II: Fundamentals of Privacy-related IT Flashcards
Privacy Notice
A notice to users that explains how data is collected, used, retained and disclosed
Privacy Policy
An internal document meant to communicate the organization’s privacy best practices.
Security Policy
Use access controls to prevent unauthorized access to company data. Also establishes a policy on physical security from both internal and external threats.
Less about preventing excessive data collection and more about preventing unauthorized access to data.
Data classification policies (security policy)
Policies for granting and revoking access to assets.
Data schema (security policy)
Used to separate customer information (e.g. separating personal information from purchase data), helping to ensure a compromised system doesn’t expose everything.
Data retention (security policy)
Policy for retention and eventual removal of data.
Data deletion (security policy)
Remove data when it’s no longer needed.
Contracts and agreements
Agreements with third-party vendors regarding data storage (e.g. GCP).
COBIT
Business and IT goals are linked and measured to create responsibilities of business and IT teams.
Meant to ensure companies follow the law, become more agile and earn more.
ITIL
Framework for aligning IT services with the needs of the business.
Describes processes, procedures, tasks and checklists that are neither organization-specific nor technology-specific.
Data inventories
An inventory of data meant to help protect privacy. Requires knowing:
- how data is collected
- how data is processed
- where data is stored
- how data is classified
Enterprise Architecture
The overall organizational design of a system
Privacy Impact Assessment
Process to assist organizations in identifying and managing privacy risks that arise from new projects, initiatives, systems, etc.
Incident Responses
Response to data breach. Some incidents are security incidents, some are privacy incidents, and some are both. Examples include:
- DoS
- Malware Infection
- Hacking attempts
- Data exfiltration
- Lost Devices
- Misdirected emails
Some breaches expose proprietary business data, rather than personal data.
Security and Privacy in the System Development Life Cycle
- Securely Provision
- Operate and Maintain
- Protect and defend
- Investigate