Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
In the era of almost daily news accounts of massive retailer credit card data, employer human resources data, and health care provider patient medical data security breaches, the legal and business imperative for data and data system protection needs no explanation. Suffice it to say that privacy and data security are increasingly regulated and the topic of litigation. Data is also a rich source for evidence in litigation and, for many companies, a valuable asset. What is less apparent, however, to many lawyers, business people, and even information professionals, is exactly how to properly manage information and its privacy and security. However, over the past several decades, frameworks, standards, and best practices have been developed for establishing and managing a comprehensive privacy, data protection and information governance program. This article summarizes those learnings to suggest an approach for how to design and run a program that is right for your company.
Program Elements and Framework
For any privacy, data protection, and information governance program to be effective, it requires a multi-disciplinary effort with a mandate from the Board and C-suite, and ongoing assessment and maturement. What is legally required, cost beneficial, and otherwise reasonable under the circumstances will differ based on company size, industry, jurisdictional footprint, and corporate philosophy. Accordingly, data management programs must be developed and evaluated individually ' sadly, there is no boilerplate, one-size-fits-all model. However, there are paradigms, elements and best practices, discussed below, that all good programs have in common.
Privacy and data security are often referred to as opposite sides of the same information governance coin. While this metaphor does help visualize the similarities and differences between privacy and data security and their inextricable links to each other, it ignores other aspects of information governance all together. When looked at instead as three indispensable legs of the data management stool, the role of each is better understood:
These three subsets of data management all need to be considered together in a collaborative manner, even where, as is typical in large organizations, each has its own domain. This can be accomplished through bringing together all data stakeholders, across domains, and developing collaboratively shared policies, goals and tools. Only in this way can an integrated and overall data management program be developed.
There are a number of frameworks that can be drawn upon to articulate key elements of a data management program. The Federal Trade Commission's (FTC) version of the Fair Information Practice Principles (FIPPs), which are the core of the Privacy Act of 1974, 5 U.S.C. ' 552a, that applies to federal government agency computer systems and records, lists eight: Transparency; Individual Participation; Purpose Specificity; Data Minimization; Use Limitation; Data Quality and Integrity; Security and Accountability; and Auditing.
The Organization for Economic Cooperation and Development's (OECD) Privacy Principles, which tie closely to the European Commission's Data Protection Directive, also have eight, though somewhat differing, principles: Collection Limitation; Data Quality; Purpose Specification; Use Limitation; Security Safeguards; Openness; Individual Participation; and Accountability. The American Institute of Certified Public Accountants (AICPA), along with its Canadian counterparts, have drawn from these and other frameworks to establish 10 Generally Accepted Privacy Principles (GAPP) around which a company's data management policies and practices can be accessed and managed: Management; Notice; Choice and Consent; Collection; Use, Retention and Disposal; Access; Disclosure to Third Parties; Security; Quality; and Monitoring and Enforcement.
Breaking data management framework principles down to the most general topics, a data management program can be organized, evaluated and operated, and risk assessed and mitigated, based on just five categories: Governance; Transparency; Data Subject Participation; Security and Control; and Accountability:
What specific program policies and practices will flesh out each category will depend upon the laws and self-regulatory schemes that may be applicable to a company, as well as business judgment decisions as to how protective or exploitive a company desires to be of its data, within the limitations of applicable law.
Stakeholders and Their Role
There are typically many data stakeholders, each with different relationships with a company's data, and as such potentially different viewpoints toward how it should be collected, used, shared, protected and maintained. Only through involvement of all these stakeholders will a company be able to implement and maintain a comprehensive data protection program that meets company-wide needs and obligations. It is recommended that a program's mandate and governance structure be established with input from these stakeholders. This will make it more likely that complete information is gathered and all stakeholders' interests are considered. It also makes governance more effective and efficient.
While all these stakeholders need to be intimately involved in program development and operations, frequently through a committee structure, programs work best with ultimate management by a single senior level executive with the responsibility to oversee the program and report directly to the Board, CEO or executive management team. This is more and more frequently a Chief Privacy Officer (CPO) or Chief Information Officer/Chief Information Security Officer (CIO/CISO). An industry analyst has proffered that “digital business innovation risk will bring about the rise of the Digital Risk Officer” to manage company data and information systems. See, Gartner, Innovation Insight: Digital Business Innovation Risk Will Bring About the Rise of the Digital Risk Officer (June 18, 2014). Sometimes, particularly in larger organizations, there is a leadership team comprised of the CIO/CISO, a CPO, and potentially one or more other executives, such as the head of Regulatory Compliance and/or Risk Management. This team may share overall management responsibility, or represent a second level of subject matter management reporting up to a single program leader. Multi-nationals and conglomerates may need various levels of structure, at for instance divisional/subsidiary levels and/or jurisdictional levels. Top-level, umbrella management is still recommended to improve oversight and accountability and help avoid discrepancies not justified by business or legal differences. Each company's size, footprint, management structure, and internal politics will drive what will be the most likely effective governance structure. However, for effective governance and accountability, a program needs both top down and bottom up involvement and the participation of all of the following stakeholders:
A program needs the participation of all of these stakeholders to be successful, and a governance structure to manage their participation and hold them accountable.
Understanding Company Data and Data Obligations and Practices
It is crucial that the company, and its data stakeholders (especially those involved in program development and governance) understand the “who,” “what,” “where,” “when” and “why” of its data. More particularly, what data it has, how it is collected, where it resides, its appropriate purposes and life cycle, what third parties have what interest in it, access to and involvement with it, how the company ensures appropriate protection and compliance with legal and other obligations, and that it is not inappropriately accessed, used or transferred. This is accomplished initially through inventories and assessments of data, data practices, and data obligations, and then application of appropriate controls on various data. This understanding is necessary to properly establish the company's overall strategic data protection mission, as well as to reflect that in a policy and to implement a policy through program management.
This process of inventorying, if not previously done, is a logical initial step for program development once the stakeholders are identified and organized. Thereafter, ongoing inventory updating is critical to keep a program effective. There are a number of tools that can be used to conduct such inventories. Software tools are available to search for and identify certain types of sensitive data so that it can be ensured that those databases have the appropriate security and access controls. However, that alone is insufficient as the company still needs to know the purpose of that data, how it is used and by whom, and to establish rules around its retention, destruction, access, use and transfer. This can be done through surveys or interviews. An example of a resource for conducting this due diligence is the online data practices survey tool offered by Jordan Lawrence (www.jordanlawrence.com). Jordan Lawrence offers industry and department function specific standard survey questions, which can be supplemented with custom questions as well. The end results are reports that identify data types, locations and use practices. These results can then be accessed to help evaluate program compliance and to identify issues that need to be addressed. There are also a number of consultants, such as accounting firms and data protection consultants, that offer similar auditing and surveying tools and services.
Strategic Mission and Program Mission Statement
As discussed, given the various data stakeholders and their different roles regarding company data, a company can only develop and mature a data protection program if there is an overall, company-wide policy statement that explains how data is to be treated in order to meet the company's overall strategic business goals. This will articulate the company's organizational objectives and values and inform employees and contractors generally how company data is to be collected, processed, used, shared, transferred, updated, retained, destroyed and made available to data subjects, employees, contractors, and others.
Considerations in developing an overall strategic policy include:
What kinds of data the company collects and maintains, its purposes, and the related degrees of sensitivity;
What legal obligations apply to company data;
Industry self-regulatory obligations; and
The degree to which the company needs or desires to be privacy-protective and/or maintain industry-leading data security to protect its brand and customer relationships.
Some companies may wish to merely comply with applicable legal and industry self-regulatory obligations and contractual commitments (which may include obligations imposed by insurers, customers or even service providers such as credit card companies), while others may seek to establish best practices and use that as a market differentiator. Companies operating only in the U.S. will have differing, usually lower, legal obligations than those with international operations, especially where European or similar laws apply. Even in the U.S., companies in industry sectors that have heightened data protection regulatory schemes, such as financial services, health care, and those collecting personal information from children, will be mandated to meet higher levels of data protection than those that are not subject to sectorial data protection laws.
There will be a multitude of company policies and notices that will reflect the overall company policy, including employee/contractor computer use (including “Bring Your Own Device”) and social media policies, consumer privacy notices (including website and specific product privacy notices), a written information security policy (WISP), a data security breach preparedness and response plan, a policy of requiring privacy impact assessments for new or changed data practices or events, etc. This second level of policies all should reflect the companies' overall strategic data protection policy.
Developing and Implementing Program Framework
Developing a program framework will help in the articulation of the broad umbrella policy and its implementation through more specific polices and notices. Part of the framework is the governance structure. From the program management group come the second level of governance ' policies, procedures, processes, guidance documents, educational programs, compliance and request reporting mechanisms, guidance documents and checklists, and incident response plans that will enable policy implementation and compliance. Some aspects of the framework will be company-wide and some specific to products, services or functions. Here, having the input and participation of all stakeholders in program governance will help ensure effective implementation and ongoing assessment and refinement, which in turn helps reduce the risk data leakage or misuse that could cause economic and/or reputational harm to the company.
A program framework can be developed from applicable established standards. In some cases, certain standards will be required by law or contract to be applied to at least certain data sets. Examples include: legally imposed frameworks such as the requirements of U.S. sectorial data protection laws, including the Health Insurance Portability and Accountability Act (HIPAA) and related regulations; the National Institute of Standards and Technology (NIST) security and data controls applicable to U.S. government systems and organizations (NIST SP 800-53 Rev.4); framework obligations imposed by international laws, where applicable, such as the EU Data Protection Directive (and guidance from local data protection authorities); the Canadian Personal Information Protection and Electronic Documents Act (PIPEDA); the Massachusetts' data protection law (which, among other things, requires companies with certain types of personal information of its citizens to have a written information security policy and to require the same of their vendors); and industry and contractual mandated frameworks such as the Payment Card Industry Data Security Standard (PCI DSS). Even if not legally required, these provide valuable standards for consideration.
There are also best practices for privacy and data security that are recommended by the Federal Trade Commission and the California and other states' Attorney Generals, and the concept of Privacy by Design (PbD), which has been adopted in various forms as either required or recommended by various data protection authorities worldwide. In short, PbD sets privacy and security as the default and implements reasonable security, limitations on data collection, use, and retention, and methods of ensuring data accuracy at all stages of development of data-using products and services. In addition, a number of data protection standards have been set by standards organizations that can be instructive, such as the American Institute of CPAs' Generally Accepted Privacy Principles, and the International Organization for Standardization (ISO) 27000 series of information security standards. Public companies should also develop data protection frameworks keeping their obligation under Section 404 of Sarbanes Oxley, which requires management and external auditors to report on the adequacy of the company's internal controls on financial reporting, firmly in mind.
Establishing Goals and Measuring Performance
Once policy is established and has begun to be implemented, the governance system should set measurable goals to gauge program performance. Tracking and benchmarking indicators of program performance and maturity can help establish what is working and where improvements are necessary. In doing so, it is important to select enough relevant metrics and ensure they are objectively measured and accurately reported. For more information on examples of developing appropriate data protection performance measurement tools, see the best practices of the NIST Interagency Report 7564: “Directions in Security Metrics Research” and Chapter 3 (Performance Measurement) in the International Association of Privacy Professionals (IAPP) Privacy Program Management ' Tools for Managing Privacy Within Your Organization (available from Google Books at http://bit.ly/1O7kFIM). Relevant metrics include: adequacy of notice at collection; consistency of access and use with policy; conformity with retention/destruction policies; results of security assessments; use of privacy impact assessments; employee policy knowledge; and number and severity of incidents and response time and effectiveness.
Accessing, Protecting, Sustaining and Responding
The operational functions of a data management program are often categorized by the literature on the subject as accessing, protecting, sustaining, and responding, and are applied across an operational lifecycle. The four phases represent key tasks, and lifecycle means not birth, growth, death and rebirth in the ecological sense, but that there is a process of constant evaluation and refinement as opposed to a one-time assessment and fix. Good programs are intended to continuously evolve and improve.
Assessment is a critical initial step to new program creation (as well as crucial to existing program evaluation), to the evaluation of the impact of each new product and service, and of changes in facts, law or practices. Assessment enables the company to understand its corporate goals, legal obligations, and the facts regarding data and data practices. It also enables the company to identify and fill in gaps, evaluate program success and failings, and establish return on investment data. All areas of a company that touch data, and all of the company's data stakeholders, need ongoing assessment. This can be institutionalized through the adoption of various assessment models and tools, including software tools, physical inspections, surveys and questionnaires, internal and third party audits, impact assessment forms, and other fact-marshalling devices that provide input necessary for a meaningful analysis. Essentially, fact gathering by use of these tools is the monitoring function, and assessment is the analysis and conclusions and recommendations that come from monitoring activities.
There are well developed models for accessing overall program development. One is the now 20-year tested AICPA Privacy Maturity Model. It uses benchmarks to rate activities and programs to five maturity levels: ad hoc, repeatable, defined, managed and optimized. The AICPA offers an affordable software tool called the Privacy Principles Scoreboard that companies and their advisors can use to conduct privacy risk and maturity assessments. Two real values of engaging in such an exercise are that it helps track growth and success, and can also be used as an objective measure of return on investment.
An assessment model used less for rating a program, but for operating it, is the concept of “Privacy by Design,” pioneered in the 1990s by Ontario Canada Privacy Commissioner Ann Cavourkian. This much refined and time-tested approach has been recommended by the FTC in many of its privacy and data security guidance and policy documents, and is essentially codified in the European Union. In its true form, privacy is the default and products and services should be developed from conceptualization through exploitation to minimize privacy and data security impact and maximize consumer privacy, control and safety. Even if a company's policy is not consumer friendly, and it operates only in jurisdictions like the United Sates ' and there in minimally regulated industry where acceptable ' the process of evaluating privacy and data security impacts all stages of product and services development and exploitation, rather than as an afterthought, has great value and helps avoids unnecessary inefficiencies and risks and costly last minute workarounds. For more information, see, www.privacybydesign.ca.
Returning to the life cycle metaphor, protection of data can also be seen in this manner, and Data Life Cycle Management (DLM) is a common information governance approach to tracking and managing data from creation to destruction. DLM is concerned with how data is handled, retained, processed, stored, shared and destroyed. Data retention policies are important to comply with legal requirements, and to minimize risk associated with data retention beyond what is necessary or beneficial. Both privacy compliance and data security are also crucial to data protection throughout the data life cycle. As previously explained, although different requirements and frameworks may apply depending on the company and its data, established frameworks that may not be legally required are nonetheless good standards to draw from.
Sustainment is essentially about evaluating, enforcing, refining and educating. This flows out of monitoring and assessment. To sustain a program, monitoring and assessment needs to be ongoing. Compliance-monitoring, which requires systems to solicit, respond to, track and learn from complaints and mistakes, is an excellent way to sustain program goals. Indeed, part of sustainment is accountability. There should be trusted people and mechanisms for making complaints, requests, recommendations and whistle blowing. There also need to be procedures for responding to and resolving issues and repercussions for non-compliance. Finally, employee and vendor training is essential. Anyone that touches, or has access to, company data or data systems needs some level of data protection sensitivity, which can only be had through ongoing education. Education is more than merely promulgating operational practices policies; it also includes educating people about the issues, why they are important, and how they relate to their particular role in the company and their daily activities. Some education is of a general nature and relevant to all, while other training should be function-specific and tailored to the relevant audiences.
In order to respond, there must be knowledge of an issue in need of response. The first three elements assist in this regard. Data protection programs need to be designed to respond to requests, inquiries, compliance failures, security breaches, disasters and other business interruption. There should be preparedness plans and systems in place for all. Also, companies should consider various cyber-liability and business interruption insurance policies to help mitigate the costs of inevitable issues.
Key to the ability to respond is preparedness, which is not only having well-conceived plans and procedures, but practical exercise to build the experience necessary to respond effectively when the time comes. This can be done through table-top exercises, which put response team members through likely scenarios, including internal and external breaches and natural and man-made disasters. In this regard, data protection incident response is similar in many respects to a good business continuity and disaster response plan, and indeed is a component of such planning. Furthermore, state laws and federal and state health care information laws may require data security incidents to be reported to regulators, data subjects and the public. These laws are far from consistent and may result in different obligations from state-to-state under identical facts, so having the ability to expeditiously address those requirements in the event of an incident, typically through outside legal counsel, is part of response preparedness.
Conclusion
In today's digital age, all companies have data assets and obligations. Legal, IT/IS, and compliance leaders need to work together with other data stakeholders, within a defined and accountable governance structure, to develop a robust program for assessing that data and its corresponding obligations, protecting the data and evaluating and minimizing data-related risks. A good data management and protection program should be in a constant state of self-evaluation and improvement.
In the era of almost daily news accounts of massive retailer credit card data, employer human resources data, and health care provider patient medical data security breaches, the legal and business imperative for data and data system protection needs no explanation. Suffice it to say that privacy and data security are increasingly regulated and the topic of litigation. Data is also a rich source for evidence in litigation and, for many companies, a valuable asset. What is less apparent, however, to many lawyers, business people, and even information professionals, is exactly how to properly manage information and its privacy and security. However, over the past several decades, frameworks, standards, and best practices have been developed for establishing and managing a comprehensive privacy, data protection and information governance program. This article summarizes those learnings to suggest an approach for how to design and run a program that is right for your company.
Program Elements and Framework
For any privacy, data protection, and information governance program to be effective, it requires a multi-disciplinary effort with a mandate from the Board and C-suite, and ongoing assessment and maturement. What is legally required, cost beneficial, and otherwise reasonable under the circumstances will differ based on company size, industry, jurisdictional footprint, and corporate philosophy. Accordingly, data management programs must be developed and evaluated individually ' sadly, there is no boilerplate, one-size-fits-all model. However, there are paradigms, elements and best practices, discussed below, that all good programs have in common.
Privacy and data security are often referred to as opposite sides of the same information governance coin. While this metaphor does help visualize the similarities and differences between privacy and data security and their inextricable links to each other, it ignores other aspects of information governance all together. When looked at instead as three indispensable legs of the data management stool, the role of each is better understood:
These three subsets of data management all need to be considered together in a collaborative manner, even where, as is typical in large organizations, each has its own domain. This can be accomplished through bringing together all data stakeholders, across domains, and developing collaboratively shared policies, goals and tools. Only in this way can an integrated and overall data management program be developed.
There are a number of frameworks that can be drawn upon to articulate key elements of a data management program. The Federal Trade Commission's (FTC) version of the Fair Information Practice Principles (FIPPs), which are the core of the Privacy Act of 1974, 5 U.S.C. ' 552a, that applies to federal government agency computer systems and records, lists eight: Transparency; Individual Participation; Purpose Specificity; Data Minimization; Use Limitation; Data Quality and Integrity; Security and Accountability; and Auditing.
The Organization for Economic Cooperation and Development's (OECD) Privacy Principles, which tie closely to the European Commission's Data Protection Directive, also have eight, though somewhat differing, principles: Collection Limitation; Data Quality; Purpose Specification; Use Limitation; Security Safeguards; Openness; Individual Participation; and Accountability. The American Institute of Certified Public Accountants (AICPA), along with its Canadian counterparts, have drawn from these and other frameworks to establish 10 Generally Accepted Privacy Principles (GAPP) around which a company's data management policies and practices can be accessed and managed: Management; Notice; Choice and Consent; Collection; Use, Retention and Disposal; Access; Disclosure to Third Parties; Security; Quality; and Monitoring and Enforcement.
Breaking data management framework principles down to the most general topics, a data management program can be organized, evaluated and operated, and risk assessed and mitigated, based on just five categories: Governance; Transparency; Data Subject Participation; Security and Control; and Accountability:
What specific program policies and practices will flesh out each category will depend upon the laws and self-regulatory schemes that may be applicable to a company, as well as business judgment decisions as to how protective or exploitive a company desires to be of its data, within the limitations of applicable law.
Stakeholders and Their Role
There are typically many data stakeholders, each with different relationships with a company's data, and as such potentially different viewpoints toward how it should be collected, used, shared, protected and maintained. Only through involvement of all these stakeholders will a company be able to implement and maintain a comprehensive data protection program that meets company-wide needs and obligations. It is recommended that a program's mandate and governance structure be established with input from these stakeholders. This will make it more likely that complete information is gathered and all stakeholders' interests are considered. It also makes governance more effective and efficient.
While all these stakeholders need to be intimately involved in program development and operations, frequently through a committee structure, programs work best with ultimate management by a single senior level executive with the responsibility to oversee the program and report directly to the Board, CEO or executive management team. This is more and more frequently a Chief Privacy Officer (CPO) or Chief Information Officer/Chief Information Security Officer (CIO/CISO). An industry analyst has proffered that “digital business innovation risk will bring about the rise of the Digital Risk Officer” to manage company data and information systems. See,
A program needs the participation of all of these stakeholders to be successful, and a governance structure to manage their participation and hold them accountable.
Understanding Company Data and Data Obligations and Practices
It is crucial that the company, and its data stakeholders (especially those involved in program development and governance) understand the “who,” “what,” “where,” “when” and “why” of its data. More particularly, what data it has, how it is collected, where it resides, its appropriate purposes and life cycle, what third parties have what interest in it, access to and involvement with it, how the company ensures appropriate protection and compliance with legal and other obligations, and that it is not inappropriately accessed, used or transferred. This is accomplished initially through inventories and assessments of data, data practices, and data obligations, and then application of appropriate controls on various data. This understanding is necessary to properly establish the company's overall strategic data protection mission, as well as to reflect that in a policy and to implement a policy through program management.
This process of inventorying, if not previously done, is a logical initial step for program development once the stakeholders are identified and organized. Thereafter, ongoing inventory updating is critical to keep a program effective. There are a number of tools that can be used to conduct such inventories. Software tools are available to search for and identify certain types of sensitive data so that it can be ensured that those databases have the appropriate security and access controls. However, that alone is insufficient as the company still needs to know the purpose of that data, how it is used and by whom, and to establish rules around its retention, destruction, access, use and transfer. This can be done through surveys or interviews. An example of a resource for conducting this due diligence is the online data practices survey tool offered by Jordan Lawrence (www.jordanlawrence.com). Jordan Lawrence offers industry and department function specific standard survey questions, which can be supplemented with custom questions as well. The end results are reports that identify data types, locations and use practices. These results can then be accessed to help evaluate program compliance and to identify issues that need to be addressed. There are also a number of consultants, such as accounting firms and data protection consultants, that offer similar auditing and surveying tools and services.
Strategic Mission and Program Mission Statement
As discussed, given the various data stakeholders and their different roles regarding company data, a company can only develop and mature a data protection program if there is an overall, company-wide policy statement that explains how data is to be treated in order to meet the company's overall strategic business goals. This will articulate the company's organizational objectives and values and inform employees and contractors generally how company data is to be collected, processed, used, shared, transferred, updated, retained, destroyed and made available to data subjects, employees, contractors, and others.
Considerations in developing an overall strategic policy include:
What kinds of data the company collects and maintains, its purposes, and the related degrees of sensitivity;
What legal obligations apply to company data;
Industry self-regulatory obligations; and
The degree to which the company needs or desires to be privacy-protective and/or maintain industry-leading data security to protect its brand and customer relationships.
Some companies may wish to merely comply with applicable legal and industry self-regulatory obligations and contractual commitments (which may include obligations imposed by insurers, customers or even service providers such as credit card companies), while others may seek to establish best practices and use that as a market differentiator. Companies operating only in the U.S. will have differing, usually lower, legal obligations than those with international operations, especially where European or similar laws apply. Even in the U.S., companies in industry sectors that have heightened data protection regulatory schemes, such as financial services, health care, and those collecting personal information from children, will be mandated to meet higher levels of data protection than those that are not subject to sectorial data protection laws.
There will be a multitude of company policies and notices that will reflect the overall company policy, including employee/contractor computer use (including “Bring Your Own Device”) and social media policies, consumer privacy notices (including website and specific product privacy notices), a written information security policy (WISP), a data security breach preparedness and response plan, a policy of requiring privacy impact assessments for new or changed data practices or events, etc. This second level of policies all should reflect the companies' overall strategic data protection policy.
Developing and Implementing Program Framework
Developing a program framework will help in the articulation of the broad umbrella policy and its implementation through more specific polices and notices. Part of the framework is the governance structure. From the program management group come the second level of governance ' policies, procedures, processes, guidance documents, educational programs, compliance and request reporting mechanisms, guidance documents and checklists, and incident response plans that will enable policy implementation and compliance. Some aspects of the framework will be company-wide and some specific to products, services or functions. Here, having the input and participation of all stakeholders in program governance will help ensure effective implementation and ongoing assessment and refinement, which in turn helps reduce the risk data leakage or misuse that could cause economic and/or reputational harm to the company.
A program framework can be developed from applicable established standards. In some cases, certain standards will be required by law or contract to be applied to at least certain data sets. Examples include: legally imposed frameworks such as the requirements of U.S. sectorial data protection laws, including the Health Insurance Portability and Accountability Act (HIPAA) and related regulations; the National Institute of Standards and Technology (NIST) security and data controls applicable to U.S. government systems and organizations (NIST SP 800-53 Rev.4); framework obligations imposed by international laws, where applicable, such as the EU Data Protection Directive (and guidance from local data protection authorities); the Canadian Personal Information Protection and Electronic Documents Act (PIPEDA); the
There are also best practices for privacy and data security that are recommended by the Federal Trade Commission and the California and other states' Attorney Generals, and the concept of Privacy by Design (PbD), which has been adopted in various forms as either required or recommended by various data protection authorities worldwide. In short, PbD sets privacy and security as the default and implements reasonable security, limitations on data collection, use, and retention, and methods of ensuring data accuracy at all stages of development of data-using products and services. In addition, a number of data protection standards have been set by standards organizations that can be instructive, such as the American Institute of CPAs' Generally Accepted Privacy Principles, and the International Organization for Standardization (ISO) 27000 series of information security standards. Public companies should also develop data protection frameworks keeping their obligation under Section 404 of Sarbanes Oxley, which requires management and external auditors to report on the adequacy of the company's internal controls on financial reporting, firmly in mind.
Establishing Goals and Measuring Performance
Once policy is established and has begun to be implemented, the governance system should set measurable goals to gauge program performance. Tracking and benchmarking indicators of program performance and maturity can help establish what is working and where improvements are necessary. In doing so, it is important to select enough relevant metrics and ensure they are objectively measured and accurately reported. For more information on examples of developing appropriate data protection performance measurement tools, see the best practices of the NIST Interagency Report 7564: “Directions in Security Metrics Research” and Chapter 3 (Performance Measurement) in the International Association of Privacy Professionals (IAPP) Privacy Program Management ' Tools for Managing Privacy Within Your Organization (available from
Accessing, Protecting, Sustaining and Responding
The operational functions of a data management program are often categorized by the literature on the subject as accessing, protecting, sustaining, and responding, and are applied across an operational lifecycle. The four phases represent key tasks, and lifecycle means not birth, growth, death and rebirth in the ecological sense, but that there is a process of constant evaluation and refinement as opposed to a one-time assessment and fix. Good programs are intended to continuously evolve and improve.
Assessment is a critical initial step to new program creation (as well as crucial to existing program evaluation), to the evaluation of the impact of each new product and service, and of changes in facts, law or practices. Assessment enables the company to understand its corporate goals, legal obligations, and the facts regarding data and data practices. It also enables the company to identify and fill in gaps, evaluate program success and failings, and establish return on investment data. All areas of a company that touch data, and all of the company's data stakeholders, need ongoing assessment. This can be institutionalized through the adoption of various assessment models and tools, including software tools, physical inspections, surveys and questionnaires, internal and third party audits, impact assessment forms, and other fact-marshalling devices that provide input necessary for a meaningful analysis. Essentially, fact gathering by use of these tools is the monitoring function, and assessment is the analysis and conclusions and recommendations that come from monitoring activities.
There are well developed models for accessing overall program development. One is the now 20-year tested AICPA Privacy Maturity Model. It uses benchmarks to rate activities and programs to five maturity levels: ad hoc, repeatable, defined, managed and optimized. The AICPA offers an affordable software tool called the Privacy Principles Scoreboard that companies and their advisors can use to conduct privacy risk and maturity assessments. Two real values of engaging in such an exercise are that it helps track growth and success, and can also be used as an objective measure of return on investment.
An assessment model used less for rating a program, but for operating it, is the concept of “Privacy by Design,” pioneered in the 1990s by Ontario Canada Privacy Commissioner Ann Cavourkian. This much refined and time-tested approach has been recommended by the FTC in many of its privacy and data security guidance and policy documents, and is essentially codified in the European Union. In its true form, privacy is the default and products and services should be developed from conceptualization through exploitation to minimize privacy and data security impact and maximize consumer privacy, control and safety. Even if a company's policy is not consumer friendly, and it operates only in jurisdictions like the United Sates ' and there in minimally regulated industry where acceptable ' the process of evaluating privacy and data security impacts all stages of product and services development and exploitation, rather than as an afterthought, has great value and helps avoids unnecessary inefficiencies and risks and costly last minute workarounds. For more information, see, www.privacybydesign.ca.
Returning to the life cycle metaphor, protection of data can also be seen in this manner, and Data Life Cycle Management (DLM) is a common information governance approach to tracking and managing data from creation to destruction. DLM is concerned with how data is handled, retained, processed, stored, shared and destroyed. Data retention policies are important to comply with legal requirements, and to minimize risk associated with data retention beyond what is necessary or beneficial. Both privacy compliance and data security are also crucial to data protection throughout the data life cycle. As previously explained, although different requirements and frameworks may apply depending on the company and its data, established frameworks that may not be legally required are nonetheless good standards to draw from.
Sustainment is essentially about evaluating, enforcing, refining and educating. This flows out of monitoring and assessment. To sustain a program, monitoring and assessment needs to be ongoing. Compliance-monitoring, which requires systems to solicit, respond to, track and learn from complaints and mistakes, is an excellent way to sustain program goals. Indeed, part of sustainment is accountability. There should be trusted people and mechanisms for making complaints, requests, recommendations and whistle blowing. There also need to be procedures for responding to and resolving issues and repercussions for non-compliance. Finally, employee and vendor training is essential. Anyone that touches, or has access to, company data or data systems needs some level of data protection sensitivity, which can only be had through ongoing education. Education is more than merely promulgating operational practices policies; it also includes educating people about the issues, why they are important, and how they relate to their particular role in the company and their daily activities. Some education is of a general nature and relevant to all, while other training should be function-specific and tailored to the relevant audiences.
In order to respond, there must be knowledge of an issue in need of response. The first three elements assist in this regard. Data protection programs need to be designed to respond to requests, inquiries, compliance failures, security breaches, disasters and other business interruption. There should be preparedness plans and systems in place for all. Also, companies should consider various cyber-liability and business interruption insurance policies to help mitigate the costs of inevitable issues.
Key to the ability to respond is preparedness, which is not only having well-conceived plans and procedures, but practical exercise to build the experience necessary to respond effectively when the time comes. This can be done through table-top exercises, which put response team members through likely scenarios, including internal and external breaches and natural and man-made disasters. In this regard, data protection incident response is similar in many respects to a good business continuity and disaster response plan, and indeed is a component of such planning. Furthermore, state laws and federal and state health care information laws may require data security incidents to be reported to regulators, data subjects and the public. These laws are far from consistent and may result in different obligations from state-to-state under identical facts, so having the ability to expeditiously address those requirements in the event of an incident, typically through outside legal counsel, is part of response preparedness.
Conclusion
In today's digital age, all companies have data assets and obligations. Legal, IT/IS, and compliance leaders need to work together with other data stakeholders, within a defined and accountable governance structure, to develop a robust program for assessing that data and its corresponding obligations, protecting the data and evaluating and minimizing data-related risks. A good data management and protection program should be in a constant state of self-evaluation and improvement.
ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN ENTERTAINMENT LAW.
Already a have an account? Sign In Now Log In Now
For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473
With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
In June 2024, the First Department decided Huguenot LLC v. Megalith Capital Group Fund I, L.P., which resolved a question of liability for a group of condominium apartment buyers and in so doing, touched on a wide range of issues about how contracts can obligate purchasers of real property.
The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
Latham & Watkins helped the largest U.S. commercial real estate research company prevail in a breach-of-contract dispute in District of Columbia federal court.