CIPM BOK Outline Flashcards
(39 cards)
Privacy Program Governance - 4 main subcategories
- Organizational Level
- Develop the Privacy Program Framework
- Implement the Privacy Program Framework
- Metrics
Governance: Organizational Level - 4 main subcategories
- Create a company vision
- Establish Data Governance Model
- Establish a privacy program
- Structure the Privacy Team
Create a company vision
Gov., Org level
- Acquire knowledge on privacy approaches
- Evaluate the intended objective
- Gain executive sponsor approval for this vision
Establish Data Governance Model
Gov., Org level
- Centralized
- Distributed
- Hybrid
Establish a Privacy Program
Gov., Org Level
- Define program scope and charter
- Identify the source, types, and uses of personal information within the organization and the applicable laws
- Develop a Privacy Strategy
Privacy Strategy
Gov., Org level, privacy program
- Business alignment– finalize the operational business case for privacy, identify stakeholders, leverage key functions, create a process for interfacing within organization, align organizational culture and privacy/data protection objectives, and obtain funding/budget for privacy and the privacy team
- Develop a data governance strategy for personal information (collection, authorized use, access, and destruction)
- Plan inquiry/complaint handling procedures (customers, regulators, etc)
Structure the Privacy team
Gov., Org level
- Establish the organizational model, responsibilities, and reporting structure appropriate to the size of the organization
- Designate a point of contact for privacy issues
- Establish/endorse the measurement of professional competency
Large Organization Structure
- Chief Privacy Officer
- Privacy Manager
- Privacy Analysts
- Business line privacy leaders
- “First Responders”
Small Organization Structure
Sole Data Protection Officer (DPO)
Privacy Program Development
Gov
- Develop organizational privacy policies, standards, and/or guidelines
- Define privacy program activities
Privacy Program Activities
Gov, Program Framework
- Education and Awareness
- Monitoring and responding to the regulatory environment
- Internal policy compliance
- Data inventories, data flows, and classification
- Risk assessments (PIAs, PTAs, etc)
- Incident Response and process, including jurisdictional regulations
- Remediation
- Program assurance, including audits
Privacy Program Implementation
Gov
- Communicate the framework to internal and external stakeholders
- Ensure continuous alignment to applicable laws and regulations to support the development of an organizational privacy program framework
Ensuring continuous alignment of program
Gov, Program Implementation
- Understand when national laws and regulations apply (e.g., GDPR, CCPA)
- Understand when local laws and regulations apply
- Understand penalties for noncompliance with laws and regulations
- Understand the scope and authority of oversight agencies (e.g., Data Protection Authorities, Privacy Commissioner, FTC, etc.)
- Understand privacy implications of doing business with or basing operations in countries with inadequate, or without, privacy laws
- Maintain the ability to manage a global privacy function
- Maintain the ability to track multiple jurisdictions for changes in privacy law
- Understand international data sharing arrangement agreements
Metrics
Gov
- Identify intended audience for metrics
- Define reporting resources
- Define privacy metrics for oversight and governance per audience
- Identify systems/application collection points
Defining Privacy Metrics
Gov., Metrics
- Compliance metrics (i.e., collection, responses to data subject inquiries, use, retention, disclosure to third parties, incidents- breaches, complaints, inquiries- employees trained, PIA metrics, privacy risk indicators, percent of company functions represented by governance mechanisms)
- Trending
- Privacy program return on investment
- Business resiliency metrics
- Privacy program maturity levels
- Resource utilization
Privacy Operational Life Cycle
- Assess your organization
- Protect
- Sustain
- Respond
Assess
life cycle
- Document current baseline of your privacy program
- Processors and third-party vendor assessment
- Physical assessments
- Mergers, acquisitions, and divestitures
- Conduct analysis and assessments, as needed or appropriate
Current baseline documentation
Life cycle, Assess
- Education and Awareness
- Monitoring and responding to the regulatory environment
- Internal policy compliance
- Data, systems, and process assessment (map data inventories, flows, and classifications, create “Record of Authority” of systems processing personal information within the organization, map and document data flow in systems and applications, and analyze and classify types and uses of data)
- Risk assessments (PIAs, PTAs, etc)
- Incident Response
- Remediation
- Determine desired state and perform gap analysis against an accepted standard or law
- Program assurance, including audits
Processors and third-party vendor assessment
Life Cycle, Assess
- Evaluate processors and third-party vendors, insourcing and outsourcing privacy risks, including rules of international data transfer (Privacy and info security policies, access controls, where PI is being held, and who has access to PI)
- Understand and leverage the different types of relationships (internal audit, info security, physical security, data protection authority)
- Risk assessment (type of data being outsourced, location of data, implications of cloud computing strategies, legal compliance, records of retention, contractual requirements like incident response, and establish minimum standards for safeguarding information
- Contractual requirements
- Ongoing monitoring and auditing
Physical Assessments
Life Cycle, Assess
Identify operational risk in:
- Data centers and offices
- Physical access controls
- Document destruction
- Media sanitization and disposal (e.g., hard drives, USB/thumb drives)
- Device forensics
- Device security (e.g., mobile devices, IoT, geo-tracking, imaging/copier hard drive security controls
Mergers, Acquisitions, and Divestitures
Life Cycle, Assess
- Due diligence
2. Risk assessment
Conduct analysis and assessments, as needed or appropriate
Life Cycle, Assess
- PTAs on systems, applications, and processes
- PIAs - define the process for conducting, understand the life cycle of a PIA and incorporate PIAs into system, process, product life cycles
Protect
Life Cycle
- Data Life Cycle and governance (creation to deletion)
- Info security practices (Access controls for physical and virtual systems, technical security controls, implement appropriate administrative safeguards
- Privacy by Design (integrate PbD throughout the system development life cycle & establish privacy gates as part of the system development framework)
Sustain
Life Cycle
- Measure
- Align
- Audit
- Communicate
- Monitor