DSCI Framework- Pilot Implementation. Operational Locations Different project groups Different client Geographies Different services Exposes PI through.

Slides:



Advertisements
Similar presentations
Auditing Governance Functions
Advertisements

STRATEGIC PLANNING FOR Post-Clearance Audit (PCA)
Course: e-Governance Project Lifecycle Day 1
INTRODUCTION TO ISO Joan Kithika. OUTLINE DEFINITIONS WHY ENVIRONMENTAL MANAGEMENT? LEGAL OVERVIEW HOW TO MANAGE THE ENVIRONMENT-AN ENVIRONMENTAL.
© 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. AT&T Security Consulting Risk.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
Topics Rule Changes Skagit County, WA HIPAA Magic Bullet HIPAA Culture of Compliance Foundation to HIPAA Privacy and Security Compliance Security Officer.
Grow Your Business through Contact Centre Outsourcing Fanny Vaz Director, Personal Market Unit, CTM.
Auditor General’s Office One key audit focus area – Compliance with Laws and Regulations.
Security Controls – What Works
WHY CHOOSE CEO-PE?  We employ International Association of Privacy Professionals (IAPP) Certified and Health Insurance Portability & Accountability Act.
Developing a Records & Information Retention & Disposition Program:
Geneva, Switzerland, 14 November 2014 Data Protection for Public Cloud (International Standard ISO 27018) Stéphane Guilloteau Engineer Expert, Orange Labs.
Training.
Security Governance Technology Executive Club
Data Protection in Higher Education: Recent Experiences in Privacy and Security Institute for Computer Law and Policy Cornell University June 29, 2005.
–LSI Internal Use Only LSI’s Investments in Compliance Energy Insight 2014.
Welcome ISO9001:2000 Foundation Workshop.
Vendor Risk: Effective Management is Essential
Client-Specific, Operational Risk Management, Solution- Building Workshops The following pages show a list of workshops that may be provided individually.
A NASSCOM ® Initiative Security and Quality Kamlesh Bajaj CEO, DSCI May 23, 2009 NASSCOM Quality Summit Hyderabad 1.
Information Security Governance 25 th June 2007 Gordon Micallef Vice President – ISACA MALTA CHAPTER.
Financial Advisory & Litigation Consulting Services Risk Management 2006 September 14-15, 2006 The Metropolitan Club, New York, NY Workshop B: Information.
A NASSCOM ® Initiative DSCI-KPMG Survey 2010 State Of Data Security and Privacy in the Indian Banking Industry Vinayak Godse Director- Data Protection,
HIPAA Trading Partners, Legal Relationships October 2, 2001 presented by Peter B. Goldstein, Esq. Cap Gemini Ernst & Young, US LLC.
Implementation of ISO 14001/OHSAS TMS Consultancy Ltd.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Finance and Governance Workshop Data Protection and Information Management 10 June 2014.
VALERIE MATHIEU PAPER NO. 13 Presented By Jared Norrell Service strategies within the manufacturing sector: Benefits, costs and partnership.
ISMS for Mobile Devices Page 1 ISO/IEC Information Security Management System (ISMS) for Mobile Devices Why apply ISMS to Mobile Devices? Overview.
© 2014 Equity Administration Solutions, Inc. All rights reserved. 1 Four Fundamentals of Financial Reporting for Equity Compensation Kathy Biddle, CEP.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
3rd Party Audits and Regulatory Inspections Food Industry Perspective
WSV323. CSO/CIO department Regulation translated to control objectives Infrastructure Support Control objectives turned into control activities.
Challenges in Infosecurity Practices at IT Organizations
Compliance Management Platform ™. Compliance Management Platform Compliance is the New Marketing – Position yourself to thrive in the new regulatory and.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
CERTIFICATION In the Electronics Recycling Industry © 2007 IAER Web Site - -
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Privacy Project Framework & Structure HIPAA Summit Brent Saunders
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Connecting the Dots A Practical Approach to Integrating Compliance, Risk and Quality Jody Ann Noon RN, JD Partner Health Care Regulatory Practice.
IT GOVERNANCE  Objective : The objective of this area is to ensure that the Certified Information Systems Auditor ( CISA ) candidate understands and can.
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
Compliance August 18, Agenda Outline Status Draft of Answers.
Castlebridge associates | | Castlebridge changing how people think about information How to Implement the.
Functioning as a Business Associate Under HIPAA William F. Tulloch Director, PCBA March 9, 2004.
Alex Ezrakhovich Process Approach for an Integrated Management System Change driven.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
Dilemmas presented by current environment Raul Zambrano Technical Assistance Manager. CIAT April 2009.
What Is Vendor Management And Why Is It Important To You?
Information Security Program
What Is ISO ISO 27001, titled "Information Security Management - Specification With Guidance for Use", is the replacement for BS It is intended.
and Security Management: ISO 28000
IS4680 Security Auditing for Compliance
Introduction to the Federal Defense Acquisition Regulation
San Francisco IIA Fall Seminar
Standards for success in city IT and construction projects
IS4680 Security Auditing for Compliance
Consumer Privacy An Introduction
Privacy Project Framework & Structure
Health Care: Privacy in a Digital Age
Cyber Risk & Cyber Insurance - Overview
IS Risk Management Framework Overview
Managing Privacy Risk in Your Commercial Practices
ISO 9001:2000 Management System Overview
Presentation transcript:

DSCI Framework- Pilot Implementation

Operational Locations Different project groups Different client Geographies Different services Exposes PI through different means Privacy Organization New Project- Exposure to Personal information Training and Awareness Report Visibility over Personal Information Exposure to different compliance regulations Regulatory Compliance Intelligence Privacy Policies, processes Enforce Contract, Service Agreement Guide Privacy Contract Management Monitoring & Incident Management Privacy breach Detect Information Usage & Access Personal Information Security DSCI Privacy Approach (POR) (PPP) VPI) (RCI) (PCM) (MIM) (PIS) (IUA) (PAT)

VPIPPPPCM PIS PATMIM POR Personal Information Security Information Usage & Access, Monitoring & Training RCI IUA VPI – Visibility Over Personal Information POR – Privacy Organization & Relations PPP – Privacy Policy & Processes RCI – Regulatory Compliance Intelligence PCM – Privacy Contract Management MIM – Privacy Monitoring & Incident Management IUA – Information Usage & Access PAT – Privacy Awareness & Training PIS– Personal Information Security Privacy Strategy & Processes DSCI- Privacy Framework DPF © - DSCI Privacy Framework

A NASSCOM ® Initiative What brings the data to you ? What the data brings to you? Business processes that involve transactions with the end customer Business relationships that involve transactions in the data Business functions that deal with employee data Concerns Retail Business Customer Services Business Partners Retailers CRM Sales & Marketing Outsourcing Service Agents HR Management Finance Travel Admin Data Protection requirements End Customer Client / Partner Employee Governments Privacy Principles Technology Measures Compliance Requirements Security & Safeguards Service (MSA) Agreements Geographical regulations (UK DPA, US California Data Sec) Vertical specific regulations (HIPAA/HITECH: Health) Functional regulations (GLBA- Finance Products) Organizational Measures Data Centric Approach DSCI Framework Implementation

A NASSCOM ® Initiative DC Role for Employee Data Protection Data Processor Role Data Controller Role Data Elements Data Fields Data Access Points Data Operations Application Access Underlying Infrastructure Physical Environment Personnel security Client environment Type of Data US, California State Health Financial Processing Data Origin Client: xyz MSA SB 1386 HIPAA/ HITECH GLBA Client Relations ProcessSub-process Business Functions ProcessSub-process Business Services ProcessSub-process Business Process Portfolio Relationship Portfolio Business Function Portfolio DSCI Framework Implementation Data Centric Approach Portfolio from Data Perspective Example Compliance MSA Requirements Geographical regulations Vertical regulations Functional regulations

A NASSCOM ® Initiative Client Relationship, Processes, Sub Processes, Gives insight into the data associated with the process/sub-process Process Portfolio: Data Perspective Data View Data Field, Form, File View of data in all processes Access, Process, Transmits, Storage View of operations performed on the data element Data AccessData Env Client & Offshore Env, Infrastructure Physical Env View of underlying infrastructure that process data Compliance MSA, Geography), Domain Specific, Special Legislation View of compliance reqds mapped to the Data Visibility Exercise Visibility Vigilance Coverage & Accuracy Discipline in defense Compliance demonstration Enablers DSCI Framework: DSF& DPF DSCI Best Practices DSCI- Document Ecosystem (Strategic Options, Guidance Notes etc) Framework Implementation Strategic, tactical & operational View DSCI Principles DSCI Framework Implementation Identify Problem Strategic Options Security Program Impleme ntation Operatio nalization DSCI Best Practices DSF & DPF or Any Security Program- ISO, PCIDSS, etc.

A NASSCOM ® Initiative Pilot Implementation DSCI Contribution DSCI Approach & Methodology Visibility tool (spreadsheet) Data capture guidance Data analysis & presentation Phase I: Visibility Exercise Service Provider Contribution Identify function/ LOS is to be covered, define sample size Data capture Help in data analysis Create case study Client relationship portfolio from data security perspective Consolidated view of data, & underlying environment Granular risk map, revealing real issues Risk classification - reveals client, as well as, SP accountability Deliverables Roles & Responsibility Scope Scope restricted to a mutually agreed sample size. Depends on the LOBs to, no of client relationships, & number of processes or sub processes under each relationship Future directions & plan No involvement of third party Lean exercise, avoiding bulkiness Enablers DSCI Best Practices Data Controller Data Processor DSCI Framework - DPF | DSFVisibility Exercise Tools

A NASSCOM ® Initiative Brings data centric approach in the security initiatives Creates a portfolio of business processes from data perspective Focus on scenarios that may lead to data breach, identify the issues in environments both at client and service provider Reach to the granularities of risks, which help fix accountability of process and project owners, Revitalize security operations, compliances and reporting to incorporate data centric elements Rely on visibility that identifies where the data is residing and how it is transacting Provides assurance over security over the specific data element in the wake of emerging data protection regulations Data Centric Approach Visibility as a fundamental Principle Portfolios from Data perspective Granularity of risks Scenario based evaluation Revitalization of security operations Assurance in the wake of regulations Framework Implementation Benefits

A NASSCOM ® Initiative Thank You