclosure, security, quality, and monitoring/enforcement. Privacy policies and the consequences of noncompliance with such policies are communicated, at least annually, to the entity s internal personnel responsible for collecting, using, retaining, and disclosing personal information. Changes in privacy policies are communicated to such personnel shortly after the changes are approved. Responsibility and accountability are assigned to a person or group for developing, documenting, implementing, enforcing, monitoring, and updating the entity s privacy policies. The names of such person or group and their responsibilities are communicated to internal personnel. Scoring: 2=Low Risk, 5=Medium Risk, 8=High Risk Likelihood of a Control Failure Business Impact Effort/Cost to Mitigate 2 8 2 2 5 2 2 5 2

AICPA Privacy Tool Sample Criteria Summary 1.0 Management The entity defines, documents, communicates, and assigns accountability for its privacy policies and procedures. Scoring: 2=Low Risk, 5=Medium Risk, 8=High Risk Likelihood of a Control Failure Business Impact Effort/Cost to Mitigate 14 Criteria Average Score - 14 Criteria 4.4 5.1 3.9 Privacy Policies (1.1.0) Policies are defined for: notice, choice/consent, collection, use/retention/ disposal, access, disclosure, security, quality, and monitoring/enforcement. Input 1 2 8 2 Input 2 2 2 5 Input 3 0 0 0 Input 4 0 0 0 Input 5 0 0 0 Input 6 0 0 0 Input 7 0 0 0 Input 8 0 0 0 Input 9 0 0 0 Input 10 0 0 0 Average Score 2.0 5.0 3.5

AICPA Privacy Tool Sample summary of results Summary of Results GAPP - 10 Principles MANAGEMENT NOTICE CHOICE / CONSENT The entity defines, documents, communicates, and assigns accountability for its privacy policies and Likelihoo d of a Control Failure Business Impact Size of Marker procedures. 4.4 5.1 3.9 The entity provides notice about its privacy policies and procedures and identifies the purposes for which personal information is collected, used, retained, and disclosed. The entity describes the choices available to the individual and obtains implicit or explicit consent with respect to the collection, use, and disclosure of personal information. 3.2 3.2 2.0 6.7 7.1 5.0

AICPA Privacy Tool Sample Heat Map 10 Actively Manage Remediation Plans Requires Immediate Attention, Senior Mgmt Focus High CHOICE / CONSENT Business Impact 5 NOTICE MANAGEMENT Low 0 Fix at Mgmt Discretion, Bear Risk Plan to Remediate, Business Contingency Plans 0 Low 5 High 10 Likelihood of a Control Failure

Privacy Maturity Model Based on GAPP AICPA/CICA Privacy Task Force Input from ISACA Requires understanding of GAPP and entityspecific privacy requirements Designed for organizations that have existing privacy program Useful for measuring progress against initial maturity (baseline) and desired maturity (goal)

Privacy Maturity Model Follows Capability Maturity Model (CMM) Five Maturity Levels 1. Ad hoc 2. Repeatable 3. Defined 4. Managed 5. Optimized Recognizes not all privacy initiatives need to reach highest level of maturity Facilitates measurement of progress over time and identification of next steps for continuous improvement

Privacy Maturity Model To be effective, PMM must consider: Maturity of the entity s privacy program Ability to obtain complete and accurate information on the entity s privacy initiatives Agreement on the Privacy Maturity assessment criteria Level of understanding of GAPP and the PMM

Privacy Maturity Model Sample PMM Criteria Maturity GAPP 73 Criteria Criteria Description Maturity Levels Ad HOC Repeatable Defined Managed Optimized Management (14 criteria Privacy Policies (1.1.0) The entity defines, documents, communicates, and assigns accountability for its privacy policies and procedures. The entity defines and documents its privacy policies with respect to notice; choice and consent; collection; use, retention and disposal; access; disclosure to third parties; security for privacy; quality; and monitoring and enforcement. Some aspects of privacy policies exist informally. Privacy policies exist but may not be complete and are not fully documented. Policies are defined for: notice, choice and consent; collection; use, retention and disposal; access; disclosure; security for privacy; quality; and monitoring and enforcement. Compliance with privacy policies are monitored and the results of such monitoring are used to reinforce key privacy messages. Management monitors compliance with policies and procedures concerning information. Issues of noncompliance are identified and remedial action taken to ensure compliance in a timely manner.

Privacy Maturity Model Sample PMM Report

Other Resources AICPA http://www.aicpa.org/interestareas/informatio NTECHNOLOGY/RESOURCES/PRIVACY/Pages/defa ult.aspx IAPP https://www.privacyassociation.org/ FTC http://business.ftc.gov/privacy-and-security ISACA http://www.isaca.org/groups/professional- English/privacy-data-protection/Pages/Overview.aspx

Summary Privacy laws and risks will continue to evolve Privacy programs can be effective at reducing risks A privacy risk assessment can identify risks and facilitate mitigation Numerous resources are available to support the practitioner in performing a privacy risk assessment

Questions: Michael Hulet mhulet@perkinsaccounting.com 503-221-7533 LinkedIn/Michael Hulet Perkins & Co perkinsaccounting.com 503-221-0336 PerkinsCo LinkedIn/perkins & co