Module #6: Information Management from a US Perspective Flashcards
information management programs
developing programs to protect personal information is a critical step in adhering to laws and regulations on privacy and security
privacy professionals
Assigning one or more privacy professionals to oversee the privacy and security programs helps to ensure compliance, provide training and assess risk when handling personal information.
vendor relationships
Information
management expands into both contract and vendor relationships to protect info from being compromised
incident response
development
of an incident response program in the event that information is compromised.
Individual Roles of the privacy professional
includes:
- legal
- marketing
- sales
- human resource
- public and government relations
- information technology
Privacy Professional is made up of:
– Researching laws, guidelines, common practices and tools; monitoring current events and changing guidelines to provide guidance to the organization
– Educating the organization about privacy laws, organizational policies, risks and recommended practices
–Designing and recommending policies and procedures for the organization
- Monitoring and managing organizational risk as it is impacted by privacy issues and policies - Monitoring internal and external threats to privacy
4 types of risk using privacy info
- legal risks
- reputational risks
- operational risks
- investment risks
legal risks
– Not complying with privacy laws (state, federal and international)
– Not fulfilling contractual commitments
Reputational risks
– Damaging trust in the brand: Organizations can face both legal enforcement and reputational harm if they do not adhere to their stated privacy policies
Operational risks
– Affecting efficiency
– Inhibiting use of personal information that benefits the organization and customers
Investment risks
– Hampering the ability of the organization to receive an appropriate return on its investments in information, IT and information processing programs
Accountability consideration questions
- Where, how and for what length of time should the data be stored?
- How sensitive is the information?
- Should the information be encrypted?
- Will the information be transferred to or from other countries, and if so, how will it be transferred?
- What are each country’s privacy laws?
- Who determines the rules that apply to the information?
- How will the information be processed, and how will these processes be maintained?
- Is the use of PI dependent upon other systems?
What are the 4 steps of developing an information management program?
1) Discover
2) Build
3) Communicate
4) Evolve
What should you consider during the Discover process (1st step of developing an information management program)
Consider?
- Accountability
- Company policy goals
- PI data inventory
- Data locations
- Data sharing
- Data transfers
- Data flows
- Data classification
- Data risk
What tasks are included during the Discover process (1st step of developing an information management program)
Tasks?
Tasks include:
• Self-assessing and identifying privacy risk
• Classifying PI according to sensitivity
• Developing and documenting best practices