SlideShare a Scribd company logo
DATA PROTECTION
Andrew Nooks
An Approach To Privacy
Symptai
• Symptai Consulting Limited is an independent IS Audit, Security &
Business Assurance firm founded in 1998.
• We are an industry leader in technology consulting services for
assurance, security, business processes, and compliance with
numerous success stories and excellent client retention rates.
Symptai Consulting Ltd
Director
eGov Jamaica
Member, Board of Directors
Andrew A. Nooks
Certs:
CISA, CISSP, CISSP-ISSAP, CIPM, CSSLP, CISM,
CRISC, PCIP, ISO27001, ITSM
Interests: Volleyball Swimming Aikido
Disclaimer
• This presentation is based on research collated from the Internet
leveraging articles from the International Association of Privacy
Professionals (IAPP), an organization of which I am a member, and its
contributors.
• I have also leveraged my own experience being as an IS practitioner
for over twenty-five (25) years of which thirteen (13) of which has
been dedicated to Information Security and related controls to
include privacy, as well as and the knowledge and experience from
the Symptai team.
Definition of Privacy
Privacy
The right to be left
alone, or freedom
from interference or
intrusion.
Information
privacy
The right to have
some control over
how your personal
information is
collected and used.
Impact
How organization
protect data in its
various states: At
rest, in-transit and in
use.
Why is Privacy Important?
Due to advancement in technological innovation, information
privacy is becoming more complex by the minute as more data is
being collected and exchanged.
As the technology gets more sophisticated so do the uses of data.
This leaves organizations facing an incredibly complex
risk matrix for ensuring that personal information
is protected.
In the News (Source https://www.scmagazine.com)
Source: https://iapp.org/news
Business Risk
• Health
• Banking
• Insurance
• Telecoms
Inherent High Risk
• GDPR and other Data Protection
Legislations
• PCI DSS
• HIPAA
Legal &
Compliance
Primary Components of a Privacy Program
Privacy Program
Governance
Privacy Operational
Life-Cycle Management
Privacy Program Governance
• Vision and Mission
• Develop a strategy
• Team structure and composition
Strategy
Management
Privacy Program Governance
• Vision and Mission
• Develop a strategy
• Team structure and composition
Strategy
Management
• Frameworks
• Policies Procedures Standards
and guidelines
Framework
Privacy Program Governance
• Vision and Mission
• Develop a strategy
• Team structure and composition
Strategy Management
• Frameworks
• Policies Procedures Standards and guidelinesFramework
• Metrics and measurements
(identify, Define, Select,
Collect, Analyze)
Performance
Business Case
• Organizational Privacy Office Guidance
• Define Privacy
• Laws and Regulations
• Technical Controls
• External Privacy Organizations
• Industry Frameworks
• Privacy information Technology
• Education and Awareness
• Program Assurance
Privacy
Operational
Lifecycle
Assess
Protect
Sustain
Respond
Assess
• AICPA/CICA Privacy Maturity Model
• GAPP
• Privacy by Design
Assessment
Models
• Data
• Systems
• Processes
Assess Business
Privacy
Operational
Lifecycle
Assess
Protect
Sustain
Respond
• Need for DLM
• DLM Principles
Data Lifecycle
Management
• Standards and Frameworks
Information
Security Practices
• Proactive, Default Settings
• Embedded, End2End Protection
• Transparency, Respect for Users
Privacy by Design
• Privacy Impact Assessments
• Risk Assessments
Analyze and Assess
Privacy
Operational
Lifecycle
Assess
Protect
Sustain
Respond
Protect
• Compliance with Privacy Policy
• Monitor regulations and legislation
• Compliance and Risk
• Environment
Monitor
• Align Privacy operations
• Compliance with Policies and Standards
• Access Modification Disclosure
• Communication of Findings
Audit
• Awareness
• Flexibility
• Catalog and maintain documents
• Train
Communicate
Sustain
Privacy
Operational
Lifecycle
Assess
Protect
Sustain
Respond
• Handling, Access
• Redress, Correction
• Integrity
Information
Request
• Preventing Harm
• Accountability
• Monitoring
Legal
Compliance
• Roles and Responsibility
• Integration in BCP
• Detection
Incident
Planning
• Pre-notification
• Response Plan, Plan Execution
• Reporting, Evaluation
Incident
Handling
Respond
Privacy
Operational
Lifecycle
Assess
Protect
Sustain
Respond
In Summary
1. Define the privacy mission statement
2. Develop a strategy
3. Define team structure
4. Develop a framework – aligned to organization
5. Develop and communicate policies, procedures, standards and guidelines
6. Define performance metrics
7. Assess the based on governance model
8. Protect – DLM, Info Sec embedding privacy in the organization
9. Conduct RA and PIA
10. Monitor, audit and communicate
11. Respond to request
12. Accountability
13. Incident management
Additional Reading
• IAPP.org
• APEC.org
• ICO.gov.uk
• Priv.gc.ca
• OECD.org
Questions?
Andrew Nooks
Symptai Consulting Limited
Email: info@symptai.com

More Related Content

PPTX
CISSP - Chapter 1 - Security Concepts
PPTX
Domain 1 - Security and Risk Management
PDF
Cyber Security Governance
PDF
Cybersecurity Roadmap Development for Executives
PDF
How can the ISO 27701 help to design, implement, operate and improve a privac...
PPTX
Cyber Security IT GRC Management Model and Methodology.
PPTX
CISSP Chapter 1 Risk Management
PPTX
Chapter 1 Security Framework
CISSP - Chapter 1 - Security Concepts
Domain 1 - Security and Risk Management
Cyber Security Governance
Cybersecurity Roadmap Development for Executives
How can the ISO 27701 help to design, implement, operate and improve a privac...
Cyber Security IT GRC Management Model and Methodology.
CISSP Chapter 1 Risk Management
Chapter 1 Security Framework

What's hot (20)

PPTX
Cissp Training PPT
PPT
Isms awareness training
PPTX
ISMS User_Awareness Training.pptx
PPTX
The Board and Cyber Security
PPTX
CISSP - Chapter 2 - Asset Security
PPTX
it grc
PPTX
Information Security Governance and Strategy - 3
PDF
Security Awareness Training
PDF
Information Security It's All About Compliance
PDF
Introduction: CISSP Certification
PPTX
Identity and Access Management Introduction
PPTX
CISSP-Certified.pptx
PDF
NIST Cybersecurity Framework 101
PPTX
Legal obligations and responsibilities of data processors and controllers und...
PPTX
ISO27k ISMS implementation and certification process overview v2.pptx
PPTX
microsoft-cybersecurity-reference-architectures (1).pptx
PPTX
What is iso 27001 isms
PDF
ISO 27001 2002 Update Webinar.pdf
PPTX
Information Security Risk Management and Compliance.pptx
PPTX
Cybercrime And Cyber forensics
Cissp Training PPT
Isms awareness training
ISMS User_Awareness Training.pptx
The Board and Cyber Security
CISSP - Chapter 2 - Asset Security
it grc
Information Security Governance and Strategy - 3
Security Awareness Training
Information Security It's All About Compliance
Introduction: CISSP Certification
Identity and Access Management Introduction
CISSP-Certified.pptx
NIST Cybersecurity Framework 101
Legal obligations and responsibilities of data processors and controllers und...
ISO27k ISMS implementation and certification process overview v2.pptx
microsoft-cybersecurity-reference-architectures (1).pptx
What is iso 27001 isms
ISO 27001 2002 Update Webinar.pdf
Information Security Risk Management and Compliance.pptx
Cybercrime And Cyber forensics
Ad

Similar to Data Protection: An Approach to Privacy (20)

PPTX
PPTX
PPTX
Privacy frameworks 101
PDF
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
PPT
isms-presentation.ppt
DOC
Ttss consulting(1)
PDF
Building an effective Information Security Roadmap
PDF
ISO27001: Implementation & Certification Process Overview
PPTX
5548 isaca for-students
PPTX
Professional Designations IT Assurance
PPT
FRSecure Sales Deck
PDF
Navigate LLC Overview
PDF
Dont let governance risk and compliance be a roll of the dice | ESPC22 | De...
PPTX
ACSPL PROFILE - FEB 2021.pptx
PPT
Asis 2013 april updates
PPTX
538522937-Cisa-easdasdsadsadasdBook-New-1-188.pptx
PDF
CNIT 160 Ch 4a: Information Security Programs
PDF
CNIT 160 Ch 4a: Information Security Programs
PDF
GRC - Isaca Training 16.9.2014
PPTX
Belgina ism-v3 3
Privacy frameworks 101
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
isms-presentation.ppt
Ttss consulting(1)
Building an effective Information Security Roadmap
ISO27001: Implementation & Certification Process Overview
5548 isaca for-students
Professional Designations IT Assurance
FRSecure Sales Deck
Navigate LLC Overview
Dont let governance risk and compliance be a roll of the dice | ESPC22 | De...
ACSPL PROFILE - FEB 2021.pptx
Asis 2013 april updates
538522937-Cisa-easdasdsadsadasdBook-New-1-188.pptx
CNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security Programs
GRC - Isaca Training 16.9.2014
Belgina ism-v3 3
Ad

More from Symptai Consulting Limited (19)

PPTX
Embracing the Risk and Opportunity of AI & Cloud.pptx
PDF
Migrating to the Cloud - From Preparation to Operation copy.pdf
PDF
Integrated Security for Software Development and Advanced Penetration Testing...
PDF
Strengthening Caribbean Business against Cyber Attacks May 18.pdf
PDF
Keeping security relevant amid digital transformation
PPTX
Realizing the benefits of Digital Transformation
PDF
Securing Devices at Home
PDF
Preparing your Business for the Data Protection Bill
PPTX
Why cost optimization is the way of the future
PPTX
Best practices for PCI compliance
PPTX
The role of Technology: Battling Financial Crime
PPTX
Data Analytics: Improving Business
PPTX
IT Audit - Evolve and Stay in the Game
PPTX
Balancing Privacy and Digitization
PPTX
Misconceptions of Business Continuity Planning
PPTX
Cyber-Attack and Security: Putting the Audit Committee on High Alert
PPTX
Data mining: How it can Help Boost Effectiveness
PPTX
Can your company survive a modern day cyber attack?
PPTX
Governance: a tool for growth
Embracing the Risk and Opportunity of AI & Cloud.pptx
Migrating to the Cloud - From Preparation to Operation copy.pdf
Integrated Security for Software Development and Advanced Penetration Testing...
Strengthening Caribbean Business against Cyber Attacks May 18.pdf
Keeping security relevant amid digital transformation
Realizing the benefits of Digital Transformation
Securing Devices at Home
Preparing your Business for the Data Protection Bill
Why cost optimization is the way of the future
Best practices for PCI compliance
The role of Technology: Battling Financial Crime
Data Analytics: Improving Business
IT Audit - Evolve and Stay in the Game
Balancing Privacy and Digitization
Misconceptions of Business Continuity Planning
Cyber-Attack and Security: Putting the Audit Committee on High Alert
Data mining: How it can Help Boost Effectiveness
Can your company survive a modern day cyber attack?
Governance: a tool for growth

Recently uploaded (20)

PPTX
(Ali Hamza) Roll No: (F24-BSCS-1103).pptx
PDF
Introduction to the R Programming Language
PPTX
Copy of 16 Timeline & Flowchart Templates – HubSpot.pptx
PDF
Data Engineering Interview Questions & Answers Batch Processing (Spark, Hadoo...
PPTX
Topic 5 Presentation 5 Lesson 5 Corporate Fin
PDF
REAL ILLUMINATI AGENT IN KAMPALA UGANDA CALL ON+256765750853/0705037305
PPTX
STERILIZATION AND DISINFECTION-1.ppthhhbx
PDF
Business Analytics and business intelligence.pdf
PPTX
Acceptance and paychological effects of mandatory extra coach I classes.pptx
PPTX
Pilar Kemerdekaan dan Identi Bangsa.pptx
PDF
Capcut Pro Crack For PC Latest Version {Fully Unlocked 2025}
PPT
ISS -ESG Data flows What is ESG and HowHow
PPTX
New ISO 27001_2022 standard and the changes
PPTX
Introduction to Inferential Statistics.pptx
PPTX
A Complete Guide to Streamlining Business Processes
PPTX
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb
PDF
Data Engineering Interview Questions & Answers Cloud Data Stacks (AWS, Azure,...
PPTX
retention in jsjsksksksnbsndjddjdnFPD.pptx
PPTX
IBA_Chapter_11_Slides_Final_Accessible.pptx
PDF
Optimise Shopper Experiences with a Strong Data Estate.pdf
(Ali Hamza) Roll No: (F24-BSCS-1103).pptx
Introduction to the R Programming Language
Copy of 16 Timeline & Flowchart Templates – HubSpot.pptx
Data Engineering Interview Questions & Answers Batch Processing (Spark, Hadoo...
Topic 5 Presentation 5 Lesson 5 Corporate Fin
REAL ILLUMINATI AGENT IN KAMPALA UGANDA CALL ON+256765750853/0705037305
STERILIZATION AND DISINFECTION-1.ppthhhbx
Business Analytics and business intelligence.pdf
Acceptance and paychological effects of mandatory extra coach I classes.pptx
Pilar Kemerdekaan dan Identi Bangsa.pptx
Capcut Pro Crack For PC Latest Version {Fully Unlocked 2025}
ISS -ESG Data flows What is ESG and HowHow
New ISO 27001_2022 standard and the changes
Introduction to Inferential Statistics.pptx
A Complete Guide to Streamlining Business Processes
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb
Data Engineering Interview Questions & Answers Cloud Data Stacks (AWS, Azure,...
retention in jsjsksksksnbsndjddjdnFPD.pptx
IBA_Chapter_11_Slides_Final_Accessible.pptx
Optimise Shopper Experiences with a Strong Data Estate.pdf

Data Protection: An Approach to Privacy

  • 1. DATA PROTECTION Andrew Nooks An Approach To Privacy
  • 2. Symptai • Symptai Consulting Limited is an independent IS Audit, Security & Business Assurance firm founded in 1998. • We are an industry leader in technology consulting services for assurance, security, business processes, and compliance with numerous success stories and excellent client retention rates.
  • 3. Symptai Consulting Ltd Director eGov Jamaica Member, Board of Directors Andrew A. Nooks Certs: CISA, CISSP, CISSP-ISSAP, CIPM, CSSLP, CISM, CRISC, PCIP, ISO27001, ITSM Interests: Volleyball Swimming Aikido
  • 4. Disclaimer • This presentation is based on research collated from the Internet leveraging articles from the International Association of Privacy Professionals (IAPP), an organization of which I am a member, and its contributors. • I have also leveraged my own experience being as an IS practitioner for over twenty-five (25) years of which thirteen (13) of which has been dedicated to Information Security and related controls to include privacy, as well as and the knowledge and experience from the Symptai team.
  • 5. Definition of Privacy Privacy The right to be left alone, or freedom from interference or intrusion. Information privacy The right to have some control over how your personal information is collected and used. Impact How organization protect data in its various states: At rest, in-transit and in use.
  • 6. Why is Privacy Important? Due to advancement in technological innovation, information privacy is becoming more complex by the minute as more data is being collected and exchanged. As the technology gets more sophisticated so do the uses of data. This leaves organizations facing an incredibly complex risk matrix for ensuring that personal information is protected.
  • 7. In the News (Source https://www.scmagazine.com) Source: https://iapp.org/news
  • 8. Business Risk • Health • Banking • Insurance • Telecoms Inherent High Risk • GDPR and other Data Protection Legislations • PCI DSS • HIPAA Legal & Compliance
  • 9. Primary Components of a Privacy Program Privacy Program Governance Privacy Operational Life-Cycle Management
  • 10. Privacy Program Governance • Vision and Mission • Develop a strategy • Team structure and composition Strategy Management
  • 11. Privacy Program Governance • Vision and Mission • Develop a strategy • Team structure and composition Strategy Management • Frameworks • Policies Procedures Standards and guidelines Framework
  • 12. Privacy Program Governance • Vision and Mission • Develop a strategy • Team structure and composition Strategy Management • Frameworks • Policies Procedures Standards and guidelinesFramework • Metrics and measurements (identify, Define, Select, Collect, Analyze) Performance
  • 13. Business Case • Organizational Privacy Office Guidance • Define Privacy • Laws and Regulations • Technical Controls • External Privacy Organizations • Industry Frameworks • Privacy information Technology • Education and Awareness • Program Assurance
  • 15. Assess • AICPA/CICA Privacy Maturity Model • GAPP • Privacy by Design Assessment Models • Data • Systems • Processes Assess Business Privacy Operational Lifecycle Assess Protect Sustain Respond
  • 16. • Need for DLM • DLM Principles Data Lifecycle Management • Standards and Frameworks Information Security Practices • Proactive, Default Settings • Embedded, End2End Protection • Transparency, Respect for Users Privacy by Design • Privacy Impact Assessments • Risk Assessments Analyze and Assess Privacy Operational Lifecycle Assess Protect Sustain Respond Protect
  • 17. • Compliance with Privacy Policy • Monitor regulations and legislation • Compliance and Risk • Environment Monitor • Align Privacy operations • Compliance with Policies and Standards • Access Modification Disclosure • Communication of Findings Audit • Awareness • Flexibility • Catalog and maintain documents • Train Communicate Sustain Privacy Operational Lifecycle Assess Protect Sustain Respond
  • 18. • Handling, Access • Redress, Correction • Integrity Information Request • Preventing Harm • Accountability • Monitoring Legal Compliance • Roles and Responsibility • Integration in BCP • Detection Incident Planning • Pre-notification • Response Plan, Plan Execution • Reporting, Evaluation Incident Handling Respond Privacy Operational Lifecycle Assess Protect Sustain Respond
  • 19. In Summary 1. Define the privacy mission statement 2. Develop a strategy 3. Define team structure 4. Develop a framework – aligned to organization 5. Develop and communicate policies, procedures, standards and guidelines 6. Define performance metrics 7. Assess the based on governance model 8. Protect – DLM, Info Sec embedding privacy in the organization 9. Conduct RA and PIA 10. Monitor, audit and communicate 11. Respond to request 12. Accountability 13. Incident management
  • 20. Additional Reading • IAPP.org • APEC.org • ICO.gov.uk • Priv.gc.ca • OECD.org
  • 21. Questions? Andrew Nooks Symptai Consulting Limited Email: info@symptai.com

Editor's Notes

  • #2: Welcome everyone Thank you for joining us today
  • #11: Privacy Framework: An implementation Roadmap that provides a structure or checklists to guide the privacy professional through privacy management and prompts them for details to determine all privacy-relevant decisions of the organization Strategy Management Vision and Mission (statements, scope, compliance, legal) - Develop a strategy (Stakeholders –CISO, CRO, GLC, CIO, HRM, CMO), Key Functions, Interfacing, Data Governance Strategy (Collection, Authorized use, access, Security Destruction), Privacy Workshop Team structure (Governance Model – Centralized, Decentrlized, Hybrid, Org Model – CPO, privacy manager, Professional Competency – CIPM, CIPP, CIPT)
  • #12: Privacy Framework: An implementation Roadmap that provides a structure or checklists to guide the privacy professional through privacy management and prompts them for details to determine all privacy-relevant decisions of the organization. Managing risk Framework Assist in risk management Minimize incidents of data loss Protect reputation and market value Aids in Compliance to lawas regulation and standards Frameworks (privacy by Design, Privacy Maturity Model) APEC Privacy Framework – Enable regional data transfers C2B, B2B, B2G Guidance from UK Information Commissioner’s Office Canadian Personal Information and Electronic Documents Act PIPEDA Australian Privacy Principles Organization for Economic Co-operation amd Development Privacy Guidelines Framework questions Are risks defined identified and is there a business case Who has responsibility Are gaps in privacy management understood Is privacy management being monitored Are employees trained Are best practices for data inventory, risk assessments and privacy impact assessments Is there an incident response plan Is there a communication policy on privacy-related matters and are materials updated Policies Procedures Standards and guidelines (Business Case, Gap Analysis, Review Process and Monitoring, Communicate to stakeholders
  • #13: Performance Measurable, meaningful, unambiguous, specific
  • #14: Externalprovacy – Data Commissioner’s office Privacy enhancing technologied Industry frameworks such as AICPA – Generally Accepted Privacy Principles -- collection use
  • #15: Assess – measure Protect – Improve Sustain – evaluate Support – respond
  • #16: PMM – Levels adhoc repeatable, defined, managed, optimized PbD – Assess org objectives and goals – Dr Ann Cavoukian Support for these areas Internal Audit and Risk Management Informaiton Technology – Business Continuity/DRP InformationSecurity – Response and Breach Notification Legal and Contracts – Compliance, Mergers, Acquisitions, divestitures Processors and thirdparty vendors Human Resourcesmarketting and business development Gobernment relations and public policy Finance/business contrls
  • #17: DLM Principles Alignment with enterprise objectives Minimalism Simplify processes Provide adequate infrastructure Information Security Authenticity of subjects records Retrievability Distribution Controls Auditability Consistency of policies Enforcement