540 likes | 984 Views
A Privacy Audit Using Generally Accepted Privacy Principles A Global Privacy Framework The Next Sarbanes Oxley?. AAA Annual Meeting - Anaheim August 6, 2008. Everett C. Johnson, CPA. Title: AICPA/CICA Privacy Task Force Chair
E N D
A Privacy AuditUsingGenerally Accepted Privacy PrinciplesA Global Privacy FrameworkThe Next Sarbanes Oxley? AAA Annual Meeting - Anaheim August 6, 2008
Everett C. Johnson, CPA • Title: • AICPA/CICA Privacy Task Force Chair • Area of Focus: Information Protection Services, Computer Auditing • Background: • Retired Partner – Deloitte & Touche • Over 40 years experience in audit, control and security matters • Affiliations: • Former International President - ISACA, IT Governance Institute • Past Chair • AICPA Electronic Commerce Assurance Services Task Force • AICPA Information Technology Research Subcommittee • Deloitte’s International Enterprise Risk Services Committee • IFAC Information Technology Committee • Past National Director – Deloitte’s Computer Assurance Services Group • Past Chair & USA Representative – • Former Member • AICPA Information Technology Executive Committee • AICPA Assurance Services Executive Committee
Ken Askelson, CPA.CITP, CIA • Title: • AICPA/CICA Privacy Task Force Vice Chair • Area of Focus: Information Security, Microcomputer Accounting Systems, IT Infrastructure Management. • Background: • Retired Senior IT Audit Manager – JCPenney • Over 20 years of IT audit experience • Affiliations: • Former Commissioner – AICPA National Accreditation Commission • Past Member – AICPA Information Technology Executive Committee • Past Member – AICPA Information Technology Research Subcommittee • Past Member – AICPA Business and Industry Executive Committee • Past Member – IIA Advanced Technology Committee • Past Member – Journal of Accounting Advisory Board • Past participant - Partnership for Critical Infrastructure Security sponsored by the U.S. Chamber of Commerce and the Critical Infrastructure Assurance Office of the Department of Homeland Security
Marilyn Prosch, PhD., CIPP • Title: • Associate Professor of Accounting – Arizona State University, School of Global Management • Area of Focus: Privacy, Data Protection, Accounting Information Systems, Internal Controls, eBusiness • Affiliations: • Member – AICPA/CICA Privacy Task Force • Sample of Journal Articles • International Journal of Corporate Governance • Journal of Emerging Technologies in Accounting • Journal of Information Systems • Journal of Forecasting • Journal of Accountancy • Research in Accounting Regulation • The Accounting Review
AGENDA • Overview of Privacy Breach Trends • Overview of GAPP & How it may be used • GAPP & Privacy Risk Assessment • Q&A
PrivacyMedia Hype or a Real Problem? Some of the reported incidents that occurred in 2007…
J. P. Morgan General Electric Gander Mountain Gap Inc Atlantic Plastics, Inc. via accounting firm Hancock Askew Wells Fargo via unnamed auditor Merrill Lynch McKesson Albertson’s Altria & United Technologies via benefits consultant, Towers Perrin Fidelity National Information Services Premier Bank IBM Turbo Tax Lloyd's of London (FL) TJ Stores Direct Loans via its IT contractor ACS Check into Cash ADP T-Mobile USA Inc Winn-Dixie Caterpillar, Inc. Circuit City and Chase Card Services KeyCorp Dai Nippon TD Ameritrade Electronic Data Systems Deb Shops, Inc. Ceridian Corp. Columbia Bank Bank of America Linden Lab Greater Media, Inc. Pfizer Wesco Piper Jaffrey Hertz Global Holdings, Inc. Major League Baseball players via SFX Baseball, Inc. Tax Service Plus Voxant.com CVS Pharmacy Life Is Good Starbucks Corp. Metro Credit Services West Shore Bank Texas First Bank HarborOne Credit Union H&R Block Neiman Marcus Verisign Telesourcevia Vekstar Bank of America ABN Amro Mortgage Group VISA/FirstBank eBay Boeing KB Homes Compulinx Rabun Apparel Inc RadioShack American Family Insurance Western Union KSL Services, Inc American Airlines Hortica Disney Movie Club Stop & Shop Supermarkets New Horizons Community Credit Union Nikon Inc. and Nikon World Magazine CTS Tax Service Avaya Empire Equity Group MoneyGram International Monster.com Front Range Ski Shop Fox News Limewire Nissan Motor Co., Ltd. Johnny's Selected Seeds Alcatel-Lucent American Education Services TennCare / Americhoice Inc. Home Finance Mortgage, Inc. AT&T Four ARCO gas stations TransUnion Credit Bureau via Kingman, AZ, court office Couriers on Demand Gymboree Aetna / Nationwide / Wellpoint Group Health Plans via Concentra Preferred Systems Jax Federal Credit Union Cricket Communications Kingston Technology Co. Movie Gallery Howard & Partners law firm via its auditor Morris, Davis & Chan Chase Bank Science Applications International Corp. (SAIC)
U.S. Dept. of Commerce and Census Bureau Colorado Dept. of Human Services via Affiliated Computer Services (ACS) State of Connecticut via Accenture Ltd. Connecticut Dept. of Revenue Services Conn. Office of the State Comptroller FEMA Wisconsin Dept. of Revenue via Ripon Printers Transportation Security Administration via Accenture California National Guard Wisconsin Assembly California Public Employees' Retirement System U.S. Army Cadet Command Administration for Children's Services - NY U.S. Dept. of Agriculture Calif. Dept. of Health Services NY Dept. of State Internal Revenue Service NY Dept. of Labor Ohio state workers Congressional Budget Office Ohio State Auditor Kentucky Personnel Cabinet U.S. State Department Ohio Ethics Committee Florida National Guard Ohio Board of Nursing Florida Labor Department Camp Pendleton Marine Corps base via Lincoln B.P. Management Texas Commission on Law Enforcement Standards & Education NC Dept. of Transportation Army National Guard 130th Airlift Wing North Carolina Dept. of Motor Vehicles Idaho Army National Guard North Carolina Dept. of Revenue Georgia Secretary of State Illinois Dept. of Corrections Picatinny Arsenal DOD Weapons Research Center Georgia County Clerk Illinois Dept. of Financial and Professional Regulation Georgia Div. of Public Health Maine State Lottery Commission Illinois Dept. of Transportation U.S. Dept. of Veteran's Affairs Michigan Dept. of Community Health PA Public Welfare Department PA Dept. of Transportation Indian Consulate via Haight Ashbury Neighborhood Council Recycling Massachusetts Dept. of Industrial Accidents West Virginia Board of Barbers and Cosmetologists Indiana State Department of Health Indiana Dept. of Administration Maryland Dept. of Natural Resources Indiana Dept. of Transportation Maryland Department of the Environment American Ex-Prisoners of War Indiana State Web site
Cuyahoga County Dept. of Development Chicago Board of Elections Los Angeles County Child Support Services Chicago Voter Database City of Chicago via contractor Tuscarawas County and Warren County Fresno County Detroit Water and Sewerage Department Champaign Police Officers City of Savannah Orange County (FL) Controller Huntsville County Bowling Green Police Dept. Lynchburg City Santa Clara County Employment Agency Hidalgo County Commissioner’s Office Fort Monroe Port of Seattle ChildNet Metropolitan St. Louis Sewer District City of Encinitas Washiawa Women, Infants and Children program (HI) Cleveland Air Route Traffic Control Center Pima Co. Health Dept. City of Visalia, CA Fresno County/Refined Technologies Inc. New York City Financial Information Services Agency City of Wickliffe, OH Berks Co. Sheriff's Office via contractor Canon Technology Solutions Johnston County, NC City of Grand Prairie City of Lubbock Cumberland County, PA Poulsbo Department of Licensing Chicago Public Schools via All Printing & Graphics, Inc. Indianapolis Public Schools Harrison County Schools Waco Independent School District Jackson Local Schools Willamette Educational Service District Chicago Public Schools San Diego Unified School District Greenville County School District Clarksville-Montgomery County Middle and High Schools Shamokin Area School District Germanton Elementary School Cedarburg High School St. Mary Parish Riverside High School NC San Juan Capistrano Unified School District (CA) Iowa Dept. of Education Big Foot High School, WI Yuma Elementary School District Troy Athens High School St. Vrain Valley School District (CO) Clay High School, OH Loomis Chaffee School
University of Colorado-Boulder, Leeds School of Business Virginia Commonwealth University University of Michigan Rutgers-Newark University UCLA University of Idaho Northwestern University Loyola University Yale University University of Iowa – Psychology Dept. Villanova University students & staff Via Insurance broker Purdue University Mississippi State University University of Missouri Louisiana State Univ Berry College via consultant Financial Aid Services Inc. Georgia Tech Univ. Ohio State Univ. University of Minnesota University of South Carolina Johns Hopkins University Montana State University Notre Dame University University of Texas at Arlington Texas A&M University University of California, Davis University of Virginia New Mexico State Univ. University of Texas - Dallas University of Nebraska Connors State College University of Toledo Texas Woman's University Georgia Institute of Technology University of New Mexico Eastern Illinois University Radford University Westminster College De Anza College Univ. of Montana - Western City College of San Francisco UC San Francisco Black Hills State Univ. Cal State Los Angeles Metropolitan State College of Denver Nassau Community College Central Connecticut State University Montgomery College Bowling Green State University Los Rios Community College Adams State College Goshen College Stony Brook University Community College of Southern Nevada Highlands University Penn State Univ. - USMC Vanguard University East Carolina University Gadsden State Community College Grand Valley State University
Univ. of Pittsburgh, Med. Center Manhattan Veteran's Affairs Medical Center & New York Harbor Health Care System Beaumont Hospital Sisters of St. Francis Health Services via Advanced Receivables Strategy Swedish Medical Center Univ. Calif. Irvine Medical Center Group Health Cooperative Health Care System Mercy Medical Center DCH Health Systems Johns Hopkins Hospital Allina Hospitals and Clinics Prudential Financial Inc. Beacon Medical Services DePaul Medical Center Seton Healthcare Network University of Pittsburgh Medical Center Kaiser Medical Center McAlester Clinic & Veteran's Affairs Medical Center Akron Children's Hospital Highland Hospital Back and Joint Institute of Texas Cleveland Clinic Emory University Hospital, Emory Crawford Long Hospital, Grady Memorial Hospital, Geisinger Health System, Williamson Medical Center via Electronic Registry Systems Jacobs Neurological Institute Gulf Coast Medical Center Westerly Hospital Erlanger Health System Deaconess Hospital WellPoint's Anthem Blue Cross Blue Shield Health Resources, Inc. Kaiser Permanente Colorado South County Hospital Providence Alaska Medical Center Swedish Urology Group Intermountain Health Care Gundersen Lutheran Medical Center Stevens Hospital via billing company Med Data WorkCare Orem Concord Hospital St. Mary's Hospital, MD St. Vincent Hospital Sky Lakes Medical Center via Verus Inc Wellpoint's Empire Blue Cross/ Blue Shield NY Segal Group of New York via web site of Vermont state agency Healing Hands Chiropractic Georgia Dept. of Community Health
Federal Trade Commission • Has settled 14 cases “challenging faulty data-security practices by companies that handle sensitive consumer information.” • They almost always require a security audit every 2 years for the next 10-20 years.
Texas – Attorney General Sues Company for Privacy Violations • Texas Attorney General Greg Abbott is suing EZCORP Inc. for allegedly contributing to the possibility of identity theft. • The attorney general alleges that EZCORP Inc. of Austin and its subsidiary, EZPAWN, have exposed customers to identity theft by failing to properly protect customer records. • Joe Rotunda, EZCORP president and CEO, responded to the suit by saying that the company has a number of identity protection policies and systems in place. • Attorney General alleges in his lawsuit that employees at several San Antonio EZPAWN stores dumped personal business records in trash bins behind the stores. The attorney general's investigation found similarly discarded customer data at dumpsters of nearby stores in Austin, Houston, Lubbock and in the Rio Grande Valley area, according to the suit.
Poor Information Management Practices Largely at Fault • The Gartner Group has estimated that internal employees commit 70% of information intrusions, and more than 95% of intrusions that result in significant financial losses; — IPC Publication. Identity Theft Revisited: Security is Not Enough, www.ipc.on.ca/userfiles/page_attachments/idtheft-revisit.pdf
Identity Theft • Arizona ranks number 1 in the nation for identity theft complaints per capita. • More than a third of stolen identities in Arizona are used for fraudulent employment. Source: Consumer Sentinel www.net-security.org/secworld.php?id=5874
Data Lifecycle – Protecting from cradle to grave Data protection needs to be considered at all phases of the lifecycle • Collection • What data & why is it collected? • Use • Appropriate access and documentation? • Storage • How long & protection of non-redacted copies? • Retention & Ultimate Disposal • When, how, and all applicable copies?
Know what data you have and where it is! McKesson …. Notified patients that the computers were stolen on July 18, 2007. The names of the people being alerted were on one of the two PCs, but it's not known how much of their accompanying identifying information was also contained on the machines. http://www.informationweek.com/news/internet/showArticle.jhtml?articleID=201804872
Mind the GAPP: Accountants bring GAAP-like principles to the privacy sphere • “If you haven't heard of the Generally Accepted Privacy Principles (GAPP), take stock: They're likely to become the most important new source of requirements for your IT projects since Y2k and Sarbanes-Oxley. • Why is this? The accounting industry has closed ranks around the idea that the GAPP is the best international framework for assessing the privacy health of an organization. So when it comes to IT projects, any system or related business process touching personal data will have new rules to play by.” • Computerworld, December 6, 2007
AGENDA • Overview of Privacy Breach Trends • Overview of GAPP & How it may be used • GAPP & Privacy Risk Assessment • Q&A
Overview of Privacy Audits • Growing demand • Types of audits • Internal audits • Regulatory • External • Management • Elements of the privacy audit • Scope • Measurement criteria • Generally Accepted Privacy Principles - GAPP • Type and use of report
AGENDA • Privacy: Our Definition • What is GAPP? • Privacy Principles • Components of GAPP • Comparison with International Concepts • Some Benefits of GAPP • Using GAPP for Privacy Audits • Other Application Examples
PRIVACY: OUR DEFINITION PRIVACY encompasses the rights and obligations of individuals and organizations with respect to the… • Collection • Use • Disclosure, and • Retention …of personal information.
OVERALL PRIVACY OBJECTIVE Personal information is • collected, • used, • retained, and • disclosed • in conformity with the commitments in the entity’s privacy notice and • with criteria set forth in Generally Accepted Privacy Principles issued by the AICPA/CICA.
WHAT IS GAPP? Generally Accepted Privacy Principles • Developed by the American Institute of Certified Public Accountants (AICPA) and the Canadian Institute of Chartered Accountants (CICA) • Help guide organizations in implementing, sustaining and auditing privacy programs
A set of 10 privacy principles and 66 related criteria for privacy and the handling of personal information throughout an organization Incorporates concepts from domestic and foreign laws, regulations, guidelines, and other bodies of knowledge on privacy One of a series of Trust Services offered by CPAs which also include: Security Process integrity Availability Confidentiality Privacy WHAT IS GAPP?
1 - Management:The entity defines, documents, communicates, and assigns accountability for its privacy policies and procedures. 2 - Notice: The entity provides notice about its privacy policies and procedures and identifies the purposes for which personal information is collected, used, retained, and disclosed. 3 - Choice and Consent: The entity describes the choices available to the individual and obtains implicit or explicit consent with respect to the collection, use, retention, and disclosure of personal information. 4 - Collection: The entity collects personal information only for the purposes identified in the notice. 5 - Use and Retention: The entity limits the use of personal information to the purposes identified in the notice and for which the individual has provided implicit or explicit consent. The entity retains personal information for only as long as necessary to fulfill the stated purposes. What are the Principles?
6 - Access: The entity provides individuals with access to their personal information for review and update. 7 - Disclosure: The entity discloses personal information to third parties only for the purposes identified in the notice and with the implicit or explicit consent of the individual. 8 - Security for Privacy: The entity protects personal information against unauthorized access (both physical and logical). 9 - Quality: The entity maintains accurate, complete, and relevant personal information for the purposes identified in the notice. 10 - Monitoring & Enforcement: The entity monitors compliance with its privacy policies and procedures and has procedures to address privacy-related complaints and disputes. What are the Principles?
COMPONENTS OF GAPP Section Definition Policies and Communication: Privacy Policies Communication to Internal Personnel
COMPONENTS OF GAPP Responsibility and Accountability for Policies
SOME BENEFITS OF GAPP • Business, rather than regulatory, focused • Examples based upon best practices • Aligned with key regulations
Using GAPP for Privacy Audits - 1 • Reason for audit • Public reporting - “external audit” • Could include a “WebTrust Seal” on website • Management reporting - “internal audit” • Regulatory requirement • FTC and Ontario Privacy Commissioner • Scope for an external audit • Entire business • Business segment • Needs to address entire information cycle • Collection through destruction • Includes consideration of third-party processors • Needs to include all 10 privacy principles
Using GAPP for Privacy Audits - 2 • Performed under AICPA Attestation Standards • Report covers a period of time and opines on • Effectiveness of controls over privacy of personal information collected based on its privacy notice and GAPP • Complied with the commitments in its privacy notice • Important that client is ready
Using GAPP for Privacy Audits - 3 Other Types of Privacy “Audits” • Internal audit • GAP GAPP Assessment • Focused on a few principles or all • Maturity model assessment • Report for management use only • Regulatory audits • Usually required following a breach • FTC has focused on security • Ontario Privacy Commissioner has required a GAPP audit
OTHER GAPP APPLICATION EXAMPLES • Company A adopts GAPP as the basis of its privacy program for its U.S.-based online operations and includes GAPP’s principles and criteria in its online privacy policy. GAPP’s criteria and illustrations serves as the basis for the privacy procedures. • Company B adopts GAPP as the basis for its global privacy program so it can follow consistent privacy practices and use similar terminology across its various countries of operations. Although country specific exceptions and variations still exist, they are being captured in policy and procedures. • Company C uses GAPP as a benchmark against internal privacy practices and procedures. • Company D uses GAPP as a basis for a risk assessment
So - Is GAPP the Next SOX? • More breaches might result in a mandatory audit requirement to protect personal information • More organizations will voluntarily want an audit to demonstrate that they have an effective privacy program • Organizations will want the 3rd party processors they use to have an audit of their privacy-related controls
AGENDA • Overview of Privacy Breach Trends • Overview of GAPP & How it may be used • GAPP & Privacy Risk Assessment • Q&A
IT and Privacy Risk Assessments AGENDA • IT Risk Assessment • Privacy Risk Assessment • Case Study • Risk Assessment Tools
IT Risk Assessment • Assessment Areas • System Availability • Information Security • Data Integrity • Maintainability • Governance • Five Principles - 22 Criteria
IT Risk Assessment Illustration • IT Risk Assessment Tool • Narrative Template
Privacy Risk AssessmentCase Study Scope – Customer Information • U.S. Laws and Regulations • Privacy Notice • Industry Regulations – DMA’s Privacy Promise • PCI Data Security Standards
Privacy Risk Assessment Assessment Areas – Case Study • Access • Disclosure • Security • Quality • Monitoring/Enforcement • Management • Notice • Choice/Consent • Collection • Use/Retention
Privacy Risk Assessment Privacy Risk Assessment Template – CASE STUDY Attorney Client Privileged – Draft for Discussion Purposes Only
AICPA/CICA GAPP Uses • Benchmarking • Best Practice • Privacy Risk Assessment • Privacy Audits • Training and Awareness
Privacy Risk Assessment • Illustration • AICPA/CICA Privacy Risk Assessment Tool
IT Risk Assessment Frameworks • AICPA’s Trust Services - SysTrust • ISO 17799 • CoBiT – IT Governance Institute • ITIL • PCI Data Security Standards • NIST Computer Security Division • SOX General IT Controls • IIA GTAG – IT Controls