SlideShare a Scribd company logo
SACONConfidential (c) Arrka, 2020
SACON International 2020
India | Bangalore | February 21 - 22 | Taj Yeshwantpur
An Introduction to Data Privacy
1
SACON 2020
An Introduction to Data Privacy
2
• What is Personal Data?
• An Overview of Privacy Principles & Rights
• Relationship between Information Security and Privacy
• How should an organization implement Privacy?
SACON 2020
When we talk Data Privacy, we talk Personal Data
Any data that can – directly or
indirectly - or in combination
with other data – make a person
‘identifiable’
What is Personal Data?
Device Identifiers
Online Identifiers
Social Media MarkersMetadata Data that has been
processed using
analytics that can
identify a person
Trackers & CookiesLocation Data
Above – the – surface (ATS) Personal data
Demographic/
Identity Data
Health/
Biometric/Genetic/
Gender Data
Political Affiliations/
Personal beliefs/
Criminal History/etc
Financial Data
Govt Ids
Any compromise of this category of
data can cause greater harm to the
person as compared to other types
of PD
Sensitive
Personal Data
(SPD)
Financial data, health data, official identifier,
sex life, sexual orientation, biometric data,
genetic data, transgender status, intersex
status, caste or tribe, religious or political
belief or affiliation*
Further sub-categories
Comprises:
Personal Data
(PD)
Below – the – surface (BTS) Personal data
SACON 2020
Personal Data In Context
Data
Personal Data
Sensitive
Personal Data
Data Privacy not
Applicable
Data Privacy
Applicable
SACON 2020
Data Privacy Applies to Personal Data Processing
Collection Recording Organisation Structuring
Storage Alteration Transmission Dissemination
Restriction Destruction Generation
SACON 2020
Roles in the Privacy Ecosystem
Data Subject/
Principal
She ‘OWNS’ her
Personal Data
Data Controller/
Fiduciary
The entity that, alone or jointly with others,
determines the Purposes for data processing (“Why”)
& Means of data processing
(“How”)
6
DATA PROCESSOR The entity that processes personal data:
On behalf of the Fiduciary
Under the instructions of the fiduciary
SACON 2020
What are the Principles that
guide Personal Data Processing?
7
SACON 2020
Grounds for Processing Personal Data – The When
Consent
Function of State
Public Interest
Compliance with law or order of court/ tribunal
Prompt action in case emergencies
Purposes related to employment
*Reasonable Purposes of Data Fiduciary
• Processing for prevention &
detection of any unlawful activity
including fraud
• Whistle blowing
• M&A
• Network and information security
• Credit scoring
• Recovery of debt
• Processing of publicly available PD
*Reasonable Purpose Examples
SACON 2020
Principles Guiding Personal Data Processing – The How
Security Safeguards: Ensure Security Safeguards throughout the Lifecycle to protect against loss, unauthorised access, destruction, use,
modification, disclosure or other reasonably foreseeable risks.
User Rights: Provide Rights to user for Access, Correction, Processing Restrictions, etc.
Data Collection Data Usage Data Destruction
Consent: Obtain Informed, freely given
and unambiguous consent where
applicable
Collection Limitation: Collect adequate,
relevant based on Purpose
Use Limitation: Use and disclose
collected Personal Data only for pre-
defined purposes. Limit Access to only
relevant users.
Storage Limitation: Retain Personal
Data long enough to satisfy the
purpose of Collection. Define Retention
Periods
Notice/ Transparency: Organization should publish a Public Statement on the Type of Personal Data collected, used, who it is shared with and
how long it is retained
Accountability: Organization needs to implement Accountability measures to manage Privacy. Examples of these measures include Breach
Notification, Privacy By Design, inserting Privacy Clauses in 3rd Party Contracts, maintaining Records of Processing
SACON 2020
Is Data Privacy the same as
Information Security?
10
SACON 2020
Information
Security
Data
Privacy
11
Relationship: Infosec & Privacy
Security of
Personal Data
Covers Security of
non-Personal Data
Covers non-Security
related Privacy Principles
(i.e. Notice, Collection
Limitation)
SACON 2020
How should an Organization
implement Privacy?
12
SACON 202013
The need for a Framework..
Organization
Questions on
Privacy
Implementation
Where should
we start?
What kind of
Organization
structure and
capabilities do
we need?
What are the
Policies and
Processes that
need to be
implemented?
What are the
Technical,
Administrative
measures
needed?
How do we
monitor Privacy
on an ongoing
basis?
Privacy Implementation is a complex
exercise impacting more than 80% of
the organization
Most Privacy Requirements need
coordination between multiple
functions
Lack of Governance has seen failure of
many Privacy Programs
Lack of a structured Approach is a
common cause for failure
SACON 2020
Some
Privacy
Program
Frameworks
DPF
ISO
27701
BS
10012
14
Privacy Frameworks that provide a Structured Approach
BS 10012:2017 is the British
standard that sets out the
requirements for a Personal
Information Management
System and aligns with the
principles of the European
General Data Protection
Regulation (EU GDPR).
ISO 27701 is a privacy extension to
ISO 27001&02 and provides
additional guidance for the
protection of privacy, which is
potentially affected by the
processing of Personal Data.
The DSCI Privacy Framework (DPF) has
been developed to guide an
organization on developing &
implementing a Privacy Program
SACON 2020
9. PIS
7. IUA
3. PPP1. VPI
2. POR 4. RCI
5. PCM
6. MIM 8. PAT
15
A Sample Framework: DSCI Privacy Framework (DPF)
# Practice Areas
1 Visibility over Personal Information (VPI)
2 Privacy Org & Responsibilities (POR)
3 Privacy Policy and Processes (PPP)
4 Regulatory Compliance and Intelligence (RCI)
5 Privacy Contract Management (PCM)
6 Privacy Monitoring and Incident Mgt (MIM)
7 Information Usage & Access (IUA)
8 Privacy Awareness and Training (PAT)
9 Personal Information Security (PIS)
DSCI PRIVACY FRAMEWORK (DPF)
Confidential (c) Arrka, 2018
SACON 2020
Thank You
Q & A

More Related Content

PPTX
India'a Proposed Privacy & Personal Data Protection Law
PDF
(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerat...
PDF
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
PDF
BigID Data Sheet: Smart Data Labeling and Tagging
PPTX
BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data Discovery to...
PDF
BigID Data Sheet: LGPD Compliance Automated
PDF
BigID DataSheet: Data Access Intelligence
PDF
BigID Data sheet: Consent Governance & Orchestration
India'a Proposed Privacy & Personal Data Protection Law
(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerat...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
BigID Data Sheet: Smart Data Labeling and Tagging
BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data Discovery to...
BigID Data Sheet: LGPD Compliance Automated
BigID DataSheet: Data Access Intelligence
BigID Data sheet: Consent Governance & Orchestration

What's hot (14)

PPTX
BigID GDPR Compliance Automation Webinar Slides
PDF
BigID Data Sheet: GDPR Compliance
PDF
BigID's Smart Data Labeling and Tagging
PDF
BigID Data Sheet HIPAA Data Security & Privacy
PDF
BigID Virtual MDM Data Sheet
PDF
BigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
PDF
BigID Datasheet: CCPA Data Rights Automation
PDF
Beginning your General Data Protection Regulation (GDPR) Journey
PDF
Finding Data at Risk for CCPA Compliance
PPTX
Personally Identifiable Information – FTC: Identity theft is the most common ...
PPTX
GDPR: Your Journey to Compliance
PDF
Privacy & Data Protection in the Digital World
PPTX
Ensuring GDPR Compliance - A Zymplify Guide
PDF
GDPR changes affect direct marketing
BigID GDPR Compliance Automation Webinar Slides
BigID Data Sheet: GDPR Compliance
BigID's Smart Data Labeling and Tagging
BigID Data Sheet HIPAA Data Security & Privacy
BigID Virtual MDM Data Sheet
BigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
BigID Datasheet: CCPA Data Rights Automation
Beginning your General Data Protection Regulation (GDPR) Journey
Finding Data at Risk for CCPA Compliance
Personally Identifiable Information – FTC: Identity theft is the most common ...
GDPR: Your Journey to Compliance
Privacy & Data Protection in the Digital World
Ensuring GDPR Compliance - A Zymplify Guide
GDPR changes affect direct marketing
Ad

Similar to (SACON) Shivangi Nadkarni & Sandeep Rao - An introduction to Data Privacy (20)

PPTX
GDPR in the Healthcare Industry
PDF
The Rise of Data Ethics and Security - AIDI Webinar
PPTX
GDPR How to get started?
PPT
Legal And Regulatory Dp Challenges For The Financial Services Sector
PDF
GDPR for your Payroll Bureau
PDF
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
PPTX
Data Privacy and consent management .. .
PPTX
Data privacy and consent management (K.sailaja).pptx
PPTX
My presentation- Ala about privacy and GDPR
PDF
General Data Protection Regulation (GDPR) and ISO 27001
PDF
50 Most Asked Interview Questions for DPO
PDF
50 Most Asked Interview Questions for Data Protection Officer (DPO).pdf
PDF
50 Asked Interview Questions for Data Protection Officer
PDF
Top Interview Questions for Data Protection Officer (DPO).pdf
PDF
Ready to Become a Data Protection Officer (DPO)?
PPTX
Keep Calm and Comply: 3 Keys to GDPR Success
PDF
Implementing and Auditing GDPR Series (2 of 10)
PDF
Implementing and Auditing GDPR Series (3 of 10)
PDF
Uchi data local presentation 2020
PDF
GDPR – Readiness in IT offshore organization
GDPR in the Healthcare Industry
The Rise of Data Ethics and Security - AIDI Webinar
GDPR How to get started?
Legal And Regulatory Dp Challenges For The Financial Services Sector
GDPR for your Payroll Bureau
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
Data Privacy and consent management .. .
Data privacy and consent management (K.sailaja).pptx
My presentation- Ala about privacy and GDPR
General Data Protection Regulation (GDPR) and ISO 27001
50 Most Asked Interview Questions for DPO
50 Most Asked Interview Questions for Data Protection Officer (DPO).pdf
50 Asked Interview Questions for Data Protection Officer
Top Interview Questions for Data Protection Officer (DPO).pdf
Ready to Become a Data Protection Officer (DPO)?
Keep Calm and Comply: 3 Keys to GDPR Success
Implementing and Auditing GDPR Series (2 of 10)
Implementing and Auditing GDPR Series (3 of 10)
Uchi data local presentation 2020
GDPR – Readiness in IT offshore organization
Ad

More from Priyanka Aash (20)

PPTX
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
PDF
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
PDF
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
PDF
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
PDF
Lessons Learned from Developing Secure AI Workflows.pdf
PDF
Cyber Defense Matrix Workshop - RSA Conference
PDF
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
PDF
Securing AI - There Is No Try, Only Do!.pdf
PDF
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
PDF
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
PDF
10 Key Challenges for AI within the EU Data Protection Framework.pdf
PDF
Techniques for Automatic Device Identification and Network Assignment.pdf
PDF
Keynote : Presentation on SASE Technology
PDF
Keynote : AI & Future Of Offensive Security
PDF
Redefining Cybersecurity with AI Capabilities
PDF
Demystifying Neural Networks And Building Cybersecurity Applications
PDF
Finetuning GenAI For Hacking and Defending
PDF
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
PDF
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
PDF
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Cyber Defense Matrix Workshop - RSA Conference
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Securing AI - There Is No Try, Only Do!.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Keynote : Presentation on SASE Technology
Keynote : AI & Future Of Offensive Security
Redefining Cybersecurity with AI Capabilities
Demystifying Neural Networks And Building Cybersecurity Applications
Finetuning GenAI For Hacking and Defending
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf

Recently uploaded (20)

PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPT
Teaching material agriculture food technology
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Empathic Computing: Creating Shared Understanding
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Encapsulation theory and applications.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
MYSQL Presentation for SQL database connectivity
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Building Integrated photovoltaic BIPV_UPV.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
“AI and Expert System Decision Support & Business Intelligence Systems”
Teaching material agriculture food technology
Review of recent advances in non-invasive hemoglobin estimation
Empathic Computing: Creating Shared Understanding
20250228 LYD VKU AI Blended-Learning.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
A Presentation on Artificial Intelligence
CIFDAQ's Market Insight: SEC Turns Pro Crypto
The AUB Centre for AI in Media Proposal.docx
Reach Out and Touch Someone: Haptics and Empathic Computing
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Encapsulation theory and applications.pdf
NewMind AI Weekly Chronicles - August'25 Week I
MYSQL Presentation for SQL database connectivity

(SACON) Shivangi Nadkarni & Sandeep Rao - An introduction to Data Privacy

  • 1. SACONConfidential (c) Arrka, 2020 SACON International 2020 India | Bangalore | February 21 - 22 | Taj Yeshwantpur An Introduction to Data Privacy 1
  • 2. SACON 2020 An Introduction to Data Privacy 2 • What is Personal Data? • An Overview of Privacy Principles & Rights • Relationship between Information Security and Privacy • How should an organization implement Privacy?
  • 3. SACON 2020 When we talk Data Privacy, we talk Personal Data Any data that can – directly or indirectly - or in combination with other data – make a person ‘identifiable’ What is Personal Data? Device Identifiers Online Identifiers Social Media MarkersMetadata Data that has been processed using analytics that can identify a person Trackers & CookiesLocation Data Above – the – surface (ATS) Personal data Demographic/ Identity Data Health/ Biometric/Genetic/ Gender Data Political Affiliations/ Personal beliefs/ Criminal History/etc Financial Data Govt Ids Any compromise of this category of data can cause greater harm to the person as compared to other types of PD Sensitive Personal Data (SPD) Financial data, health data, official identifier, sex life, sexual orientation, biometric data, genetic data, transgender status, intersex status, caste or tribe, religious or political belief or affiliation* Further sub-categories Comprises: Personal Data (PD) Below – the – surface (BTS) Personal data
  • 4. SACON 2020 Personal Data In Context Data Personal Data Sensitive Personal Data Data Privacy not Applicable Data Privacy Applicable
  • 5. SACON 2020 Data Privacy Applies to Personal Data Processing Collection Recording Organisation Structuring Storage Alteration Transmission Dissemination Restriction Destruction Generation
  • 6. SACON 2020 Roles in the Privacy Ecosystem Data Subject/ Principal She ‘OWNS’ her Personal Data Data Controller/ Fiduciary The entity that, alone or jointly with others, determines the Purposes for data processing (“Why”) & Means of data processing (“How”) 6 DATA PROCESSOR The entity that processes personal data: On behalf of the Fiduciary Under the instructions of the fiduciary
  • 7. SACON 2020 What are the Principles that guide Personal Data Processing? 7
  • 8. SACON 2020 Grounds for Processing Personal Data – The When Consent Function of State Public Interest Compliance with law or order of court/ tribunal Prompt action in case emergencies Purposes related to employment *Reasonable Purposes of Data Fiduciary • Processing for prevention & detection of any unlawful activity including fraud • Whistle blowing • M&A • Network and information security • Credit scoring • Recovery of debt • Processing of publicly available PD *Reasonable Purpose Examples
  • 9. SACON 2020 Principles Guiding Personal Data Processing – The How Security Safeguards: Ensure Security Safeguards throughout the Lifecycle to protect against loss, unauthorised access, destruction, use, modification, disclosure or other reasonably foreseeable risks. User Rights: Provide Rights to user for Access, Correction, Processing Restrictions, etc. Data Collection Data Usage Data Destruction Consent: Obtain Informed, freely given and unambiguous consent where applicable Collection Limitation: Collect adequate, relevant based on Purpose Use Limitation: Use and disclose collected Personal Data only for pre- defined purposes. Limit Access to only relevant users. Storage Limitation: Retain Personal Data long enough to satisfy the purpose of Collection. Define Retention Periods Notice/ Transparency: Organization should publish a Public Statement on the Type of Personal Data collected, used, who it is shared with and how long it is retained Accountability: Organization needs to implement Accountability measures to manage Privacy. Examples of these measures include Breach Notification, Privacy By Design, inserting Privacy Clauses in 3rd Party Contracts, maintaining Records of Processing
  • 10. SACON 2020 Is Data Privacy the same as Information Security? 10
  • 11. SACON 2020 Information Security Data Privacy 11 Relationship: Infosec & Privacy Security of Personal Data Covers Security of non-Personal Data Covers non-Security related Privacy Principles (i.e. Notice, Collection Limitation)
  • 12. SACON 2020 How should an Organization implement Privacy? 12
  • 13. SACON 202013 The need for a Framework.. Organization Questions on Privacy Implementation Where should we start? What kind of Organization structure and capabilities do we need? What are the Policies and Processes that need to be implemented? What are the Technical, Administrative measures needed? How do we monitor Privacy on an ongoing basis? Privacy Implementation is a complex exercise impacting more than 80% of the organization Most Privacy Requirements need coordination between multiple functions Lack of Governance has seen failure of many Privacy Programs Lack of a structured Approach is a common cause for failure
  • 14. SACON 2020 Some Privacy Program Frameworks DPF ISO 27701 BS 10012 14 Privacy Frameworks that provide a Structured Approach BS 10012:2017 is the British standard that sets out the requirements for a Personal Information Management System and aligns with the principles of the European General Data Protection Regulation (EU GDPR). ISO 27701 is a privacy extension to ISO 27001&02 and provides additional guidance for the protection of privacy, which is potentially affected by the processing of Personal Data. The DSCI Privacy Framework (DPF) has been developed to guide an organization on developing & implementing a Privacy Program
  • 15. SACON 2020 9. PIS 7. IUA 3. PPP1. VPI 2. POR 4. RCI 5. PCM 6. MIM 8. PAT 15 A Sample Framework: DSCI Privacy Framework (DPF) # Practice Areas 1 Visibility over Personal Information (VPI) 2 Privacy Org & Responsibilities (POR) 3 Privacy Policy and Processes (PPP) 4 Regulatory Compliance and Intelligence (RCI) 5 Privacy Contract Management (PCM) 6 Privacy Monitoring and Incident Mgt (MIM) 7 Information Usage & Access (IUA) 8 Privacy Awareness and Training (PAT) 9 Personal Information Security (PIS) DSCI PRIVACY FRAMEWORK (DPF) Confidential (c) Arrka, 2018