I-D: Information Management & Privacy Program Development Flashcards
(91 cards)
Data Assessment
A process that identifies privacy risks by creating a data inventory, conducting a data flow analysis, and classifying categories of data.
Data Inventory
Identifies what personal data an organization processes and how it is processed, including who it is shared with and its location.
a.k.a. “record of authority”
Data Location
- The folder structure where the data is located
- The physical servers holding the data are located (a.k.a. Data Residency)
Data Access
Who has access to data and how and when data is shared
Data Flow Map
A map of how information flows through an organization across the entire life cycle of that data
Data Classification Schema
A classification system that provides the basis for managing access to and protection of data assets.
Allows restriction of access based on sensitivity.
Data Life Cycle
Data Creation
Data Storage
Data Sharing & Usage
Data Archival
Data Deletion
Data Classification: Typical Levels of Sensitivity
- Confidential
2 Proprietary - Sensitive
- Restricted
- Public
Examples of Legally Mandated Data Inventories
- E.U.’s GDPR
- U.S.’s GBLA Safeguard Rule for financial institutions
A Data Assessment Requires:
Asking and answering numerous questions geared toward compliance with applicable laws and policies
Data Mapping Should Answer:
- What data does the organization process?
- Where does the organization process data?
- Why does the organization process data?
Data Flow Mapping:
Top Down Approach
Employed for regulatory purposes (e.g., GDPR)
Looks at the legal requirements for processing data and tailors questions to ask based on those requirements
Data Flow Mapping:
Bottom-Up Approach
Used by privacy professionals
Starts with data assets and follows that data through its lineage, asking pertinent questions as they arise (e.g., is this stored on local servers or cloud-based servers?)
Privacy Program
The process organizations use to meet their legal compliance obligations, market expectations, and data security goals for handling personal information.
Data Protection Officer (DPO)
The most common title for employees in the privacy function.
Note: GDPR requires most organizations to appoint a DPO
GLBA Safeguards Rule
Requires financial institutions to appoint a designated person to assess, monitor, and improve the GLBA-mandated information security program.
Privacy Leader
The most senior employee responsible for privacy within an organization who has oversight of its privacy program.
E.g., Chief Privacy Officer, DPO, Director of Privacy, etc.
Privacy First Responders
Employees who are responsible for managing the organization’s response to privacy incidents.
Privacy Champion
Someone at the executive level acting as an advocate and sponsor to further privacy as a core organizational concept
(e.g., Chief Operating Officer or Chief Information Officer)
Privacy Programs Balance 4 Types of Risk:
Legal Risk
Reputational Risk
Operational Risk
Investment Risk
Privacy Framework
Guides the privacy professional through privacy management and decision making
Two Components of a Privacy Framework
- The creation of policies and standards
- The establishment of privacy program activities
Privacy Policy
An internal document that dictates how an organization governs its privacy function and handles personal information.
Privacy Policy Components
Purpose of the policy
Scope of the policy
Designation of responsibilities
Actual policies (i.e., compliance obligations)
Consequences to the organization for failing to comply