Romney C12: Confidentiality & Privacy Flashcards
Basic objective information security
preserving the confidentiality of the organization’s intellectual property & similar information share with it by its business partners
Objectives of confidentiality and privacy
protect sensitive information from unauthorized access and disclosure
4 basic actions to protect C&P
- Identify & classify the information to be protected
- Encrypt the information
- Control access to the information
- Train employees to properly handle the information
4 basic Actions:
1. Identify & classify information to be protected
- identify where such information resides & who has access to it
- classify the information in terms of its value to the organization
4 basic actions:
Protecting sensitive information with encryption
to protect information in transit over the internet
additional layer of protection
4 basic actions:
Protecting sensitive information with encryption
to protect information in transit over the internet
additional layer of protection
4 basic actions:
Protecting sensitive information with encryption
to protect information in transit over the internet
additional layer of protection
only protect when it is stored or being transmitted not during processing
4 basic actions:
3. Controlling access to sensitive information
additional digital physical access controls through:
- Information rights management (IRM)
- data loss prevention (DLP)
- digital watermark
- data masking
- tokenization
Information Rights Management (IRM)
Offers the capability not only to limit access to specific files or documents but also to specify the actions (read, copy, print etc) that individuals granted access to that resource can perform
Some IRM has the capability to limit access privileges to a specific period of time and to remotely erase protected files
Data Loss Protection
Software that works like antivirus program in reverse, blocking outgoing messages (email, IM, etc) that contain key words or phrases associated with intellectual property or other sensitive data the organization wants to protect
Digital watermark
code embedded in documents that enables an organization to identify confidential information that has been disclosed
Data masking
protecting privacy by replacing sensitive personal information with fake data. Also called tokenization
Tokenization
another word for data masking`
Training
- employees need to know what info they can share with outsiders
- employees need to be taught how to protect sensitive data
Privacy Regulations: The EU’s GDPR & U.S Laws
- Europeans Union’s General Data Privacy Regulation is the strictest & most far-reaching privacy regulations
- imposes huge fines (up to 4% of global revenues) for issues such as not properly obtaining consent to collect and use personal information or not being able to document that the organization has taken proactive approach to protecting privacy.
Other laws and regulations
– California Consumer Privacy Act (C CP A) of 2018
– Health Insurance Portability and Accountability Act
(H I P A A)
– Health Information Technology for Economic and
Clinical Health Act (H I T E C H)
– Financial Services Modernization Act
Generally Accepted Privacy Principles (AICPA and CICA)
- Management
- Notice
- Choice and consent
- Collection
- Use, retention, disposal
- Access
- Disclosure to 3rd parties
- Security
- Quality
- Monitoring & enforcement
GAPP: 1. management
Organizations need to establish a set of procedures and policies for protecting the privacy of personal info they collect from customers/obtain from 3rd parties
Assign responsibility and accountability for implementing those policies to a specific person