Enterprise Risk: Privacy and Identity Theft Ken DeJarnette, CIPP Principal – Security & Privacy Services, Deloitte & Touche LLP The Privacy Symposium Harvard,

Slides:



Advertisements
Similar presentations
29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY.
Advertisements

The Corporate Laws Amendment Bill, B6/2006. © 2006 Deloitte Touche Tohmatsu Corporate Laws Amendment Bill, B6/2006 – 29 May 2006 Introduction Presenting.
© 2010 Deloitte Touche Tohmatsu Sustainable Business Australia Counting the beans - retro-fitted commercial buildings Chris Leach Partner, National Leader.
Mind the Gap: Evaluating Internal Controls in Pharmaceutical Supply Chains across Sub-Saharan Africa AIDS 2012: July Julianna Kohler, Revathi Avasarala,
The Unique Alternative to the Big Four ® Gas Safety and Reliability Branch Management and Operations Review Report and Recommendations.
Copyright Security-Assessment.com 2006 Protecting The Data Data security, compliance, disclosure requirements and what can happen if you get it wrong Presented.
Tax Risk Management Keeping Up with the Ever-Changing World of Corporate Tax March 27, 2007 Tax Services Bryan Slone March 27, 2007.
University of Connecticut April 17, Copyright © 2006 Deloitte Development LLC. All rights reserved. Items to discuss… Introduction Deloitte Overview.
Data Incident Notification Policies and Procedures Tracy Mitrano Steve Schuster.
Pricing for value Tom Friedman, Principal Deloitte Consulting LLP Global Consulting Leaders Symposium December 5–7, 2007.
Office of the Secretary of Defense – Comptroller Financial Improvement and Audit Readiness Directorate Unclassified 17 September 2014 GAO Revised “Green.
WHY CHOOSE CEO-PE?  We employ International Association of Privacy Professionals (IAPP) Certified and Health Insurance Portability & Accountability Act.
PwC Role of Internal Audit in Corporate Governance September 2010 Tumin Gültekin, Partner.
1 Copyright © 2006 Deloitte Development LLC. All rights reserved. The Case ABC Molecular Imaging is seeking an Investment Bank to advise them on the sale.
Financial structure, management, and IFRS Reporting Creating value for growth Presenter: John Robinson Partner.
Information Systems Controls for System Reliability -Information Security-
Patch Management Strategy
Trade Across the Americas: Bolstering Security and Efficiency Supply Chain Risk Analytics May 2015.
Internal Auditing and Outsourcing
1Copyright Jordan Lawrence. All rights reserved. Annual In-House Symposium Practical Steps to Minimize Privacy Risks: Understanding The Intersection.
2nd Global ABC Conference and Exhibition October 2013
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Risk Management Reconstructed Implementing fraud risk intelligence practices July 2011 KPMG FORENSIC SM.
Global Risk Management Survey: Fifth Edition Key Findings
© 2013 Cengage Learning. All Rights Reserved. 1 Part Four: Implementing Business Ethics in a Global Economy Chapter 9: Managing and Controlling Ethics.
Implementing and Auditing Ethics Programs
A high-level and hands-on approach for organizations to deal with counterfeiting and piracy. Jan Corstens WIPO Moscow
Copyright © 2007 Deloitte Development LLC. All rights reserved. BSA/AML Update Peter Fitzgerald Principal Deloitte & Touche LLP.
Domestic Production Activities Deduction – Section 199 March 26, 2007 Pamela C. Beckey.
DoC NTIA Digital-to-Analog Converter Box Coupon Program NPRM Nicholas Van Dongen, Senior Manager Allen Hockenbury, Senior Manager November 14, 2006.
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
Outsourcing Business Processes ( without In-sourcing the Associated Risks) Gregg Anderson – Crowe Horwath (risk manager) Doug Tripp – Crowe Dunlevy (outsourced.
© Copyright 2011, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers. ® CISO Executive Network Executive Breakfast.
Mike Wyatt, Director State Public Sector Cyber Risk Services
KNR- Studiedag 25 september 2013 Btw-checklist. © 2013 Deloitte The Netherlands KNR Studiedag Btw-checklist 1.
IT Control Weaknesses, IT Governance and Firm Performance Discussant Comments Gary Baker, Partner, Deloitte & Touche LLP Saturday, October 13, 2007.
October 10-13, 2006 San Diego Convention Center, San Diego California Regulation for VoIP Providers What’s the impact on your business.
Georgia Gateway– Integrated Eligibility System (IES)
Deloitte Forensic Forensic Technology Conference of Regulatory Officers - CORO November 2012.
Risk Management & Corporate Governance 1. What is Risk?  Risk arises from uncertainty; but all uncertainties do not carry risk.  Possibility of an unfavorable.
ANTI-MONEY LAUNDERING COMPLIANCE PROGRAM FCM TRAINING
1 Copyright © 2006 Deloitte Development LLC. All rights reserved. The Case ABC Automotive Products has selected you to advise them on the sale of their.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. BUSINESS PLUG-IN B19 Global Information Systems.
PREPARED BY: NICHOLAS ANASINIS MARIA ISMAIL PATRICIA JURCA LEI YANG CORPORATE SUSTAINABILITY WORKOUT TEN YEAR SUSTAINABILITY PLAN APRIL 30, 2010.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
Privacy Advisory Services … … A Best Practices, Integrated Approach Insert Firm Name Here.
1 Copyright © International Security, Trust & Privacy Alliance -All Rights Reserved Making Privacy Operational International Security, Trust.
Dino Tsibouris & Mehmet Munur Privacy and Information Security Laws and Updates.
1 Privacy Lessons from Other Industries Chris Zoladz, CIPP, Vice President, Information Protection Marriott International, President, International Association.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
Current risk and compliance priorities for law firms PETER SCOTT CONSULTING.
MIS 374 Christine Lyman, Sr. Manager Jan 2015 Root Cause Analysis.
ICAJ/PAB - Improving Compliance with International Standards on Auditing Planning an audit of financial statements 19 July 2014.
© 2013 Deloitte Global Services Limited Growing Markets for Social Impact September 16 th, 2014 Global Public SectorThinking people.
1Third Party Assurance Optimization and Control RationalizationCopyright © 2016 Deloitte Development LLC. All rights reserved. Third-Party Assurance (TPA)
Cyber Security Phillip Davies Head of Content, Cyber and Investigations.
Data Minimization Framework
Capital Project / Infrastructure Renewal – Making the Business Case
Insert School Name and Class Name here Insert date here
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Presentation transcript:

Enterprise Risk: Privacy and Identity Theft Ken DeJarnette, CIPP Principal – Security & Privacy Services, Deloitte & Touche LLP The Privacy Symposium Harvard, MA August 21, 2007

2 Copyright © 2007 Deloitte Development LLC. All rights reserved. Reputation/Brand Operational Legal/Regulatory Financial Consequences Privacy and ID Theft: Part of a Broader Risk Program What risk are we trying to manage?

3 Copyright © 2007 Deloitte Development LLC. All rights reserved. The Nature of PII: Protecting an Evolving Asset Data is an asset with multiple attributes. The value associated with data is determined by its attributes, context within the enterprise and associated risk. The nature of data changes over time, as it is stored, used and shared. Attributes Enterprise Context Associated Risk Data Value Data Lifecycle Acquisition Storage Use Sharing Destruction Recursive

4 Copyright © 2007 Deloitte Development LLC. All rights reserved. The Privacy and Data Protection Environment Many Requirements Addressing Use, Protection, Accountability Requirement Commonalities International Regional Responses EU DPD, APEC Privacy Framework, Safe Harbor (EEA – U.S.) National US Gramm-Leach- Bliley Canada PIPEDA Australian Privacy Act State/Provincial California SB1 NY Security & Notification British Columbia Bill 73 Contracts Clients Partners Vendors Seal Programs Policies Privacy Policies Security Policies Industry and Professional Standards AICPA/CICA Cross-Border Data Flows Front-end Obligations Back-end Obligations What can the information be used for? What must the individual be told? What choices does the individual have? What can the individual request? How must the information be protected? What information must be provided to the individual? How long can PII be retained and how must it be destroyed? Who must be told if something goes wrong and what redress rights does the individual have? Can the PII be shared? How is the information kept accurate? Can the information be transferred across borders? Brand and Competitive Use and Control of PII Records and Data Retention Information Sharing Identity TheftMarketing -Targeted -Unwanted

5 Copyright © 2007 Deloitte Development LLC. All rights reserved. Understanding the Totality of Problem Technical definition: –A fraud committed or attempted using the identifying information of anther person... –“Identifying information” means a name or number that can be used alone or in conjunction with other information to identify a specific person including: Name, SSN, date of birth, drivers license, alien registration, passport, taxpayer id Unique biometric data Unique electronic identification number, address or routing code However, broader than technical definition: –Disclosure requirements are triggered when an individual or business knows or reasonably believes there has been a security breach impacting personal information (i.e., identifying information) (CA SB-1386) –A “security breach" typically means unauthorized acquisition/access of unencrypted personal information (CA SB-1386) Lost Identifying Information Stolen Identifying Information Identity Theft Practical Problem Potential Unauthorized Access Notifications Individuals Uncertainty Significant Time/Cost Less likely to buy Individuals Uncertainty Significant Time/Cost Less likely to buy Company Reputation Significant Time/Cost Impedes Initiatives Company Reputation Significant Time/Cost Impedes Initiatives Consequences

6 Copyright © 2007 Deloitte Development LLC. All rights reserved. Common Privacy Challenges Organizations face multiple challenges in meeting privacy demands: –Creating a privacy strategy that accounts for a complex, multi-regulatory, and changing environment –Driving policy into business practices and technology –Managing customer and employee concerns and perceptions across differing cultures and multiple industries –Reconciling inconsistent practices among affiliates and regions –Managing the data lifecycle (legacy, current, and future) –Knowing how PII is acquired, what they do with it, where it is, who it is shared with, and how to dispose of it –Adopting privacy values throughout the enterprise –Coordinating incident response and investigations Most common mistakes: –Rushing to policy –“Failing to do what you say you do” Policies Processes Technology DISCONNECT

7 Copyright © 2007 Deloitte Development LLC. All rights reserved. Bringing Analytical Rigor Understanding environment –Process centric Rationalizing requirements Developing risk criteria –Origin –Type –Use –Environment Prioritizing Use/scenarios Common controls

8 Copyright © 2007 Deloitte Development LLC. All rights reserved. Data Protection Program Methodology Map Multinational Regulatory Requirements Contractual Requirements Industry Standards Government Frameworks Common Requirements Decision Program Design Governance: Organization and Policies Operations: Procedures,Tools and Value Adoption Communications, Training& Awareness Change Management Rationalized Requirements Model of Larger Enterprise -High risk function -Breadth of function Data Life Cycle& Use Cases Business Process View Risk-based/ Sample based Sample Set of Processes Communications, Training& Awareness DESIGN&IMPLEMENT DISCOVEREVALUATE IMPLEMENT&MAINTAIN ANALYZE Metrics& Measurement Sample Data Protection Program Outliers Operationalize: Processes, Procedures, Common Controls and Remediation Deloitte & Touche Risk Calculator Deloitte & Touche DPI Tool Deloitte & Touche Assessment Tool Deloitte & Touche Privacy Handbook Deloitte & Touche Metrics and Reporting

9 Copyright © 2007 Deloitte Development LLC. All rights reserved. Responding to a Privacy Incident Privacy incidents can have a broad impact and lasting implications Response must be programmatic –Thought through –Risk-based –Tactical and strategic Early issue spotting is critical – for instance: –Lost data may have the same consequences as a hacking incident –Notice (who to tell, what to tell and when) may not be simple –Duties and obligations may not be clear and might conflict (customers, partners, regulatory agencies, law enforcement) Post-incident analysis is essential –Address the root-cause –Update the program based on lessons learned Practice

10 Copyright © 2007 Deloitte Development LLC. All rights reserved. Incident Response Program 1. Define IRP Strategy 2. Design IRP Organization 3. Develop IRP Documentation 4. Establish Communications Plan 5. Evaluate IRP Incident Response Program Develop executive sponsorship Develop objectives Define scope Document charter and strategy Tied to related programs (BCM) Define roles and responsibilities Identify requirements and resources Develop organizational structure Define budget Develop policies Develop standards, including types and levels of incidents Develop procedures Design templates Communicate IRP to stakeholders Establish internal and external communications strategy Conduct training and awareness Create testing schedule Develop scenarios and test cases Conduct tests and practice sessions Prioritize and plan remediations

11 Copyright © 2007 Deloitte Development LLC. All rights reserved. About Deloitte Deloitte refers to one or more of Deloitte Touche Tohmatsu, a Swiss Verein, its member firms, and their respective subsidiaries and affiliates. Deloitte Touche Tohmatsu is an organization of member firms around the world devoted to excellence in providing professional services and advice, focused on client service through a global strategy executed locally in nearly 150 countries. With access to the deep intellectual capital of 120,000 people worldwide, Deloitte delivers services in four professional areas – audit, tax, consulting and financial advisory services – and serves more than one-half of the world’s largest companies, as well as large national enterprises, public institutions, locally important clients, and successful, fast-growing global growth companies. Services are not provided by the Deloitte Touche Tohmatsu Verein, and, for regulatory and other reasons, certain member firms do not provide services in all four professional areas. As a Swiss Verein (association), neither Deloitte Touche Tohmatsu nor any of its member firms has any liability for each other’s acts or omissions. Each of the member firms is a separate and independent legal entity operating under the names “Deloitte,” “Deloitte & Touche,” “Deloitte Touche Tohmatsu,” or other related names. In the U.S., Deloitte & Touche USA LLP is the U.S. member firm of Deloitte Touche Tohmatsu and services are provided by the subsidiaries of Deloitte & Touche USA LLP (Deloitte & Touche LLP, Deloitte Consulting LLP, Deloitte Financial Advisory Services LLP, Deloitte Tax LLP and their subsidiaries), and not by Deloitte & Touche USA LLP. The subsidiaries of the U.S. member firm are among the nation’s leading professional services firms, providing audit, tax, consulting and financial advisory services through nearly 30,000 people in more than 80 cities. Known as employers of choice for innovative human resources programs, they are dedicated to helping their clients and their people excel. For more information, please visit the U.S. member firm’s Web site at