Privacy Session PSUT
Privacy Session PSUT
Privacy Vs Security
Terminologies
Privacy Principles
Controller Vs Processor
Compliance Areas
https://myaccount.google.com/dashboard?pli=1
Introduction
Think for example of a window on a building; without it being in place an intruder can
sneak in and violate both the privacy and security of the occupants.
Once the window is mounted it will perform a decent job in keeping unwanted parties
from getting into the building. It will, however, not prevent them from peeking in,
interfering thus with the occupants’ privacy. At least not without a curtain.
In this (oversimplified) example the window is a security control, while the curtain is
privacy control.
Privacy Vs. Security
There are many definitions for ‘data privacy’. The
simplest way to think about it is that people
(customers, employees, anybody!) need to know
what personal data organizations are collecting
about them and how they are using it.
DATA SUBJECT
The individual to whom Personal Data relates. Data subject
Introduction
Authority
DATA PROCESSOR
Any Public Entity, natural person or private legal person
that processes Personal Data for the benefit and on behalf of the Controller.
Controller Vs. Processor
Controllers ‘determine the purpose of the
processing's’. This means that they make A simple way to think about
decisions about what information is captured this is as follows. A retailer
and why.
creates an
Introduction e-commerce
website and decides what
information they require from
customers to create an
account. The company uses a
cloud provider to host their
website and database. In this
case, the company is the data
Controller, and the cloud
provider is the data
Processors process personal data on Processor
behalf of a controller and in line with the
given instructions. If a processor sub-
Examples of Personal Data
General Personal Data Financial Information
Name, Surname
Social Security Numbers
Gender Account numbers (bank accounts, credit cards,
Date of birth etc.)
Personal Identification Numbers (PINs)
Home Address
Passwords to financial accounts
ID Number
Income information
Personal email address
Biometric data (photograph / video)
Personal Identifiable Information
Regulatory Reputational
Operational Financial
Controller Responsibilities
17
Controller Responsibilities
Joint Risk Assessments: security and privacy teams can collaborate on conducting risk
assessments to identify potential threats and vulnerabilities to personal data they can
ensure that the risk assessment process considers both security and privacy risks.
Introduction
Data Classification: Security and privacy teams can collaborate on developing a data
classification scheme that categorizes data based on its sensitivity and the level of
protection required. This can help ensure that appropriate security and privacy
controls are applied to different types of data.
Incident Response:
Security and privacy teams can collaborate on developing and testing incident response
plans to ensure that they are aligned and effective. This can include procedures for
detecting, containing, and reporting security and privacy incidents.
Security and Privacy Interdependences
Introduction
Thank you