Software development with Data Protection by Design and by Default Flashcards
Why did the Norwegian Data Protection Authority develop Data Protection guidelines?
to help organizations understand and comply with the requirement of data protection by design and by default in article 25 of the General Data Protection Regulation.
Who should use the Privacy By Design guidelines?
1) developers
2) software architects
3) project managers
4) testers
5) data protection officers
6) and security advisors.
Everybody who develops and contributes to the development of software containing or processing personal data.
s
Data Protection by Design development begins with an idea of creating a product that will help to simplify or improve the quality of a process or task. There are functional requirements to how the software should solve the task.
Software development should follow a methodology with key activities to ensure that the final product is robust.
What are some frameworks that assist with Data Protection by Design?
1) Microsoft Security Development Lifecycle (SDL),
2) Secure Software Development LifeCycle (S-SDLC) and
3) ENISA; Privacy and Data Protection by Design
What are the important processes in Data Protection by Design?
1) policy to engineering
how to incorporate data protection principles,
2) subject rights,
3) and the requirements of the GDPR into every step of the process.
Is the scope of your organization’s control over employees’ mobile devices consistent with the organization’s interest?
Organizations should think about how much interest they have an interest in knowing about their employees’ mobile devices.
The company’s legitimate interest in information can be the basis from which a BYOD policy emerges.
For example if the organization simply wants to allow an employee to access work email on a mobile device, then the policies and restrictions should proceed with that focus.
To what extent and for what purpose does the organization monitor employees’ use of mobile devices?
Many servers create logs showing when an employee’s device accessed the organization’s server using certain authentication credentials. As security measures such logs are often appropriate. To the extent that the organization wants to monitor more substantive actions by an employee on a mobile device, such monitoring should be in line with an appropriate purpose.
What procedures are in place to restrict the transfer of data from the organization’s network by way of the mobile device?
Organizations often protect against the risk that the organization’s data will be “floating” on multiple devices by
(a) limiting the types of data accessible to mobile devices (e.g., email) and
(b) restricting, to the extent possible, how that data can be used on the mobile device (e.g., policies on copying and requiring certain security settings).
For security purposes, does the organization require a minimum version of the operating system to be in place, and for that version to be fully patched, before an employee can use a mobile device?
Minimum versions ensure that certain security protections and bug fixes are present on the device.
Can data on a mobile device be remotely wiped? By whom?
A best practice for devices that contain confidential or sensitive organization information is to ensure that the data can be remotely deleted from the device by the organization if, for example, the device is stolen or the employee is terminated. This may be relatively easy for some organizations. For example, organizations that use sandboxed application that permit employees to access email on the company’s server – but do not store or cache data locally – can typically be deactivated relatively easily and in a manner that does not allow an unauthorized person who may possess the mobile device to gain any access to the company’s system. To the extent that an employee was permitted to locally store work-related data (e.g., cache work emails locally, or download attachments), an employer should consider whether it has the right, and the technical means, to remotely wipe the entire device.
What procedure is in place for an employee to report a missing mobile device?
Accidents happen to everyone, but their aftermath can determine whether they become catastrophes. Employees should report a missing device to someone – perhaps the IT department or help desk – so that the organization’s device removal policy can be followed.
What steps does the organization take to proliferate its mobile device policies?
Organizations often rely on their IT staff, self-help materials, and employee certifications to ensure (a) employee awareness of the organization policies and (b) enforcement of organization policies.
Do the security measures in place match the sensitivity of the data accessed through the mobile device?
For employees that receive non-sensitive information minimal restrictions may be appropriate. For employees that receive sensitive or confidential information higher restrictions may be appropriate.
Does your BYOD policy facilitate a wage and hour dispute?
Although BYOD programs are widely lauded for increased productivity and “off-the-clock” accessibility, this benefit can expose employers to potential wage-and-hour issues if the BYOD user is a nonexempt employee. If a nonexempt employee is permitted to use a mobile device for work related purposes after working hours, is there a policy that mandates that the employee must report the time that he or she worked? Is there an effective and efficient means for the employee to report such time?