SlideShare a Scribd company logo
1 of 16
SACONConfidential (c) Arrka, 2020
SACON International 2020
India | Bangalore | February 21 - 22 | Taj Yeshwantpur
An Introduction to Data Privacy
1
SACON 2020
An Introduction to Data Privacy
2
• What is Personal Data?
• An Overview of Privacy Principles & Rights
• Relationship between Information Security and Privacy
• How should an organization implement Privacy?
SACON 2020
When we talk Data Privacy, we talk Personal Data
Any data that can – directly or
indirectly - or in combination
with other data – make a person
‘identifiable’
What is Personal Data?
Device Identifiers
Online Identifiers
Social Media MarkersMetadata Data that has been
processed using
analytics that can
identify a person
Trackers & CookiesLocation Data
Above – the – surface (ATS) Personal data
Demographic/
Identity Data
Health/
Biometric/Genetic/
Gender Data
Political Affiliations/
Personal beliefs/
Criminal History/etc
Financial Data
Govt Ids
Any compromise of this category of
data can cause greater harm to the
person as compared to other types
of PD
Sensitive
Personal Data
(SPD)
Financial data, health data, official identifier,
sex life, sexual orientation, biometric data,
genetic data, transgender status, intersex
status, caste or tribe, religious or political
belief or affiliation*
Further sub-categories
Comprises:
Personal Data
(PD)
Below – the – surface (BTS) Personal data
SACON 2020
Personal Data In Context
Data
Personal Data
Sensitive
Personal Data
Data Privacy not
Applicable
Data Privacy
Applicable
SACON 2020
Data Privacy Applies to Personal Data Processing
Collection Recording Organisation Structuring
Storage Alteration Transmission Dissemination
Restriction Destruction Generation
SACON 2020
Roles in the Privacy Ecosystem
Data Subject/
Principal
She ‘OWNS’ her
Personal Data
Data Controller/
Fiduciary
The entity that, alone or jointly with others,
determines the Purposes for data processing (“Why”)
& Means of data processing
(“How”)
6
DATA PROCESSOR The entity that processes personal data:
On behalf of the Fiduciary
Under the instructions of the fiduciary
SACON 2020
What are the Principles that
guide Personal Data Processing?
7
SACON 2020
Grounds for Processing Personal Data – The When
Consent
Function of State
Public Interest
Compliance with law or order of court/ tribunal
Prompt action in case emergencies
Purposes related to employment
*Reasonable Purposes of Data Fiduciary
• Processing for prevention &
detection of any unlawful activity
including fraud
• Whistle blowing
• M&A
• Network and information security
• Credit scoring
• Recovery of debt
• Processing of publicly available PD
*Reasonable Purpose Examples
SACON 2020
Principles Guiding Personal Data Processing – The How
Security Safeguards: Ensure Security Safeguards throughout the Lifecycle to protect against loss, unauthorised access, destruction, use,
modification, disclosure or other reasonably foreseeable risks.
User Rights: Provide Rights to user for Access, Correction, Processing Restrictions, etc.
Data Collection Data Usage Data Destruction
Consent: Obtain Informed, freely given
and unambiguous consent where
applicable
Collection Limitation: Collect adequate,
relevant based on Purpose
Use Limitation: Use and disclose
collected Personal Data only for pre-
defined purposes. Limit Access to only
relevant users.
Storage Limitation: Retain Personal
Data long enough to satisfy the
purpose of Collection. Define Retention
Periods
Notice/ Transparency: Organization should publish a Public Statement on the Type of Personal Data collected, used, who it is shared with and
how long it is retained
Accountability: Organization needs to implement Accountability measures to manage Privacy. Examples of these measures include Breach
Notification, Privacy By Design, inserting Privacy Clauses in 3rd Party Contracts, maintaining Records of Processing
SACON 2020
Is Data Privacy the same as
Information Security?
10
SACON 2020
Information
Security
Data
Privacy
11
Relationship: Infosec & Privacy
Security of
Personal Data
Covers Security of
non-Personal Data
Covers non-Security
related Privacy Principles
(i.e. Notice, Collection
Limitation)
SACON 2020
How should an Organization
implement Privacy?
12
SACON 202013
The need for a Framework..
Organization
Questions on
Privacy
Implementation
Where should
we start?
What kind of
Organization
structure and
capabilities do
we need?
What are the
Policies and
Processes that
need to be
implemented?
What are the
Technical,
Administrative
measures
needed?
How do we
monitor Privacy
on an ongoing
basis?
Privacy Implementation is a complex
exercise impacting more than 80% of
the organization
Most Privacy Requirements need
coordination between multiple
functions
Lack of Governance has seen failure of
many Privacy Programs
Lack of a structured Approach is a
common cause for failure
SACON 2020
Some
Privacy
Program
Frameworks
DPF
ISO
27701
BS
10012
14
Privacy Frameworks that provide a Structured Approach
BS 10012:2017 is the British
standard that sets out the
requirements for a Personal
Information Management
System and aligns with the
principles of the European
General Data Protection
Regulation (EU GDPR).
ISO 27701 is a privacy extension to
ISO 27001&02 and provides
additional guidance for the
protection of privacy, which is
potentially affected by the
processing of Personal Data.
The DSCI Privacy Framework (DPF) has
been developed to guide an
organization on developing &
implementing a Privacy Program
SACON 2020
9. PIS
7. IUA
3. PPP1. VPI
2. POR 4. RCI
5. PCM
6. MIM 8. PAT
15
A Sample Framework: DSCI Privacy Framework (DPF)
# Practice Areas
1 Visibility over Personal Information (VPI)
2 Privacy Org & Responsibilities (POR)
3 Privacy Policy and Processes (PPP)
4 Regulatory Compliance and Intelligence (RCI)
5 Privacy Contract Management (PCM)
6 Privacy Monitoring and Incident Mgt (MIM)
7 Information Usage & Access (IUA)
8 Privacy Awareness and Training (PAT)
9 Personal Information Security (PIS)
DSCI PRIVACY FRAMEWORK (DPF)
Confidential (c) Arrka, 2018
SACON 2020
Thank You
Q & A

More Related Content

What's hot

What's hot (20)

BigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesBigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar Slides
 
BigID Data Sheet: GDPR Compliance
BigID Data Sheet: GDPR ComplianceBigID Data Sheet: GDPR Compliance
BigID Data Sheet: GDPR Compliance
 
BigID's Smart Data Labeling and Tagging
BigID's Smart Data Labeling and TaggingBigID's Smart Data Labeling and Tagging
BigID's Smart Data Labeling and Tagging
 
BigID Data Sheet HIPAA Data Security & Privacy
BigID Data Sheet HIPAA Data Security & Privacy BigID Data Sheet HIPAA Data Security & Privacy
BigID Data Sheet HIPAA Data Security & Privacy
 
BigID Virtual MDM Data Sheet
BigID Virtual MDM Data SheetBigID Virtual MDM Data Sheet
BigID Virtual MDM Data Sheet
 
BigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
BigID Data Subject Rights Automation for GDPR & Privacy Data SheetBigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
BigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
 
BigID Datasheet: CCPA Data Rights Automation
BigID Datasheet: CCPA Data Rights AutomationBigID Datasheet: CCPA Data Rights Automation
BigID Datasheet: CCPA Data Rights Automation
 
2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
 
Beginning your General Data Protection Regulation (GDPR) Journey
Beginning your General Data Protection Regulation (GDPR) JourneyBeginning your General Data Protection Regulation (GDPR) Journey
Beginning your General Data Protection Regulation (GDPR) Journey
 
Finding Data at Risk for CCPA Compliance
Finding Data at Risk for CCPA ComplianceFinding Data at Risk for CCPA Compliance
Finding Data at Risk for CCPA Compliance
 
Personally Identifiable Information – FTC: Identity theft is the most common ...
Personally Identifiable Information – FTC: Identity theft is the most common ...Personally Identifiable Information – FTC: Identity theft is the most common ...
Personally Identifiable Information – FTC: Identity theft is the most common ...
 
Becoming PIPL Compliant In No Time
Becoming PIPL Compliant In No TimeBecoming PIPL Compliant In No Time
Becoming PIPL Compliant In No Time
 
2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management
 
GDPR: Your Journey to Compliance
GDPR: Your Journey to ComplianceGDPR: Your Journey to Compliance
GDPR: Your Journey to Compliance
 
Privacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital WorldPrivacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital World
 
Ensuring GDPR Compliance - A Zymplify Guide
Ensuring GDPR Compliance - A Zymplify GuideEnsuring GDPR Compliance - A Zymplify Guide
Ensuring GDPR Compliance - A Zymplify Guide
 
2019 06-19 convince customerspartnersboard gdpr-compliant
2019 06-19 convince customerspartnersboard gdpr-compliant2019 06-19 convince customerspartnersboard gdpr-compliant
2019 06-19 convince customerspartnersboard gdpr-compliant
 
Marketing under the GDPR: What You Can and Cannot Do [Webinar Slides]
Marketing under the GDPR: What You Can and Cannot Do [Webinar Slides]Marketing under the GDPR: What You Can and Cannot Do [Webinar Slides]
Marketing under the GDPR: What You Can and Cannot Do [Webinar Slides]
 
2019 09-26 leveraging the power of automated intelligence for privacy management
2019 09-26 leveraging the power of automated intelligence for privacy management2019 09-26 leveraging the power of automated intelligence for privacy management
2019 09-26 leveraging the power of automated intelligence for privacy management
 
GDPR changes affect direct marketing
GDPR changes affect direct marketingGDPR changes affect direct marketing
GDPR changes affect direct marketing
 

Similar to (SACON) Shivangi Nadkarni & Sandeep Rao - An introduction to Data Privacy

Legal And Regulatory Dp Challenges For The Financial Services Sector
Legal And Regulatory Dp Challenges For The Financial Services SectorLegal And Regulatory Dp Challenges For The Financial Services Sector
Legal And Regulatory Dp Challenges For The Financial Services Sector
MSpadea
 
Data Privacy and consent management .. .
Data Privacy and consent management  ..  .Data Privacy and consent management  ..  .
Data Privacy and consent management .. .
ClinosolIndia
 

Similar to (SACON) Shivangi Nadkarni & Sandeep Rao - An introduction to Data Privacy (20)

GDPR in the Healthcare Industry
GDPR in the Healthcare IndustryGDPR in the Healthcare Industry
GDPR in the Healthcare Industry
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI Webinar
 
GDPR How to get started?
GDPR  How to get started?GDPR  How to get started?
GDPR How to get started?
 
Legal And Regulatory Dp Challenges For The Financial Services Sector
Legal And Regulatory Dp Challenges For The Financial Services SectorLegal And Regulatory Dp Challenges For The Financial Services Sector
Legal And Regulatory Dp Challenges For The Financial Services Sector
 
GDPR for your Payroll Bureau
GDPR for your Payroll BureauGDPR for your Payroll Bureau
GDPR for your Payroll Bureau
 
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEnabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
 
Data Privacy and consent management .. .
Data Privacy and consent management  ..  .Data Privacy and consent management  ..  .
Data Privacy and consent management .. .
 
Data privacy and consent management (K.sailaja).pptx
Data privacy and consent management (K.sailaja).pptxData privacy and consent management (K.sailaja).pptx
Data privacy and consent management (K.sailaja).pptx
 
My presentation- Ala about privacy and GDPR
My presentation- Ala about privacy and GDPRMy presentation- Ala about privacy and GDPR
My presentation- Ala about privacy and GDPR
 
General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001
 
Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR Success
 
Implementing and Auditing GDPR Series (2 of 10)
Implementing and Auditing GDPR Series (2 of 10) Implementing and Auditing GDPR Series (2 of 10)
Implementing and Auditing GDPR Series (2 of 10)
 
Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10) Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10)
 
Uchi data local presentation 2020
Uchi data local presentation 2020Uchi data local presentation 2020
Uchi data local presentation 2020
 
GDPR – Readiness in IT offshore organization
GDPR – Readiness in IT offshore organization  GDPR – Readiness in IT offshore organization
GDPR – Readiness in IT offshore organization
 
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdfData Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
 
What's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesWhat's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) Changes
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready?
 
General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6 General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6
 
GDPR for your Payroll Bureau
GDPR for your Payroll BureauGDPR for your Payroll Bureau
GDPR for your Payroll Bureau
 

More from Priyanka Aash

More from Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Recently uploaded

Recently uploaded (20)

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 

(SACON) Shivangi Nadkarni & Sandeep Rao - An introduction to Data Privacy

  • 1. SACONConfidential (c) Arrka, 2020 SACON International 2020 India | Bangalore | February 21 - 22 | Taj Yeshwantpur An Introduction to Data Privacy 1
  • 2. SACON 2020 An Introduction to Data Privacy 2 • What is Personal Data? • An Overview of Privacy Principles & Rights • Relationship between Information Security and Privacy • How should an organization implement Privacy?
  • 3. SACON 2020 When we talk Data Privacy, we talk Personal Data Any data that can – directly or indirectly - or in combination with other data – make a person ‘identifiable’ What is Personal Data? Device Identifiers Online Identifiers Social Media MarkersMetadata Data that has been processed using analytics that can identify a person Trackers & CookiesLocation Data Above – the – surface (ATS) Personal data Demographic/ Identity Data Health/ Biometric/Genetic/ Gender Data Political Affiliations/ Personal beliefs/ Criminal History/etc Financial Data Govt Ids Any compromise of this category of data can cause greater harm to the person as compared to other types of PD Sensitive Personal Data (SPD) Financial data, health data, official identifier, sex life, sexual orientation, biometric data, genetic data, transgender status, intersex status, caste or tribe, religious or political belief or affiliation* Further sub-categories Comprises: Personal Data (PD) Below – the – surface (BTS) Personal data
  • 4. SACON 2020 Personal Data In Context Data Personal Data Sensitive Personal Data Data Privacy not Applicable Data Privacy Applicable
  • 5. SACON 2020 Data Privacy Applies to Personal Data Processing Collection Recording Organisation Structuring Storage Alteration Transmission Dissemination Restriction Destruction Generation
  • 6. SACON 2020 Roles in the Privacy Ecosystem Data Subject/ Principal She ‘OWNS’ her Personal Data Data Controller/ Fiduciary The entity that, alone or jointly with others, determines the Purposes for data processing (“Why”) & Means of data processing (“How”) 6 DATA PROCESSOR The entity that processes personal data: On behalf of the Fiduciary Under the instructions of the fiduciary
  • 7. SACON 2020 What are the Principles that guide Personal Data Processing? 7
  • 8. SACON 2020 Grounds for Processing Personal Data – The When Consent Function of State Public Interest Compliance with law or order of court/ tribunal Prompt action in case emergencies Purposes related to employment *Reasonable Purposes of Data Fiduciary • Processing for prevention & detection of any unlawful activity including fraud • Whistle blowing • M&A • Network and information security • Credit scoring • Recovery of debt • Processing of publicly available PD *Reasonable Purpose Examples
  • 9. SACON 2020 Principles Guiding Personal Data Processing – The How Security Safeguards: Ensure Security Safeguards throughout the Lifecycle to protect against loss, unauthorised access, destruction, use, modification, disclosure or other reasonably foreseeable risks. User Rights: Provide Rights to user for Access, Correction, Processing Restrictions, etc. Data Collection Data Usage Data Destruction Consent: Obtain Informed, freely given and unambiguous consent where applicable Collection Limitation: Collect adequate, relevant based on Purpose Use Limitation: Use and disclose collected Personal Data only for pre- defined purposes. Limit Access to only relevant users. Storage Limitation: Retain Personal Data long enough to satisfy the purpose of Collection. Define Retention Periods Notice/ Transparency: Organization should publish a Public Statement on the Type of Personal Data collected, used, who it is shared with and how long it is retained Accountability: Organization needs to implement Accountability measures to manage Privacy. Examples of these measures include Breach Notification, Privacy By Design, inserting Privacy Clauses in 3rd Party Contracts, maintaining Records of Processing
  • 10. SACON 2020 Is Data Privacy the same as Information Security? 10
  • 11. SACON 2020 Information Security Data Privacy 11 Relationship: Infosec & Privacy Security of Personal Data Covers Security of non-Personal Data Covers non-Security related Privacy Principles (i.e. Notice, Collection Limitation)
  • 12. SACON 2020 How should an Organization implement Privacy? 12
  • 13. SACON 202013 The need for a Framework.. Organization Questions on Privacy Implementation Where should we start? What kind of Organization structure and capabilities do we need? What are the Policies and Processes that need to be implemented? What are the Technical, Administrative measures needed? How do we monitor Privacy on an ongoing basis? Privacy Implementation is a complex exercise impacting more than 80% of the organization Most Privacy Requirements need coordination between multiple functions Lack of Governance has seen failure of many Privacy Programs Lack of a structured Approach is a common cause for failure
  • 14. SACON 2020 Some Privacy Program Frameworks DPF ISO 27701 BS 10012 14 Privacy Frameworks that provide a Structured Approach BS 10012:2017 is the British standard that sets out the requirements for a Personal Information Management System and aligns with the principles of the European General Data Protection Regulation (EU GDPR). ISO 27701 is a privacy extension to ISO 27001&02 and provides additional guidance for the protection of privacy, which is potentially affected by the processing of Personal Data. The DSCI Privacy Framework (DPF) has been developed to guide an organization on developing & implementing a Privacy Program
  • 15. SACON 2020 9. PIS 7. IUA 3. PPP1. VPI 2. POR 4. RCI 5. PCM 6. MIM 8. PAT 15 A Sample Framework: DSCI Privacy Framework (DPF) # Practice Areas 1 Visibility over Personal Information (VPI) 2 Privacy Org & Responsibilities (POR) 3 Privacy Policy and Processes (PPP) 4 Regulatory Compliance and Intelligence (RCI) 5 Privacy Contract Management (PCM) 6 Privacy Monitoring and Incident Mgt (MIM) 7 Information Usage & Access (IUA) 8 Privacy Awareness and Training (PAT) 9 Personal Information Security (PIS) DSCI PRIVACY FRAMEWORK (DPF) Confidential (c) Arrka, 2018