How Privacy Relates to Security Privacy Symposium Privacy Certificate Program Training August 2008.

Slides:



Advertisements
Similar presentations
Code of Ethics for Professional Accountants
Advertisements

PRESENTATION ON MONDAY 7 TH AUGUST, 2006 BY SUDHIR VARMA FCA; CIA(USA) FOR THE INSTITUTE OF INTERNAL AUDITORS – INDIA, DELHI CHAPTER.
What is GARP®? GARP® is an Acronym for Generally Accepted Recordkeeping Principles ARMA understands that records must be.
The Data Protection (Jersey) Law 2005.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Professional Behaviour
Agenda COBIT 5 Product Family Information Security COBIT 5 content
Discussion on SA-500 – AUDIT EVIDENCE
PwC David Devlin 23 April 2002 Auditor Independence in a Global Market Place.
The Islamic University of Gaza
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
The Information Systems Audit Process
The CPA Profession Chapter 2.
Purpose of the Standards
Session 3 – Information Security Policies
Sarbanes-Oxley Project Summary of COSO Framework Presented by Larry Dillehay & Scott Reitan Parkfield Group LLC.
Information Systems Controls for System Reliability -Information Security-
4. Quality Management System (QMS)
Auditing Standards IFTA\IRP Audit Guidance Government Auditing Standards (GAO) Generally Accepted Auditing Standards (GAAS) International Standards on.
Control environment and control activities. Day II Session III and IV.
Internal Auditing and Outsourcing
Company Confidential How to implement privacy and security requirements in practice? Tobias Bräutigam, OTT Senior Legal Counsel, Nokia 8 October
Outsourcing Louis P. Piergeti VP, IIROC March 29, 2011.
Finance and Governance Workshop Data Protection and Information Management 10 June 2014.
Presented to President’s Cabinet. INTERNAL CONTROLS are the integration of the activities, plans, attitudes, policies and efforts of the people of an.
ISO 14001:2004, Environmental Management System
Internal Control in a Financial Statement Audit
Chapter 7 Auditing Internal Control over Financial Reporting McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved.
Internal Control in a Financial Statement Audit
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
Private & Confidential1 (SIA) 13 Enterprise Risk Management The Standard should be read in the conjunction with the "Preface to the Standards on Internal.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
Fundamentals I: Accounting Information Systems McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 6-1 Chapter 6 CHAPTER 6 INTERNAL CONTROL IN A FINANCIAL STATEMENT AUDIT.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 6-1 Chapter Six Internal Control in a Financial Statement Audit.
IT Risks and Controls Revised on Content Internal Control  What is internal control?  Objectives of internal controls  Types of internal controls.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 7-1 Chapter Seven Auditing Internal Control over Financial Reporting.
Transformational technology and privacy How emerging technology contributes to the Data Diaspora and challenges privacy management August 2008.
ISO/IEC 27001:2013 Annex A.8 Asset management
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
McGraw-Hill/Irwin © The McGraw-Hill Companies 2010 Auditing Internal Control over Financial Reporting Chapter Seven.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Copyright: Internal Auditing: Assurance and Advisory Services, by The Institute of Internal Auditors Research Foundation, 247 Maitland Avenue, Altamonte.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
WESTERN PA CHAPTER OF THE AMERICAN PAYROLL ASSOCIATION – NOVEMBER 4, 2015 Risk Management for Payroll.
Data protection—training materials [Name and details of speaker]
ICAJ/PAB - Improving Compliance with International Standards on Auditing Planning an audit of financial statements 19 July 2014.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Presented by Ms. Teki Akuetteh LLM (IT and Telecom Law) 16/07/2013Data Protection Act, 2012: A call for Action1.
Clark Holt Limited (Co. No ), Hardwick House, Prospect Place, Swindon, SN1 3LJ Authorised and regulated by the Solicitors Regulation.
Classification September 2003© Peltier and Associates, all rights reserved Creating an Asset Classification Methodology ISIG & ISSA September, 2003.
-1- WORKSHOP ON DATA PROTECTION AND DATA TRANSFERS TO THIRD COUNTRIES Technical and organizational security measures Skopje, 16 May - 17 May 2011 María.
Agencija za zaštitu ličnih/osobnih podataka u Bosni i Hercegovini Агенција за заштиту личних података у Босни и Херцеговини Personal Data Protection Agency.
McGraw-Hill/Irwin © The McGraw-Hill Companies 2010 Internal Control in a Financial Statement Audit Chapter Six.
Chapter 6 Internal Control in a Financial Statement Audit McGraw-Hill/IrwinCopyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
Law Firm Data Security: What In-house Counsel Need to Know
Lecture 09 Network Security Management through the ISMS
Data protection headaches: GDPR, brexit AND perimeter risk
General Data Protection Regulation
Bob Siegel President Privacy Ref, Inc.
Transformational technology and privacy
G.D.P.R General Data Protection Regulations
Other Assurance Services
Welcome!.
How to conduct Effective Stage-1 Audit
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Presentation transcript:

How Privacy Relates to Security Privacy Symposium Privacy Certificate Program Training August 2008

Page 2 Agenda ► Privacy and Security in Context ► Common Privacy Requirements for Security ► Traditional Information Security ► Common Gaps in Tradition

Privacy and Security in Context

August 2008Page 4 Information Types ► Financial ► General ledger, accounts payable and receivable ► Financial reporting ► … ► Human resources ► Performance management ► Compensation and benefits ► Talent management ► Succession planning ► Learning and development ► … ► Operational ► Customer ► Supply chain ► Manufacturing ► Sales and marketing ► Service ► … ► Intellectual property ► Trade secrets ► Plans, designs, and methods ► Secret recipes ► … ► Information products ► …

August 2008Page 5 Privacy, Confidentiality, and Information Security Privacy ► “Privacy is defined as the rights and obligations of individuals and organizations with respect to the collection, use, retention, and disclosure of personal information.” ► AICPA Generally Accepted Privacy Principles Confidentiality ► “The property that information is not made available or disclosed to unauthorized individuals, entities, or processes.” ► ISO 27001:2005 Information Security ► “Preservation of confidentiality, integrity and availability of information; in addition, other properties such as authenticity, accountability, non-repudiation, and reliability can also be involved.” ► ISO 27001:2005

August 2008Page 6 Take Aways Privacy relates to personal information Security and confidentiality can relate to all information Different information have different requirements for privacy, security, and confidentiality

Common Privacy Requirements for Security

August 2008Page 8 Safeguarding Personal Information The organization shall protect personal information from unauthorized access, misuse, and denial of service using means that are: ► Commercially reasonable ► Aligned with best practices ► Reasonable ► Adequate ► Effective The primary question is how much security is enough security?

August 2008Page 9 GLBA-related Safeguards Rules The Safeguards Rules require financial institutions to develop a written information security plan that describes their program to protect customer information. The plan must be appropriate to the financial institution’s size and complexity, the nature and scope of its activities, and the sensitivity of the customer information it handles. ► Designate one or more employees to coordinate the safeguards ► Identify and assess the risks to customer information in each relevant area of the Company’s operation, and evaluate the effectiveness of the current safeguards for controlling these risks ► Design and implement a safeguards program, and regularly monitor and test it ► Select appropriate service providers and contract with them to implement safeguards ► Evaluate and adjust the program in light of relevant circumstances, including changes in the firm’s business arrangements or operations, or the results of testing and monitoring of safeguards

August 2008Page 10 US Safe Harbor Security ► Organizations creating, maintaining, using or disseminating personal information must take reasonable precautions to protect it from loss, misuse and unauthorized access, disclosure, alteration and destruction.

August 2008Page 11 California AB 1950 Code (a) ► A business that obtains personal information about a California resident shall implement and maintain reasonable security procedures and practices appropriate to the nature of the information, to protect the personal information from unauthorized access, destruction, use, modification, or disclosure.

August 2008Page 12 EU Data Protection Directive Confidentiality and Security (Articles 16 and 17) Confidentiality ► Any person acting under the authority of the controller or of the processor, including the processor himself, who has access to personal data must not process them except on instructions from the controller, unless he is required to do so by law. Security ► The controller must implement appropriate technical and organizational measures to protect personal data against accidental or unlawful destruction or accidental loss, alteration, unauthorized disclosure or access, in particular where the processing involves the transmission of data over a network, and against all other unlawful forms of processing. Having regard to the state of the art and the cost of their implementation, such measures shall ensure a level of security appropriate to the risks represented by the processing and the nature of the data to be protected. ► The controller must, where processing is carried out on his behalf, choose a processor providing sufficient guarantees in respect of the technical security measures and organizational measures governing the processing to be carried out, and must ensure compliance with those measures. ► The carrying out of processing by way of a processor must be governed by a contract or legal act binding the processor to the controller and stipulating in particular that the processor shall act only on instructions from the controller. ► For the purposes of keeping proof, the parts of the contract or the legal act relating to data protection and shall be in writing or in another equivalent form.

August 2008Page 13 UK Data Protection Act of 1998 Seventh Principle ► Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data.

August 2008Page 14 FACTA Example of Specific Requirements Truncation of Credit Card ad Debit Card Numbers: ► In general, except as otherwise provided in this subsection, no person that accepts credit cards or debit cards for the transaction of business shall print more than the last 5 digits of the card number or the expiration data upon any receipt provided to the cardholder at the point of the sale or transaction. This is a safeguard. It is not traditional “information security”. Who will make sure this happens?

Traditional Information Security

August 2008Page 16 Information Security Information security is the preservation of the confidentiality, integrity, and availability of information “CIA” ► Confidentiality ► Ensuring that information is accessible only to those authorized to have access ► Integrity ► Safeguarding the accuracy and completeness of information and processing methods ► Availability ► Ensuring that authorized users have access to information and associated assets when required

August 2008Page 17 Basic Security Needs In fact, security needs to be considered to a more detailed level. Basic Security Needs ► To ensure the availability of information and services ► To securely allow access to information and services ► To prevent loss of integrity of information and transactions ► To provide authenticity of all parties involved ► To provide confidentiality of information and transactions ► To provide non-repudiation to all parties involved ► To provide an audit log of significant events ► To provide fraud prevention and other misuse controls

August 2008Page 18 Key Security Principles Separation or Segregation of Duties ► Dividing responsibility for processing or information so that no individual acting alone can compromise the security Least Privilege ► The principle requiring that each subject be granted the most restrictive set of privileges needed for the performance of authorized tasks. Application of this principle limits the damage that can result from accident, error, or unauthorized use of an information system Need to Know/Need to Access ► The legitimate requirement of a person or organization to know, access, or possess specific information that is critical to the performance of an authorized, assigned mission. The necessity for access to, or knowledge or possession of, specific information required to carry out official duties.

August 2008Page 19 Standards for Information Security ISO 27001: Information Security Management – Specification With Guidance for Use ► Common model for implementing and operating an Information Security Management System ► Comprehensive set of controls comprising best practices for information security management Question: Is best practice reasonable, adequate, or effective? ISO 17799/27002: Information Technology—Security Techniques—Code of Practice for Information Security Management ► Defines an overarching security framework consisting of 133 specific controls organized around 39 control objectives

August 2008Page 20 Security Domains The 11 security clauses of ISO each have categories of controls and implementation guidance for consideration. ► Security policy ► Organization of information security ► Asset management ► Access control ► Compliance ► Human resources security ► Physical and environmental security ► Information systems acquisition, development and maintenance ► Communications and operations management ► Business continuity management ► Information security incident management Organizational Operational

Common Gaps in the Tradition of Information Security

August 2008Page 22 Common Gaps in Traditional Information Security ► Security programs have focused on corporate or other central systems and business functions, with limited impact on line of business systems ► Security programs have been focused on Sarbanes-Oxley §404 internal controls, and have ignored non-financial processes ► Data classification does not contemplate personal information in context ► Security programs are focused on IT, not accounting for security in the application and business process ► Business units do not know how to apply security policy and procedures inside of their business processes ► Portable devices and media containing personal information, and electronic transfer of personal information are not consistently protected ► Information security of third parties remains only hopeful, with little specific requirements, inconsistent legal protections, and little or no assurance ► Adequacy or reasonableness levels are not established

August 2008Page 23 Closing the Gaps: Making It Adequate ► Deliberately extend the information security program to cover all systems and processes that handle personal information ► Differentiate information protection requirements for the various categories of personal information (and not by data element) ► Educate information security staff and management about the compliance requirements related to personal information so that policies and practices may be brought up to date ► Educate user of personal information about policies, but also give them enablers for security ► Provide active protection for portable devices, portable media, and electronic communications containing personal information ► Provide meaningful security requirements to third parties that are legally binding; develop an approach to gain the appropriate level of assurance over third party security ► Establish goals for adequacy and reasonableness of controls that includes tests of their effectiveness

Questions

Page 2530 April 2008 Ingredients for effective risk management and compliance Ernst & Young Assurance | Tax | Transactions | Advisory About Ernst & Young Ernst & Young is a global leader in assurance, tax, transaction and advisory services. Worldwide, our 130,000 people are united by our shared values and an unwavering commitment to quality. We make a difference by helping our people, our clients and our wider communities achieve potential. About Ernst & Young’s Technology Risk and Security Services Information technology is one of the key enablers for modern organizations to compete. It gives the opportunity to get closer, more focused and faster in responding to customers, and can redefine both the effectiveness and efficiency of operations. But as opportunity grows, so does risk. Effective information technology risk management helps you to improve the competitive advantage of your information technology operations, to make these operations more cost efficient and to manage down the risks related to running your systems. Our 6,000 information technology risk professionals draw on extensive personal experience to give you fresh perspectives and open, objective advice – wherever you are in the world. We work with you to develop an integrated, holistic approach to your information technology risk or to deal with a specific risk and security issue. And because we understand that, to achieve your potential, you need a tailored service as much as consistent methodologies, we work to give you the benefit of our broad sector experience, our deep subject matter knowledge and the latest insights from our work worldwide. It’s how Ernst & Young makes a difference. For more information, please visit © 2008 EYGM Limited. All Rights Reserved. Proprietary and confidential. Do not distribute without written permission. Ernst & Young refers to the global organization of member firms of Ernst & Young Global Limited, each of which is a separate legal entity. Ernst & Young Global Limited, a UK company limited by guarantee, does not provide services to clients.