SlideShare une entreprise Scribd logo
1  sur  16
Télécharger pour lire hors ligne
Insights on IT risk
       January 2011




                      Privacy trends 2011
                      Challenges to privacy programs in
                      a borderless world
Summary of trends
• Regulation, laws and enforcement. Historically, enforcement of privacy
  legislation has been inconsistent or nonexistent. Today’s regulators plan on
  changing that by expanding their reach and imposing tougher penalties.

• Additional breach notification requirements. Governments around the world
  are drafting and adopting breach notification legislation. Organizations need to
  adapt based on their industry and jurisdictions of operations.

• Governance, risk and compliance (GRC) initiatives. Organizations are
  expanding GRC initiatives to converge with governance and enhance business
  performance with risk management. There is only a small number of GRC
  technologies available, but that number is growing. In 2011, expect technology
  firms to produce and update modules that attempt to address privacy monitoring.

• Cloud computing. Organizations transitioning their business processes to a
  cloud environment need to have robust vendor risk management and third-party
  reporting capabilities in place that address privacy risks.

• Mobile devices. Portable media means portable personal information. Employees
  and organizations alike need to understand and respect the power, limitations
  and technical controls of mobile devices.

• Increased investment. Organizations are increasing their investment in
  governance and tools that help manage privacy and data protection, in part
  because of regulation, but also because of increasing risks.

• More privacy assessments. Look for internal audit departments to identify specific
  parts of their organizations on which to conduct deeper privacy audits and for
  other assessments to expand.

• Service provider reporting standards. Changes to the Statement on Auditing
  Standards (SAS) 70 in 2011 will give service providers the ability to obtain a
  report on privacy and data protection controls and compliance.

• Privacy by Design. Evolving from a concept to an essential component of
  privacy protection, Privacy by Design suggests that regulators are recognizing
  the importance of embedding privacy into new technologies and business
  practices from the beginning.

• Social networking. Organizations need to develop and communicate thoughtful
  privacy protection policies that address interactions among customers,
  employees and job candidates on social networks.

• Evolving privacy professional expectations. Privacy certifications are
  becoming more specialized, allowing individuals to be certified in focused
  areas such as jurisdictional regulation, IT or industry.




iii                                        Insights on IT risk | January 2011
Introduction
For years, the fixed boundaries of an office’s four walls have, for the most part, enabled companies to
manage the privacy of the data they keep. But in an era of anytime, anywhere access to information,
these traditional boundaries are disappearing. It is a new world — technology-driven, ever-connected,
globally extended and well beyond the scope of conventional privacy protection approaches.
In Borderless security: Ernst & Young’s 2010 Global Information Security Survey, 81% of executives
interviewed indicate that managing privacy and protecting personal data is very important or important
to their organization. And no wonder: highly publicized incidents of data leaks or identity theft pose
huge brand and reputation risks for businesses — a concern survey participants ranked even higher than
privacy protection (84%).
As a result, executives are investing more money to protect the privacy of personal information — to
respond to ever-increasing government regulation and enforcement and to stem the rising tide of
risk. But are they spending it in the right places? With parts of the global economy still limping toward
recovery, executives continue to ask this burning question as they search for the right balance between
spending on privacy protection and taking appropriate levels of risk to manage costs.
One thing is certain: technological advances will only continue to accelerate, and organizations need
to be ready. While governments are stepping up regulation and enforcement, privacy protection lacks
international cohesion. It is a compliance patchwork with levels of consistency that vary from country
to country and industry to industry.
Organizations do not have time to wait for global regulatory bodies to reach consensus. They need to
take action now to proactively develop and implement enterprise-wide privacy protection strategies that
match the organization’s risk profile. By looking upon privacy strategies to drive regulation rather than
the other way around, companies can meet today’s needs and also anticipate tomorrow’s challenges.




                     Insights on IT risk | January 2011                                                  1
Regulations, laws and enforcement

Historically, enforcement of information protection legislation               and for improving cooperation and coordination among member
has lacked teeth. Today’s regulators plan on changing that by                 nations. In advance of the release of new regulations under the
expanding their reach and imposing tougher penalties. The US                  EU Data Protection Directive, several EU countries have been busy
Health Information Technology for Economic and Clinical Health                intensifying existing enforcement policies.
(HITECH) Act of 2009 (the HITECH Act) is one such example. Under
                                                                              This year, Mexico, a significant outsourcing destination, joined
the HITECH Act, state attorneys general can investigate and take
                                                                              about 50 other countries in adopting a broad privacy regulation
action against organizations for failing to secure protected health
                                                                              that focuses on the private sector. The Federal Law on the
information. The year 2011 will bring additional clarity and detail
                                                                              Protection of Personal Data Held by Private Parties will impact
regarding the provisions of regulations that address the online
                                                                              many large US-based companies operating in Mexico.
environment in many countries.
                                                                              Similarly, the EU found the data protection laws of Israel, an
In the EU, the European Commission is in the process of updating
                                                                              important outsourcing destination for the EU, provided an
the 1995 EU Data Protection Directive. Plans for strengthening
                                                                              “adequate level of data protection” relative to the EU Data
enforcement include providing data protection authorities with
                                                                              Protection Directive. This designation means that data between
the ability to investigate and sue organizations that do not comply,
                                                                              the EU and Israel can now move much more freely.




Questions to consider
• Have you stayed current with the regulations impacting your particular industry and
  the personal information your organization processes?
• Have you reviewed whether regulations have changed in the jurisdiction(s) where
  you operate?

• Have you assessed your compliance with applicable regulations recently?



2                                               Insights on IT risk | January 2011
Additional breach notification requirements

Breach notification goes beyond regulatory compliance. Its                      Breach notification cannot be discussed without raising the
focus is on transparency, which has fundamentally altered how                  concern of the “insider threat.” Individuals who are authorized to
organizations approach privacy and data protection. Breach                     access and use information are increasingly found at the center
notification failures have resulted in reputational damage and                  of high-profile incidents. Such misuse of information may be
attracted the attention of regulators. In the US, most states have             due either to lack of awareness or to malicious intent. Training
adopted breach notification requirements that commonly address                  and awareness are key to addressing the unintended disclosure
sensitive and financial identifiers. The HITECH Act introduced                   of information. Technical controls, such as tools for monitoring
similar requirements for protected health information. And,                    information traffic, can be of great help when addressing more
while the US has been an early adopter of breach notification                   malicious cases.
requirements, these types of requirements are increasingly taking
                                                                               Data loss prevention (DLP) tools can also help by monitoring
hold in other places around the world.
                                                                               unintentional or intentional data leaks from within the organization.
In Canada, an amendment to the Personal Information Protection                 In 2011, we will continue to see the popularity of these tools
and Electronic Documents Act (PIPEDA) is making its way through                increase as organizations look for a technical control to limit their
the regulatory process and includes breach notification obligations.            breach exposure. However, it takes more than the purchase of a
In the EU, a breach notification regulation for the telecommunications          DLP tool to achieve effective monitoring of personal information
industry will come into effect in 2011. In addition, the EU’s review           to prevent loss. Adopting these tools requires appropriate
of the Data Protection Directive is expected to result in notification          consideration of the policy that will guide the extent of the tool’s
requirements for all EU member countries. Some EU countries are                implementation (e.g., to stop a possible leak or just report it for a
adding their own breach notification provisions. In the UK, for                 later investigation) as well as cross-functional leadership support
example, regulators are working on a law that will force organizations         and the necessary staffing to implement it.
to publicly acknowledge any data breaches to regulators and to
                                                                               Regardless of jurisdiction, organizations have to adapt to new
inform those affected.
                                                                               requirements regarding breach notification. Whatever their
In Asia, Japan is leading the way with breach notification                      reliance is on technical controls for combating the loss of personal
requirements that have been in place for several years. Much                   information, organizations need to have effective programs in
like in the US, the expense associated with such breaches can                  place to detect, address and resolve breaches. They also need to
lead to a significant number of direct and indirect expenses for                have open and transparent communication plans to inform those
organizations operating there.                                                 affected when their data is compromised.




                                     Questions to consider
                                     • Have you developed and implemented an incident response plan for handling breaches
                                       of personal information?
                                     • Have you identified the relevant breach notification requirements in your industry and
                                       jurisdiction(s) of operation?
                                     • Have you looked into the adoption of a DLP tool or using DLP services to
                                       monitor your organization’s network for possible loss of personal information?



                                                 Insights on IT risk | January 2011                                                                   3
Governance, risk and compliance (GRC) initiatives

Organizations have been investing heavily in GRC initiatives for                     update a common roster that identifies where an organization’s
years. But in the wake of the worst economic crisis since the Great                  data resides. In 2011, we expect technology firms large and small
Depression, some reports are suggesting that financial institutions                   to produce new modules that will attempt to better integrate
alone were spending up to US$100 billion on mitigating risks in 2010.                privacy into control monitoring.

In an Ernst & Young survey of 567 organizations across Europe, the                   GRC tools, however, should not be seen as a one-dimensional
Middle East, India and Africa in 2010,1 69% of participants indicate                 solution for managing risk. Often, organizations need to completely
that they are highly reliant on their GRC activities as a safeguard                  transform their risk functions. In 2011, we expect to see progressive
against failure. And yet, 67% of respondents suggest that more                       organizations take an integrated approach that aligns risk and
work is needed to enhance their GRC functions.                                       strategic business objectives. This means shifting GRC investment to
                                                                                     focus on the risks that matter, and looking across the enterprise to
From a technology perspective, the market for GRC tools continues
                                                                                     identify compliance control redundancies. From there, organizations
to develop and offer risk management solutions, and more specifically,
                                                                                     may wish to consider compliance convergence, which streamlines
solutions for managing privacy. In 2009 and 2010, technology
                                                                                     controls horizontally rather than vertically within the organization.
heavyweights entered the GRC market. However, few vendors offer
                                                                                     Convergence of control activities will reduce audit fatigue and the
a full GRC solution, and even fewer offer sophisticated or easy to use
                                                                                     strain that repeat audits put on resources. It may also produce
modules for privacy management. This is partly due to the complex
                                                                                     the much-needed cost efficiencies many budget-conscious
nature of the requirements and partly due to the difficulty involved
                                                                                     organizations still seek.
in automating key privacy-related updates. But while the giant
GRC technology firms may still be finding their feet when it comes                     As organizations endeavor to implement a risk transformation
to privacy management, some boutique software companies,                             program to improve GRC performance, privacy professionals need
seeing a gap to fill, are entering the market. These smaller firms                     to make sure they have a seat at the table to ensure that privacy
are aggressively exploring ways to automate regulatory and policy                    concerns remain a top priority for risk leaders and an integral part
mapping, incorporate a framework for integrated compliance and                       of any comprehensive GRC solution.
risk assessments, and provide the ability for multiple users to




Questions to consider
• Have you considered different approaches for continuously monitoring key aspects
  of your privacy program?
• Have you assessed GRC solutions that offer a wide range of monitoring areas,
  including privacy?
• Have you asked your current GRC vendor for updated modules to help monitor risk
  and compliance related to the use of personal information?



1
    The multi-billion dollar black hole — Is your governance, risk and compliance investment being sucked in?, Ernst & Young’s survey of 567 companies in
    Europe, the Middle East, India and Africa, conducted in the second quarter of 2010.


4                                                      Insights on IT risk | January 2011
“ Cloud computing has enormous social and economic potential. It can help businesses save money and
                                 create jobs. It can help governments increase efficiency and better serve their citizens. And it can help
                                 schools better educate their students. However, privacy concerns remain a significant impediment to
                                 the adoption of cloud computing for many potential customers. To ensure that society can maximize the
                                 benefits of cloud computing, removing the blockers around privacy is critical. Cloud service providers can
                                 start by building customers’ confidence in the cloud. They can do this by demonstrating an inherent respect
                                 for privacy that is embodied in transparent business practices and a commitment to accountability.”
                                                                                                        Brendon Lynch, Chief Privacy Officer, Microsoft




Cloud computing

While cloud computing may be on the rise, many organizations still                  Today in the US, it’s easier to subpoena or otherwise compel the
have reservations about the inherent data privacy and security                      release of information when it is held by a third party (such as a
risks associated with using cloud providers. In our 2010 Global                     cloud provider) than its original owner. And then there are laws
Information Security Survey, only 23% of participants indicate that                 such as the PATRIOT Act, which for some specific purposes allows
they currently use cloud computing-based delivery solutions. A                      the government to gain access to personal information residing in a
further 55% say they have no plans to use cloud computing in the                    third-party cloud provider without the knowledge of the information
next 12 months. But this will change quickly — according to a 2010                  owner or data subject.
Gartner research publication, by 2014 less than 10% of companies
                                                                                    Further, as more companies choose to use a third-party cloud
will see privacy concerns as a reason not to join the cloud.2
                                                                                    provider in 2011, they need to outline specific requirements that
The major attractions of cloud computing are cost and flexibility. As                enable them to meet their privacy regulatory obligations. Before
some global economies struggle to recover, organizations are looking                moving data to the cloud, organizations should analyze their data
for more ways to streamline operations and save money. Cloud                        and develop policies that address both the risks associated with
computing can be a huge cost-saver. It is particularly attractive to                sensitive data and regulatory requirements.
small- and medium-size businesses that use it to stay competitive.
                                                                                    Policies should include how soon the cloud provider needs to alert
But with cloud use comes responsibility. Organizations need to have                 the organization of a suspected breach so that the organization can
robust vendor risk management, including third-party reporting                      notify relevant regulatory bodies and individuals. Organizations will
capabilities that address data privacy risks. For example, cloud                    also want to be clear about retention periods, where the data can
services located in different geographies raise regulatory challenges               or cannot be transferred, logging of access by cloud administrators
as personal information travels across jurisdictions.                               and the ability of other parties to access the data for market
                                                                                    research or other secondary activities.




                                       Questions to consider
                                       • Have you conducted a risk-based review of what business processes and related personal
                                         information are needed before a move can be made to a cloud environment, and what
                                         varying levels of protection and control they require?
                                       • Have you reviewed what contractual and regulatory limitations may exist over the use
                                         of a cloud provider, including questions surrounding geographic location, data retention
                                         and security?
                                       • Have you explored your ability to monitor the adherence of your cloud providers to the
                                         terms set in your agreement with them, including the protection of personal information?

2
    “Predicts 2011: Enterprises Should Not Wait to Find Solutions for Business-Critical Privacy Issues,” Gartner, 8 November 2010,
    © 2010 Gartner, Inc. and/or its Affiliates.



                                                      Insights on IT risk | January 2011                                                                5
Mobile devices

Laptops, cell phones, smart phones and tablets: in today’s wireless           Encryption
world, there is an array of mobile devices that employees can use             Traveling data means understanding and adhering to state, federal
to stay connected to the office without stepping foot in the building.         and international privacy regulations that will vary from one
This kind of mobility offers huge opportunities for organizations             jurisdiction to another. Some emphasize the encryption of personal
to enhance productivity. But there are risks. Portable media lead             information on mobile devices (e.g., the State of Massachusetts in
to portable personal information. In 2011, we expect increased                the US). But, in most cases, hard drive encryption is only useful when
regulation that directly addresses protecting personal information            a mobile device is lost or stolen and it is in the “off” or “hibernation”
on mobile devices, and the sensitive information revealed by                  mode. It doesn’t protect against hackers, nor does it necessarily
geo-location tracking of mobile devices.                                      protect information that is being backed up. Encryption is an effective
                                                                              tool for protecting some data, but it is not preventing attacks and it
Geo-location
                                                                              is likely not addressing your organization’s top security risks.
Technology advances are increasingly enabling organizations to
identify the physical location of a device, as well as the person             Training and transparency
using it. In terms of privacy, organizations need to understand               The benefits to organizations and employees of being able to work
where to draw the line in using location data.                                in different locations and in different time zones (think telecommuting)
On the employee level, organizations can keep track of their                  bring increased responsibility for protecting the personal information
workforce, comparing where their employees are at any given                   employees use for work. Employees and organizations alike need
time versus where they are supposed to be. On the customer level,             to understand and respect the limitations and technical controls
organizations can offer marketing programs that are based on                  of mobile devices. When employees use personal devices for work,
immediate location.                                                           organizations may be able to apply technical controls (e.g., require
                                                                              a download of a certain load set before allowing a personal device
If organizations decide to use physical location to track employees           to connect to the firm’s network) that provide visibility into various
or reach out to customers with special offers, transparency is                content and activities on those devices.
paramount. Employees need to know what the policies are regarding
geo-location and what tools they may have at their disposal to shield         However, where should the organization draw the line in terms of
their privacy by choosing how much information they share on the              infringement on personal privacy? Organizations need to ensure
device. Customers must have the opportunity to provide informed               that they have specific policies regarding the use of each mobile
consent before allowing any organization to track their location.             device issued, and the extent to which personal devices used for
                                                                              work purposes may be monitored. Organizations should clearly
                                                                              communicate to employees what information is being monitored,
                                                                              how it is being monitored and the consequences for not adhering to
                                                                              mobile device policies.




Questions to consider
• Have you considered both the advantages and risks associated with using mobile device
  geo-location information for your operations?
• Have you assessed what level of encryption (or combination of levels) is merited to protect
  personal information in the common work settings of your organization?
• Have you reviewed your privacy policies recently in light of your organization’s use of
  mobile devices?



6                                               Insights on IT risk | January 2011
Increased investment

Organizations understand the significance of data protection. They             start to re-invest in related positions. The increased use of tools to
are increasing their investment around personal information, in               protect privacy, such as DLP solutions, will also require appropriate
part because of regulation, but also because of increasing risks.             staffing to monitor and respond to technology alerts.
In 2011 we will see an increase in privacy and data protection
                                                                              In terms of technical controls, 2011 promises more spending in this
investments that will focus on two issues: program initiatives and
                                                                              area as organizations rely more heavily on controls to manage
technical controls.
                                                                              personal information. Tracing the web, with brand risk management
Organizations will once again review their governance structure               in mind, is yet another area of investment for organizations in 2011
through a privacy and security lens. They will launch new privacy             as employees and customers increasingly interact with (and discuss)
programs, including updated policies, new procedures and awareness            organizations, products and services. In addition to the GRC and DLP
programs, and will recruit talent accordingly. Reacting to the global         technologies mentioned in previous sections, organizations will
economic downturn, many organizations reduced compliance and                  continue to invest in internal monitoring solutions to monitor
risk management positions. As organizations start to rebound                  inappropriate activity by insiders who use — and may be abusing —
economically, and as privacy risks increase, organizations will               personal information.


                              “ In health care, privacy goes back thousands of years to the Hippocratic Oath. The health care profession
                                realized, even then, that the ability to provide care to individuals requires that the interactions between
                                physician and patient remain confidential. Privacy enables trust, and trust is at the core of providing
                                care. If that trust is absent, there can be negative consequences to the health of a patient, as they may
                                not seek the treatment they need.
                               Unlike breaches in other industries, where you may be able to reimburse an individual after a breach, it is
                               not possible to compensate an individual for an irreversible breach of their privacy. Trust is eroded.
                               Historically, the health care industry’s focus has been on regulatory compliance. The notion of security
                               as a discipline that is separate from compliance is still relatively new. But as health care increasingly
                               relies on technology as a means of providing care, security needs to mean more than basic guidelines on
                               password length and not inappropriately sharing information.
                               The growing reliance on technology exposes the health care industry to new threats that go beyond
                               those that have traditionally been a concern to health care. New and rapidly evolving technologies have
                               also increased the stakes in that a breach may now involve thousands of records. Continuously adapting
                               to changing threats and evolving technologies to manage risk and ensure patient privacy is the challenge
                               we face in health care.”
                                                                             Patrick Heim, Chief Information Security Officer, Kaiser Permanente



                                     Questions to consider
                                     • Have you assessed your budget needs in light of the evolving risk and compliance landscape?
                                     • Have you reviewed the necessary positions for effective governance over your privacy
                                       and data protection activities?
                                     • Have you consulted with your organization’s privacy professionals regarding the investment
                                       in technology to monitor the use (and possible abuse) of personal information?



                                                Insights on IT risk | January 2011                                                                 7
More privacy assessments

Protecting personal information needs to be a never-ending focus               of guidance and training should also be performed, as incidents
for organizations. Internal auditors are increasingly challenged to            involving personal information may result from a lack of awareness
identify and assess controls to minimize the risk of data breaches.            rather than the intent to cause harm.
According to our 2010 Global Information Security Survey, 54% of
                                                                               The American Institute of Certified Public Accountants (AICPA)
participants are already using internal auditing to test controls as a
                                                                               and Canadian Institute of Chartered Accountants (CICA) Privacy
means of controlling data leakage of sensitive information. In 2011,
                                                                               Task Force’s Generally Accepted Privacy Principles (GAPP)
we expect that number to increase.
                                                                               describe a comprehensive framework developed to allow the
In the past, internal audits have had a fairly broad focus. In the             auditing and development of privacy programs. The GAPP help
future, internal audit departments will begin to identify specific              management develop effective policies to address privacy risks.
parts of their organizations to conduct deeper privacy audits.                 They are gaining widespread recognition and use in the design,
This may include reviewing the effectiveness of the monitoring                 measurement, monitoring and auditing of privacy programs. In
of the possible exposure of personal information. Concerns over                2011, organizations will be able to use a newly developed maturity
abuses of personal information by employees, whether intentional               model to assess themselves with incremental improvement in mind.
or unintentional, make privacy an area of risk that internal audit             In addition, beginning in mid-2011, changes to reporting standards
cannot ignore. Such audits address the effective use of technical              for service providers will allow organizations to include the GAPP
controls to monitor activities and the use of personal information             criteria in the report they receive from their auditors.
in databases, repositories and the organization’s network. Audits




Questions to consider
• Are there or should there be any privacy internal audits planned for 2011?
• Does the internal audit group in your organization have access to professional training
  about privacy risks?
• Have you reviewed the GAPP and their possible use in assessing and further developing
  your privacy program?



8                                                Insights on IT risk | January 2011
Service provider reporting standards

Even an organization with the most robust privacy practices and               • A description of its system by management of the service
controls cannot comply with its privacy commitments if its service              provider, and an assertion of the effectiveness of its controls and
providers do not also have equally robust practices and controls.               its compliance with its privacy commitments in accordance
In our 2010 Global Information Security Survey, 41% of participants             with GAPP
indicate that service providers and outsourcing rank among their
                                                                              • An auditor’s opinion on the fairness of the description of the
top five areas of IT risk.
                                                                                system, effectiveness of controls and compliance with privacy
As a result, many organizations desire or require their service                 commitments based on GAPP
providers to obtain an independent assessment of their privacy
                                                                              • A description of the tests performed by the auditor to arrive at its
and security practices. Often, organizations seeking such an
                                                                                opinion, and the results of those tests
assessment have been making do with reports performed in
accordance with Statement on Auditing Standards No. 70                        This new report will provide transparency and insight into the
(SAS 70) reports, although these reports are not intended to                  privacy and security practices of service providers, permitting them
address privacy, or even security for the most part.                          to demonstrate that they have effective privacy and data protection
The AICPA is in the process of issuing new guidance on service                practices in place. Many leading service providers are eagerly
organization controls (SOC) reporting (SOC 2, Reports on Controls             awaiting this new guidance and their customers are anticipating its
at a Service Organization Relevant to Security, Availability,                 release even more.
Processing Integrity, Confidentiality and Privacy), which will allow           Expect 2011 to bring an increased interest in and new discussion
service providers to report on their privacy and security controls.           about independent assessments of privacy and security practices.
A report prepared using this guidance will provide:                           Service providers should become familiar with this new guidance,
                                                                              the principles and criteria of GAPP and the controls necessary to
• A description of the service provider’s system regarding the
                                                                              address them. Service providers and their customers can follow
  privacy and security of personal information throughout
                                                                              the development of this guidance at http://www.aicpa.org/
  its life cycle
                                                                              InterestAreas/InformationTechnology.




                                     Questions to consider
                                     • Have you been relying on your service providers’ SAS 70 report as a privacy and security
                                       monitoring mechanism?
                                     • Have you discussed with your service providers the controls over the use of personal
                                       information that you expect to see covered in the new reports?




                                                Insights on IT risk | January 2011                                                                 9
Privacy by Design

Privacy by Design gained international recognition with the signing          The resolution ensures that privacy becomes an essential component
of the Privacy by Design Resolution at the 32nd International                of privacy protection by embedding it into new technologies and
Conference of Data Protection and Privacy Commissioners in                   business practices from the beginning. The resolution also encourages
Jerusalem. The resolution is intended to help preserve privacy               organizations to adopt Privacy by Design principles as a fundamental
into the future.                                                             means of operation. On a government level, it invites data protection
                                                                             and privacy commissioners globally to promote Privacy by Design
The concept of Privacy by Design is not new. Dr. Ann Cavoukian,
                                                                             and to incorporate its principles in future privacy policy and legislation
Information and Privacy Commissioner of Ontario, Canada, has
                                                                             in their jurisdictions.
been championing the idea since the 1990s. The model offers
a different approach to the security versus privacy conundrum.               In 2011, expect Privacy by Design to be increasingly openly debated
Rather than sacrificing one for the other, the concept of Privacy             by organizations as new products and services are discussed. The
by Design suggests that organizations should design a system                 concept will further elevate the important role privacy professionals
that protects both. Instead of treating privacy as an afterthought,          play in their organizations. It will also help increase their involvement
Privacy by Design offers a proactive and prescriptive response that          with the initial operational considerations — those that influence the
is entrenched into the very fabric of the organization.                      direction of the organization.




                               “ We live in an era of enhanced surveillance: data mining, behavioral profiling, targeted and discriminatory
                                 practices and cloud computing. If we want to preserve the privacy that so many of our freedoms rest
                                 upon, beyond the next decade, we need to commit to a new approach, and we need to do it now.”
                                                    Dr. Ann Cavoukian, Information and Privacy Commissioner, Province of Ontario, Canada




Questions to consider
• Have you considered Privacy by Design as part of your system development life cycle
  (SDLC) and process development life cycle (PDLC)?
• Do privacy professionals in your organization play a mandatory and integral part in the
  early consideration of the business developments and changes that may impact both
  employee and customer personal information?




10                                             Insights on IT risk | January 2011
Social networking

There is a new generation of workers and customers who have                    Commercially, some organizations are creating a presence on social
never known a world without the internet, social media or around-              networks to promote products and services and to communicate
the-clock access to information. They have different expectations              directly with their customers. But when an organization creates a
of their work environment — expectations that blur the lines of                profile for this purpose, how does it define and communicate its
personal, professional and commercial communication.                           privacy practices for the information it collects? And how should
                                                                               employees who communicate with customers on an individual
On an individual level, stories about social networking profiles
                                                                               basis use the additional personal information available to them
scuttling job opportunities are legendary. Once pictures or status
                                                                               from their customers’ profile? These are all questions companies
updates are posted, the internet makes them accessible forever.
                                                                               using social networks as a sales or promotion tool should be asking.
Social networks challenge the privacy concept of the right to
                                                                               Organizations also need to be aware that social media sites can be
be forgotten. Despite the development and growth of privacy
                                                                               abused for fraud purposes and that the information that is collected
regulations, regulators find it difficult to accurately capture the
                                                                               by the site is not in the control of the organization and will likely end
particular challenges that come with sharing personal information
                                                                               up “living” longer than the organization intends or expects.
on social networks. Many of the actions taken by regulators
regarding social networks have been directed at challenging their              In 2011, whether organizations use social networks to reach out to
current practices and requiring certain changes to those practices.            customers or to communicate with (or monitor) employees, policies
The right to be forgotten has yet to be addressed.                             and training are key. It is important that organizations develop and
                                                                               communicate thoughtful policies that address interactions among
In the workplace, there are a host of issues about which companies
                                                                               customers, employees and job candidates. Merely disabling social
need to be clear. They need to be transparent about their expectations
                                                                               network use in the workplace is not a sustainable solution. The
of employees’ behavior on social networking sites (as applicable to
                                                                               reliance on these policies is especially paramount in an environment
the organization) and whether such activities may be monitored
                                                                               where regulatory requirements do not easily align with technology
and used to discipline them. Recruiters should have policies about
                                                                               and its common uses. Awareness campaigns and training must
whether and how to use social networks to mine for information on
                                                                               accompany the policy changes.
candidates and should communicate those intentions clearly when
candidates come in for an interview.




                                      Questions to consider
                                      • Have you considered the possible privacy risk and compliance challenges before using
                                        social media sites for commercial purposes?
                                      • Have you brought together your compliance and HR groups to discuss the approach and
                                        policies to follow regarding the personal information on social media sites of employees and
                                        job candidates?
                                      • Have you clearly communicated your expectations to employees regarding their
                                        communication on social networking sites where they are identified with your
                                        organization, or otherwise interact with colleagues or customers?



                                                 Insights on IT risk | January 2011                                                                  11
Evolving privacy professional expectations

With the ever-increasing scrutiny on privacy protection, it is no              a more holistic approach to data protection. This also encourages
surprise that the privacy profession is evolving well beyond the               more proactive compliance with privacy requirements, rather than
position of the chief privacy officer. Organizations with privacy               attempting to inject privacy after the fact.
offices are recruiting and training privacy professionals to focus on
specific areas of the business. Moreover, far from being a dead-end             Beyond professionals that solely focus on privacy, many positions
role with an unclear career trajectory, privacy positions are playing          that impact the organization’s use of personal information will
a pivotal role within the organization.                                        become increasingly savvy about privacy risk and compliance
                                                                               matters. In 2011, we will see individuals in areas such as IT, audit,
In 2011, organizations will increase their hiring of privacy                   legal and marketing add privacy to their skill sets.
professionals, reversing the head count loss privacy offices
experienced during the economic downturn. Organizations will                   To accommodate that growth, individuals seeking privacy
have a better understanding of the complex nature of privacy                   certifications will rise in 2011. For example, Ernst & Young in the
protection and their need to do a better job of managing the                   US has added Certified Information Privacy Professional (CIPP) as
associated risk and compliance obligations.                                    one of the professional certifications an employee may earn to be
                                                                               promoted in our Advisory Services group. In 2011, this and other
Several organizations are improving the privacy function by merging            certifications will become more professional, allowing individuals to
information security, privacy and other functions (HR, legal, sourcing)        be certified in focused areas, such as jurisdictional regulation, IT or
into virtual information risk governance organizations, which take             industry-specific privacy requirements.



                                 “ As the privacy profession evolves, I expect we’ll see continued focus on regulatory risk and information
                                   technology, but perhaps with an added dose of ethics and social responsibility added in. No longer will
                                   this be a role of just lawyers advising IT professionals or tech experts challenging regulatory norms.
                                   Collaborative technologies are challenging our notions of what is ‘good’ — what is good for our children,
                                   our communities, our society — in terms of how much information we share and keep indefinitely. We
                                   need responsible leaders, in corporations, the government and civil society, to
                                   address these questions.”
                                      Nuala O’Connor Kelly, Senior Counsel, Information Governance & Chief Privacy Leader, General Electric;
                                                    Chairman of the International Association of Privacy Professionals Executive Committee




Questions to consider
• Have you considered specific positions in your organization that can benefit from additional
  training and certification in privacy?
• Have you identified specific certification requirements for professionals handling personal
  information in marketing, IT, internal audit, compliance and legal in your organization?




12                                               Insights on IT risk | January 2011
Conclusion
In an increasingly borderless operational environment, protecting personal information is
paramount. Mobile communication, social networking and cloud computing have erased the
boundaries of the traditional corporate environment. They have also created a number of
new privacy risks for organizations and employees alike.

Regulators have taken notice. The year 2011 promises to usher in a host of new regulations
and enforcement capabilities to see that organizations comply. But, as the new breach
notification regulations coming into effect in various jurisdictions around the world
highlight, privacy protection is no longer a compliance exercise. Organizations that ignore
the importance of protecting personal information from outside — or inside — will suffer
more than financial penalties. They may also see their reputation damaged and their brand
negatively impacted.

Regulation and risk are the two primary reasons we will see organizations increasing their
investment in privacy. They will be spending money to hire highly skilled certified privacy
professionals and will invest in technical controls that monitor and manage external attacks
and leaks from within.

As we enter 2011, a fundamental shift in how organizations approach privacy may be in
order. Protecting personal information can no longer be an afterthought that is bolted
onto an existing privacy or security program. As Privacy by Design suggests, it needs to
be a series of much-needed policies that embed privacy protection into new technologies
and business practices at the outset. The focus on privacy will enhance the business
performance of leading organizations.
Ernst & Young

Assurance | Tax | Transactions | Advisory


About Ernst & Young
Ernst & Young is a global leader in assurance, tax,
transaction and advisory services. Worldwide,                        About Ernst & Young
our 141,000 people are united by our shared
values and an unwavering commitment to quality.                      At Ernst & Young, our services focus on our individual clients’ specific business needs
We make a difference by helping our people,                          and issues because we recognize that each is unique to that business.
our clients and our wider communities achieve
their potential.                                                     IT is a key to allowing modern organizations to compete. It offers the opportunity to become closer
                                                                     to customers and more focused and faster in responses, and can redefine both the effectiveness
Ernst & Young refers to the global organization                      and efficiency of operations. But as opportunity grows, so does risk. Effective IT risk management
of member firms of Ernst & Young Global                              helps you to improve the competitive advantage of your IT operations, by making these operations
Limited, each of which is a separate legal entity.                   more cost efficient and managing down the risks related to running your systems. Our 6,000 IT
Ernst & Young Global Limited, a UK company                           risk professionals draw on extensive personal experience to give you fresh perspectives and open,
limited by guarantee, does not provide services                      objective advice — wherever you are in the world. We work with you to develop an integrated,
to clients. For more information about our                           holistic approach to your IT risk or to deal with a specific risk and information security issue.
organization, please visit www.ey.com                                We understand that to achieve your potential you need tailored services as much as consistent
                                                                     methodologies. We work to give you the benefit of our broad sector experience, our deep
About Ernst & Young’s Advisory Services                              subject-matter knowledge and the latest insights from our work worldwide. It’s how
The relationship between risk and performance                        Ernst & Young makes a difference.
improvement is an increasingly complex and
central business challenge, with business                            For more information on how we can make a difference in your organization, contact your local
performance directly connected to the                                Ernst & Young professional or a member of our team listed below.
recognition and effective management of risk.
Whether your focus is on business transformation
or sustaining achievement, having the right                          Contacts
advisors on your side can make all the difference.
Our 20,000 advisory professionals form one of                         Global
the broadest global advisory networks of any
                                                                      Norman Lonergan                      +44 20 7980 0596         norman.lonergan@uk.ey.com
professional organization, delivering seasoned
                                                                      (Advisory Services Leader)
multidisciplinary teams that work with our
clients to deliver a powerful and superior                            Advisory Services
client experience. We use proven, integrated
methodologies to help you achieve your strategic                      Robert Patton                        +1 404 817 5579          robert.patton@ey.com
priorities and make improvements that are                             (Americas Leader)
sustainable for the longer term. We understand                        Andrew Embury                        +44 20 7951 1802         aembury@uk.ey.com
that to achieve your potential as an organization                     (Europe, Middle East, India and
you require services that respond to your specific                     Africa Leader)
issues, so we bring our broad sector experience
                                                                      Doug Simpson                         +61 2 9248 4923          doug.simpson@au.ey.com
and deep subject matter knowledge to bear in a
                                                                      (Asia Pacific Leader)
proactive and objective way. Above all, we are
committed to measuring the gains and identifying                      Naoki Matsumura                      +81 3 3503 1100          matsumura-nk@shinnihon.or.jp
where the strategy is delivering the value your                       (Japan Leader)
business needs. It’s how Ernst & Young makes
a difference.                                                         IT Risk and Assurance Services
© 2011 EYGM Limited.                                                  Bernie Wedge                         +1 404 817 5120          bernard.wedge@ey.com
All Rights Reserved.                                                  (Americas Leader)
                                                                      Paul van Kessel                      +31 88 40 71271          paul.van.kessel@nl.ey.com
EYG no. AU0730                                                        (Europe, Middle East, India and
                                                                      Africa Leader)
          In line with Ernst & Young’s commitment to minimize
          its impact on the environment, this document has            Troy Kelly                           +852 2629 3238           troy.kelly@hk.ey.com
          been printed on paper with a high recycled content.
                                                                      (Asia Pacific Leader)
This publication contains information in summary form and is          Masahiko Tsukahara                   +81 3 3503 2900          tsukahara-mshk@shinnihon.or.jp
therefore intended for general guidance only. It is not intended      (Japan Leader)
to be a substitute for detailed research or the exercise of
professional judgment. Neither EYGM Limited nor any other
member of the global Ernst & Young organization can accept
any responsibility for loss occasioned to any person acting
or refraining from action as a result of any material in this
publication. On any specific matter, reference should be made
to the appropriate advisor. The opinions of third parties set out
in this publication are not necessarily the opinions of the global
Ernst & Young organization or its member firms. Moreover, they
should be viewed in the context of the time they were expressed.

www.ey.com

Contenu connexe

Tendances

Cs8792 cns - unit i
Cs8792   cns - unit iCs8792   cns - unit i
Cs8792 cns - unit iArthyR3
 
The Cybersecurity Executive Order
The Cybersecurity Executive OrderThe Cybersecurity Executive Order
The Cybersecurity Executive OrderBooz Allen Hamilton
 
02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Securitysappingtonkr
 
Protection and defense against sensitive data leakage problem within organiza...
Protection and defense against sensitive data leakage problem within organiza...Protection and defense against sensitive data leakage problem within organiza...
Protection and defense against sensitive data leakage problem within organiza...Alexander Decker
 
Cybersecurity Law and Risk Management
Cybersecurity Law and Risk ManagementCybersecurity Law and Risk Management
Cybersecurity Law and Risk ManagementKeelan Stewart
 
Integrating the prevention of cyber crime into the overall anti-crime strateg...
Integrating the prevention of cyber crime into the overall anti-crime strateg...Integrating the prevention of cyber crime into the overall anti-crime strateg...
Integrating the prevention of cyber crime into the overall anti-crime strateg...Jacqueline Fick
 
Information governance
Information governanceInformation governance
Information governanceGerardo Medina
 
Lily lim data privacy ownership and ethics
Lily lim data privacy ownership and ethicsLily lim data privacy ownership and ethics
Lily lim data privacy ownership and ethicsMassTLC
 
2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA ComplianceRaffa Learning Community
 
Data Protection in India
Data Protection in IndiaData Protection in India
Data Protection in IndiaHome
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Financial Poise
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009asundaram1
 
Privacy Impact Assessment Methodologies for Protection of Personal Data
Privacy Impact Assessment Methodologies for Protection of Personal DataPrivacy Impact Assessment Methodologies for Protection of Personal Data
Privacy Impact Assessment Methodologies for Protection of Personal DataH. T. Besik
 
Integrating the prevention of cyber crime into the overall anti-crime strateg...
Integrating the prevention of cyber crime into the overall anti-crime strateg...Integrating the prevention of cyber crime into the overall anti-crime strateg...
Integrating the prevention of cyber crime into the overall anti-crime strateg...Jacqueline Fick
 
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...Hansa Edirisinghe
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
20111010 The National Security Framework of Spain for Guide Share Europe, in ...
20111010 The National Security Framework of Spain for Guide Share Europe, in ...20111010 The National Security Framework of Spain for Guide Share Europe, in ...
20111010 The National Security Framework of Spain for Guide Share Europe, in ...Miguel A. Amutio
 

Tendances (20)

Cs8792 cns - unit i
Cs8792   cns - unit iCs8792   cns - unit i
Cs8792 cns - unit i
 
The Cybersecurity Executive Order
The Cybersecurity Executive OrderThe Cybersecurity Executive Order
The Cybersecurity Executive Order
 
02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security
 
Protection and defense against sensitive data leakage problem within organiza...
Protection and defense against sensitive data leakage problem within organiza...Protection and defense against sensitive data leakage problem within organiza...
Protection and defense against sensitive data leakage problem within organiza...
 
Cybersecurity Law and Risk Management
Cybersecurity Law and Risk ManagementCybersecurity Law and Risk Management
Cybersecurity Law and Risk Management
 
Integrating the prevention of cyber crime into the overall anti-crime strateg...
Integrating the prevention of cyber crime into the overall anti-crime strateg...Integrating the prevention of cyber crime into the overall anti-crime strateg...
Integrating the prevention of cyber crime into the overall anti-crime strateg...
 
Information governance
Information governanceInformation governance
Information governance
 
Social & Ethical Issues in Information Systems
Social & Ethical Issues in Information SystemsSocial & Ethical Issues in Information Systems
Social & Ethical Issues in Information Systems
 
Lily lim data privacy ownership and ethics
Lily lim data privacy ownership and ethicsLily lim data privacy ownership and ethics
Lily lim data privacy ownership and ethics
 
Data protection
Data protectionData protection
Data protection
 
2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance
 
Data Breach Response Checklist
Data Breach Response ChecklistData Breach Response Checklist
Data Breach Response Checklist
 
Data Protection in India
Data Protection in IndiaData Protection in India
Data Protection in India
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009
 
Privacy Impact Assessment Methodologies for Protection of Personal Data
Privacy Impact Assessment Methodologies for Protection of Personal DataPrivacy Impact Assessment Methodologies for Protection of Personal Data
Privacy Impact Assessment Methodologies for Protection of Personal Data
 
Integrating the prevention of cyber crime into the overall anti-crime strateg...
Integrating the prevention of cyber crime into the overall anti-crime strateg...Integrating the prevention of cyber crime into the overall anti-crime strateg...
Integrating the prevention of cyber crime into the overall anti-crime strateg...
 
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
20111010 The National Security Framework of Spain for Guide Share Europe, in ...
20111010 The National Security Framework of Spain for Guide Share Europe, in ...20111010 The National Security Framework of Spain for Guide Share Europe, in ...
20111010 The National Security Framework of Spain for Guide Share Europe, in ...
 

En vedette (8)

Developing A Privacy Culture In Health Care Oganizations
Developing A Privacy Culture In Health Care OganizationsDeveloping A Privacy Culture In Health Care Oganizations
Developing A Privacy Culture In Health Care Oganizations
 
2010 GISS EY
2010 GISS EY2010 GISS EY
2010 GISS EY
 
Texto bb4
Texto bb4Texto bb4
Texto bb4
 
Eli at the MSU Explorations in Instructional Technology Brownbag Series
Eli at the MSU Explorations in Instructional Technology Brownbag SeriesEli at the MSU Explorations in Instructional Technology Brownbag Series
Eli at the MSU Explorations in Instructional Technology Brownbag Series
 
Security certification overview
Security certification overviewSecurity certification overview
Security certification overview
 
Borderless world
Borderless worldBorderless world
Borderless world
 
8 Tips for an Awesome Powerpoint Presentation
8 Tips for an Awesome Powerpoint Presentation8 Tips for an Awesome Powerpoint Presentation
8 Tips for an Awesome Powerpoint Presentation
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI Explainer
 

Similaire à Privacy trends 2011

Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy IntroductionG Prachi
 
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdfData Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdfCIOWomenMagazine
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...Symantec
 
Running Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docx
Running Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docxRunning Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docx
Running Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docxtodd581
 
Running Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docx
Running Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docxRunning Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docx
Running Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docxglendar3
 
Data Privacy and Protection in the Digital Age - pdf.pdf
Data Privacy and Protection in the Digital Age - pdf.pdfData Privacy and Protection in the Digital Age - pdf.pdf
Data Privacy and Protection in the Digital Age - pdf.pdfKarpagam Institute
 
Managing Consumer Data Privacy
Managing Consumer Data PrivacyManaging Consumer Data Privacy
Managing Consumer Data PrivacyGigya
 
Running head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docx
Running head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docxRunning head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docx
Running head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docxjeanettehully
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast- Mark - Fullbright
 
Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Druva
 
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020Jessica Graf
 
RIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCE
RIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCERIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCE
RIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCEVARUN KESAVAN
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxjeanettehully
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxglendar3
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxtodd581
 
The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law Owako Rodah
 
GDPRIBMWhitePaper
GDPRIBMWhitePaperGDPRIBMWhitePaper
GDPRIBMWhitePaperJim Wilson
 
The Evolution of Data Privacy: 3 Things You Need To Consider
The Evolution of Data Privacy:  3 Things You Need To ConsiderThe Evolution of Data Privacy:  3 Things You Need To Consider
The Evolution of Data Privacy: 3 Things You Need To ConsiderSymantec
 
DATA SAFEGUARD INC.- WHITE PAPER
DATA SAFEGUARD INC.- WHITE PAPERDATA SAFEGUARD INC.- WHITE PAPER
DATA SAFEGUARD INC.- WHITE PAPERYashiVaidya
 

Similaire à Privacy trends 2011 (20)

Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdfData Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
 
Running Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docx
Running Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docxRunning Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docx
Running Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docx
 
Running Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docx
Running Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docxRunning Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docx
Running Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docx
 
Data Privacy and Protection in the Digital Age - pdf.pdf
Data Privacy and Protection in the Digital Age - pdf.pdfData Privacy and Protection in the Digital Age - pdf.pdf
Data Privacy and Protection in the Digital Age - pdf.pdf
 
Managing Consumer Data Privacy
Managing Consumer Data PrivacyManaging Consumer Data Privacy
Managing Consumer Data Privacy
 
Running head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docx
Running head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docxRunning head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docx
Running head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docx
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast
 
Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?
 
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
 
RIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCE
RIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCERIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCE
RIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCE
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law
 
GDPRIBMWhitePaper
GDPRIBMWhitePaperGDPRIBMWhitePaper
GDPRIBMWhitePaper
 
The Evolution of Data Privacy: 3 Things You Need To Consider
The Evolution of Data Privacy:  3 Things You Need To ConsiderThe Evolution of Data Privacy:  3 Things You Need To Consider
The Evolution of Data Privacy: 3 Things You Need To Consider
 
DATA SAFEGUARD INC.- WHITE PAPER
DATA SAFEGUARD INC.- WHITE PAPERDATA SAFEGUARD INC.- WHITE PAPER
DATA SAFEGUARD INC.- WHITE PAPER
 

Plus de Vladimir Matviychuk

Thinking outside the box survey questions
Thinking outside the box survey questions Thinking outside the box survey questions
Thinking outside the box survey questions Vladimir Matviychuk
 
Insights on it risks evolving it landscape
Insights on it risks evolving it landscapeInsights on it risks evolving it landscape
Insights on it risks evolving it landscapeVladimir Matviychuk
 
Управление рисками - серебряная пуля или данность моды?
Управление рисками - серебряная пуля или данность моды?Управление рисками - серебряная пуля или данность моды?
Управление рисками - серебряная пуля или данность моды?Vladimir Matviychuk
 
Building control efficiency: Rationalization, optimization and redesign
Building control efficiency: Rationalization, optimization and redesign Building control efficiency: Rationalization, optimization and redesign
Building control efficiency: Rationalization, optimization and redesign Vladimir Matviychuk
 
Insights on it risks cyber attacks
Insights on it risks cyber attacksInsights on it risks cyber attacks
Insights on it risks cyber attacksVladimir Matviychuk
 
Роль ИТ в выявлении и предотвращении мошенничества на предприятии
Роль ИТ в выявлении и предотвращении мошенничества на предприятииРоль ИТ в выявлении и предотвращении мошенничества на предприятии
Роль ИТ в выявлении и предотвращении мошенничества на предприятииVladimir Matviychuk
 
2010 giss results_global and ua_2010
2010 giss results_global and ua_20102010 giss results_global and ua_2010
2010 giss results_global and ua_2010Vladimir Matviychuk
 
как составить грамотный Slа
как составить грамотный Slакак составить грамотный Slа
как составить грамотный SlаVladimir Matviychuk
 

Plus de Vladimir Matviychuk (17)

дети в интернете
дети в интернетедети в интернете
дети в интернете
 
Thinking outside the box survey questions
Thinking outside the box survey questions Thinking outside the box survey questions
Thinking outside the box survey questions
 
Thinking outside the box (SOX)
Thinking outside the box (SOX)Thinking outside the box (SOX)
Thinking outside the box (SOX)
 
Insights on it risk bcm
Insights on it risk bcmInsights on it risk bcm
Insights on it risk bcm
 
Insights on it risks evolving it landscape
Insights on it risks evolving it landscapeInsights on it risks evolving it landscape
Insights on it risks evolving it landscape
 
Управление рисками - серебряная пуля или данность моды?
Управление рисками - серебряная пуля или данность моды?Управление рисками - серебряная пуля или данность моды?
Управление рисками - серебряная пуля или данность моды?
 
Building control efficiency: Rationalization, optimization and redesign
Building control efficiency: Rationalization, optimization and redesign Building control efficiency: Rationalization, optimization and redesign
Building control efficiency: Rationalization, optimization and redesign
 
Insights on it risks cyber attacks
Insights on it risks cyber attacksInsights on it risks cyber attacks
Insights on it risks cyber attacks
 
Роль ИТ в выявлении и предотвращении мошенничества на предприятии
Роль ИТ в выявлении и предотвращении мошенничества на предприятииРоль ИТ в выявлении и предотвращении мошенничества на предприятии
Роль ИТ в выявлении и предотвращении мошенничества на предприятии
 
2010 giss results_global and ua_2010
2010 giss results_global and ua_20102010 giss results_global and ua_2010
2010 giss results_global and ua_2010
 
Effective risk management
Effective risk managementEffective risk management
Effective risk management
 
как составить грамотный Slа
как составить грамотный Slакак составить грамотный Slа
как составить грамотный Slа
 
BCP intro
BCP introBCP intro
BCP intro
 
Continious auditing
Continious auditingContinious auditing
Continious auditing
 
Legalcamp 2.0
Legalcamp 2.0Legalcamp 2.0
Legalcamp 2.0
 
Security Innovation Forum
Security Innovation ForumSecurity Innovation Forum
Security Innovation Forum
 
Yalta_10 _ey-cio_forum
Yalta_10 _ey-cio_forumYalta_10 _ey-cio_forum
Yalta_10 _ey-cio_forum
 

Dernier

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Dernier (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Privacy trends 2011

  • 1. Insights on IT risk January 2011 Privacy trends 2011 Challenges to privacy programs in a borderless world
  • 2. Summary of trends • Regulation, laws and enforcement. Historically, enforcement of privacy legislation has been inconsistent or nonexistent. Today’s regulators plan on changing that by expanding their reach and imposing tougher penalties. • Additional breach notification requirements. Governments around the world are drafting and adopting breach notification legislation. Organizations need to adapt based on their industry and jurisdictions of operations. • Governance, risk and compliance (GRC) initiatives. Organizations are expanding GRC initiatives to converge with governance and enhance business performance with risk management. There is only a small number of GRC technologies available, but that number is growing. In 2011, expect technology firms to produce and update modules that attempt to address privacy monitoring. • Cloud computing. Organizations transitioning their business processes to a cloud environment need to have robust vendor risk management and third-party reporting capabilities in place that address privacy risks. • Mobile devices. Portable media means portable personal information. Employees and organizations alike need to understand and respect the power, limitations and technical controls of mobile devices. • Increased investment. Organizations are increasing their investment in governance and tools that help manage privacy and data protection, in part because of regulation, but also because of increasing risks. • More privacy assessments. Look for internal audit departments to identify specific parts of their organizations on which to conduct deeper privacy audits and for other assessments to expand. • Service provider reporting standards. Changes to the Statement on Auditing Standards (SAS) 70 in 2011 will give service providers the ability to obtain a report on privacy and data protection controls and compliance. • Privacy by Design. Evolving from a concept to an essential component of privacy protection, Privacy by Design suggests that regulators are recognizing the importance of embedding privacy into new technologies and business practices from the beginning. • Social networking. Organizations need to develop and communicate thoughtful privacy protection policies that address interactions among customers, employees and job candidates on social networks. • Evolving privacy professional expectations. Privacy certifications are becoming more specialized, allowing individuals to be certified in focused areas such as jurisdictional regulation, IT or industry. iii Insights on IT risk | January 2011
  • 3. Introduction For years, the fixed boundaries of an office’s four walls have, for the most part, enabled companies to manage the privacy of the data they keep. But in an era of anytime, anywhere access to information, these traditional boundaries are disappearing. It is a new world — technology-driven, ever-connected, globally extended and well beyond the scope of conventional privacy protection approaches. In Borderless security: Ernst & Young’s 2010 Global Information Security Survey, 81% of executives interviewed indicate that managing privacy and protecting personal data is very important or important to their organization. And no wonder: highly publicized incidents of data leaks or identity theft pose huge brand and reputation risks for businesses — a concern survey participants ranked even higher than privacy protection (84%). As a result, executives are investing more money to protect the privacy of personal information — to respond to ever-increasing government regulation and enforcement and to stem the rising tide of risk. But are they spending it in the right places? With parts of the global economy still limping toward recovery, executives continue to ask this burning question as they search for the right balance between spending on privacy protection and taking appropriate levels of risk to manage costs. One thing is certain: technological advances will only continue to accelerate, and organizations need to be ready. While governments are stepping up regulation and enforcement, privacy protection lacks international cohesion. It is a compliance patchwork with levels of consistency that vary from country to country and industry to industry. Organizations do not have time to wait for global regulatory bodies to reach consensus. They need to take action now to proactively develop and implement enterprise-wide privacy protection strategies that match the organization’s risk profile. By looking upon privacy strategies to drive regulation rather than the other way around, companies can meet today’s needs and also anticipate tomorrow’s challenges. Insights on IT risk | January 2011 1
  • 4. Regulations, laws and enforcement Historically, enforcement of information protection legislation and for improving cooperation and coordination among member has lacked teeth. Today’s regulators plan on changing that by nations. In advance of the release of new regulations under the expanding their reach and imposing tougher penalties. The US EU Data Protection Directive, several EU countries have been busy Health Information Technology for Economic and Clinical Health intensifying existing enforcement policies. (HITECH) Act of 2009 (the HITECH Act) is one such example. Under This year, Mexico, a significant outsourcing destination, joined the HITECH Act, state attorneys general can investigate and take about 50 other countries in adopting a broad privacy regulation action against organizations for failing to secure protected health that focuses on the private sector. The Federal Law on the information. The year 2011 will bring additional clarity and detail Protection of Personal Data Held by Private Parties will impact regarding the provisions of regulations that address the online many large US-based companies operating in Mexico. environment in many countries. Similarly, the EU found the data protection laws of Israel, an In the EU, the European Commission is in the process of updating important outsourcing destination for the EU, provided an the 1995 EU Data Protection Directive. Plans for strengthening “adequate level of data protection” relative to the EU Data enforcement include providing data protection authorities with Protection Directive. This designation means that data between the ability to investigate and sue organizations that do not comply, the EU and Israel can now move much more freely. Questions to consider • Have you stayed current with the regulations impacting your particular industry and the personal information your organization processes? • Have you reviewed whether regulations have changed in the jurisdiction(s) where you operate? • Have you assessed your compliance with applicable regulations recently? 2 Insights on IT risk | January 2011
  • 5. Additional breach notification requirements Breach notification goes beyond regulatory compliance. Its Breach notification cannot be discussed without raising the focus is on transparency, which has fundamentally altered how concern of the “insider threat.” Individuals who are authorized to organizations approach privacy and data protection. Breach access and use information are increasingly found at the center notification failures have resulted in reputational damage and of high-profile incidents. Such misuse of information may be attracted the attention of regulators. In the US, most states have due either to lack of awareness or to malicious intent. Training adopted breach notification requirements that commonly address and awareness are key to addressing the unintended disclosure sensitive and financial identifiers. The HITECH Act introduced of information. Technical controls, such as tools for monitoring similar requirements for protected health information. And, information traffic, can be of great help when addressing more while the US has been an early adopter of breach notification malicious cases. requirements, these types of requirements are increasingly taking Data loss prevention (DLP) tools can also help by monitoring hold in other places around the world. unintentional or intentional data leaks from within the organization. In Canada, an amendment to the Personal Information Protection In 2011, we will continue to see the popularity of these tools and Electronic Documents Act (PIPEDA) is making its way through increase as organizations look for a technical control to limit their the regulatory process and includes breach notification obligations. breach exposure. However, it takes more than the purchase of a In the EU, a breach notification regulation for the telecommunications DLP tool to achieve effective monitoring of personal information industry will come into effect in 2011. In addition, the EU’s review to prevent loss. Adopting these tools requires appropriate of the Data Protection Directive is expected to result in notification consideration of the policy that will guide the extent of the tool’s requirements for all EU member countries. Some EU countries are implementation (e.g., to stop a possible leak or just report it for a adding their own breach notification provisions. In the UK, for later investigation) as well as cross-functional leadership support example, regulators are working on a law that will force organizations and the necessary staffing to implement it. to publicly acknowledge any data breaches to regulators and to Regardless of jurisdiction, organizations have to adapt to new inform those affected. requirements regarding breach notification. Whatever their In Asia, Japan is leading the way with breach notification reliance is on technical controls for combating the loss of personal requirements that have been in place for several years. Much information, organizations need to have effective programs in like in the US, the expense associated with such breaches can place to detect, address and resolve breaches. They also need to lead to a significant number of direct and indirect expenses for have open and transparent communication plans to inform those organizations operating there. affected when their data is compromised. Questions to consider • Have you developed and implemented an incident response plan for handling breaches of personal information? • Have you identified the relevant breach notification requirements in your industry and jurisdiction(s) of operation? • Have you looked into the adoption of a DLP tool or using DLP services to monitor your organization’s network for possible loss of personal information? Insights on IT risk | January 2011 3
  • 6. Governance, risk and compliance (GRC) initiatives Organizations have been investing heavily in GRC initiatives for update a common roster that identifies where an organization’s years. But in the wake of the worst economic crisis since the Great data resides. In 2011, we expect technology firms large and small Depression, some reports are suggesting that financial institutions to produce new modules that will attempt to better integrate alone were spending up to US$100 billion on mitigating risks in 2010. privacy into control monitoring. In an Ernst & Young survey of 567 organizations across Europe, the GRC tools, however, should not be seen as a one-dimensional Middle East, India and Africa in 2010,1 69% of participants indicate solution for managing risk. Often, organizations need to completely that they are highly reliant on their GRC activities as a safeguard transform their risk functions. In 2011, we expect to see progressive against failure. And yet, 67% of respondents suggest that more organizations take an integrated approach that aligns risk and work is needed to enhance their GRC functions. strategic business objectives. This means shifting GRC investment to focus on the risks that matter, and looking across the enterprise to From a technology perspective, the market for GRC tools continues identify compliance control redundancies. From there, organizations to develop and offer risk management solutions, and more specifically, may wish to consider compliance convergence, which streamlines solutions for managing privacy. In 2009 and 2010, technology controls horizontally rather than vertically within the organization. heavyweights entered the GRC market. However, few vendors offer Convergence of control activities will reduce audit fatigue and the a full GRC solution, and even fewer offer sophisticated or easy to use strain that repeat audits put on resources. It may also produce modules for privacy management. This is partly due to the complex the much-needed cost efficiencies many budget-conscious nature of the requirements and partly due to the difficulty involved organizations still seek. in automating key privacy-related updates. But while the giant GRC technology firms may still be finding their feet when it comes As organizations endeavor to implement a risk transformation to privacy management, some boutique software companies, program to improve GRC performance, privacy professionals need seeing a gap to fill, are entering the market. These smaller firms to make sure they have a seat at the table to ensure that privacy are aggressively exploring ways to automate regulatory and policy concerns remain a top priority for risk leaders and an integral part mapping, incorporate a framework for integrated compliance and of any comprehensive GRC solution. risk assessments, and provide the ability for multiple users to Questions to consider • Have you considered different approaches for continuously monitoring key aspects of your privacy program? • Have you assessed GRC solutions that offer a wide range of monitoring areas, including privacy? • Have you asked your current GRC vendor for updated modules to help monitor risk and compliance related to the use of personal information? 1 The multi-billion dollar black hole — Is your governance, risk and compliance investment being sucked in?, Ernst & Young’s survey of 567 companies in Europe, the Middle East, India and Africa, conducted in the second quarter of 2010. 4 Insights on IT risk | January 2011
  • 7. “ Cloud computing has enormous social and economic potential. It can help businesses save money and create jobs. It can help governments increase efficiency and better serve their citizens. And it can help schools better educate their students. However, privacy concerns remain a significant impediment to the adoption of cloud computing for many potential customers. To ensure that society can maximize the benefits of cloud computing, removing the blockers around privacy is critical. Cloud service providers can start by building customers’ confidence in the cloud. They can do this by demonstrating an inherent respect for privacy that is embodied in transparent business practices and a commitment to accountability.” Brendon Lynch, Chief Privacy Officer, Microsoft Cloud computing While cloud computing may be on the rise, many organizations still Today in the US, it’s easier to subpoena or otherwise compel the have reservations about the inherent data privacy and security release of information when it is held by a third party (such as a risks associated with using cloud providers. In our 2010 Global cloud provider) than its original owner. And then there are laws Information Security Survey, only 23% of participants indicate that such as the PATRIOT Act, which for some specific purposes allows they currently use cloud computing-based delivery solutions. A the government to gain access to personal information residing in a further 55% say they have no plans to use cloud computing in the third-party cloud provider without the knowledge of the information next 12 months. But this will change quickly — according to a 2010 owner or data subject. Gartner research publication, by 2014 less than 10% of companies Further, as more companies choose to use a third-party cloud will see privacy concerns as a reason not to join the cloud.2 provider in 2011, they need to outline specific requirements that The major attractions of cloud computing are cost and flexibility. As enable them to meet their privacy regulatory obligations. Before some global economies struggle to recover, organizations are looking moving data to the cloud, organizations should analyze their data for more ways to streamline operations and save money. Cloud and develop policies that address both the risks associated with computing can be a huge cost-saver. It is particularly attractive to sensitive data and regulatory requirements. small- and medium-size businesses that use it to stay competitive. Policies should include how soon the cloud provider needs to alert But with cloud use comes responsibility. Organizations need to have the organization of a suspected breach so that the organization can robust vendor risk management, including third-party reporting notify relevant regulatory bodies and individuals. Organizations will capabilities that address data privacy risks. For example, cloud also want to be clear about retention periods, where the data can services located in different geographies raise regulatory challenges or cannot be transferred, logging of access by cloud administrators as personal information travels across jurisdictions. and the ability of other parties to access the data for market research or other secondary activities. Questions to consider • Have you conducted a risk-based review of what business processes and related personal information are needed before a move can be made to a cloud environment, and what varying levels of protection and control they require? • Have you reviewed what contractual and regulatory limitations may exist over the use of a cloud provider, including questions surrounding geographic location, data retention and security? • Have you explored your ability to monitor the adherence of your cloud providers to the terms set in your agreement with them, including the protection of personal information? 2 “Predicts 2011: Enterprises Should Not Wait to Find Solutions for Business-Critical Privacy Issues,” Gartner, 8 November 2010, © 2010 Gartner, Inc. and/or its Affiliates. Insights on IT risk | January 2011 5
  • 8. Mobile devices Laptops, cell phones, smart phones and tablets: in today’s wireless Encryption world, there is an array of mobile devices that employees can use Traveling data means understanding and adhering to state, federal to stay connected to the office without stepping foot in the building. and international privacy regulations that will vary from one This kind of mobility offers huge opportunities for organizations jurisdiction to another. Some emphasize the encryption of personal to enhance productivity. But there are risks. Portable media lead information on mobile devices (e.g., the State of Massachusetts in to portable personal information. In 2011, we expect increased the US). But, in most cases, hard drive encryption is only useful when regulation that directly addresses protecting personal information a mobile device is lost or stolen and it is in the “off” or “hibernation” on mobile devices, and the sensitive information revealed by mode. It doesn’t protect against hackers, nor does it necessarily geo-location tracking of mobile devices. protect information that is being backed up. Encryption is an effective tool for protecting some data, but it is not preventing attacks and it Geo-location is likely not addressing your organization’s top security risks. Technology advances are increasingly enabling organizations to identify the physical location of a device, as well as the person Training and transparency using it. In terms of privacy, organizations need to understand The benefits to organizations and employees of being able to work where to draw the line in using location data. in different locations and in different time zones (think telecommuting) On the employee level, organizations can keep track of their bring increased responsibility for protecting the personal information workforce, comparing where their employees are at any given employees use for work. Employees and organizations alike need time versus where they are supposed to be. On the customer level, to understand and respect the limitations and technical controls organizations can offer marketing programs that are based on of mobile devices. When employees use personal devices for work, immediate location. organizations may be able to apply technical controls (e.g., require a download of a certain load set before allowing a personal device If organizations decide to use physical location to track employees to connect to the firm’s network) that provide visibility into various or reach out to customers with special offers, transparency is content and activities on those devices. paramount. Employees need to know what the policies are regarding geo-location and what tools they may have at their disposal to shield However, where should the organization draw the line in terms of their privacy by choosing how much information they share on the infringement on personal privacy? Organizations need to ensure device. Customers must have the opportunity to provide informed that they have specific policies regarding the use of each mobile consent before allowing any organization to track their location. device issued, and the extent to which personal devices used for work purposes may be monitored. Organizations should clearly communicate to employees what information is being monitored, how it is being monitored and the consequences for not adhering to mobile device policies. Questions to consider • Have you considered both the advantages and risks associated with using mobile device geo-location information for your operations? • Have you assessed what level of encryption (or combination of levels) is merited to protect personal information in the common work settings of your organization? • Have you reviewed your privacy policies recently in light of your organization’s use of mobile devices? 6 Insights on IT risk | January 2011
  • 9. Increased investment Organizations understand the significance of data protection. They start to re-invest in related positions. The increased use of tools to are increasing their investment around personal information, in protect privacy, such as DLP solutions, will also require appropriate part because of regulation, but also because of increasing risks. staffing to monitor and respond to technology alerts. In 2011 we will see an increase in privacy and data protection In terms of technical controls, 2011 promises more spending in this investments that will focus on two issues: program initiatives and area as organizations rely more heavily on controls to manage technical controls. personal information. Tracing the web, with brand risk management Organizations will once again review their governance structure in mind, is yet another area of investment for organizations in 2011 through a privacy and security lens. They will launch new privacy as employees and customers increasingly interact with (and discuss) programs, including updated policies, new procedures and awareness organizations, products and services. In addition to the GRC and DLP programs, and will recruit talent accordingly. Reacting to the global technologies mentioned in previous sections, organizations will economic downturn, many organizations reduced compliance and continue to invest in internal monitoring solutions to monitor risk management positions. As organizations start to rebound inappropriate activity by insiders who use — and may be abusing — economically, and as privacy risks increase, organizations will personal information. “ In health care, privacy goes back thousands of years to the Hippocratic Oath. The health care profession realized, even then, that the ability to provide care to individuals requires that the interactions between physician and patient remain confidential. Privacy enables trust, and trust is at the core of providing care. If that trust is absent, there can be negative consequences to the health of a patient, as they may not seek the treatment they need. Unlike breaches in other industries, where you may be able to reimburse an individual after a breach, it is not possible to compensate an individual for an irreversible breach of their privacy. Trust is eroded. Historically, the health care industry’s focus has been on regulatory compliance. The notion of security as a discipline that is separate from compliance is still relatively new. But as health care increasingly relies on technology as a means of providing care, security needs to mean more than basic guidelines on password length and not inappropriately sharing information. The growing reliance on technology exposes the health care industry to new threats that go beyond those that have traditionally been a concern to health care. New and rapidly evolving technologies have also increased the stakes in that a breach may now involve thousands of records. Continuously adapting to changing threats and evolving technologies to manage risk and ensure patient privacy is the challenge we face in health care.” Patrick Heim, Chief Information Security Officer, Kaiser Permanente Questions to consider • Have you assessed your budget needs in light of the evolving risk and compliance landscape? • Have you reviewed the necessary positions for effective governance over your privacy and data protection activities? • Have you consulted with your organization’s privacy professionals regarding the investment in technology to monitor the use (and possible abuse) of personal information? Insights on IT risk | January 2011 7
  • 10. More privacy assessments Protecting personal information needs to be a never-ending focus of guidance and training should also be performed, as incidents for organizations. Internal auditors are increasingly challenged to involving personal information may result from a lack of awareness identify and assess controls to minimize the risk of data breaches. rather than the intent to cause harm. According to our 2010 Global Information Security Survey, 54% of The American Institute of Certified Public Accountants (AICPA) participants are already using internal auditing to test controls as a and Canadian Institute of Chartered Accountants (CICA) Privacy means of controlling data leakage of sensitive information. In 2011, Task Force’s Generally Accepted Privacy Principles (GAPP) we expect that number to increase. describe a comprehensive framework developed to allow the In the past, internal audits have had a fairly broad focus. In the auditing and development of privacy programs. The GAPP help future, internal audit departments will begin to identify specific management develop effective policies to address privacy risks. parts of their organizations to conduct deeper privacy audits. They are gaining widespread recognition and use in the design, This may include reviewing the effectiveness of the monitoring measurement, monitoring and auditing of privacy programs. In of the possible exposure of personal information. Concerns over 2011, organizations will be able to use a newly developed maturity abuses of personal information by employees, whether intentional model to assess themselves with incremental improvement in mind. or unintentional, make privacy an area of risk that internal audit In addition, beginning in mid-2011, changes to reporting standards cannot ignore. Such audits address the effective use of technical for service providers will allow organizations to include the GAPP controls to monitor activities and the use of personal information criteria in the report they receive from their auditors. in databases, repositories and the organization’s network. Audits Questions to consider • Are there or should there be any privacy internal audits planned for 2011? • Does the internal audit group in your organization have access to professional training about privacy risks? • Have you reviewed the GAPP and their possible use in assessing and further developing your privacy program? 8 Insights on IT risk | January 2011
  • 11. Service provider reporting standards Even an organization with the most robust privacy practices and • A description of its system by management of the service controls cannot comply with its privacy commitments if its service provider, and an assertion of the effectiveness of its controls and providers do not also have equally robust practices and controls. its compliance with its privacy commitments in accordance In our 2010 Global Information Security Survey, 41% of participants with GAPP indicate that service providers and outsourcing rank among their • An auditor’s opinion on the fairness of the description of the top five areas of IT risk. system, effectiveness of controls and compliance with privacy As a result, many organizations desire or require their service commitments based on GAPP providers to obtain an independent assessment of their privacy • A description of the tests performed by the auditor to arrive at its and security practices. Often, organizations seeking such an opinion, and the results of those tests assessment have been making do with reports performed in accordance with Statement on Auditing Standards No. 70 This new report will provide transparency and insight into the (SAS 70) reports, although these reports are not intended to privacy and security practices of service providers, permitting them address privacy, or even security for the most part. to demonstrate that they have effective privacy and data protection The AICPA is in the process of issuing new guidance on service practices in place. Many leading service providers are eagerly organization controls (SOC) reporting (SOC 2, Reports on Controls awaiting this new guidance and their customers are anticipating its at a Service Organization Relevant to Security, Availability, release even more. Processing Integrity, Confidentiality and Privacy), which will allow Expect 2011 to bring an increased interest in and new discussion service providers to report on their privacy and security controls. about independent assessments of privacy and security practices. A report prepared using this guidance will provide: Service providers should become familiar with this new guidance, the principles and criteria of GAPP and the controls necessary to • A description of the service provider’s system regarding the address them. Service providers and their customers can follow privacy and security of personal information throughout the development of this guidance at http://www.aicpa.org/ its life cycle InterestAreas/InformationTechnology. Questions to consider • Have you been relying on your service providers’ SAS 70 report as a privacy and security monitoring mechanism? • Have you discussed with your service providers the controls over the use of personal information that you expect to see covered in the new reports? Insights on IT risk | January 2011 9
  • 12. Privacy by Design Privacy by Design gained international recognition with the signing The resolution ensures that privacy becomes an essential component of the Privacy by Design Resolution at the 32nd International of privacy protection by embedding it into new technologies and Conference of Data Protection and Privacy Commissioners in business practices from the beginning. The resolution also encourages Jerusalem. The resolution is intended to help preserve privacy organizations to adopt Privacy by Design principles as a fundamental into the future. means of operation. On a government level, it invites data protection and privacy commissioners globally to promote Privacy by Design The concept of Privacy by Design is not new. Dr. Ann Cavoukian, and to incorporate its principles in future privacy policy and legislation Information and Privacy Commissioner of Ontario, Canada, has in their jurisdictions. been championing the idea since the 1990s. The model offers a different approach to the security versus privacy conundrum. In 2011, expect Privacy by Design to be increasingly openly debated Rather than sacrificing one for the other, the concept of Privacy by organizations as new products and services are discussed. The by Design suggests that organizations should design a system concept will further elevate the important role privacy professionals that protects both. Instead of treating privacy as an afterthought, play in their organizations. It will also help increase their involvement Privacy by Design offers a proactive and prescriptive response that with the initial operational considerations — those that influence the is entrenched into the very fabric of the organization. direction of the organization. “ We live in an era of enhanced surveillance: data mining, behavioral profiling, targeted and discriminatory practices and cloud computing. If we want to preserve the privacy that so many of our freedoms rest upon, beyond the next decade, we need to commit to a new approach, and we need to do it now.” Dr. Ann Cavoukian, Information and Privacy Commissioner, Province of Ontario, Canada Questions to consider • Have you considered Privacy by Design as part of your system development life cycle (SDLC) and process development life cycle (PDLC)? • Do privacy professionals in your organization play a mandatory and integral part in the early consideration of the business developments and changes that may impact both employee and customer personal information? 10 Insights on IT risk | January 2011
  • 13. Social networking There is a new generation of workers and customers who have Commercially, some organizations are creating a presence on social never known a world without the internet, social media or around- networks to promote products and services and to communicate the-clock access to information. They have different expectations directly with their customers. But when an organization creates a of their work environment — expectations that blur the lines of profile for this purpose, how does it define and communicate its personal, professional and commercial communication. privacy practices for the information it collects? And how should employees who communicate with customers on an individual On an individual level, stories about social networking profiles basis use the additional personal information available to them scuttling job opportunities are legendary. Once pictures or status from their customers’ profile? These are all questions companies updates are posted, the internet makes them accessible forever. using social networks as a sales or promotion tool should be asking. Social networks challenge the privacy concept of the right to Organizations also need to be aware that social media sites can be be forgotten. Despite the development and growth of privacy abused for fraud purposes and that the information that is collected regulations, regulators find it difficult to accurately capture the by the site is not in the control of the organization and will likely end particular challenges that come with sharing personal information up “living” longer than the organization intends or expects. on social networks. Many of the actions taken by regulators regarding social networks have been directed at challenging their In 2011, whether organizations use social networks to reach out to current practices and requiring certain changes to those practices. customers or to communicate with (or monitor) employees, policies The right to be forgotten has yet to be addressed. and training are key. It is important that organizations develop and communicate thoughtful policies that address interactions among In the workplace, there are a host of issues about which companies customers, employees and job candidates. Merely disabling social need to be clear. They need to be transparent about their expectations network use in the workplace is not a sustainable solution. The of employees’ behavior on social networking sites (as applicable to reliance on these policies is especially paramount in an environment the organization) and whether such activities may be monitored where regulatory requirements do not easily align with technology and used to discipline them. Recruiters should have policies about and its common uses. Awareness campaigns and training must whether and how to use social networks to mine for information on accompany the policy changes. candidates and should communicate those intentions clearly when candidates come in for an interview. Questions to consider • Have you considered the possible privacy risk and compliance challenges before using social media sites for commercial purposes? • Have you brought together your compliance and HR groups to discuss the approach and policies to follow regarding the personal information on social media sites of employees and job candidates? • Have you clearly communicated your expectations to employees regarding their communication on social networking sites where they are identified with your organization, or otherwise interact with colleagues or customers? Insights on IT risk | January 2011 11
  • 14. Evolving privacy professional expectations With the ever-increasing scrutiny on privacy protection, it is no a more holistic approach to data protection. This also encourages surprise that the privacy profession is evolving well beyond the more proactive compliance with privacy requirements, rather than position of the chief privacy officer. Organizations with privacy attempting to inject privacy after the fact. offices are recruiting and training privacy professionals to focus on specific areas of the business. Moreover, far from being a dead-end Beyond professionals that solely focus on privacy, many positions role with an unclear career trajectory, privacy positions are playing that impact the organization’s use of personal information will a pivotal role within the organization. become increasingly savvy about privacy risk and compliance matters. In 2011, we will see individuals in areas such as IT, audit, In 2011, organizations will increase their hiring of privacy legal and marketing add privacy to their skill sets. professionals, reversing the head count loss privacy offices experienced during the economic downturn. Organizations will To accommodate that growth, individuals seeking privacy have a better understanding of the complex nature of privacy certifications will rise in 2011. For example, Ernst & Young in the protection and their need to do a better job of managing the US has added Certified Information Privacy Professional (CIPP) as associated risk and compliance obligations. one of the professional certifications an employee may earn to be promoted in our Advisory Services group. In 2011, this and other Several organizations are improving the privacy function by merging certifications will become more professional, allowing individuals to information security, privacy and other functions (HR, legal, sourcing) be certified in focused areas, such as jurisdictional regulation, IT or into virtual information risk governance organizations, which take industry-specific privacy requirements. “ As the privacy profession evolves, I expect we’ll see continued focus on regulatory risk and information technology, but perhaps with an added dose of ethics and social responsibility added in. No longer will this be a role of just lawyers advising IT professionals or tech experts challenging regulatory norms. Collaborative technologies are challenging our notions of what is ‘good’ — what is good for our children, our communities, our society — in terms of how much information we share and keep indefinitely. We need responsible leaders, in corporations, the government and civil society, to address these questions.” Nuala O’Connor Kelly, Senior Counsel, Information Governance & Chief Privacy Leader, General Electric; Chairman of the International Association of Privacy Professionals Executive Committee Questions to consider • Have you considered specific positions in your organization that can benefit from additional training and certification in privacy? • Have you identified specific certification requirements for professionals handling personal information in marketing, IT, internal audit, compliance and legal in your organization? 12 Insights on IT risk | January 2011
  • 15. Conclusion In an increasingly borderless operational environment, protecting personal information is paramount. Mobile communication, social networking and cloud computing have erased the boundaries of the traditional corporate environment. They have also created a number of new privacy risks for organizations and employees alike. Regulators have taken notice. The year 2011 promises to usher in a host of new regulations and enforcement capabilities to see that organizations comply. But, as the new breach notification regulations coming into effect in various jurisdictions around the world highlight, privacy protection is no longer a compliance exercise. Organizations that ignore the importance of protecting personal information from outside — or inside — will suffer more than financial penalties. They may also see their reputation damaged and their brand negatively impacted. Regulation and risk are the two primary reasons we will see organizations increasing their investment in privacy. They will be spending money to hire highly skilled certified privacy professionals and will invest in technical controls that monitor and manage external attacks and leaks from within. As we enter 2011, a fundamental shift in how organizations approach privacy may be in order. Protecting personal information can no longer be an afterthought that is bolted onto an existing privacy or security program. As Privacy by Design suggests, it needs to be a series of much-needed policies that embed privacy protection into new technologies and business practices at the outset. The focus on privacy will enhance the business performance of leading organizations.
  • 16. Ernst & Young Assurance | Tax | Transactions | Advisory About Ernst & Young Ernst & Young is a global leader in assurance, tax, transaction and advisory services. Worldwide, About Ernst & Young our 141,000 people are united by our shared values and an unwavering commitment to quality. At Ernst & Young, our services focus on our individual clients’ specific business needs We make a difference by helping our people, and issues because we recognize that each is unique to that business. our clients and our wider communities achieve their potential. IT is a key to allowing modern organizations to compete. It offers the opportunity to become closer to customers and more focused and faster in responses, and can redefine both the effectiveness Ernst & Young refers to the global organization and efficiency of operations. But as opportunity grows, so does risk. Effective IT risk management of member firms of Ernst & Young Global helps you to improve the competitive advantage of your IT operations, by making these operations Limited, each of which is a separate legal entity. more cost efficient and managing down the risks related to running your systems. Our 6,000 IT Ernst & Young Global Limited, a UK company risk professionals draw on extensive personal experience to give you fresh perspectives and open, limited by guarantee, does not provide services objective advice — wherever you are in the world. We work with you to develop an integrated, to clients. For more information about our holistic approach to your IT risk or to deal with a specific risk and information security issue. organization, please visit www.ey.com We understand that to achieve your potential you need tailored services as much as consistent methodologies. We work to give you the benefit of our broad sector experience, our deep About Ernst & Young’s Advisory Services subject-matter knowledge and the latest insights from our work worldwide. It’s how The relationship between risk and performance Ernst & Young makes a difference. improvement is an increasingly complex and central business challenge, with business For more information on how we can make a difference in your organization, contact your local performance directly connected to the Ernst & Young professional or a member of our team listed below. recognition and effective management of risk. Whether your focus is on business transformation or sustaining achievement, having the right Contacts advisors on your side can make all the difference. Our 20,000 advisory professionals form one of Global the broadest global advisory networks of any Norman Lonergan +44 20 7980 0596 norman.lonergan@uk.ey.com professional organization, delivering seasoned (Advisory Services Leader) multidisciplinary teams that work with our clients to deliver a powerful and superior Advisory Services client experience. We use proven, integrated methodologies to help you achieve your strategic Robert Patton +1 404 817 5579 robert.patton@ey.com priorities and make improvements that are (Americas Leader) sustainable for the longer term. We understand Andrew Embury +44 20 7951 1802 aembury@uk.ey.com that to achieve your potential as an organization (Europe, Middle East, India and you require services that respond to your specific Africa Leader) issues, so we bring our broad sector experience Doug Simpson +61 2 9248 4923 doug.simpson@au.ey.com and deep subject matter knowledge to bear in a (Asia Pacific Leader) proactive and objective way. Above all, we are committed to measuring the gains and identifying Naoki Matsumura +81 3 3503 1100 matsumura-nk@shinnihon.or.jp where the strategy is delivering the value your (Japan Leader) business needs. It’s how Ernst & Young makes a difference. IT Risk and Assurance Services © 2011 EYGM Limited. Bernie Wedge +1 404 817 5120 bernard.wedge@ey.com All Rights Reserved. (Americas Leader) Paul van Kessel +31 88 40 71271 paul.van.kessel@nl.ey.com EYG no. AU0730 (Europe, Middle East, India and Africa Leader) In line with Ernst & Young’s commitment to minimize its impact on the environment, this document has Troy Kelly +852 2629 3238 troy.kelly@hk.ey.com been printed on paper with a high recycled content. (Asia Pacific Leader) This publication contains information in summary form and is Masahiko Tsukahara +81 3 3503 2900 tsukahara-mshk@shinnihon.or.jp therefore intended for general guidance only. It is not intended (Japan Leader) to be a substitute for detailed research or the exercise of professional judgment. Neither EYGM Limited nor any other member of the global Ernst & Young organization can accept any responsibility for loss occasioned to any person acting or refraining from action as a result of any material in this publication. On any specific matter, reference should be made to the appropriate advisor. The opinions of third parties set out in this publication are not necessarily the opinions of the global Ernst & Young organization or its member firms. Moreover, they should be viewed in the context of the time they were expressed. www.ey.com