Annual Army FOIA/Privacy/Records Management Conference Privacy Leadership – Accountability - Action presented by Samuel P. Jenkins, Director Defense Privacy.

Slides:



Advertisements
Similar presentations
Organizational Governance
Advertisements

Auditing, Assurance and Governance in Local Government
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
IT Security Law for Federal Agencies As of: 30 December 2002.
Confidentiality and HIPAA
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
More CMM Part Two : Details.
The Data Protection (Jersey) Law 2005.
29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL DATA PROTECTION AND PRIVACY COMMISSIONERS.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Identity Management In A Federated Environment Identity Protection and Management Conference Presented by Samuel P. Jenkins, Director Defense Privacy and.
The Office of Information Technology Information Security Administrator Kenneth Pierce, Vice Provost for IT and Chief Information Officer.
Developing Privacy and Security Standards Allen Briskin Allen Briskin
Environmental Management Systems An Overview With Practical Applications.
Introduction to the APPs and the OAIC’s regulatory approach Presented by: Este Darin-Cooper Director, Regulation and Strategy May 2015.
Information Systems Security Officer
Quality evaluation and improvement for Internal Audit
Purpose of the Standards
Corporate Ethics Compliance *
DEFENSE PRIVACY & CIVIL LIBERTIES OFFICE Safeguarding Personally Identifiable Information (PII) Samuel P. Jenkins Director for Privacy Defense Privacy.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Complying With The Federal Information Security Act (FISMA)
Internal Auditing and Outsourcing
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
DEFENSE PRIVACY & CIVIL LIBERTIES OFFICE Privacy Foundations Samuel P. Jenkins Director for Privacy Defense Privacy and Civil Liberties Office Identity.
CUI Statistical: Collaborative Efforts of Federal Statistical Agencies Eve Powell-Griner National Center for Health Statistics.
Electronic Records Management: What Management Needs to Know May 2009.
Company Confidential How to implement privacy and security requirements in practice? Tobias Bräutigam, OTT Senior Legal Counsel, Nokia 8 October
HIPAA PRIVACY AND SECURITY AWARENESS.
FISMA Privacy Reporting Requirements United States Pacific Command (USPACOM) FOIA & Privacy Act Conference Presented by Samuel P. Jenkins, Director for.
Implications of the Markets in Financial Instruments Directive (“MIFID”) Richard Thompson.
Association for Biblical Higher Education February 13, 2013 Lori Jo Stanfield Evaluator Team Training for Business Officers.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Agency Risk Management & Internal Control Standards (ARMICS)
Why the Office of Compliance and Ethics was Created
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
Crosswalk of Public Health Accreditation and the Public Health Code of Ethics Highlighted items relate to the Water Supply case studied discussed in the.
Stakeholder consultations Kyiv May 13, Why stakeholder consultations? To help improve project design and implementation To inform people about changes.
1 Information Sharing Environment (ISE) Privacy Guidelines Jane Horvath Chief Privacy and Civil Liberties Officer.
Department of Energy June 16, 2015 Executive Order (EO) 13673: Fair Pay and Safe Workplaces Jean Seibert Stucky Assistant General Counsel for Labor and.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
Environmental Management System Definitions
PricewaterhouseCoopers 1 Administrative Simplification: Privacy Audioconference April 14, 2003 William R. Braithwaite, MD, PhD “Doctor HIPAA” HIPAA Today.
The right item, right place, right time. DLA Privacy Act Code of Fair Information Principles.
Roadmap For An Effective Compliance And Ethics Program The Top Ten Things the Board Must Know [Name of Presenter] [Title] [Date]
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
Malcolm Crompton APEC Information Privacy Framework: review, impact, & progress APEC Symposium on Information Privacy Protection in E Government & E Commerce.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
U.S. Department of Education Safeguarding Student Privacy Melanie Muenzer U.S. Department of Education Chief of Staff Office of Planning, Evaluation, and.
FORUM GUIDE TO SUPPORTING DATA ACCESS FOR RESEARCHERS A STATE EDUCATION AGENCY PERSPECTIVE Kathy Gosa, Kansas State Department of Education.
1 PARCC Data Privacy & Security Policy December 2013.
Approved for Public Release. Distribution Unlimited. 1 Government Privacy Rick Newbold, JD, MBA, CIPP/G Futures Branch 28.
Effectively Integrating Information Technology (IT) Security into the Acquisition Process A course for the Department of Commerce contracting and contracting.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Privacy Act United States Army (Managerial Training)
Organizing a Privacy Program: Administrative Infrastructure and Reporting Relationships Presented by: Samuel P. Jenkins, Director Defense Privacy Office.
APEC Privacy Framework “The lack of consumer trust and confidence in the privacy and security of online transactions and information networks is one element.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Organization and Implementation of a National Regulatory Program for the Control of Radiation Sources Program Performance Criteria.
Internal and Governmental Financial Auditing and Operational Auditing
Introduction to the Federal Defense Acquisition Regulation
Bob Siegel President Privacy Ref, Inc.
FOIA, Privacy & Records Management Conference 2009
Move this to online module slides 11-56
Samuel P. Jenkins, Director Defense Privacy Office
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
IAPP TRUSTe SYMPOSIUM 9-11 JUNE 2004
Presentation transcript:

Annual Army FOIA/Privacy/Records Management Conference Privacy Leadership – Accountability - Action presented by Samuel P. Jenkins, Director Defense Privacy Office November 2009

Defense Privacy Office 2 Presentation Topics FAIR INFORMATION PRACTICE PRINCIPLES GAO REPORTS COMPLIANCE AND REPORTING A CALL TO LEADERSHIP

Defense Privacy Office 3 Fair Information Practice Principles

Defense Privacy Office 4 GAO report “Alternatives Exist for Enhancing Protection of Personally Identifiable Information” May 2008 provides a representation of Fair Information Practice Principles. The Fair Information Practice Principles PrincipleDescription Collection limitation The collection of personal information should be limited, should be obtained by lawful and fair means, and, where appropriate, with the knowledge or consent of the individual. Data quality Personal information should be relevant to the purpose for which it is collected, and should be accurate, complete, and current as needed for that purpose. Purpose specification The purposes for the collection of personal information should be disclosed before collection and upon any change to that purpose, and its use should be limited to those purposes and compatible purposes. Use limitation Personal information should not be disclosed or otherwise used for other than a specified purpose without consent of the individual or legal authority. Fair Information Practice Principles

Defense Privacy Office 5 Fair Information Practice Principles GAO report “Alternatives Exist for Enhancing Protection of Personally Identifiable Information” May 2008 provides a representation of Fair Information Practice Principles. The Fair Information Practice Principles PrincipleDescription Security safeguards Personal information should be protected with reasonable security safeguards against risks such as loss or unauthorized access, destruction, use, modification, or disclosure. Openness The public should be informed about privacy policies and practices, and individuals should have ready means of learning about the use of personal information. Individual participation Individuals should have the following rights: to know about the collection of personal information, to access that information, to request correction, and to challenge the denial of those rights. Accountability Individuals controlling the collection or use of personal information should be accountable for taking steps to ensure the implementation of these principles.

Defense Privacy Office 6 Security Objectives CONFIDENTIALITY “Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information…” INTEGRITY “Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity…” A loss of integrity is the unauthorized modification or destruction of information. AVAILABILITY “Ensuring timely and reliable access to and use of information…” A loss of availability is the disruption of access to or use of information or an information system.

Defense Privacy Office 7 GAO Reports

Defense Privacy Office 8 GAO Reports GAO Privacy: Agencies Should Ensure That Designated Senior Officials Have Oversight of Key Functions May 2008

Defense Privacy Office 9 GAO Reports GAO “Privacy: Agencies Should Ensure That Designated Senior Officials Have Oversight of Key Functions,” May 2008 Purpose: 1. To describe laws and guidance that set requirements for senior agency official for privacy (SAOP) within federal agencies 2. To describe the organizational structures used by agencies to address privacy requirements and assess whether SAOPs have oversight over key functions. Methodology: GAO analyzed the laws, related guidance, policies and procedures relating to key privacy functions at 12 agencies Commerce Defense Health and Human Services Homeland Security Justice Labor State Treasury Transportation Veterans Affairs Social Security Administration U.S. Agency for International Development

Defense Privacy Office 10 GAO Reports GAO “Privacy: Agencies Should Ensure That Designated Senior Officials Have Oversight of Key Functions,” May 2008 Findings: There are six (6) broad categories of SAOP responsibilities as defined by federal laws and guidance Conducting PIAs Complying with the Privacy Act Reviewing and evaluating the privacy implications of agency policies, regulations and initiatives Producing reports on the status of privacy protections Ensuring that redress procedures are in place Ensuring that employees and contractors receive appropriate training Agencies have varying organizational structures to address privacy responsibilities. Evolving requirements in law and guidance have resulted in fragmented assignment of privacy functions across organizational units. Not all agencies have given their designated SAOP full oversight over all privacy related functions. This may lead to ineffective SAOPs.

Defense Privacy Office 11 GAO Reports GAO “Privacy: Agencies Should Ensure That Designated Senior Officials Have Oversight of Key Functions,” May 2008 Recommendation: In order to ensure SAOPs function effectively as central focal points for privacy management, the Attorney General and the Secretaries of Commerce, Defense, Health and Human Services, Labor and Treasury should take steps to ensure that their SAOPs have oversight over all key privacy functions. Note: DoD provided written comments that did not state whether it agreed or disagreed with the GAO recommendation, however, the agency stated that its privacy management structures were adequate.

Defense Privacy Office 12 GAO Reports GAO Privacy: Alternatives Exist for Enhancing Protection of Personally Identifiable Information May 2008

Defense Privacy Office 13 GAO Reports GAO “Alternatives Exist for Enhancing Protection of Personally Identifiable Information,” May 2008 Methodology: GAO analyzed privacy laws and guidance (Privacy Act, E-Gov Act, Paperwork Reduction Act and OMB guidance), compared them with the Fair Information Practices, and obtained perspectives from federal agencies and an expert forum. They may not consistently protect personally identifiable information (PII) in all circumstances of its collection and use throughout the federal government and may not fully adhere to key privacy principles. Based on discussions with privacy experts, agency officials, and analysis of laws and related guidance, the GAO identified three major areas.

Defense Privacy Office 14 The “803” Report GAO Reports GAO “Alternatives Exist for Enhancing Protection of Personally Identifiable Information,” May Applying privacy protections consistently to all federal collection and use of personal information. The Privacy Act’s definition of a “system of records” (any grouping of records containing personal information retrieved by individual identifier), which sets the scope of the Act’s protections, does not always apply whenever personal information is obtained and processed by federal agencies. If agencies do not retrieve personal information by identifier, the Act’s protections do not apply.

Defense Privacy Office 15 GAO Reports GAO “Alternatives Exist for Enhancing Protection of Personally Identifiable Information,” May Ensuring that collection and use of personally identifiable information is limited to a stated purpose. According to the purpose specification, collection limitation, and use limitation principles, the collection of personal information should be limited, and its use should be limited to a specified purpose. Current laws and guidance impose only modest requirements for describing the purposes for collecting and using personal information and limiting how that information is collected and used. Agencies are not required to be specific in formulating purpose descriptions in their public notices.

Defense Privacy Office 16 GAO Reports GAO “Alternatives Exist for Enhancing Protection of Personally Identifiable Information,” May Establishing effective mechanisms for informing the public about privacy protections. According to the openness principle, the public should be informed about privacy polices and practices, and the accountability principle calls for those who control the collection or use of personal information to be held accountable for taking steps to ensure privacy protection. Public notices are a primary means of establishing accountability for privacy protections and giving individuals a measure of control over the use of their personal information. Yet concerns have been raised that Privacy Act notices may not serve this function well.

Defense Privacy Office 17 GAO Reports GAO “Alternatives Exist for Enhancing Protection of Personally Identifiable Information,” May 2008 Recommendations: Some of these issues—particularly those dealing with limitations on collection and use as well as mechanisms for informing the public—could be addressed by OMB through revisions or supplements to guidance. Unilateral actions by OMB would not have the benefit of public deliberations regarding how best to achieve an appropriate balance between the government’s need to collect, process and share PII and; The rights of individuals to know about such collections and be assured that they are only for limited purposes and uses.

Defense Privacy Office 18 GAO Reports GAO “Alternatives Exist for Enhancing Protection of Personally Identifiable Information,” May 2008 Recommendations (cont): A better approach is to amend applicable laws, such as the Privacy Act and the E-Government Act: Revise scope of the laws to cover all PII collected, used, and maintained by the federal government Set requirements to ensure that the collection and use of PII is limited to a stated purpose Establish additional mechanisms for informing the public about privacy protections by revising requirements for the structure and publication of public notices

Defense Privacy Office 19 Compliance and Reporting

Defense Privacy Office 20 Compliance and Reporting Key Memoranda for Privacy DateReportTitleContent 5/22/2006M-06-15Safeguarding Personally Identifiable Information Requires the Senior Official for Privacy at each agency to conduct a review of agency policies and processes, and take corrective action as appropriate, to ensure adequate safeguards to prevent the intentional or negligent misuse of, or unauthorized access to, personally identifiable information. 6/23/2006M-06-16Protection of Sensitive Agency Information CIO/NII responsibility. 7/12/2006M-06-19Reporting Incidents Involving Personally Identifiable Information and Incorporating the Cost for Security in Agency Information Technology Investments Privacy responsibility required policy on reporting PII incidences to the United States-Computer Emergency response Team (US-CERT) within 1 hour of discovery of the incident. Requirement incorporated in DoD R, DoD Privacy Program.

Defense Privacy Office 21 Key Memoranda for Privacy (continued) DateReportTitleContent 5/22/2007M-07-16Safeguarding Against and Responding to the Breach of Personally Identifiable Information Requires agencies to develop a policy for handling breaches of personally identifiable information as well as policies concerning the responsibilities of individuals authorized to access such information. Compliance and Reporting

Defense Privacy Office 22 A CALL TO LEADERSHIP: What Does All This Mean To A Privacy Leader?

Defense Privacy Office 23 A CALL TO LEADERSHIP Risks are constantly evolving. It’s our collective responsibility to stay informed. Help stakeholders understand assessments of potential impact and likelihood of harm when collecting information and managing breaches.

Defense Privacy Office 24 NIST recommends and encourages close coordination with STAKEHOLDERS to include:  Privacy Officers  Chief Information Officers  Contractors  Executive Leadership  Front Line Staff  Information Security Officers  General Counsel  Service members  Recipients of your services  Other government agencies NIST SP , DRAFT Guide to Protecting the Confidentiality of PII (1/2009) A CALL TO LEADERSHIP

Defense Privacy Office 25 A CALL TO LEADERSHIP Assemble a useful PII inventory. Consider a risk-based approach (e.g., Privacy Threshold Analysis). Know which specific collections, which permissible uses apply and what dissemination/disclosure is allowed of your PII.

Defense Privacy Office 26 A CALL TO LEADERSHIP Promote tools and preventive practices that bring greater focus on the “insider threat”. User account housekeeping Rules of behavior Warning banners Training and Awareness FAR clauses MOUs/MOAs Access agreements Web content monitoring tools

Defense Privacy Office 27 Privacy – Security Interface Focused on meeting the information requirements of the DoD while ensuring the protection of the rights of the individual in the collection, use and dissemination of PII. Privacy’s success is dependent on establishment of a basic foundation for information security. Focused on protecting the information and information systems supporting the operations and assets of an organization. PRIVACY SECURITY A CALL TO LEADERSHIP NIST SP , DRAFT Guide to Protecting the Confidentiality of PII (1/2009 )

Defense Privacy Office 28 Close coordination among privacy officers, chief information officers, information security officers, and legal counsel are essential when addressing PII issues. Protecting the confidentiality of PII requires knowledge of information systems, information security, privacy, and legal requirements. Decisions regarding the applicability of a particular law, regulation, or other mandate should be made in consultation with an organization’s legal counsel and privacy officer because relevant laws, regulations, and other mandates are often complex and change over time. Additionally, new policies often require the implementation of technical security controls to enforce the policies. Close coordination of the relevant experts helps to prevent PII breaches by ensuring proper interpretation and implementation of requirements. A CALL TO LEADERSHIP NIST SP , DRAFT Guide to Protecting the Confidentiality of PII (1/2009 )

Defense Privacy Office 29 Some privacy objectives are only partially supported by the security objectives or are fully independent of the security objectives. Notice Limitation Accuracy Choice Access, Redress & Correction Confidentiality Integrity Availability Privacy Objectives Security Objectives A CALL TO LEADERSHIP NIST SP , DRAFT Guide to Protecting the Confidentiality of PII (1/2009 )

Defense Privacy Office 30 Putting It Into Action  Chart the flow of PII both inside and leaving your organization.  Identify points of exit.  Inventory and categorize PII identified in your flowchart.  Share your flowchart with the CIO and other stakeholders.  Update the flowchart annually.  Crosswalk information technology, privacy and information assurance policies.  Create a decision flowchart to assess the risk level of PII.  Build privacy in during the early stages of the system development life cycle.  Train, train, train …  Stay on top of the latest technology trends. A CALL TO LEADERSHIP NIST SP , DRAFT Guide to Protecting the Confidentiality of PII (1/2009 )

Defense Privacy Office 31 A CALL TO LEADERSHIP Privacy Act of 1974 Privacy Impact Assessments Compliance Reporting Breach Management and the list goes on … Our Job Is Never Done!

Defense Privacy Office 32 Questions/Comments?