25
Building Blocks of Data Privacy John P. Tomaszewski Seyfarth Shaw LLP

Building Blocks of Data Privacyweb1.amchouston.com/flexshare/003/ACCH/WebsiteInfo/...• Onboarding • Annual • Other periodic as necessary (e.g. security engineers need more) Vendor

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Building Blocks of Data Privacyweb1.amchouston.com/flexshare/003/ACCH/WebsiteInfo/...• Onboarding • Annual • Other periodic as necessary (e.g. security engineers need more) Vendor

Building Blocks of Data Privacy

John P. TomaszewskiSeyfarth Shaw LLP

Page 2: Building Blocks of Data Privacyweb1.amchouston.com/flexshare/003/ACCH/WebsiteInfo/...• Onboarding • Annual • Other periodic as necessary (e.g. security engineers need more) Vendor

©2015 Seyfarth Shaw LLP

The Building Blocks

Corporate Governance

COSO Framework

COBIT Framework

Privacy Program Components and Structure

2

Page 3: Building Blocks of Data Privacyweb1.amchouston.com/flexshare/003/ACCH/WebsiteInfo/...• Onboarding • Annual • Other periodic as necessary (e.g. security engineers need more) Vendor

©2015 Seyfarth Shaw LLP

Corporate Governance

3

Policy(general

management statements)

Standards(how to implement policy)

Processes(specific controls)

Procedures(step by step instructions)

The TriumvirateAdministrative

Technical &

Procedural Safeguards

Page 4: Building Blocks of Data Privacyweb1.amchouston.com/flexshare/003/ACCH/WebsiteInfo/...• Onboarding • Annual • Other periodic as necessary (e.g. security engineers need more) Vendor

©2015 Seyfarth Shaw LLP

Corporate Governance

4

Policy(general

management statements)

Policy is generally “End State” oriented

Senior Management Endorsement/Approval• Need a “Responsible Officer”Alignment Between Business Objectives & Security Needs• The most secure computer is encased in plastic… and at the bottom

of the ocean.Integration Between Executive & Line Management• Have to have the folks building stuff know what their obligations are.

Page 5: Building Blocks of Data Privacyweb1.amchouston.com/flexshare/003/ACCH/WebsiteInfo/...• Onboarding • Annual • Other periodic as necessary (e.g. security engineers need more) Vendor

©2015 Seyfarth Shaw LLP

Corporate Governance

5

Technical Standards• Password length & complexity• Encryption requirements (at rest & in transit)• PC configuration standards (e.g. disable USB ports, etc.)• Network configuration standardsAdministrative Standards• Metrics• Training• AuditProcedural Standards• Product Requirements• Development Methodology• Role-based access controls (both people AND machines)

Standards(how to implement policy)

Page 6: Building Blocks of Data Privacyweb1.amchouston.com/flexshare/003/ACCH/WebsiteInfo/...• Onboarding • Annual • Other periodic as necessary (e.g. security engineers need more) Vendor

©2015 Seyfarth Shaw LLP

Corporate Governance

6

Access credential ProvisioningIdentify responsibility for business processesAccountability (read: Enforcement)Training• Onboarding• Annual• Other periodic as necessary (e.g. security engineers need more)

Vendor management• contracts • due diligence

Event Management

Processes (usually human focused)Processes

(specific controls)

Page 7: Building Blocks of Data Privacyweb1.amchouston.com/flexshare/003/ACCH/WebsiteInfo/...• Onboarding • Annual • Other periodic as necessary (e.g. security engineers need more) Vendor

©2015 Seyfarth Shaw LLP

Corporate Governance

7

Standard Operating Procedures (“SOP”)• Standing up new products & services• Transitioning customers across services• Personal Device connectivity/monitoring• Data Loss Prevention policies (monitoring & blocking network traffic)

Configuration Baselines• Collection Limitations (only collect what you need)• 3rd Party Vendor Tracking Tech on websites• Encryption implementation requirements (salting, hash algorithms, etc.)

Database architecture• Metatagging data for sensitivity classification

Procedures(step by step instructions) Technical Procedures

Page 8: Building Blocks of Data Privacyweb1.amchouston.com/flexshare/003/ACCH/WebsiteInfo/...• Onboarding • Annual • Other periodic as necessary (e.g. security engineers need more) Vendor

©2015 Seyfarth Shaw LLP

Data Privacy

Controlling DataLike any other “control.”

Control: a proactive step taken to accomplish an objective• Controls attain Objectives.• Objectives address Risks.

Controls are best developed within a framework. Begin with COSO - a general control framework.

Treadway Commission’s Committee Of Sponsoring Organization

8

Page 9: Building Blocks of Data Privacyweb1.amchouston.com/flexshare/003/ACCH/WebsiteInfo/...• Onboarding • Annual • Other periodic as necessary (e.g. security engineers need more) Vendor

©2015 Seyfarth Shaw LLP

COSO Internal Control Framework

9U

nit B

Act

ivity

AU

nit A A

ctiv

ityBMonitoring

Information &Communication

Control Activities

Risk Assessment

Control EnvironmentU

nit A

Page 10: Building Blocks of Data Privacyweb1.amchouston.com/flexshare/003/ACCH/WebsiteInfo/...• Onboarding • Annual • Other periodic as necessary (e.g. security engineers need more) Vendor

©2015 Seyfarth Shaw LLP

COBIT Framework

After establishing general controls (COSO)Time to get detailed (COBIT)

COBIT FrameworkControl Objectives for Information Technology

An IT governance frameworkProcess-oriented

It starts with your Business Goals.

10

Page 11: Building Blocks of Data Privacyweb1.amchouston.com/flexshare/003/ACCH/WebsiteInfo/...• Onboarding • Annual • Other periodic as necessary (e.g. security engineers need more) Vendor

©2015 Seyfarth Shaw LLP

COBIT Framework

11

Business Goals

Governance Drivers

Information Criteria

IT Resources

Determines Parameters

PLAN &ORGANIZE

MONITOR &EVALUATE

DELIVER &SUPPORT

ACQUIRE &IMPLEMENT

The ProcessOptimize Use Of

Determines Availability

Achieve Quality Of

Page 12: Building Blocks of Data Privacyweb1.amchouston.com/flexshare/003/ACCH/WebsiteInfo/...• Onboarding • Annual • Other periodic as necessary (e.g. security engineers need more) Vendor

©2015 Seyfarth Shaw LLP

Putting it all together

12

Page 13: Building Blocks of Data Privacyweb1.amchouston.com/flexshare/003/ACCH/WebsiteInfo/...• Onboarding • Annual • Other periodic as necessary (e.g. security engineers need more) Vendor

©2015 Seyfarth Shaw LLP

Privacy Program Components

13

DEFINE

TEST

MANAGE

Page 14: Building Blocks of Data Privacyweb1.amchouston.com/flexshare/003/ACCH/WebsiteInfo/...• Onboarding • Annual • Other periodic as necessary (e.g. security engineers need more) Vendor

©2015 Seyfarth Shaw LLP

The Nature of Information

14

Confidential Information

Private

Internal

Proprietary

Public

Note: overlaps are a function of time

Page 15: Building Blocks of Data Privacyweb1.amchouston.com/flexshare/003/ACCH/WebsiteInfo/...• Onboarding • Annual • Other periodic as necessary (e.g. security engineers need more) Vendor

©2015 Seyfarth Shaw LLP

Define Asset

What are we Controlling?

Data Information Knowledge Intelligence

Inventory managed by each division/business unit• Know what you use and how you use it• Data flow diagrams• Data classification standard

15

DEFINE

Page 16: Building Blocks of Data Privacyweb1.amchouston.com/flexshare/003/ACCH/WebsiteInfo/...• Onboarding • Annual • Other periodic as necessary (e.g. security engineers need more) Vendor

©2015 Seyfarth Shaw LLP

Privacy Programs

Privacy Statement/Policy:• Data storage policy• Data access policy• Associate training policy

• Monitoring and compliance policy• Data classification standard• Data disclosure standard

• Access Management Process• Data disclosure process

• Associate handbook policy• Confidential information and trade secret policy

16

DEFINE

Page 17: Building Blocks of Data Privacyweb1.amchouston.com/flexshare/003/ACCH/WebsiteInfo/...• Onboarding • Annual • Other periodic as necessary (e.g. security engineers need more) Vendor

©2015 Seyfarth Shaw LLP

Privacy Programs

Privacy Policy Structure• Clear & Conspicuous• Content:

• How you collect data• What you do with the data (be specific if possible)• Data disclosure statement

• When you disclose to third parties• What categories of data you disclose to third parties• Who you disclose data to• Disclosure processes

• What kind of security is in place• Review (periodically – business models change)

17

DEFINE

Page 18: Building Blocks of Data Privacyweb1.amchouston.com/flexshare/003/ACCH/WebsiteInfo/...• Onboarding • Annual • Other periodic as necessary (e.g. security engineers need more) Vendor

©2015 Seyfarth Shaw LLP

Privacy Programs

Privacy Policy Delivery• At time of relationship formation• Annually• By paper or electronically

• Reasonable expectation of “actual notice”• Watch out for E-SIGN/UETA

Consent• Include language in Terms & Conditions/Consumer Agreement• Opt-in: easier to manage• Opt-out: preferred by businesses

• General opt-out hard to manage• The more specific the options, the easier to manage in the long run

• Unsubsribe processes for email• Be SURE you get the language right• Permissions follow data

18

DEFINE

Page 19: Building Blocks of Data Privacyweb1.amchouston.com/flexshare/003/ACCH/WebsiteInfo/...• Onboarding • Annual • Other periodic as necessary (e.g. security engineers need more) Vendor

©2015 Seyfarth Shaw LLP

Privacy Programs

Infrastructure• Continuing Education

• Awareness Training• Classes for security applications

• Effective tools• Easy to understand policies, definitions, and standards• Management support for privacy related decisions (even if

deployment is delayed)

• Privacy Assessments• What is the risk? Is it Data, Information, Knowledge, or Intelligence

that needs to be protected?

• Product design & review• Make sure the product has privacy as a business requirement

19

DEFINE

Page 20: Building Blocks of Data Privacyweb1.amchouston.com/flexshare/003/ACCH/WebsiteInfo/...• Onboarding • Annual • Other periodic as necessary (e.g. security engineers need more) Vendor

©2015 Seyfarth Shaw LLP

Privacy Programs

Data Flow and Gap Analysis

Annual privacy assessment (has the gap changed)

Internal Audit

3d Party Audits

Certification Programs

20

TEST

Page 21: Building Blocks of Data Privacyweb1.amchouston.com/flexshare/003/ACCH/WebsiteInfo/...• Onboarding • Annual • Other periodic as necessary (e.g. security engineers need more) Vendor

©2015 Seyfarth Shaw LLP

Privacy Programs

Designate responsible party in senior management

Track risks as identified in testing

Quarterly reporting to executive management

21

MANAGE

Page 22: Building Blocks of Data Privacyweb1.amchouston.com/flexshare/003/ACCH/WebsiteInfo/...• Onboarding • Annual • Other periodic as necessary (e.g. security engineers need more) Vendor

©2015 Seyfarth Shaw LLP

Privacy Programs

Incident Response• Establish security protocol and escalation process

• What constitutes a triggering event?• Who, what, when, and how to notify?

• Include multiple parties• Legal • PR• Media Relations• Investor Relations• Operations• Technical Teams

22

MANAGE

Page 23: Building Blocks of Data Privacyweb1.amchouston.com/flexshare/003/ACCH/WebsiteInfo/...• Onboarding • Annual • Other periodic as necessary (e.g. security engineers need more) Vendor

©2015 Seyfarth Shaw LLP

Privacy Programs

Incident Response• Security Breach Notice Requirements (in 20+ states)

• Unauthorized access/acquisition• Computerized data (some states don’t require)• Compromising the security, confidentiality or integrity• Data “owners” mu notify consumers in the “most expedient time

possible.”• “Processors” must notify “Owners” immediately• Many times, no harm is necessary to trigger notice requirements

23

MANAGE

Page 24: Building Blocks of Data Privacyweb1.amchouston.com/flexshare/003/ACCH/WebsiteInfo/...• Onboarding • Annual • Other periodic as necessary (e.g. security engineers need more) Vendor

©2015 Seyfarth Shaw LLP

Privacy Programs

Employee’s Role• In order to prevent accidental or intentional loss or disclosure of

confidential information, companies must be committed to providing a secure environment.

• Managers are responsible for ensuring employees are aware of what information is considered especially sensitive and how confidential information is to be handled.

• Confidential information is secured when not in use.• Confidential information if shredded when disposed of.

24

MANAGE

Page 25: Building Blocks of Data Privacyweb1.amchouston.com/flexshare/003/ACCH/WebsiteInfo/...• Onboarding • Annual • Other periodic as necessary (e.g. security engineers need more) Vendor

©2015 Seyfarth Shaw LLP

Question & Answer

John TomaszewskiSeyfarth Shaw

[email protected](713) 860-0088

25