Understand the controls used to protect the confidentiality of an organization’s information and personal information from customers, suppliers, and employees.
Discuss the Generally Accepted Privacy Principles (GAPP) framework guiding the development of comprehensive privacy protection complying with regulations like the EU’s General Data Privacy Regulation (GDPR).
Explain the functioning of various encryption systems and differentiate between encryption and hashing.
Archiving digital signatures and their role in creating legally enforceable contracts.
Discuss the workings of blockchain technology.
Key Players:
Defensive Tools: Firewalls, Encryption, Antivirus Software
Threats: Human Errors
Reliable systems must uphold five principles:
Information Security
Confidentiality
Privacy
Processing integrity
Availability
Confidentiality involves maintaining sensitive information's secrecy.
Important in ensuring privacy alongside robust security measures.
Identify and Classify Information: Understanding what data is sensitive.
Encryption: Process of transforming data to make it unreadable.
Access Controls: Regulating who can handle sensitive information.
Training: Educating employees on information handling practices.
Effective control of sensitive information requires:
Identification of sensitive data
Classification based on value
Protection strategies that include encryption and access control.
At Storage: Use encryption and access controls.
During Transmission: Ensure data is encrypted to protect its integrity.
Disposal: Employ physical destruction and thorough erasure to prevent data retrieval.
Limit access to data and monitor actions performed on it. Preventative control. Limit access to data files but also which actions can be taken with the files (access control matrix).
Use Data Loss Prevention (DLP) software to prevent unauthorized data distribution. Preventative control. Stop outgoing messages which contain key words or phrases associated with intellectual property.
Implement digital watermarks to trace disclosed sensitive data. Detective control. Code embedded into a file that allows company to identify confidential information that has been disclosed.
Train employees to manage sensitive data positively and securely. Key points include:
Proper password protection and logging out of applications when leaving workstations.
Manage email communication to prevent unintended disclosures.
Specific protocols for handling sensitive reports and files.
Examples of Confidential Company Information:
Business plans, Pricing strategies, Client lists, Legal documents, Trade secrets.
Private Data:
Personal information from customers, suppliers, and employees.
GDPR: Imposes significant fines for non-compliance concerning personal data.
Other notable regulations include:
CCPA: California Consumer Privacy Act 2018
HIPAA: Health Insurance Portability and Accountability Act
HITECH: Health Information Technology for Economic and Clinical Health Act
The GAPP outlines 10 best practices for ensuring customer data privacy:
Management: Establish procedures for protecting customer data and assign accountability.
Notice: Inform customers of data collection practices.
Choice and Consent: Obtain customer consent for data usage.
Collection: Only collect necessary data.
Use, Retention, and Disposal: Adhere to data usage policies, retain only as needed, and dispose of securely.
Access: Allow individuals to access and correct their data.
Disclosure to Third Parties: Share data only per stated policies, ensuring third-party protection.
Security: Implement measures to protect data from unauthorized access.
Quality: Maintain data integrity and allow customer review.
Monitoring and Enforcement: Assign personnel to ensure compliance with privacy policies and handling complaints.
Digital signatures affirm document integrity via hashing and encryption.
Digital certificates authenticate public keys, essential for secure communications.
Functionality: A blockchain is a distributed ledger ensuring data integrity through hashed documents.
Importance of Immutability: If a document is altered, its corresponding hash changes, detecting fraud.
Maintaining confidentiality and privacy in an organization requires disciplined approaches, robust encryption methods, extensive training, and strict adherence to established regulations and practices. Training employees is crucial in reevaluating and enhancing existing privacy measures.