DCPP Training Program Set2 v0.5 - Maya Misra
DCPP Training Program Set2 v0.5 - Maya Misra
TRAINING PROGRAM
Schedule – Day 2
2
Judicial Systems
NOTE: Privacy Laws are always playing ‘catch-up’ with technology and other developments and trends
Industry has adopted alternatives to formal regulations (like Codes of Practice, ISO standards,
Trust Seals)
Many aspects of privacy have been introduced into other legislations or regulations (for e.g. – in
consumer protection laws)
Therefore, should governance of privacy
be an evolving ‘hybrid’ approach
from industry-bodies as they develop best practices and codes of conduct for their members
At the same time, countries have to protect the interests of its citizens and safeguard their right to
privacy
particularly so where an average citizen does not comprehend what goes on ‘behind the scenes’
or its possible implications.
how to achieve a balance between the two forces. Should such flows be governed at all in the first
place? If yes, in what manner?
raises the costs of services which get passed on the same citizens.
Components Explanation
Fines Multifold increase, per breach fine, even to an extent of % of
income
Criminal Penalties Fines, Imprisonment for willful neglect or violation as part of
pattern
Technical & Organizational Measures High level v/s Stringent requirements, prescriptive controls,
insists on CPO/DPO
Data transfer Specific legal requirements, technical means, overseeing
mechanism, BCR, Safe harbor
Legal Relationship Relationship- Data Subject, Exporter (Controller), Importer
(Processor) , Supervisory authority
Components Explanation
Regulatory Infrastructure Infrastructure- Privacy/Information Commissioner, FTC,
EU, DPAs
Contract Guidelines & Monitoring Model contract guidelines, monitoring & controls e.g.
SCCs
Components Explanation
Dispute
Data Transfer Data Breach
Privacy Principles Resolution Liabilities
Instruments Notification
Mechanisms
Definition of
Rights of Data Organizational
Legal
Subjects Measures
Relationships
Generic vs Prescriptive
Functional vs Entity
Privacy Codes
C. A. Privacy Principles
Controller/Processor
Obligations B. Data Subject Rights – Rights are provided to data
subjects to help them have more control over their PI
Lawfulness of
Processing
Breach Data Privacy Records of
Management Impact Processing
Security Purpose Assessment
Safeguards Limitation
+ +
Privacy Data protection Data Protection Cross Border
Principles by design and Officer Transfer
by default Appointment
Data Quality Data
(Accuracy) Minimization
Processor
Contract
Storage Management
limitation
In 2016, the EU adopted the General Data Protection Regulation (GDPR), one of its greatest
achievements in recent years. It replaces the 1995 Data Protection Directive which was adopted at a
time when the internet was in its infancy.
'Personal data' means any information relating to an identified or identifiable natural person ('data subject'); an
identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an
identifier such as a name, an identification number, location data, an online identifier or to one or more factors
specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person
'Processing' means any operation or set of operations which is performed on Personal Data or on sets of Personal
Data, whether or not by automated means, such as collection, recording, organisation, structuring, storage,
adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making
available, alignment or combination, restriction, erasure or destruction
Identifiable natural person: “one who can be identified, directly or indirectly, in particular by reference
to an identifier such as a name, an identification number, location data, an online identifier or to one or
more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity
of that natural person
Accountability
The controller shall be responsible for and be able to demonstrate compliance with all the privacy
principles.
Confidential (c) Arrka, 2020
Licensed to Maya Misra <[email protected]> on 07-04-2020. Single user license only, copying and networking prohibited.
Data Subjects have the right to..
26
..not be
..object to
..restrict ..data subject to
data being
processing portability automated
processed
processing
..communicate
to the
..communicate ..appoint a Data
supervisory ..provide ..cooperate with
to data subjects Protection
authority if they appropriate the supervisory
about data Officer where
have a breach security authority
breaches specified
(within 72
hours)
..carry out data protection impact
.. determine responsibilities of each controller,
assessments and consult supervisory
if two or more controllers are involved
authority
Notification to Data
Subject
If this risk is ‘high’, then
the same has to be
Notification to notified to the affected
Supervisory Authority individual(s) as well.
(Within 72 hrs.)
• If a breach is expected to result in a risk to the rights and the freedom of an individual, the same has to be
reported to the Supervisory Authority.
• The assessment of whether a particular breach falls under the risk vs high risk category will have to be done on
a case-by-case basis.
• Different threshold levels applicable for notification to each of the above.
• If the nature of the breach is serious enough to require notification to the public at large, then the same must be
done without undue delay.
Confidential (c) Arrka, 2020
Licensed to Maya Misra <[email protected]> on 07-04-2020. Single user license only, copying and networking prohibited.
Obligations of Processors
29
PRINCIPLES
Violation
DATA TRANSFER
Controller Processor
Up to
Violation €10M or Violation
2% global
turnover
Confidential (c) Arrka, 2020
Licensed to Maya Misra <[email protected]> on 07-04-2020. Single user license only, copying and networking prohibited.
Supervisory Authority
32
1. Challenging compliance
2. Lawfulness, fair and transparency
3.Security
4. Accuracy
1.Right to Anonymity
2.Right to be Informed
3.Right to Object
4.Right to Data Portability
Background:
HIPAA (or the Health Insurance Portability and Accountability Act)
◼ passed in 1996
◼ to enable Electronic Healthcare Transactions.
HITECH (The Health Information Technology for Economic and Clinical Health Act)
◼ enacted in Feb 2009
◼ to promote health information technology (HIT) and enable electronic exchange of health
information.
Scope and Applicability
Physicians, healthcare orgns and their business associates – including patient safety
organizations (PSOs), health information organizations (HIOs), subcontractors, e-
prescribing gateways, other persons that provide data transmission services or facilitate
access to health records, and vendors of personal health records
Confidential (c) Arrka, 2020
Licensed to Maya Misra <[email protected]> on 07-04-2020. Single user license only, copying and networking prohibited.
HIPPA/HITECH
41
Regulatory Infrastructure
HIPAA is enforced by the US Dept of Health and Human Services (HHS).
Rights of Data Subjects
The various players in the healthcare system are not permitted to use or disclose PHI unless
specified by the individual.
Liabilities
HIPAA has both civil and criminal penalties including significant fines and imprisonment.
HHS can proceed directly to imposition of civil monetary penalties.
$100-500k per occurrence / Max annual penalty $1.5 Million
Background:
Passed in 1999
Official name is ‘The Financial Services Modernization Act’
Scope and Applicability
Applicable to Financial Institutions
Three Rules Specific to Privacy:
◼ ‘Financial Privacy Rule’ - governs the collection and disclosure of customers’ personal financial
information by financial institutions as well as any other entity that receives this kind of
information
◼ ‘Safeguards Rule’ - requires the abovementioned entities to design, implement and maintain
safeguards for the protection of customer information
◼ ‘Pretexting Rule’ - ‘Pretexting’ = social engineering. Rule encourages organizations to
implement safeguards against pretexting
Confidential (c) Arrka, 2020
Licensed to Maya Misra <[email protected]> on 07-04-2020. Single user license only, copying and networking prohibited.
GLBA – Gramm Leach Bliley Act
43
Definition of Personal Data (PD)
‘Non-public Personal Data’ – covers information provided by an individual, information gathered from
other sources and via transactions
Privacy Principles
Notice, Choice, Disclosure, Security
Regulatory Infrastructure
Under respective regulators for each type of entity.
For e.g.: The US Securities & Exchange Commission (SEC), Commodities Futures Trading Commission,
Federal Banking Agencies, etc.
Those entities that are not covered by any regulator come under the purview of the Federal Trade
Commission
Liabilities
Civil penalties -up to $100,000 per violation for an institution and up to $10,000 per violation for
individual directors & officers of the institution. Criminal penalties - imprisonment up to 5 years.
On June 28, 2018, Governor Brown signed Assembly Bill 375, now known as the California Consumer
Privacy Act of 2018
b) annually buys, receives sells, or shares the Personal Data of 50,000 or more consumers,
households, or devices, for commercial purposes
c) derives 50 percent or more of its annual revenues from selling consumers’ Personal Data
Background:
Legislations both at the central (federal) and state level
At the central level:
◼ the Privacy Amendment (Enhancing Privacy Protection) Act 2012
◼ passed in December 2012 and has been applicable from March 2014
◼ Contains the Australian Privacy Principles (APPs)
Regulatory Infrastructure
The Office of the Australian Information Commissioner (IC) is the entity vested with the powers to
oversee the Act.
Regulatory Mechanism
The Act supports co-regulation
◼ A formal mechanism has been instituted for recognition of external dispute resolution schemes
(EDRs) who can handle privacy-specific complaints and issues of individuals.
◼ Till date the Telecom Industry Ombudsman, the Credit Ombudsman service and the Financial
Ombudsman service have been recognized and others are in the pipeline.
The Act also recognizes any industry codes of practice around privacy – and formally terms them as
‘APP Codes’.
Liabilities
Fines up to A $220,000 for an individual and
A $1.1 million for organisations for serious or repeated interferences with the privacy of individuals.
Confidential (c) Arrka, 2020
Licensed to Maya Misra <[email protected]> on 07-04-2020. Single user license only, copying and networking prohibited.
51 Canada
Regulatory Infrastructure
Under the Privacy Act, the Office of the Privacy Commissioner of Canada was established.
Data Breach Notification
The amendment requires organizations to notify data subjects of any compromise to their
Personal Data resulting in a ‘real risk of significant harm’ to the individuals.
Organizations are also required to maintain records of all data breaches and same have to be
reported to the Privacy Commissioner as well.
◼ However, this requirement will come into force only when the federal government passes
associated regulations which are expected to provide greater clarity.
Privacy Principles:
The main principles covered in the PDPA are consent (express or deemed), purpose specification,
security, access & correction, etc
Regulatory Infrastructure
The Personal Data Protection Commission (PDPC) is established under the PDPA to oversee the
PDPA, and to investigate and enforce compliance with the PDPA.
Liabilities:
The PDPC, after investigation of a complaint, can take several measures like
◼ destroying any Personal Data collected in contravention to the PDPA
◼ levying a penalty up to S$ 1 Million.
1.Challenging compliance
2. Anonymity
3. DPIA
4. Record Processing
1.Data portability
2.Equal service and price
3.Opt-out of automated decision making
4.Anonymity
2008
2012
2017
2018
2019
IT Act 2000 - An IT The Justice A. P. The Indian The committee A draft bill -
Act to provide (Amendment) Shah panel government set headed by India PDPA -
legal Act, 2008 –IT recommended up a Justice BN introduced in
recognition for Act 2000 an over-arching Committee of Shrikrishna Parliament
transactions amended to law to protect experts headed submitted its Gone to a Joint
carried out by include Data privacy and by Justice report on Data Parliamentary
means of Protection personal data Shrikrishna. Protection Committee
electronic data Security and in the private Their task was framework and (JPC)
interchange Privacy and public to provide Personal Data
and other spheres Ministry of Protection Bill
means of Electronics and to the
electronic IT (MEITY) with Government.
communication a draft of
; India’s first data
protection law.
Confidential (c) Arrka, 2020
Licensed to Maya Misra <[email protected]> on 07-04-2020. Single user license only, copying and networking prohibited.
Legal Framework in India – IT (Amendment) Act,
62
2008: Security, Privacy, Cyber crimes
❑ IT Act 2000 - An Act to provide legal recognition for transactions carried out by means of electronic data
interchange and other means of electronic communication; effective from October 17, 2000
❑ IT (Amendment) Act, 2008 –IT Act 2000 amended to include (not limited to):
▪ Data Protection – Security & Privacy
▪ Cyber Security –Role of CERT-In, Nodal Agency for Critical Information Infrastructure Protection
▪ National Security – information retention, interception & monitoring
▪ Computer related offences to include cyber terrorism, identity theft, pornography, violation of
privacy, etc.
▪ Role of Intermediaries
▪ Encryption Policy
▪ Increase in penalties
❑ Sec 43A
❑ “Where a body corporate possessing, dealing or handling any Sensitive Personal Data or
information in a computer resource which it owns, controls or operates, is negligent in
implementing and maintaining reasonable security practices and procedures and thereby
causes wrongful loss or wrongful gain to any person, such body corporate shall be liable to pay
damages by way of compensation to the person so affected.”-Effective from October 27, 2009
Sec 72 - Breach of confidentiality and privacy.- Save as otherwise provided in this Act or
any other law for the time being in force, any person who, in pursuant of any of the powers
conferred under this Act, rules or regulations made there under, has secured access to any
electronic record, book, register, correspondence, information, document or other material
without the consent of the person concerned discloses such electronic record, book,
register, correspondence, information, document or other material to any other person
shall be punished with imprisonment for a term which may extend to two years, or with
fine which may extend to one lakh rupees, or with both
Sec 72A – “Save as otherwise provided in this Act or any other law for the time being in
force, any person including an intermediary who, while providing services under the terms
of lawful contract, has secured access to any material containing Personal Data about
another person, with the intent to cause or knowing that he is likely to cause wrongful loss
or wrongful gain discloses, without the consent of the person concerned, or in breach of a
lawful contract, such material to any other person, shall be punished with imprisonment
for a term which may extend to three years, or with fine which may extend to five lakhs
rupees, or with both.”
1. Password
2. Caste & Tribe Details
3. Financial Information
4. Biometric Data
Further sub-categories
Any data that can – directly
or indirectly - or in What is
combination with other Personal Data Sensitive
data – make a person (PD)? Critical Personal
‘identifiable’
Personal Data
Data (CPD)
(SPD)
DPA to decide who fits in here – which Two special categories constituted
would be based on volume & sensitivity - Who operates commercial
of PD processed, turnover of the data Who has the websites or online services
fiduciary, risk of harm resulting from Guardian
potential to Significant directed at children
processing undertaken, use of new cause greater
Data - Who processes large volumes
technologies, and any other factor that Data Fiduciary
harm Fiduciary of Personal Data of children
may cause harm
Confidential (c) Arrka, 2020
Licensed to Maya Misra <[email protected]> on 07-04-2020. Single user license only, copying and networking prohibited.
Applicability
72
Territorial
• Processing of Personal Data
• collected, disclosed, shared within India Processing of Personal Data for
• by State, Company, Indian citizen or body of persons incorporated under Indian law
Extra-Territorial
• Processing of Personal Data for
• Systematic activity of offering goods or services to data principals within the territory of
India;
• in connection any business carried on in India
• any activity which involves profiling of data principals within the territory of India
Central Government may exempt from the applicability of this law the processing of personal data of data
principals who are not within the territory of India, pursuant to any contract
Confidential (c) Arrka, 2020
Licensed to Maya Misra <[email protected]> on 07-04-2020. Single user license only, copying and networking prohibited.
Grounds for Processing Personal Data
73
Data Principal’s
Consent
Function of State
Purposes related
to employment
Reasonable
Purpose of data
fiduciary
Confidential (c) Arrka, 2020
Sensitive
Licensed Personal
to Maya Misra Data can
<[email protected]> only be
on 07-04-2020. processed
Single using
user license only, copying and explicit consent.
networking prohibited.
Data Principal Rights
74
75
Record Keeping
Grievance Redressal
Data Audits
Privacy by Design
Confidential (c) Arrka, 2020
Licensed to Maya Misra <[email protected]> on 07-04-2020. Single user license only, copying and networking prohibited.
75
Restrictions and Conditions Transfer of Personal Data Outside India
Personal Data
Processed
outside India
77
The Aadhaar (Targeted Delivery of Financial and other Subsidies, Benefits and Services) Act, 2016
was published and gazetted on 25th March 2016
The Act puts a legal framework around Aadhaar – the 12-digit unique identification number issued
to residents of India, and captures their biometric and demographic data.
This can then be used by various entities – both from the government and private sector – to
identify residents and verify their credentials.
1980(OECD)
In close with Council of
Europe, but guidelines
1981(Council of Europe
were not binding
Convention for
Protection of
Late 1970(Council of Individuals)
Europe and European
Included regulations on
Parliament)
transborder data flows
Early 1970(Expert
Discussing on how to and allowed some
Group in Council of
remove these trade restrictions on
Europe)
barriers while transborder, where data
Identified transnational preserving data needs to be transferred
character of protection to lower protection
computerization and country
need for international
regulatory
harmonization
Confidential (c) Arrka, 2020
Licensed to Maya Misra <[email protected]> on 07-04-2020. Single user license only, copying and networking prohibited.
History of Trans Border Data Flow contd..
86
2007(APEC)
Come out with its own
Framework Pathfinder, to
1990(UN General Assembly) enable transborder data flow
Appropriate Safeguards
Consent
Performance of a Contract
Public Interest
Vital Interests
Organizations have to comply with the seven privacy principles and the eleven
supplemental principles outlined in the framework
DOC maintains a list of organizations that have self-certified + those that were previously
certified but no longer are
Notice
Choice & Consent
Express affirmative consent required for Sensitive PD
Security
Data Integrity & Purpose Limitation
Data Integrity is defined as data being reliable for its intended use by being accurate,
complete and current
Access & correction
Recourse, enforcement & liability
Confidential (c) Arrka, 2020
Licensed to Maya Misra <[email protected]> on 07-04-2020. Single user license only, copying and networking prohibited.
The APEC Cross Border Privacy Rules System (CBPR)
98
APEC Data Privacy Pathfinder The result of the Pathfinder project was the
initiative was launched in 2007. APEC Cross Border Privacy Rules (CBPR) system.
The CBPR system was endorsed by APEC member
Objectives of the Pathfinder economies in November 2011 and consequently
initiative: were to develop a simple became a reality.
and transparent system that could The CBPR system has a defined set of baseline
be used by organizations for program requirements pertaining to PD that
protection of Personal Data (PD) needs to cross borders based on the nine APEC
moving across APEC countries. privacy principles.
The resultant framework was to be applicable to only organizations to transfer PD across APEC
borders – it was not meant for governments or individuals
Domestic laws & regulations would continue to govern PD collection and management within
individual APEC countries
Confidential (c) Arrka, 2020
Licensed to Maya Misra <[email protected]> on 07-04-2020. Single user license only, copying and networking prohibited.
CBPR: The Ecosystem
99
To facilitate cross border PD movement and its management & oversight, the CBPR system
has instituted the following concepts & entities:
India has what is known as an ‘observer’ status which allows India to participate in key
proceedings at the APEC.
1. Japan
3. India
4. Hong Kong
Privacy in
Bodily Privacy Territorial Privacy
Communication
? Sector Concerns
about
Potential
Without Abuse
Privacy
Safeguard
Fear of a
Scale of
Totalitarian
Data
Lack of State
Clarity in
Objectiv
es
Confidential (c) Arrka, 2020
Licensed to Maya Misra <[email protected]> on 07-04-2020. Single user license only, copying and networking prohibited.
Forms of Surveillance
107
Wiretapp
ing Compute
Social r or
Media Network
Analysis Surveillan
ce
Malicious Tracking
Surveillance
Software via Wi-Fi
Location
Data
Web
based
Tracking Tracking Surveillan
by ce
Compani
es
Metadata and
Privacy and Anonymity
Surveillance
▪ It is the information that is generated by the devices and the service providers
used by individuals for communication.
▪ For e.g., in case of telephone or mobile calls, this would be information like the
number called, time and duration of call, location information etc.
So during the course of a day, with just the location data, it is possible to track all
the geographical locations the individual has been to.
If some of these locations come up on a routine basis (for eg, the individual’s
home & office), by analysing the time of the day, it would be easy to figure out
where exactly the individual lives and works.
Anonymity is when one or one’s actions are visible but may not be necessarily
identified with the person.
For eg:
When you walk on the road and no one recognises you, you are anonymous.
If you make a posting on a public website –if you have masked your IP address –
the posting is public but you can remain anonymous.
However, when you post a photograph with a friend on a social networking site and
tag the friend, in effect, the friend loses her anonymity.
Anonymity nurtures freedom on one hand
On the other hand, it is a tool for criminals and perpetrators as well.
The general impression often created is that privacy and security cannot co-
exist
and privacy should be sacrificed to ensure national security.
However, in reality, the two have to be balanced and remain in tandem.
Discussions today:
State surveillance programs that are designed to protect citizens and ensure their
security should be launched with adequate controls and checks & balances.
The checks and balances are required to ensure that innocent citizens are not targeted
by these programs and their privacy thereby violated.
Further, if such violation does take place, the citizen can avail of proper recourse
measures.
Confidential (c) Arrka, 2020
Licensed to Maya Misra <[email protected]> on 07-04-2020. Single user license only, copying and networking prohibited.
Privacy and Human Body
113
Two major developments over the last couple of decades that affect privacy of an
individual concern the human body –
DNA
Biometric Identifiers
DNA profiles are built based on bodily samples. The associated ecosystem to support and
enable this involves collection, use, analysis and storage of bodily samples.
Used widely in tracking and identifying offenders and criminals.
In order to enable this, many countries have built up large centralised databases
containing DNA profiles of individuals .
DNA
Biometric Identifiers
Healthcare sector also uses this for treatment of abnormalities, disorders, research etc.
• Value of Data
• Lifecycle Data Protection Management
Policies
directed by business goals and objectives.
generally tie into the framework of overall IT governance and management.
Operational Aspects
address issues
develop processes and procedures
Infrastructure aspects
overall architecture of data processing and storage.
Who is using the information? When and how are they accessing the
Information?
DPF
ISO27701 APEC
Some
Privacy
BS 10012
Program GAPP
Frameworks
NIST
Privacy OECD
Framework
01 Check the Awareness & Understanding to Enable the organization to become aware of
the Personal Data Elements, Categories, Storage, Formats , Access levels and usage
02 Assess the Current State Assessment to Enable the organization to map this against
its privacy program objectives.
01 Articulate Privacy Objectives, Develop Privacy Policy, defining Personal Data and
Organizational role and Provide Direction to implementing Privacy Initiatives
02 Build supporting processes to ensure policy objectives are achieved effectively and
consistently
03
Keep track of organization specific business and technology developments to ensure
policy is updated and remains relevant and new privacy risks are effectively addressed
01
Establishing a process for incorporating privacy requirements into
contracts.
02
Understanding obligations, impacts & compliance requirements
arising out of contracts signed.
03
Management and execution of contracts for the purpose of privacy
and addressing privacy related issues
01
Establish organizational understanding of Personal Data access and
usage across different functions, processes or relationships
02
To establish necessary policies to limit the Access, and Usage of
Personal Data; and to ensure their lawful & fair handling
03
To establish technical and tactical measures to limit access and usage
of PD and monitor it on a regular basis to identify non-compliances.
01 To create awareness & understanding amongst employees, stakeholders and external third
parties about privacy.
02 Communicate relevant organizational business context and explain the privacy policies,
principles, processes and other measures adopted by the organization as part of its privacy
program.
03
To train employees on how to ensure compliance and handle data breaches.
02
To establish components of a data security program and integrate
them with organization’s security & risk management processes
03
To help define the scope and coverage of data security program to
ensure security of Personal Data
• ISO 27701 is a privacy • Applicable to all types • Provides Best Practice • ISO 27701 is the first • ISO 27701 is intended
extension to ISO and sizes of and effective ways of ISO standard to to be a certifiable
27001&02 and organizations, managing Privacy reference to external extension to ISO27001
provides additional including public and processes written in a frameworks or certification.
guidance for the private companies, practical and usable publications not Organizations planning
protection of privacy, government entities manner. actually developed by to seek an ISO 27701
which is potentially and not-for-profit • As the overlap of ISO. This standard certification will also
affected by the organizations Privacy and Security provides mapping to need to have an ISO
processing of Personal processing Personal regulations increases, GDPR 27001 certification.
Data. Data there is a clear benefit • It provides mapping to • Despite the GDPR
• The standard outlines • Applies to for these two teams to other ISO Standards being in effect for
a framework for organizations playing collaborate, related to Privacy : ISO more than a year, to
organizations to different roles in the communicate more 29100 (Privacy date, there has been
manage privacy Personal Data effectively, and use Framework), ISO no certification
controls so that risk to Processing Ecosystem: common tools. ISO 27018(Cloud Privacy), standard for it. This
individual privacy Controllers, Joint 27701 provides this ISO 29151(Code of standard can be a
rights is reduced . Controllers, Processors platform practice for Personal viable option to
and Sub-Processors Protection) demonstrate
compliance to GDPR
Confidential (c) Arrka, 2020
Licensed to Maya Misra <[email protected]> on 07-04-2020. Single user license only, copying and networking prohibited.
ISO 27701 Structure: The Core Content is spread across 4
Clauses
143
143
PIMS specific requirement as related to ISO 27001 PIMS specific guidance as related to ISO 27002
• The clauses and sub-clauses in this section are the same as the mandatory • The clauses and sub-clauses in this section are the same as the mandatory
controls under ISO 27001. controls under ISO 27002 (and Annexure Controls under ISO 27001)
• PIMS-specific requirements have been added wherever applicable at a Clause • PIMS-specific control statements and guidance have been added wherever
& Sub-Clause level applicable at a Clause & Sub-Clause level
• As the Mandatory controls are mainly generic & “management” related, • This section is highly insightful as it provides answers to what Privacy
most areas do not have any additional PIMS specific requirement. related extensions need to be made to specific Security Controls.
• E.g. Risk Management clause recommends addition of the privacy risk • E.g. The Information Classification clause now recommends addition of Personal
assessment process to identify risks related to the processing of Personal Data, Data as part of the Classification Schema as an organization needs to track
within the scope of the PIMS. where PD is stored and where it flows
• Categories are the subdivisions of a function into groups of privacy outcomes closely tied to programmatic needs and
particular activities. Examples include “Protected Processing,” “Inventory and Mapping,” and “Risk Assessment.
• Subcategories (Controls) further divide a category into specific outcomes of technical and/or management activities.
They provide a set of results that, while not exhaustive, help support achievement of the outcomes in each category.
Examples include
• “Systems/products/services that process data, or with which individuals are interacting, are inventoried”.
Data are processed to limit the identification of individuals
Function Description
Identify Develop the organizational understanding to manage privacy risk for individuals arising from data processing. Foundational for effective
implementation of Privacy Framework
Govern Develop and implement the organizational governance structure to enable an ongoing understanding of the organization’s risk management priorities
that are informed by privacy risk. Foundation from an organization level
Control Develop and implement appropriate activities to enable organizations or individuals to manage data with sufficient granularity to manage privacy
risks. Function considers data processing management from the standpoint of both organizations and individuals.
Communicate Develop and implement appropriate activities to enable organizations and individuals to have a reliable understanding and engage in a dialogue about how
data are processed and associated privacy risks. Function recognizes that both organizations and individuals may need to know how data are processed in
order to manage privacy risk effectively.
Protect Develop and implement appropriate data processing safeguards. Function covers data protection to prevent cybersecurity-related privacy events
Data Processing Ecosystem Risk Management Protect Data Protection Policies, Processes, and Procedures
Govern Governance Policies, Processes, and Procedures
Identity Management, Authentication, and Access
Risk Management Strategy Control
Awareness and Training
Monitoring and Review Data Security
Control Data Processing Policies, Processes, and Procedures Maintenance
Data Processing Management
Protective Technology
Disassociated Processing
• Tiers support organizational decision-making about how to manage privacy risk by considering the
Implementation Tiers nature of the privacy risks engendered by an organization’s systems, products, or services and the
sufficiency of the processes and resources an organization has in place to manage such risks.
• The 4 maturity tiers are: Partial, Risk Informed, Repeatable & Adaptable. Tiers represent
progression, however, need not always want to be at the highest Tier
• When selecting Tiers, an organization should consider its Target Profile(s) and how achievement
may be supported or hampered by
• A. Current Privacy risk management practices
• B. Degree of integration of privacy risk into its enterprise risk management portfolio
C. Data processing ecosystem relationships
•
Confidential (c) Arrka, 2020
• D. Workforce
Licensed to Maya Misra <[email protected]> composition
on 07-04-2020. anduser
Single training program.
license only, copying and networking prohibited.
Source: NIST Privacy Framework_V1.0
Some Other Relevant Standards
149
ISO 27018: 2014
Published on Aug 1st 2014, builds on the ISO 27002 standard.
Applicable where public cloud computing service providers (for e.g.: Amazon Web Services (AWS)) act as
processors of PD. However, the standard does not cover the data controllers themselves.
The standard addresses PD protection controls as a part of the implementation of an ISMS (Information Security
Management System) for cloud computing.
ISO 29101:2013
This is a standard for developing a privacy architecture framework. Specifically, it deals with systems that process
PD with a focus on ICT systems that interact with Data Subjects.
ISO 29190: 2015
This is a privacy capability assessment model. It gives a guidance to organizations on how to assess their
capabilities in managing privacy-specific processes.
ISO 29134
This standard is currently under development. This is being designed specifically for privacy impact assessments.
ISO 27701
A privacy extension to ISO 27001&02 and provides additional guidance for the protection of privacy, which is
potentially affected by the processing of Personal Data.
The privacy team’s main duties include dealing When asked to choose the team’s most critical
with privacy policies and companywide training responsibilities, most pros say it is compliance
Twice as many firms subject to GDPR have Only 2% of firms that have reported a breach
reported a data breach in 2019 as compared to last to a supervisory authority have been fined
year
38%
16%
Total exam time for answering all the questions is 150 minutes.
There is no separate sectional time limit. Candidates are advised to distribute time accordingly.
There are both single choice as well multiple choice questions in the exam.
Please note that in case of multiple choice questions, only two options would be correct.
You can determine whether the question is single choice or multiple choice by the language of the
question and answer box (Radio button for single choice and Check Box for multiple choice).
There are some case study based questions, which are also objective type questions with one or two
options as correct answers.
Exam is a mix of questions with varied difficulty levels – easy, medium and difficult.
Differential marking scheme is used, which means that different questions with varied difficulty
levels have been allocated different marks.
Candidates will not be informed about the difficulty level of any question in the exam, hence
candidates would not know which question will fetch them how many marks.
No negative marks - Neither answering a question wrongly nor skipping any question will fetch
negative marks.
Candidate can traverse back and forth all the questions in a section.
Once a section gets over, candidates cannot jump from current section to answer questions of the
previous sections in the middle of the exam.
But, a review screen is provided at the end of the exam after the last question of last section has
been attempted. From the review screen, candidate can jump to any question in any of the sections.
Kindly note that ending the review screen ends the examination – candidates will not be able to
answer any more questions and all responses will be recorded.
Candidates can decide the ordering of the section. Before candidates begin answering the
questions, a screen will be shown and candidates would be required to select the desired sequence
of sections
Candidates will be given 3 minutes to provide their choice of sequence selection. In case, no choice
is provided in the given time limit, the exam will start with default sequence of sections (1-2-3) .
Once order is selected at the starting, it cannot be changed during the course of examination.
Confidential (c) Arrka, 2020
Licensed to Maya Misra <[email protected]> on 07-04-2020. Single user license only, copying and networking prohibited.
160 Training Feedback
Did the training meet the expectations stated at the start of the
training?
2 2. Insta Pharma is the data controller that uses Phoenix Tec as data processor to collect and process data of data subjects
3 1. Legal Obligation
2. Vital Interest
3. Performance of a Contract
4. Consent of the Data Subject
4 1. The customer was not given the choice to opt-in for insurance
2. The customer was not notified that the travel insurance was from ABC’s partner company
5 2. Only 2
6 3. Religion
5. Make of the Car Owned
7 1. RM should have informed the husband and taken his consent prior to sharing the account statement with wife.
8 2. Send the requested information to customer’s registered e-mail and inform the customer of the channel
9 2. Cookies
10 1. A form of cookies
2. Stored in different location than browser cookies
Confidential (c) Arrka, 2020
Licensed to Maya Misra <[email protected]> on 07-04-2020. Single user license only, copying and networking prohibited.
Pop Quiz – Answer Key
162
POP QUIZ! # Answer Key
11 4. Encryption
13 1. Challenging compliance
14 1.Right to Anonymity
15 2. Anonymity
18 2.Justice A. P. Shah
20 3. India