43
Privacy and Trust In Europe Mike Small Principal Consultant Security Management CA EMEA

Privacy and Trust In Europe Mike Small Principal Consultant Security Management CA EMEA

Embed Size (px)

Citation preview

Page 1: Privacy and Trust In Europe Mike Small Principal Consultant Security Management CA EMEA

Privacy and Trust In Europe

Mike SmallPrincipal Consultant Security Management CA EMEA

Page 2: Privacy and Trust In Europe Mike Small Principal Consultant Security Management CA EMEA

CA Support for Privacy Trust and Compliance

CA’s Enterprise IT Management Approach is based on best standards and practices like COBIT and ISO 27002

Many of CA’s product are evaluated Common Criteria (ISO/ISEC 15048) for computer security .

CA’s IT Security practitioners are CISSP accredited

2 Meeting the challenges of privacy, trust and compliance

Page 3: Privacy and Trust In Europe Mike Small Principal Consultant Security Management CA EMEA

Privacy - Why Does it Matter?

Clarkson eats words over lost dataTV presenter Jeremy Clarkson said in a newspaper column that the data lost by staff at HM Revenue & Customs was useless, and published his own bank details in the article to prove his point.

However, he was forced to apologise publicly after £500 was quickly removed from his account.

3

Page 4: Privacy and Trust In Europe Mike Small Principal Consultant Security Management CA EMEA

Privacy - Why Does it Matter?

Unproven allegations kept on UK Criminal Records Bureau files

A High Court judge has acknowledged that workers' careers can be ruined by unproven allegations kept on police files but refused to allow a challenge to the rules.

Mr Justice Blake added that he was powerless to stop details of unproved accusations being passed to managers because the Government and police had clearly intended that they should be, in order to protect vulnerable groups.

1997 Police Act had placed officers under a duty to disclose allegations to employers, even when they had not been proved, provided they were relevant and not too historic.

UK Daily Telegraph 15th September, 2008

4

Page 5: Privacy and Trust In Europe Mike Small Principal Consultant Security Management CA EMEA

Principal ExplanationCollection Limitation

There should be limits to the collection of personal data and should be obtained with the knowledge or consent of the data subject.

Data Quality Personal data should be relevant to the purposes for which they are to be used, and should be accurate, complete and kept up-to-date.

Purpose Specification

The purposes for which personal data are collected should be specified and the subsequent use limited to these.

Use Limitation Personal data should not be disclosed, made available or otherwise used for purposes other than those specified

Security Personal data should be protected by reasonable security safeguards

Openness There should be a general policy of openness about developments, practices and policies with respect to personal data.

Individual Participation

An individual should have the right to obtain data related to him in a timely and low cost manner and to correct errors.

Accountability A data controller should be accountable for complying with measures which give effect to the principles stated above.OECD Guidelines on the Protection of Privacy and Trans-border Flows of Personal Data. 23rd

September 1980

Privacy – OECD Principles

Page 6: Privacy and Trust In Europe Mike Small Principal Consultant Security Management CA EMEA

EU Directive 2002/58/EC (Directive on Privacy and Electronic Communications)

Providers of publicly available electronic communications services (i.e. telecommunications companies) must safeguard the security and confidentiality of communications on their services.

EU Directive 95/46/EC Personal data should be (Article 6)

Only collected for specified, explicit and legitimate purposes

Relevant and not excessive for the purpose collected

Accurate and where necessary, updated Maintained in a form that allows identification of

data subjects for no longer than necessary

Privacy – European Laws

Page 7: Privacy and Trust In Europe Mike Small Principal Consultant Security Management CA EMEA

This Directive applies to data processed by automated means and data contained in or intended to be part of non automated filing systems.

The Directive aims to protect the rights and freedoms of persons with respect to the processing of personal data by laying down guidelines determining when this processing is lawful.

Privacy – EU Directive 95/46/EC

Page 8: Privacy and Trust In Europe Mike Small Principal Consultant Security Management CA EMEA

EU Article 29 Working Party, Working Paper 55 on the surveillance of electronic communications in the workplace:

prevention should be more important than detection. any monitoring measure must pass a list of tests:

a) Is the monitoring activity transparent to the workers?

b) Is it necessary? Could not the employer obtain the same result with traditional methods of supervision?

c) Is the processing of personal data proposed fair to the workers?

d) Is it proportionate to the concerns that it tries to ally? employer must inform the worker of

i. the presence, use and purpose of any detection equipment and/or apparatus activated with regards to his/her working station and

ii. any misuse of the electronic communications detected (e-mail or the Internet), unless important reasons justify the continuation of the secret surveillance

Privacy – Employee Surveillance

Page 9: Privacy and Trust In Europe Mike Small Principal Consultant Security Management CA EMEA

Trust

A receipt for payment

9

Photo reproduced with permission from the Daily Telegraph (UK)

Page 10: Privacy and Trust In Europe Mike Small Principal Consultant Security Management CA EMEA

Which organizations do people trust?

Which organizations would you trust MOST to protect your personal data?

10

Poll by YouGov plc conducted between 3rd - 5th September 2007 in the UK with a sample size of 2,156 adults.

Banks

60%

Cre

dit

Card

Com

panie

s

40%G

overn

men

t

25%

Onlin

e

reta

iler

19%

Page 11: Privacy and Trust In Europe Mike Small Principal Consultant Security Management CA EMEA

Ensuring Privacy and Trust Standards and Best Practice

COBIT Common Criteria for Information

Technology Security Evaluation ISO/IEC 15408-1 to 15408-3

ISO 27001 Information security management systems - Requirements

ISO 27002 Code of practice for information security management

Payment Card Industry (PCI) Data Security Standard

11

Page 12: Privacy and Trust In Europe Mike Small Principal Consultant Security Management CA EMEA

Acquire & Implement

Specify Purpose for data collected

Inform data subjects Ensure subject aware of data

processing and reason

Deliver and Support

Ensure Data Quality Relevance, accuracy and

updating Ensure Security

IT Security measures Ensure subject participation Restrict Data Transfer

Plan & Organize

Justify processing consent, legal obligations,

justified interest Notify authorities

Unless exempted report processing to DPA or CPO

Monitor & Evaluate

Ensure Respect of Data Purpose

Monitor accuracy Monitor Security Monitor Data Transfer

Mapping Privacy to COBIT

Page 13: Privacy and Trust In Europe Mike Small Principal Consultant Security Management CA EMEA

Ensuring Privacy and Trust Training and Accreditation

ISACA (Information Systems Audit and Controls Association)

Certified Information Systems Auditor (CISA)

Certified Information Security Manager (CISM)

ISC2, the International Information Systems

Security Certification Consortium Certified Information Systems Security

Professional (CISSP) Systems Security Certified Practitioner

(SSCP)

13

Page 14: Privacy and Trust In Europe Mike Small Principal Consultant Security Management CA EMEA

Compliance Gap

A survey of 482 EMEA organizations during November 2007 found that 62% hold regulated information.

14 Meeting the challenges of privacy, trust and compliance

Page 15: Privacy and Trust In Europe Mike Small Principal Consultant Security Management CA EMEA

Compliance Gap

Only 31% of 482 organizations surveyed across EMEA had controls in place to identify “orphan” accounts

15 Meeting the challenges of privacy, trust and compliance

> ISO 27002 – 11.2.1 User Registration

There should be a formal user registration and de-registration procedure in place for granting and revoking access to all information systems and services.

Page 16: Privacy and Trust In Europe Mike Small Principal Consultant Security Management CA EMEA

Compliance Gap

Only 41% of 482 organizations surveyed across EMEA could report on users’ access rights.

16 Meeting the challenges of privacy, trust and compliance

> ISO 27002 – 11.2.4 Review of Access Rights

Management should review users’ access rights at regular intervals using a formal process.

Page 17: Privacy and Trust In Europe Mike Small Principal Consultant Security Management CA EMEA

Compliance Gap

Only 46% of 482 organizations surveyed across EMEA had controls in place to regulate administrators.

17 Meeting the challenges of privacy, trust and compliance

> ISO 27002 – 11.5 OS Access Control

Objective: To prevent unauthorized access to operating systems

Page 18: Privacy and Trust In Europe Mike Small Principal Consultant Security Management CA EMEA

Privacy

18 Meeting the challenges of privacy, trust and compliance

PRIVACYMatters

Page 19: Privacy and Trust In Europe Mike Small Principal Consultant Security Management CA EMEA

A ‘Framework’ forData Privacy Management

John T. Sabo, CISSPDirector, Global Government Relations, CA, Inc.

Page 20: Privacy and Trust In Europe Mike Small Principal Consultant Security Management CA EMEA

What is the ISTPA?

The International Security, Trust and Privacy Alliance (ISTPA), founded in 1999, is a global alliance of companies, institutions and technology providers working together to clarify and resolve existing and evolving issues related to security, trust, and privacy

ISTPA’s focus is on the protection of personal information (PI) – see www.istpa.org

Page 21: Privacy and Trust In Europe Mike Small Principal Consultant Security Management CA EMEA

ISTPA’s Perspective on Privacy

Operational, Technical, Architectural Focus …“making Privacy Operational” based on legal, policy and business process

drivers multi-dimensional privacy management with

support for temporal requirements

“Analysis of Privacy Principles: An Operational Study” published in 2007

Privacy Framework v1.1 published in 2002 supports the full “lifecycle” of Personal Information now under major revision

Page 22: Privacy and Trust In Europe Mike Small Principal Consultant Security Management CA EMEA

Principles/Legislation/Policies Many competing requirements and constraints on the collection

and use of personal information (PI) and personally identifiable information (PII)

Business Processes Business applications using PI/PII with privacy-related

components such as data collection, communications, processing and storage, customer/citizen relationship management, partner agreements, and compliance

Today’s Networked PI Lifecycle Digitally-based personal information and personally identifiable

information are now essentially networked and boundless

Absence of privacy-specific technical management standards Technical architectures which incorporate standardized,

universal privacy management services and controls not yet available

Privacy Drivers and Issues

Page 23: Privacy and Trust In Europe Mike Small Principal Consultant Security Management CA EMEA

See ISTPA “Analysis of Privacy Principles: An Operational Study” (2007)

Starting Point - Principles/Legislation/Policies

Page 24: Privacy and Trust In Europe Mike Small Principal Consultant Security Management CA EMEA

Many Laws, Directives, Codes

The Privacy Act of 1974 (U.S.)

OECD Privacy Guidelines UN Guidelines EU Data Protection Directive Canadian Standards

Association Model Code Health Insurance Portability

and Accountability Act (HIPAA)

•US FTC Fair Information Practice Principles

•US-EU Safe Harbor Privacy Principles

•Australian Privacy Act •Japan Personal Information

Protection Act•APEC Privacy Framework•California Security Breach

Bill

Page 25: Privacy and Trust In Europe Mike Small Principal Consultant Security Management CA EMEA

No Standardized Policies

Australian Privacy Principles – 2001

Collection Use and Disclosure Data Quality Data Security Openness Access and

Correction Identifiers Anonymity Transborder Data

Flows Sensitive

Information

APEC Privacy Framework – 2005

Preventing Harm Notice Collection

Limitation Uses of Personal

Information Choice Integrity of

Personal Information

Security Safeguards

Access and Correction

Accountability

See ISTPA “Analysis of Privacy Principles: An Operational Study” (2007)

OECD Guidelines – 1980

Collection Limitation Data Quality Purpose

Specification Use Limitation Security Safeguards Openness Individual

Participation Accountability

Page 26: Privacy and Trust In Europe Mike Small Principal Consultant Security Management CA EMEA

•Anonymity•Data Flow•Sensitivity

Need for Generalized Requirements Accountability Notice Consent Collection Limitation Use Limitation Disclosure Access & Correction Security/Safeguards

Data Quality Enforcement Openness

Page 27: Privacy and Trust In Europe Mike Small Principal Consultant Security Management CA EMEA

Time

Managing Privacy Requirements in Networked PI/PII Lifecycle?

AggregationAnd

Linkages

PI Collection

PI Use

PI Use

PI UseDestruction?

Time

Page 28: Privacy and Trust In Europe Mike Small Principal Consultant Security Management CA EMEA

Example: PI/PII Lifecycle Implications of “Notice”

PI Collection

Use, Linkage, Re-use, Aggregation Destruction?

PI over time

1, definition of the personal information collected

2. use (purpose specification)

3. disclosure to parties within or external to the entity

4. practices associated with maintenance and protection of the PI

5. options available to the data subject regarding the collector’s privacy practices

6. changes made to policies or practices

7. information provided to data subject at designated times under designated circumstances

Page 29: Privacy and Trust In Europe Mike Small Principal Consultant Security Management CA EMEA

A Dynamic Operationally-Focused Privacy Management Reference Model

Page 30: Privacy and Trust In Europe Mike Small Principal Consultant Security Management CA EMEA

PI Life Cycle Perspective

Most Models Assume Sequential Processes

PI

PI

PI

Subject

Requestor

Business Application Processor

Sequential Operational Privacy Management

Page 31: Privacy and Trust In Europe Mike Small Principal Consultant Security Management CA EMEA

PI Life Cycle Perspective

Today – Networked-Interactive Processes

PI

PI

PI

Data Subject

Requestors/Users

Business Application 1, 2… n

Processor/Aggregator 1, 2…n

•Non-sequential

•Data subject impacted directly and indirectly after initial data collections

PI

TimeRequestors/Users ..n …

Page 32: Privacy and Trust In Europe Mike Small Principal Consultant Security Management CA EMEA

ISTPA Privacy Framework Services

Negotiation - agreements, options, permissions Control – policies – data management Interaction - manages data/preferences/notice

Agent - software that carries out processes

Access - subject review/suggest updates to PI Usage - data use, aggregation, anonymization

Certification - credentials, trusted processes Audit - independent, verifiable accountability Validation - checks accuracy of PI Enforcement - including redress for violations

Page 33: Privacy and Trust In Europe Mike Small Principal Consultant Security Management CA EMEA

Original ISTPA Privacy Framework

Security Foundation

Usage

Assurance Services

PIContainer

(PIC)

Data Subject Data Requestor

Control

Negotiation

PI, Preferences& PIC Repository

Interaction

Control

Negotiation

Interaction

PIC Repository

Agent Agent

Audit EnforcementCertificationValidation

Legal, Regulatory, & Policy Context

Page 34: Privacy and Trust In Europe Mike Small Principal Consultant Security Management CA EMEA

From “Framework” to “Model”

From policy perspective, pushback on use of the term “framework”

Framework v1.1 services were validated, but in a relatively static model

difficult to understand applicability in contemporary privacy/data protection scenarios

Need to better incorporate use cases where PI is disassociated from the data collector and the data subject’s control

Temporality and data lifecycle Policy changes

Improved understanding of service to service relationships

Page 35: Privacy and Trust In Europe Mike Small Principal Consultant Security Management CA EMEA

PI and Policies

Making the FrameworkPI and Policy– Centric

Page 36: Privacy and Trust In Europe Mike Small Principal Consultant Security Management CA EMEA

PI and Policies

PI and Policies

PI and Policies

Managing Multiple Policy Instances

Page 37: Privacy and Trust In Europe Mike Small Principal Consultant Security Management CA EMEA

PI Objects

P-Rule Objects

PI as Objects - Rules as Objects…

Page 38: Privacy and Trust In Europe Mike Small Principal Consultant Security Management CA EMEA

PI Objects

PIRules Objects

…and Managed in “Lifecycle” Networked Context

AggregationAnd

Linkages

PI Collection

PI Use

PI Use

PI Use

Page 39: Privacy and Trust In Europe Mike Small Principal Consultant Security Management CA EMEA

Personal Information

AGENT

INTERACTION

CONTROL

NEGOTIATION

USAGE

ACCESSVALIDATION

CERTIFICATION

AUDIT

ENFORCEMENT

SECURITY

Modular Services

Page 40: Privacy and Trust In Europe Mike Small Principal Consultant Security Management CA EMEA

Legal, Regulatory, and Policy Context

Security Foundation

Agent

Control

Interaction

Negotiation

PI Touch Point

PI, Rules& PIC Repository

PIContainer

(PIC)

EnforcementAuditCertificationValidation

Touch Point Concept

Assurance Services

Usage

Access

- Each “Touch Point” node configured with operational stack

- Privacy policies are input “parameters” to Control

- Agent is the Touch Point programming persona

-“PIC” logically contains PI and usage agreements

Page 41: Privacy and Trust In Europe Mike Small Principal Consultant Security Management CA EMEA

Legal, Regulatory, and Policy Context

Security Foundation

Agent

Control

Interaction

Negotiation

Any n touch points in the PI life cycle

Usage

PI, Rules& PIC Repository

Agent

Control

Interaction

Negotiation

PI, Rules& PIC Repository

PIContainer

(PIC)

EnforcementAuditCertificationValidation

Multiple Instances

Assurance Services

Usage

Access

Page 42: Privacy and Trust In Europe Mike Small Principal Consultant Security Management CA EMEA

Framework WG completing revision of new “reference model”

Publication expected December 2008

Linkages to IT governance disciplines and current standards (such as XACML)

ISTPA has joined the OASIS standards organization as an institutional member

Exploring proposing an OASIS Privacy Management Technical Committee using v. 2.0

Work requires cross-disciplinary knowledge and desire to develop privacy management tools which reflect our global, digital, and networked information-based environment

Next Steps

Page 43: Privacy and Trust In Europe Mike Small Principal Consultant Security Management CA EMEA

Questions?Questions?

John Sabo [email protected]