Data Minimization Framework

Slides:



Advertisements
Similar presentations
What is GARP®? GARP® is an Acronym for Generally Accepted Recordkeeping Principles ARMA understands that records must be.
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
Clean-up Days!.
WHY CHOOSE CEO-PE?  We employ International Association of Privacy Professionals (IAPP) Certified and Health Insurance Portability & Accountability Act.
Developing a Records & Information Retention & Disposition Program:
1 E-Discovery Changes to Federal Rules of Civil Procedure Concerning Discovery of Electronically Stored Information (ESI) Effective Date: 12/01/2006 October,
Managing Records in SharePoint Step 1: Develop Retention Rules that Work.
SAFA- IFAC Regional SMP Forum
Control environment and control activities. Day II Session III and IV.
Why Information Governance….instead of Records & Information Management? Angela Fares, RHIA, CRM, CISA, CGEIT, CRISC, CISM or
Information Assurance and Information Sharing IMKS Public Sector Forum 7 February 2011 Clare Cowling, Senior Information Governance Adviser Transport for.
LAW SEMINARS INTERNATIONAL New Developments in Internet Marketing & Selling November 13 & 14, 2006 San Francisco, California Moderator : Maureen A. Young.
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
Presenting The Broker-Dealer Certification Tool The Compliance Department Inc. Broker Dealer Compliance Consultants Compliance SCORE Powered by Keane BRMS.
Electronic Records Management: What Management Needs to Know May 2009.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
STORAGE MANAGEMENT/ EXECUTIVE: Managing a Compliant Infrastructure Processes and Procedures Mike Casey Principal Analyst Contoural Inc.
Compliance Management Platform ™. Compliance Management Platform Compliance is the New Marketing – Position yourself to thrive in the new regulatory and.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Records & Information Management (RIM) Risk: Is Your Company Exposed? March 19, 2013.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Beyond the Fortress Fortify Your Content Before it Travels Beyond the Firm Walls.
Tad and Terry Legal Issues in ILP. 28 CFR Part 23 The federal rule that governs or provides guidance for these issues. § 23.3 Applicability: These policy.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
1 Records Management Organization The Committee provides guidance on operating the company’s records management program.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
1Copyright Jordan Lawrence. All rights reserved. U. S. Privacy and Security Laws DELVACCA INAUGURAL INHOUSE COUNSEL CONFERENCE April 1, 2009 Marty.
Cyber Risk Management Solutions Fall 2015 Thomas Compliance Associates, Inc
Current risk and compliance priorities for law firms PETER SCOTT CONSULTING.
CBIZ RISK & ADVISORY SERVICES BUSINESS CONTINUITY PLANNING Developing a Readiness Strategy that Mitigates Risk and is Actionable and Easy to Implement.
Security – 2015’s Biggest Threat to Client Confidentiality A Panel Discussion Joseph Abrenio, VP of Cyber Advisory Services & General Counsel Delta Risk.
HOW TO AVOID COMMON DATA BREACH PITFALLS IAPP Privacy Academy 2014.
Improving Compliance with ISAs Presenters: Al Johnson & Pat Hayle.
Presentation on Mechanisms for Reducing Corruption through Private Sector Monitoring and Enforcement by Essa Faal / Thomas F. McInerney General Counsel.
Law Firm Data Security: What In-house Counsel Need to Know
Accountability & Structured Privacy Management
Leveraging the Data Map – A Case Study November 15, 2016
CPA Gilberto Rivera, VP Compliance and Operational Risk
COMPLIANCE Challenges and opportunities for the legal profession
Microsoft 365 Get help with regulatory compliance
Proactive Information Management and eDiscovery
Service Organization Control (SOC)
LATIHAN MID SEMINAR AUDIT hiday.
Chapter 3: IRS and FTC Data Security Rules
ECM for Legal & Law.
General Counsel and Chief Privacy Officer
#IASACFO.
The State of Cybersecurity and
G.D.P.R General Data Protection Regulations
RECORDS AND INFORMATION
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Lockheed Martin Canada’s SMB Mentoring Program
Cybersecurity compliance for attorneys
Holistic Approach to Information Security
Ethics as Culture key elements
Chapter 8 Developing an Effective Ethics Program
Cybersecurity ATD technical
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Protecting Business Assets While Enabling Performance
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Managing Privacy Risk in Your Commercial Practices
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Ethics as Culture key elements
Anatomy of a Common Cyber Attack
The state of digital supplier risk management: In partners we trust
Presentation transcript:

Data Minimization Framework 1. Create and Maintain an Accurate Data Inventory. Information governance starts with knowing your data. An accurate, up-to-date datamap identifies what information you have, where it exists, media types, applications, third-party access, reference value and sensitive elements. 2. Use Industry-Specific Retention Standards. Generic record naming and retention standards are of little value. Adopt standards that are specific to your industry and incorporate valid business needs unique to your organization. 3. Tag Records to Relevant Sensitive Elements. The sensitivity of data is a critical factor in determining retention decisions. It’s not only a good idea, it’s often the law. 4. Address Obsolete and Redundant Information. Information that is retained longer than valid regulatory requirements or business needs should be systematically disposed of through an appropriate and defensible process. 5. Target Sensitive Data Immediately at Risk. Review the data inventory for unauthorized movement, access, storage, retention and disclosure of sensitive employee, customer and corporate data. Get rid of all records as soon as they are eligible! 6. Prioritize Email. 90% of discovery and review costs go toward email. Email is a prime target for cyber criminals. Prioritize appropriate email deletion in your data minimization strategy. 8 .

Human Risk Framework 1. Conduct an Enterprise-Wide Risk Assessment Annually. You can’t address risks you don’t know exist. Evaluate existing safeguards and practices of key subject matter experts, department mangers as well as employees. 2. Establish Clear Guidelines. Review and update existing policies and establish clear guidelines that are easy for employees to understand and comply with. 3. Evaluate Policy Awareness Levels and Training. Policies are only effective if employees are aware of and comply with them, and the company can demonstrate they are consistently enforced. 4. Communicate Policy Expectations Consistently. Establish a set frequency for communicating policies and guidelines to increase awareness and improve policy effectiveness and defensibility. 5. Track Compliance Verification. Require employees to certify their awareness and compliance with policies and guidelines. This establishes an audit trail and evidence of diligence. 6. Address Risky Employee Practices. Identify employee behaviors that put sensitive information at risk and are out of compliance with policies. 7 .

Information Governance Framework 1. Create and Maintain an Accurate Data Inventory. Information governance starts with knowing your data. An accurate, up-to-date datamap identifies what information you have, where it exists, media types, applications, third-party access, reference value and sensitive elements. 2. Tag Records to Relevant Sensitive Elements. Appropriate security needs are determined by the sensitive content each record type contains and is a critical factor in determining retention and disposal decisions. 3. Use Industry-Specific Retention Standards. Generic record naming and retention standards are of little value. Adopt standards that are specific to your industry and incorporate valid business needs unique to your organization. 4. Address Obsolete and Redundant Information. Information that has been retained longer than valid regulatory or business needs should be systematically disposed of through an appropriate and defensible process. 5. Communicate Policies and Security Guidelines Consistently. People forget. When they forget, they don’t comply. Routinely communicate program expectations and diligently track compliance verification. 6. Demand Strict Compliance with Retention Rules and Policy. Retention rules aren’t minimum standards – they are absolute standards. Program adherence – including disposal consistency – provides a strong defense. 7. Keep Your Program Up-To-Date. Review and update your program annually and send out appropriate communications to improve employee awareness and compliance. 6 .

Vendor Diligence Framework 1. Assess Every Vendor - Not Just Your Largest. Every third party, including law firms and small companies, with access to your systems or data poses a threat. Their data breach is your data breach. 2. Use Relevant Standards. Evaluate your vendors’ current security practices against recognized standards. 3. Segment Vendors By Risk. Identify high-risk and (presumed) low-risk vendors to balance effective evaluation with process efficiency. 4. Eliminate Manual Processes. Manual diligence processes are resource-intensive and error-prone. The right technology eliminates bandwidth restrictions and provides consistent, documented evidence of your controls. 5. Consider Both the Letter and Spirit of Regulations. Vendor diligence standards must be comprehensive and consider existing technical controls as well as compliance with applicable regulations. 6. Make It Easy for Vendors to Respond. The right technology, process and question sets enable accurate, timely responses from your vendors. You’ll identify issues faster so you can stop problems before they happen. 7. Assess Law Firms Against the ACC Model Controls. Law firms have some of your most sensitive information. The ACC Model Controls provide a recognized starting point for evaluating your law firms’ cybersecurity practices. 8. Conduct Annual Assessments. The cyber threat landscape is continually changing and relationships with vendors evolve. Every vendor should complete a vendor risk profile at least annually. 6 .

PROFESSIONAL SERVICES. PERFECTLY DELIVERED. About Jordan Lawrence For over a decade, Jordan Lawrence has served as an ACC Alliance Partner providing services that enable members around the world to effectively and defensibly meet legal obligations, mitigate risks and reduce the costs of information compliance and control. Senior executives and corporate counsel depend on our specialty risk-assessment services to address critical areas of risk and to stay in compliance with international and domestic regulations. Third-Party Diligence for Cybersecurity Risks Data Minimization for Email, ESI and Paper Records Data Inventory Development for Information Privacy and Litigation Readiness Records Retention Standards and Defensible Deployment Human Factors of Cybersecurity Risks Our innovative service delivery model provides predictability, accuracy and speed for every client. Our industry benchmarking and world-class best practices are relied upon and proven defensible in the most vital areas of corporate risk. PROFESSIONAL SERVICES. PERFECTLY DELIVERED.

www.jordanlawrence.com/acc (636) 821-2222 services@jordanlawrence.com