1 / 0

Breach Prevention – Due Diligence and Risk Reduction

Breach Prevention – Due Diligence and Risk Reduction. Information Privacy and Data Protection Lexpert Seminar. David Young December 9, 2013. What is a Privacy Breach?. Privacy breach is the unintended and unconsented-to loss of personal data held by an organization

garnet
Download Presentation

Breach Prevention – Due Diligence and Risk Reduction

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Breach Prevention – Due Diligence and Risk Reduction Information Privacy and Data ProtectionLexpert Seminar David Young December 9, 2013
  2. What is a Privacy Breach? Privacy breach is the unintended and unconsented-to loss of personal data held by an organization Can result from intentional act (e.g. theft), negligenceor simply system failure Under privacy laws organizations have an obligation to protect the personal information held by them and to disclose or release it only in accordance with purposes consented to by the data subjects A privacy breach involves a failure of the organization’s systems to protect such information  which may indicate a failure to comply with the law 2
  3. Obligations to Protect Personal Information – The Security Requirement An organization is required to protect personal information using security safeguards appropriate in the circumstances This obligation means that the type of information andits sensitivity will dictate the nature of the security systems: more sensitive information must be protected by a higher level of security Organizations are required to use: Physical measures (e.g. passcard access restrictions) Organizational measures (e.g. confidentiality agreements) Technological measures (e.g. password protection, encryption) 3
  4. Why Privacy Breaches are a Concern A privacy breach involves the potential loss of information that for both competitive and regulatory reasons the organization seeks to keep confidential However, the more critical issue is that the compromised personal information may be used to injure customersor others (e.g. fraud, identity theft) The breach may indicate a failure of the organization to comply with its security obligations under the privacy law, or at common law, which could have serious financial and regulatory impact, as well as a loss of public (i.e. consumer) trust 4
  5. Due Diligence – the Organization’s Responsibilities Most importantly, an organization should ensure that its security systems are adequate and meet or exceed recognized standards It should continually review (i.e. audit) its security systems and conduct threat, vulnerability and risk assessments When a deficiency is identified, it should address that and rectify it Training of staff both in respect to privacy and security compliance as well in responding to breaches should be conducted 5
  6. Due Diligence – Risk Reduction Compliance with the security principle under PIPEDA is a strict liability requirement, which is satisfied by the organization taking due care – due diligence satisfies this requirement If the organization takes appropriate steps to comply with recognized security standards it should be able to minimize or avoid liability in the event of a breach
  7. Security Compliance Standards Payment card industry data security Standard (PCI DSS) ISO/IEC 27000 series of standards – provide best practice recommendations for the management of information securityand risks, and potential controls: ISO/IEC 27001 – Specification for Information Security Management System provides a standard for systemsagainst which certification can be obtained ISO/IEC 27002 – Code of Practice for Information Security– listing of potential control mechanisms for implementationwith guidance from ISO/IEC 27001 – categories include: Risk assessment and treatment ○ Asset management Security policy ○ HR Security Organization of information systems ○ Access Controls 7
  8. ISO/IEC 27001 Requires that management within an organization must: Systematically assess the organization's information security risks, taking account of the threats, vulnerabilities and impacts Design and implement a coherent and comprehensive suite of information security controls and/or other forms of risk treatment (such as risk avoidance or risk transfer) to address those risks that it deems unacceptable Adopt an all-encompassing management process to ensure that the information security controls continue to meet the organization's information security needs on an ongoing basis 8
  9. ISO/IEC 27001 The standard has a long-term outlook and incorporates the “Plan-Do-Check-Act” approach: Plan: Establish ISMS policy, objectives, processes and procedures relevant to managing risk and improving information security to deliver results in accordance with an organization’s overall policies and objectives Do: Implement and operate the ISMS policy, controls, processes, and procedures Check: Assess and, where applicable, measure process performance against ISMS policy, objectives, and practical experience and report the results to management for review Act: Take corrective and preventive actions, based on the resultsof the internal ISMS audit and management review or other relevant information, to achieve continual improvement of the ISMS 9
  10. What Should an Organization do to Respond to a Privacy Breach? If a privacy breach occurs, the organization must respond both immediately to remedy the source of the breach and mitigate the potential damage and must subsequently evaluate its systems for future prevention How an organization responds to a breach is part of its compliance with the security principle under the privacy law Diligent and effective response including notification of affected persons will reduce risk 10
  11. Response to a Breach – The Key Steps Internal notification – implement breach protocol Contain the breach and preliminary assessment Evaluate the risks Reporting to law enforcement and regulatory authorities Notification of affected individuals Investigation and Remediation
  12. Investigation and Remediation Following completion of its immediate breach response actions, an organization must thoroughly investigate the cause of the breach This should involve an audit of all systems and procedures that may have had an impact on the breach (e.g. faxing procedures, credit card usage security, mobile transport of sensitive data)
  13. Investigation and Remediation – cont’d The objective is to learn from the breach to improve procedures and systems so as to prevent a reoccurrence of the breach or similar breaches New procedures/systems should be established, appropriate training of staff conducted and an audit/review completed at the end of the process to ensure the intended objective is met These actions address the organization’s on-going and future compliance with the security principle in the privacy laws and address due diligence
  14. THANK YOU David Young Direct: 416.307.4118 david.young@mcmillan.ca McMillan LLP Brookfield Place 181 Bay Street, Suite 4400 Toronto, Ontario M5J 2T3
More Related