CIPM BOK Outline Flashcards
Privacy Program Governance - 4 main subcategories
- Organizational Level
- Develop the Privacy Program Framework
- Implement the Privacy Program Framework
- Metrics
Governance: Organizational Level - 4 main subcategories
- Create a company vision
- Establish Data Governance Model
- Establish a privacy program
- Structure the Privacy Team
Create a company vision
Gov., Org level
- Acquire knowledge on privacy approaches
- Evaluate the intended objective
- Gain executive sponsor approval for this vision
Establish Data Governance Model
Gov., Org level
- Centralized
- Distributed
- Hybrid
Establish a Privacy Program
Gov., Org Level
- Define program scope and charter
- Identify the source, types, and uses of personal information within the organization and the applicable laws
- Develop a Privacy Strategy
Privacy Strategy
Gov., Org level, privacy program
- Business alignment– finalize the operational business case for privacy, identify stakeholders, leverage key functions, create a process for interfacing within organization, align organizational culture and privacy/data protection objectives, and obtain funding/budget for privacy and the privacy team
- Develop a data governance strategy for personal information (collection, authorized use, access, and destruction)
- Plan inquiry/complaint handling procedures (customers, regulators, etc)
Structure the Privacy team
Gov., Org level
- Establish the organizational model, responsibilities, and reporting structure appropriate to the size of the organization
- Designate a point of contact for privacy issues
- Establish/endorse the measurement of professional competency
Large Organization Structure
- Chief Privacy Officer
- Privacy Manager
- Privacy Analysts
- Business line privacy leaders
- “First Responders”
Small Organization Structure
Sole Data Protection Officer (DPO)
Privacy Program Development
Gov
- Develop organizational privacy policies, standards, and/or guidelines
- Define privacy program activities
Privacy Program Activities
Gov, Program Framework
- Education and Awareness
- Monitoring and responding to the regulatory environment
- Internal policy compliance
- Data inventories, data flows, and classification
- Risk assessments (PIAs, PTAs, etc)
- Incident Response and process, including jurisdictional regulations
- Remediation
- Program assurance, including audits
Privacy Program Implementation
Gov
- Communicate the framework to internal and external stakeholders
- Ensure continuous alignment to applicable laws and regulations to support the development of an organizational privacy program framework
Ensuring continuous alignment of program
Gov, Program Implementation
- Understand when national laws and regulations apply (e.g., GDPR, CCPA)
- Understand when local laws and regulations apply
- Understand penalties for noncompliance with laws and regulations
- Understand the scope and authority of oversight agencies (e.g., Data Protection Authorities, Privacy Commissioner, FTC, etc.)
- Understand privacy implications of doing business with or basing operations in countries with inadequate, or without, privacy laws
- Maintain the ability to manage a global privacy function
- Maintain the ability to track multiple jurisdictions for changes in privacy law
- Understand international data sharing arrangement agreements
Metrics
Gov
- Identify intended audience for metrics
- Define reporting resources
- Define privacy metrics for oversight and governance per audience
- Identify systems/application collection points
Defining Privacy Metrics
Gov., Metrics
- Compliance metrics (i.e., collection, responses to data subject inquiries, use, retention, disclosure to third parties, incidents- breaches, complaints, inquiries- employees trained, PIA metrics, privacy risk indicators, percent of company functions represented by governance mechanisms)
- Trending
- Privacy program return on investment
- Business resiliency metrics
- Privacy program maturity levels
- Resource utilization
Privacy Operational Life Cycle
- Assess your organization
- Protect
- Sustain
- Respond
Assess
life cycle
- Document current baseline of your privacy program
- Processors and third-party vendor assessment
- Physical assessments
- Mergers, acquisitions, and divestitures
- Conduct analysis and assessments, as needed or appropriate
Current baseline documentation
Life cycle, Assess
- Education and Awareness
- Monitoring and responding to the regulatory environment
- Internal policy compliance
- Data, systems, and process assessment (map data inventories, flows, and classifications, create “Record of Authority” of systems processing personal information within the organization, map and document data flow in systems and applications, and analyze and classify types and uses of data)
- Risk assessments (PIAs, PTAs, etc)
- Incident Response
- Remediation
- Determine desired state and perform gap analysis against an accepted standard or law
- Program assurance, including audits
Processors and third-party vendor assessment
Life Cycle, Assess
- Evaluate processors and third-party vendors, insourcing and outsourcing privacy risks, including rules of international data transfer (Privacy and info security policies, access controls, where PI is being held, and who has access to PI)
- Understand and leverage the different types of relationships (internal audit, info security, physical security, data protection authority)
- Risk assessment (type of data being outsourced, location of data, implications of cloud computing strategies, legal compliance, records of retention, contractual requirements like incident response, and establish minimum standards for safeguarding information
- Contractual requirements
- Ongoing monitoring and auditing
Physical Assessments
Life Cycle, Assess
Identify operational risk in:
- Data centers and offices
- Physical access controls
- Document destruction
- Media sanitization and disposal (e.g., hard drives, USB/thumb drives)
- Device forensics
- Device security (e.g., mobile devices, IoT, geo-tracking, imaging/copier hard drive security controls
Mergers, Acquisitions, and Divestitures
Life Cycle, Assess
- Due diligence
2. Risk assessment
Conduct analysis and assessments, as needed or appropriate
Life Cycle, Assess
- PTAs on systems, applications, and processes
- PIAs - define the process for conducting, understand the life cycle of a PIA and incorporate PIAs into system, process, product life cycles
Protect
Life Cycle
- Data Life Cycle and governance (creation to deletion)
- Info security practices (Access controls for physical and virtual systems, technical security controls, implement appropriate administrative safeguards
- Privacy by Design (integrate PbD throughout the system development life cycle & establish privacy gates as part of the system development framework)
Sustain
Life Cycle
- Measure
- Align
- Audit
- Communicate
- Monitor
Measure
Life cycle, sustain
- Quantify the costs of technical controls
- Manage data retention with respect to the organization’s policies
- Define the methods for physical and electronic data destruction
- Define roles and responsibilities for managing the sharing and disclosure of data for internal and external use
Align
Life cycle, sustain
Integrate privacy requirements and representation into functional areas across the organization:
- Information security
- IT operations and development
- Business continuity and disaster recovery planning
- Mergers, acquisitions, and divestitures
- Human resources
- Compliance and ethics
- Audit
- Marketing/business development
- Public relations
- Procurement/sourcing
- Legal and contracts
- Security/emergency services
- Finance
- Others
Audit
Life Cycle, sustain
- Align program privacy operations to an internal and external compliance audit program (knowledge of audit processes & align to industry standards)
- Audit compliance with privacy policies and standards
- Audit data integrity and quality and communicate audit findings with stakeholders
- Audit information access, modification, and disclosure accounting
Communicate
Life cycle, sustain
- Awareness
2. Targeted employee, management, and contractor training
Communicating Awareness
Life cycle, sustain
- Create awareness of the organization’s privacy program internally and externally
- Ensure policy flexibility in order to cooperate legislative/regulatory/market requirements
- Develop internal and external communication plans to ingrain organizational accountability
- Identify, catalog, and maintain documents requiring updates as privacy requirements change
Communicating Training
Life Cycle, Sustain
For targeted employee, management, and contractor training:
- Privacy policies
- Operational privacy practices (e.g., standard operating instructions), such as data creation/usage/retention/disposal, access control, reporting incidents, and key contacts
Monitor
Life Cycle, Sustain
- Environment (e.g., systems, applications) monitoring
- Monitor compliance with established privacy policies
- Monitor regulatory and legislative changes
- Compliance monitoring (e.g., collection, use, and retention) with internal audit, self-regulation, retention strategy, exit strategy
Respond
Life Cycle
- Information Requests
2. Privacy incidents
Responding to Information Requests
Life Cycle, Respond
- Access
- Redress
- Correction
- Managing data integrity
Responding to Privacy Incidents
Life Cycle, Respond
- Legal Compliance
- Incident Response Planning
- Incident detection
- Incident Handling
- Follow incident response process to ensure meeting jurisdictional, global, and business requirements
- Identify incident reduction techniques
- Incident metrics–quantify the cost of a privacy incident
Legal Compliance in Incident Response
Life Cycle, Respond
- Preventing harm
- Collection limitations
- Accountability
- Monitoring and enforcement
Incident Response Planning
Life Cycle, Response
- Understand key roles and responsibilities by Identifying key business stakeholders (info security, legal, audit, human resources, marketing, biz development, communications and PR, and other) & establishing oversight team
- Develop a privacy incident response plan
- Identify elements of the privacy incident response plan
- Integrate privacy incident response into business continuity planning
Incident Detection
Life Cycle, Response
- Define what constitutes a privacy incident
- Identify reporting process
- Coordinate detection responsibilities with Organization IT, Physical Security, Human resources, Investigation teams, and vendors
Incident Handling
Life Cycle, Response
- Understand key roles and responsibilities
2. Develop a communications plan to notify executive management
Incident Response Process
Life Cycle, Response
- Engage privacy team
- Review the facts
- Conduct analysis
- Determine actions (contain, communicate, etc.)
- Execute
- Monitor
- Review and apply lessons learned