How To Manage Data Integrity And Information Protection



Similar documents
ATMD Bird & Bird. Singapore Personal Data Protection Policy

CORK INSTITUTE OF TECHNOLOGY

Information Privacy Policy

PRIVACY POLICY Personal information and sensitive information Information we request from you

PRIVACY AND CREDIT REPORTING POLICY

Index. Definitions. What is Data Protection? Rights of Individuals. The 8 Principles of Data Protection

Data Compliance. And. Your Obligations

PRIVACY POLICY. comply with the Australian Privacy Principles ("APPs"); ensure that we manage your personal information openly and transparently;

Data Protection Policy

communications between us and your financial, legal or other adviser, or your broker or agent;

Data Protection Act 1998 The Data Protection Policy for the Borough Council of King's Lynn & West Norfolk

DATA PROTECTION POLICY

DATA PROTECTION ACT 1998 COUNCIL POLICY

Respecting your privacy

The Privacy Act 1988 contains 10 National Privacy Principles (the NPPs) which specify how organisations should handle personal information.

Corporate ICT & Data Management. Data Protection Policy

Merthyr Tydfil County Borough Council. Data Protection Policy

MONMOUTHSHIRE COUNTY COUNCIL DATA PROTECTION POLICY

Information Governance Policy

QUEENSLAND COUNTRY HEALTH FUND. privacy policy. Queensland Country Health Fund Ltd ABN better health cover shouldn t hurt

ROEHAMPTON UNIVERSITY DATA PROTECTION POLICY

Data Protection Good Practice Note

Disclosure is the action of making new or secret information known.

DATA PROTECTION POLICY

ShineWing Australia Wealth Privacy Policy

Data Governance Policy. Staff Only Students Only Staff and Students. Vice-Chancellor

Data Protection Policy

Data Protection and Information Security. Procedure for reporting a breach of data security. April 2013

Data protection policy

Data Protection for the Guidance Counsellor. Issues To Plan For

Human Resources Policy documents. Data Protection Policy

Information security incident reporting procedure

Guidelines on Data Protection. Draft. Version 3.1. Published by

Data Protection and Data security Policy

Scottish Rowing Data Protection Policy

The kinds of personal information we collect and hold vary depending on the services we are providing, but generally can include:

Next Business Telecom is also subject to other laws relating to the protection of personal information.

The supplier shall have appropriate policies and procedures in place to ensure compliance with

Rick Parsons Information Governance Officer County Hall

GUIDE TO THE ISLE OF MAN DATA PROTECTION ACT. CONTENTS PREFACE 1 1. Background 2 2. Data Protections Principles 3 3. Notification Requirements 4

Access Control Policy

Data Protection Policy.

Data Protection. Processing and Transfer of Personal Data in Kvaerner. Binding Corporate Rules Public Document

2. Scope 2.1 This policy covers all the activities and processes of the University that uses personal information in whatever format.

Policies & Procedures

An Executive Overview of GAPP. Generally Accepted Privacy Principles

Privacy Policy. Approved by: College Board, 01/12/2005 Principal from 14/02/2014

Derbyshire Constabulary GUIDANCE ON THE SAFE USE OF THE INTERNET AND SOCIAL MEDIA BY POLICE OFFICERS AND POLICE STAFF POLICY REFERENCE 09/268

Privacy Policy First National Real Estate Cremorne ACN

FIRST DATA CORPORATION PROCESSOR DATA PROTECTION STANDARDS

DATA PROTECTION POLICY. Examples of personal data which TWM may require from clients include the following and for the reasons ascribed to each;

3. Consent for the Collection, Use or Disclosure of Personal Information

A Pragmatic Guide to Big Data & Meaningful Privacy. kpmg.be

Direct Recruitment Privacy Policy

HERTSMERE BOROUGH COUNCIL

Data Protection Policy A copy of this policy is published in the following areas: The school s intranet The school s website

Policy and Procedure Title: Maintaining Secure Learner Records Policy No: CCTP1001 Version: 1.0

The Manchester College

Policy Document Control Page

Last updated: 30 May Credit Suisse Privacy Policy

RAMS Privacy Policy. When you trust us with your personal information, you expect us to protect it and keep it safe.

Data Protection in Ireland

Privacy & Big Data: Enable Big Data Analytics with Privacy by Design. Datenschutz-Vereinigung von Luxemburg Ronald Koorn DRAFT VERSION 8 March 2014

Corporate Policy. Data Protection for Data of Customers & Partners.

Opal Privacy Policy. Opal Electronic Ticketing System

PRIVACY POLICY Our privacy policy discloses how we gather and use your data. In short we do not collect sensitive personal information.

Evolve Financial Solutions Mortgage & Insurance Services & Costs

John Leggott College. Data Protection Policy. Introduction

Westpac Privacy Policy. Our privacy commitment to you

FIDELITY APPLICANT PRIVACY AND PROTECTION NOTICE

RECORDS MANAGEMENT POLICY

How To Ensure Network Security

Council Policy. Records & Information Management

MODEL CHILD PROTECTION POLICY

University of Limerick Data Protection Compliance Regulations June 2015

CLOUD COMPUTING FOR ehealth DATA PROTECTION ISSUES

INFORMATION GOVERNANCE POLICY

Campus and Workplace Violence Prevention

Corporate Guidelines for Subsidiaries (in Third Countries ) *) for the Protection of Personal Data

Transcription:

Data Integrity and Information Protection May 2014 Advisory

Presentation Outline Overview of Data Integrity and Information Protection KPMG Data Loss Barometer 2012 Information Protection Challenges Some causes of Poor Data Integrity Some common Information Protection Principles Management of Data Integrity and Information Protection 2

Overview Of Data Integrity and Information Protection

Overview Of Data Integrity and Information Protection Current Issues around the world 4

Definition of Information Protection Information protection (IP) focuses on the protection of information from inappropriate access or use, using a variety of means as required, including, but not limited to, policy and standards; physical and electronic security measures; and compliance monitoring and reporting. IP represents the point at which the management of information converges with security policy and measures. Information Protection is safeguarding all information regardless of its form. 5

Definition of Data Integrity Data integrity refers to maintaining and assuring the accuracy and consistency of data over its entire life-cycle, and is a critical aspect to the design, implementation and usage of any system which stores, processes, or retrieves data. Data integrity can mean ensuring data is "whole" or complete, the condition in which data is identically maintained during any operation (such as transfer, storage or retrieval), the preservation of data for their intended use. Put simply, data integrity is the assurance that data is consistent and correct. 6

Data Protection KPMG s Data Loss Barometer Surveys regularly conducted by KPMG globally, addressing Data Loss published incidents, reveals the following findings in the January 2012 report: External data losses rose 40% vs. 2011, affecting 160 million people Hacking remains the most significant threat, causing 67% of total data loss incidents Personally identifiable information remains the #1 data loss type Government, Education, & Technology were the worst affected sectors for data loss Over 96% of data loss incidents in media were attributed to hacking in the first half of 2012 As organizations are involved in redundancies and downward pressure on costs forces drastic changes, there is a significant risk that disgruntled employees can cause serious damage to an organization through data breaches. Edge Zarrella Head of IT Advisory, KPMG Global 7 7

Data Integrity and Information Protection Challenges 8

Data Integrity and Information Protection Protecting information in a constantly challenging environment External work environments Blogs Leavers P2P applications Outsourced Activities Professional Networks Websites (corporate, Industry & Private) E-Mail Communication Wireless Networks Media WWW Mobile Devices Virtual Virtual Information Physical Physical Geographical/ Political changes Social Networks End Point Security Removable Devices Physical Security Compliance\Legislation IT infrastructure & maintenance Disposal\Archival Of physical media Privacy Corporate communication 9

Some causes of Poor Data Integrity Incomplete Data System Design Entry Errors Collection Errors Others 10

Some common Information Protection Principles Collection 1. Lawful When an entity collects your personal information, the information must be collected for a lawful purpose. It must also be directly related to the entity s activities and necessary for that purpose. 2. Direct Your information must be collected directly from you, unless you have given your consent otherwise. Parents and guardians can give consent for minors. 3. Open You must be informed about the purpose of the information being collected, how it will be stored and used. The entity should also disclose information on subsequent access and updates. 11

Some common Information Protection Principles Collection 4. Relevant The entity must ensure that the information is relevant, accurate, up-to-date and not excessive. The collection should not unreasonably intrude into your personal affairs. 5. Storage Secure - your information must be stored securely, not kept any longer than necessary, and disposed of appropriately. It should be protected from unauthorised access, use or disclosure. 12

Some common Information Protection Principles Access 6. Transparent The entity must provide you with enough details about what personal information they are storing, why they are storing it and what rights you have to access it. 7. Accessible The entity must allow you to access your personal information without unreasonable delay and expense. 8. Correct The entity must allow you to update, correct or amend your personal information where necessary. 13

Some common Information Protection Principles Usage 9. Accurate The entity must make sure that your information is accurate before using it. 10. Limited Entities can only use your information for the purpose for which it was collected, for a directly related purpose, or for a purpose to which you have given your consent. It can also be used without your consent in order to deal with a serious and imminent threat to any person's health or safety. Disclosure 11. Restricted The entity can only disclose your information with your consent or if you were told at the time they collected it from you that they would do so. Otherwise the entity can disclose your information if it is for a related purpose and they don't think that you would object. Your information can also be used without your consent in order to deal with a serious and imminent threat to any person's health or safety. 14

Some common Information Protection Principles 12. Safeguarded The entity cannot disclose your sensitive personal information without your consent, for example information about your ethnic or racial origin, political opinions, religious or philosophical beliefs, health or sexual activities or trade union membership. Otherwise it can only disclose sensitive information without your consent in order to deal with a serious and imminent threat to any person's health or safety. However there are other limited circumstances in which this information may be disclosed. 15

Management of Data Integrity and Information Protection

Management of Data Integrity and Information Protection An overview of Data Leakage Prevention Program 17

Data Protection What should an organization have in place? Information Mapping: Know what and Where you assets are. Information Classification: Identify the value of your information assets, prioritize your effort. Risk information Matrix: Identify risks and impact of information Policies and procedures: Create clear guidelines for employees and for monitoring. Access management: IT related (Preventive) measures: Physical Measures: Correlate access rights to the risk-information matrix. Implement technical tools and controls Be cost effective- prioritize your investments, use plateaus. Correlate measures implementation with classification level and identified risks. Address loss of assets (physical), relevant aspects of perimeter security etc. Awareness Plan: Make your employees aware of risks and possible implications Monitoring and Reporting: Remain in control over breaches in policies and changes in risks and needs 18

Food for thought The world is a dangerous place to live; Not because of people who are evil, but because of the people who don t do anything about it -Albert Einstein 19

QUESTIONS

Thank you