14
1 13 June 2012 Peter Koo Partner, Enterprise Risk Services Deloitte Touche Tohmatsu Privacy By Design: Privacy smart from the start. Agenda © 2012 Deloitte Touche Tohmatsu. All Rights Reserved 2 1. About Deloitte 2. Privacy Incidents Around the World 3. Privacy Smart from the Start 4. Some Key Privacy Considerations in Design 5. Tools for Privacy Governance 6. Final Thoughts 7. Q & A

Privacy By Design - PCPDreport highlights our strong client focus, technical expertise, and extensive service offerings which set us apart from others in the risk and security consultancy

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Privacy By Design - PCPDreport highlights our strong client focus, technical expertise, and extensive service offerings which set us apart from others in the risk and security consultancy

1

13 June 2012

Peter Koo

Partner, Enterprise Risk Services

Deloitte Touche Tohmatsu

Privacy By Design:

“Privacy smart from the start”.

Agenda

© 2012 Deloitte Touche Tohmatsu. All Rights Reserved 2

1. About Deloitte

2. Privacy Incidents Around the World

3. Privacy Smart from the Start

4. Some Key Privacy Considerations in Design

5. Tools for Privacy Governance

6. Final Thoughts

7. Q & A

Page 2: Privacy By Design - PCPDreport highlights our strong client focus, technical expertise, and extensive service offerings which set us apart from others in the risk and security consultancy

2

3

“In Forrester’s 75-criteria evaluation of information security and risk consulting service providers, we found that Deloitte led the pack because of its maniacal customer focus and deep technical expertise.” Deloitte is the top-ranked Information Security and Risk Consulting firm in Forrester Research’s latest report, Information Security and Risk Consulting Wave Q3 2010. The report highlights our strong client focus, technical expertise, and extensive service offerings which set us apart from others in the risk and security consultancy space.

Global Leadership in Security and Risk Consulting

© 2012 Deloitte Touche Tohmatsu. All Rights Reserved 3

Privacy and Data Loss Incidents

© 2012 Deloitte Touche Tohmatsu. All Rights Reserved 4

Page 3: Privacy By Design - PCPDreport highlights our strong client focus, technical expertise, and extensive service offerings which set us apart from others in the risk and security consultancy

3

The Seven Foundational Principles

© 2012 Deloitte Touche Tohmatsu. All Rights Reserved

1. Proactive not Reactive; Preventative

not Remedial

2. Privacy as the Default Setting

3. Privacy Embedded into Design

4. Full Functionality - Positive-Sum, not

Zero-Sum

5. End-to-End Security - Full Lifecycle

Protection

6. Visibility and Transparency - Keep it

Open

7. Respect for User Privacy - Keep it

User-Centric

www.ipc.on.ca/images/Resources/7foundationalprinciples.pdf

© 2012 Deloitte Touche Tohmatsu. All Rights Reserved 5

Privacy Smart from the Start

Page 4: Privacy By Design - PCPDreport highlights our strong client focus, technical expertise, and extensive service offerings which set us apart from others in the risk and security consultancy

4

Continuous Monitoring and

Assessment

Timeline

Formulate Data Protection Strategy

Perform Privacy Impact

Assessment

System and Process Design with Privacy

Consideration

Define Policy, Procedures

and Guidelines

Invest in Technology

Communication and Training

Pri

va

cy C

ap

ab

ilit

y

Establish Privacy Governance

Structure

Privacy and Data Protection Roadmap

© 2012 Deloitte Touche Tohmatsu. All Rights Reserved 7

Privacy by Design

Branch Offices

Remote Employees

WAN

WAN

WWW

VPN

Outsourced Development

Enterprise e-mail

Business Analytics

Customer Portal

Production Data

Data warehouse

Staging

File Server

DR

Back up disk

Back up tape

Disk storage

Customers

Partners

DLP IAM Encryption Data Redaction Archive

Set Policy

(People)

Deploy Controls

(Process)

Enforce and Monitor Controls

(Technology)

Implementing the Privacy Protection Framework: Combined top down, bottom up, side-ways..

© 2012 Deloitte Touche Tohmatsu. All Rights Reserved 8

Page 5: Privacy By Design - PCPDreport highlights our strong client focus, technical expertise, and extensive service offerings which set us apart from others in the risk and security consultancy

5

Privacy Impact

Assessment

Analyze their impact on privacy

Identify potential further privacy erosion

Consider alternative, less privacy-intrusive

practices

Make informed choices and recommendations

Describe the way personal information "flows”

Source: Australia Office of the Privacy Commissioner

© 2012 Deloitte Touche Tohmatsu. All Rights Reserved 9

What Does a Privacy Impact Assessment (PIA) Do?

Project Initiation

Development

User Acceptance

Testing

System Rollout

Privacy Impact Assessment (PIA)

System Analysis &

Design

Pro

jec

t P

ha

se

s

Presentation will be

conducted at Project

Steering Committee

meeting Review the System

Analysis & Design

(SA&D) specifications

and sit in demos /

workshops (Prototype)

PIA Report

(SA&D) PIA Report

Review the policy and

procedures as well as

performing walkthrough

to the system

PIA Report PIA Report

(Scoping)

© 2012 Deloitte Touche Tohmatsu. All Rights Reserved 10

PIA in Process and System Design

Page 6: Privacy By Design - PCPDreport highlights our strong client focus, technical expertise, and extensive service offerings which set us apart from others in the risk and security consultancy

6

Data life cycle The intrinsic and contextual value of data and associated ownership risk vary throughout

the data life cycle and throughout the value chain of health plans

Data Management Life Cycle

© 2012 Deloitte Touche Tohmatsu. All Rights Reserved 11

In business, well-intentioned employees simply getting their jobs done may inadvertently put information at risk, sometimes resulting in data leakage.

Data Leakage Happens

© 2012 Deloitte Touche Tohmatsu. All Rights Reserved 12

Page 7: Privacy By Design - PCPDreport highlights our strong client focus, technical expertise, and extensive service offerings which set us apart from others in the risk and security consultancy

7

Some Key Privacy Considerations in Design

Personal Information Collection Statement (PICS)

Font size?

Clarity of wordings?

Understandable?

Buried the PICS into the T&C?

“Bundled Consent” for Direct

Marketing?

Collection and Use of Personal Data

© 2012 Deloitte Touche Tohmatsu. All Rights Reserved 14

Ref: Guidance on the Collection and Use of Personal

Data in Direct Marketing, Office of the Privacy

Commissioner for Personal Data, Hong Kong

Page 8: Privacy By Design - PCPDreport highlights our strong client focus, technical expertise, and extensive service offerings which set us apart from others in the risk and security consultancy

8

Clarity of Use

of Personal

Data?

(e.g. any

purposes relating

thereto)

Clarity of third

parties?

(e.g. other

business partners)

Sharing of Personal Data to Third Parties

© 2012 Deloitte Touche Tohmatsu. All Rights Reserved 15

Ref: Administrative Appeal No. 38 of 2009

Data Sharing

Direct Marketing Options

Default setting for receiving marketing materials?

Any option for customers to unsubscribe marketing

materials?

Direct Marketing Materials

© 2012 Deloitte Touche Tohmatsu. All Rights Reserved 16

Ref: Reference: Guidance on the Collection and Use of

Personal Data in Direct Marketing, Office of the Privacy

Commissioner for Personal Data, Hong Kong

Page 9: Privacy By Design - PCPDreport highlights our strong client focus, technical expertise, and extensive service offerings which set us apart from others in the risk and security consultancy

9

Tools for Privacy Governance

Tools for Privacy Governance

Organizational Structure Relevant Tools

Strategic and Board Level Privacy Governance Framework /

Risk Assessment

Entity Level Governance Risk and Compliance

(GRC)

Business Process Level Role Based Access Control

Technology and Infrastructure Level Identity and Access Management

(IAM)

Different tools can be adopted at different levels of the organization to assist in strengthening personal data privacy protection.

© 2012 Deloitte Touche Tohmatsu. All Rights Reserved 18

Page 10: Privacy By Design - PCPDreport highlights our strong client focus, technical expertise, and extensive service offerings which set us apart from others in the risk and security consultancy

10

AICPA / CICA Privacy Risk Assessment Tool

© 2012 Deloitte Touche Tohmatsu. All Rights Reserved 19

Governance Risk and Compliance

GRC can help you to understand and manage risks across the enterprise and at the business unit as well as risk areas such as strategy, regulatory and operations.

© 2012 Deloitte Touche Tohmatsu. All Rights Reserved 20

Page 11: Privacy By Design - PCPDreport highlights our strong client focus, technical expertise, and extensive service offerings which set us apart from others in the risk and security consultancy

11

• A role-based access control (RBAC) model is to provide access to roles that create or consume information in the course of a business activity.

• The role is assigned permissions at the business activity level to define the relationship with an information class and related information assets.

• RBAC may be accomplished either through functional capabilities in a business system or through application of metadata and business description rules.

Role Based Access Control

© 2012 Deloitte Touche Tohmatsu. All Rights Reserved 21

The following IAM functions should be applied or extended to cloud-deployed systems:

Privileged user management/root user control

Identity management and role management

Access management/single sign-on (SSO)

Log management

© 2012 Deloitte Touche Tohmatsu. All Rights Reserved 22

Identity and Access Management

Page 12: Privacy By Design - PCPDreport highlights our strong client focus, technical expertise, and extensive service offerings which set us apart from others in the risk and security consultancy

12

Final Thoughts

1. Privacy has become part of our daily life

2. People, Process and Technology are the keys to a successful

privacy framework

3. Privacy = key components on both business and IT strategies

4. Privacy Assessment and Continuous Monitoring minimizes the

privacy risk in system development

5. Protecting data privacy is everyone’s responsibility (Awareness)

6. Consult, Consult and Consult………..

© 2012 Deloitte Touche Tohmatsu. All Rights Reserved 24

Key Takeaways…

Page 13: Privacy By Design - PCPDreport highlights our strong client focus, technical expertise, and extensive service offerings which set us apart from others in the risk and security consultancy

13

Q&A

26

Should you require further information, please feel free to contact us or go to our web site at www.deloitte.com

Deloitte Touche Tohmatsu 35/F One Pacific Place 88 Queensway Hong Kong

Tel: 2852-1600 Fax: 2541-7392

Tel: 2852-5810 E-mail: [email protected]

Maverick Tam Director Enterprise Risk Services

Our Contacts

Tel: 2852-6507 E-mail: [email protected]

Peter Koo Partner Enterprise Risk Services

© 2012 Deloitte Touche Tohmatsu. All Rights Reserved 26

Page 14: Privacy By Design - PCPDreport highlights our strong client focus, technical expertise, and extensive service offerings which set us apart from others in the risk and security consultancy

14