IAPP Privacy Program Management 3E-SAMPLE
IAPP Privacy Program Management 3E-SAMPLE
Management
Tools for Managing Privacy Within Your Organization
Third Edition
E
PL
Executive Editor and Contributor
Russell Densmore, CIPP/E, CIPP/US, CIPM, CIPT, FIP
M
Contributors
Susan Bandi, CIPP/E, CIPP/US, CIPM, CIPT, FIP
João Torres Barreiro, CIPP/E, CIPP/US
SA
John Brigagliano
Ron De Jesus, CIPP/A, CIPP/C, CIPP/E, CIPP/US, CIPM, CIPT, FIP
Jonathan Fox, CIPP/US, CIPM
Jon Neiditz, CIPP/E, CIPP/US, CIPM
Chris Pahl, CIPP/C, CIPP/E, CIPP/G, CIPP/US, CIPM, CIPT, FIP
Liisa Thomas
Amanda Witt, CIPP/E, CIPP/US
Edward Yakabovicz, CIPP/G, CIPM, CIPT
An IAPP Publication
E
PL
©2022 by the International Association of Privacy Professionals (IAPP)
M
All rights reserved. No part of this publication may be reproduced, stored in a retrieval
system, or transmitted in any form or by any means, mechanical, photocopying,
SA
CIPP, CIPP/US, CIPP/C, CIPP/E, CIPP/G, CIPM, and CIPT are registered
trademarks of the International Association of Privacy Professionals, Inc. registered in
the United States. CIPP, CIPP/E, CIPM, and CIPT are also registered in the European
Union as Community Trademarks (CTM).
ISBN: 978-1-948771-55-9
E
CHAPTER 1
Introduction to Privacy Program Management
PL
1.1 Responsibilities of a Privacy Program Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.2 Accountability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
1.3 Beyond Law and Compliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.4 Why Does an Organization Need a Privacy Program? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
M
1.5 Privacy Across the Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.6 Championing Privacy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
1.7 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
SA
CHAPTER 2
Privacy Program Framework: Privacy Governance
2.1 Create an Organizational Privacy Vision and Mission Statement . . . . . . . . . . . . . . . . . . . . . . . . . . 15
2.2 Define Privacy Program Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
2.3 Develop a Privacy Strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
2.4 Develop and Implement a Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
2.5 Frameworks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
2.6 Privacy Technology and Governance, Risk, and Compliance Vendors and Tools . . . . . . . . . . . 33
2.7 Structure the Privacy Team . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
2.8 Establishing the Organizational Model, Responsibilities, and Reporting Structure . . . . . . . . . 38
2.9 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
iii
CHAPTER 3
Privacy Program Framework: Applicable Privacy Laws and Regulations
3.1 Global Privacy Laws . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
3.2 Self-Regulation: Industry Standards and Codes of Conduct . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
3.3 Cross-Border Data Transfers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
3.4 Organizational Balance and Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
3.5 Understanding Penalties for Noncompliance with Laws and Regulations . . . . . . . . . . . . . . . . . 63
3.6 Understanding the Scope and Authority of Oversight Agencies . . . . . . . . . . . . . . . . . . . . . . . . . . 65
3.7 Other Privacy-Related Matters to Consider . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
3.8 Monitoring Laws and Regulations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
3.9 Third-Party External Privacy Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
E
3.10 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
CHAPTER 4
Privacy Operational Life Cycle: Assess: Data Assessments
PL
4.1 Data Governance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
4.2 Inventories and Records . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
M
4.3 Records of Processing Activities Under the EU General Data Protection Regulation . . . . . . . . 80
4.4 Assessments and Impact Assessments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
4.5 Physical and Environmental Assessments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
SA
CHAPTER 5
Privacy Operational Life Cycle: Protect: Protecting Personal Information
5.1 Privacy by Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
5.2 Data Protection by Design and Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
5.3 Diagramming Privacy by Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
5.4 Information Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
5.5 Data Privacy and Information Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
5.6 Privacy Policy and Technical Controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
5.7 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
iv
CHAPTER 6
Privacy Operational Life Cycle: Protect: Policies
6.1 What Is a Privacy Policy? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
6.2 Privacy Policy Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
6.3 Interfacing and Communicating with an Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
6.4 Communicating the Privacy Policy within the Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
6.5 Policy Cost Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
6.6 Design Effective Employee Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
6.7 Procurement: Engaging Vendors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
6.8 Data Retention and Destruction Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
6.9 Implementing and Closing the Loop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
E
6.10 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
CHAPTER 7
Privacy Operational Life Cycle: Sustain: Monitoring and Auditing Program Performance
PL
7.1 Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
7.2 Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
M
7.3 Audits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
7.4 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182
7.5 Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182
SA
CHAPTER 8
Privacy Operational Life Cycle: Sustain: Training and Awareness
8.1 Training and Awareness . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
8.2 Leveraging Privacy Incidents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
8.3 Communication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
8.4 Creating Awareness of the Organization’s Privacy Program . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
8.5 Awareness: Operational Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196
8.6 Identifying Audiences for Training . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
8.7 Training and Awareness Strategies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
8.8 Training and Awareness Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199
8.9 Using Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
8.10 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
v
CHAPTER 9
Privacy Operational Life Cycle: Respond: Data Subject Rights
9.1 Privacy Notices and Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
9.2 Choice, Consent, and Opt-Outs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210
9.3 Obtaining Consents from Children . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211
9.4 Data Subject Rights in the United States . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
9.5 Data Subject Rights in Europe and the United Kingdom . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
9.6 Responding to Data Subject Requests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
9.7 Handling Complaints: Procedural Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236
9.8 Data Subject Rights Outside the United States and Europe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238
9.9 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241
E
CHAPTER 10
Privacy Operational Life Cycle: Respond: Data Breach Incident Plans
PL
10.1 Incident Planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
10.2 How Incidents Occur . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251
10.3 Terminology: Security Incident versus Breach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251
M
10.4 Getting Prepared . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252
10.5 Roles in Incident Response Planning by Function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
10.6 Integrating Incident Response into the Business Continuity Plan . . . . . . . . . . . . . . . . . . . . . . . 261
SA
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303
vi
About the IAPP
E
support, and improve the privacy profession globally. We are committed to providing
a forum for privacy professionals to share best practices, track trends, advance privacy
PL
management issues, standardize the designations for privacy professionals, and provide
education and guidance on opportunities in the field of information privacy.
The IAPP is responsible for developing and launching the only globally recognized
credentialing programs in information privacy: the Certified Information Privacy
Professional (CIPP®), the Certified Information Privacy Manager (CIPM®), and the
M
Certified Information Privacy Technologist (CIPT®). The CIPP, CIPM, and CIPT are
the leading privacy certifications for thousands of professionals around the world who
serve the data protection, information auditing, information security, legal compliance,
SA
vii
SA
M
PL
E
Preface
E
are all designed to make your life better and improve services. However, there is a trade-
off to all these items. It requires you to allow others to use your data in ways that you
choose. PL
This interaction and sharing of data between individuals and service providers
is growing at an exponential pace. If we as privacy professionals do not stand up for
the rights and freedoms of individuals to ensure proper protection of their personal
information, then who?
M
Over the last decade, we have seen privacy ingrained into everyday operations of
organizations. The proper handling of data by organizations is demanded by society.
Probably one of the greatest changes we have seen in privacy program management
SA
is in training and awareness. Similar to how information security has been “baked”
into an organization’s training strategy, so has privacy. It is not uncommon to see an
organization emphasize that protecting data is the responsibility of each employee. Now
we see organizations adding that protecting personal information is also the employee’s
responsibility. This has been incorporated into many organizations’ standard operating
procedures. This is a good thing.
The roles of the chief privacy officer, privacy program manager, privacy analyst, and
privacy engineer are to ensure organizations are adhering to the privacy principles
outlined in various privacy laws around the globe. The laws may have specific
requirements; however, most of the regulations are based on the same principles. The
principles may be named differently but in essence are quite similar. These privacy
principles must be adhered to if an organization wishes to be compliant to the varying
regulations. This is where the privacy program manager comes into play. The privacy
program manager leads the effort to ensure privacy principles are being carried out
through information security practices. This activity will look different for every
ix
organization. The privacy program manager works with other privacy professionals, if
available, to establish the proper policies, procedures, and processes that will protect a
data subject’s personal information.
The success of the privacy compliance program for different organizations relies
heavily on how the organization has established its data governance program. Some
organizations do not have a structured data governance program. The importance of
good data governance is being highlighted as organizations race to comply with not only
privacy regulations, but also sectoral regulations, such as finance and medical. This is a
new area for which the privacy professional may play an increased role.
I would like to humbly thank the International Association of Privacy Professionals
(IAPP) for allowing me this opportunity for a third edition and everyone who assisted
with this textbook, especially the individual authors who contributed in their areas of
expertise. They are all dedicated and supportive professionals, proving we can all work
E
together as a holistic team to achieve success. This work would not be possible without
all of them. My deepest thanks to the team.
PL
Russell Densmore, CIPP/E, CIPP/US, CIPM, CIPT, FIP
October 2021
M
SA
x
Acknowledgments
This third edition of Privacy Program Management: Tools for Managing Privacy Within
Your Organization would not have been possible without contributions and support
from the IAPP’s global community of privacy and data protection professionals.
Thank you to our Training Advisory Board. We are ever grateful for your guidance
and generosity in sharing your expertise. Current members include:
E
Shay Babb, CIPP/C, CIPM
Robin Anise Benns, CIPP/US
Jonathan Cantor, CIPP/G, CIPP/US PL
Justin Castillo, CIPP/E, CIPP/US, CIPM
Alfredo Della Monica, CIPP/E
Katrina Destrée, CIPP/E
Marta Dunphy-Moriel, CIPP/E
M
Thays Castaldi Gentil, CIPP/E
Ian Goodwin, CIPP/E, CIPM, CIPT, FIP
Wei Gu, CIPM
SA
xi
Garry Tyler Spence, CIPP/E, CIPP/US, CIPM, FIP
Becky Tarrant, CIPP/E, CIPM
Liisa Thomas
Michael Tibodeau, CIPP/E, CIPP/US, CIPM, CIPT, FIP
Jessica Vaianisi, CIPP/C
Judith van de Vorle, CIPP/E, CIPM
Victoria van Roosmalen, CIPP/C, CIPP/E, CIPP/US, CIPM, CIPT, FIP
Rajesh Kumar Viswanathan, CIPP/A, CIPP/E, CIPP/US, CIPM, FIP
Victoria Watts, CIPP/E, CIPT
Zhaofeng Zhou, CIPP/E
It has been my true pleasure to work with Russell Densmore, CIPP/E, CIPP/US,
CIPM, CIPT, FIP, who serves as executive editor for this book. He led our contributing
team of privacy and data protection pros from around the globe through all stages of
E
development and has supported our CIPM program from its inception. Thank you for
your guidance, advice, and continued commitment to this project.
PL
To our stellar contributors—Susan Bandi, CIPP/US, CIPM, CIPT, FIP, João Torres
Barreiro, CIPP/E, CIPP/US, John Brigagliano, Ron De Jesus, CIPP/A, CIPP/C,
CIPP/E, CIPP/US, CIPM, CIPT, FIP, Jonathan Fox, CIPP/US, CIPM, Jon Neiditz,
CIPP/E, CIPP/US, CIPM, Chris Pahl, CIPP/C, CIPP/E, CIPP/G, CIPP/US, CIPM,
CIPT, FIP, Liisa Thomas, Amanda Witt, CIPP/E, CIPP/US, and Edward Yakabovicz,
M
CIPP/G, CIPM, CIPT—we are so grateful you have shared your expertise and diverse
perspectives in the pages of this book.
Many thanks to Jyn Schultze-Melling for permission to include his chapter on the
SA
rights of data subjects from European Data Protection: Law and Practice, Second Edition
as an excerpt in Chapter 9 of this book.
Wei Gu, CIPM, Adam Higgins, CIPP/E, CIPM, CIPT, FIP, Sarah Morrow, CIPP/US,
CIPM, FIP, Julia Palmer, CIPP/E, CIPM, Jennifer Schack, CIPP/E, CIPP/US, CIPM,
FIP, Timothy Smit, CIPP/E, CIPP/US, CIPM, FIP, Becky Tarrant, CIPP/E, CIPM,
and Michael Tibodeau, CIPP/E, CIPP/US, CIPM, CIPT, FIP, thank you for providing
thoughtful, constructive feedback on the draft manuscript.
Thank you to Hyde Park Publishing Services for creating the book index.
We appreciate the hard work, expertise, and dedication of the many professionals
who contributed to the publication of this book. We hope you will find it to be both a
useful tool for preparing for your CIPM certification and a practical resource for your
professional career.
Marla Berry, CIPT
Training Director
International Association of Privacy Professionals
xii
Introduction
In 2013, when we launched the Certified Information Privacy Manager program, the
idea of operating a privacy program was still novel. Our profession largely evolved from
law and compliance, and privacy was, in many ways, binary: the privacy professional
gave the product or service a thumbs-up or thumbs-down.
Quickly, however, organizations with business models increasingly dependent
E
on data came to realize that better management and customer trust were needed.
Unless the privacy professional was involved at every step of product development,
organizations faced too much risk. PL
Further, with the passage of the EU General Data Protection Regulation (GDPR),
the idea of operational privacy, or “privacy by design,” (PbD), became law. In the years
since our last edition, the GDPR’s effects have become further cemented into business
operations, while other laws around the world continually borrow concepts from the
M
GDPR.
Moreover, the privacy world has gone through a panoply of changes. Brazil and China
now have national data protection laws. India is pondering its own law, and several other
SA
nations around the world have passed or will pass their own legislation. In the United
States, California passed not one, but two, comprehensive privacy laws. Other states
followed suit, including Colorado and Virginia. And more may be on the horizon.
Keeping up with these developments complicates the efforts of the privacy office.
Finding areas of convergence and identifying gaps is a must for risk management and
compliance. Operationally, many of these laws now require organizations to facilitate
data subject access requests, as well as rights to deletion, correction, and portability. An
entire marketplace of privacy technology vendors equipped with products and services
designed to scale the internal privacy function has grown in response.
To add on, in the wake of the Court of Justice of the European Union’s (CJEU)
decision in “Schrems II,” international data flows have become exponentially
complicated. Companies must conduct transfer impact assessments, deploy new
standard contractual clauses, and rely on alternative transfer mechanisms, such as
xiii
binding corporate rules and derogations. Data localization is taxing cloud vendors and
creating its own sources of risk.
Plus, artificial intelligence and machine learning systems, which often require
massive amounts of data collection, are proliferating across industry sectors.
As we’ve consistently observed in our annual IAPP-EY Privacy Governance Report,
organizations with mature privacy operations not only have full teams of privacy
professionals, but they also have them embedded in various business operations and
administrative departments, ranging from human resources to information technology,
marketing, and sales. They provide privacy with multimillion-dollar budgets. They buy
tech bespoke for privacy operations.
In short, privacy program management is a foundational component in modern
business, and the need for sophisticated leaders who understand the complexities of the
global digital marketplace will only increase.
E
Yet again, Executive Editor Russell Densmore, CIPP/E, CIPP/US, CIPM, CIPT,
FIP, has overseen a variety of valuable contributions in revamping Privacy Program
PL
Management: Tools for Managing Privacy Within Your Organization. There are more
practical examples, more deep dives into the “how” of privacy management, and more
information on the tools privacy professionals are using to create effective privacy
programs.
For data protection officers, privacy program managers, global privacy leaders, and
M
any number of other titles emerging around the globe, the CIPM is the perfect tool
for privacy professionals working in both the public and private sectors. This book
helps unlock the benefits of CIPM and prepare those hoping to take the exam and get
SA
certified.
I am extremely pleased with the way the CIPM continues to be accepted around the
globe as the standard for how privacy is done on the ground. I hope you—and your
organization—enjoy its benefits.
J. Trevor Hughes, CIPP
President and CEO
International Association of Privacy Professionals
xiv
CHAPTER 1
E
requirements, meet the expectations of clients or customers, while at the same time
prevent and mitigate privacy risks.
PL
What is program management? It is the process of managing multiple projects across
an organization to improve performance. Program management is used widely in the
aerospace and defense industries. It allows for oversight and status of projects to ensure
goals of the program are met. It allows for a holistic view of multiple projects and change
management. It also allows for valued metrics to be viewed across the program.
M
What is a framework? A framework is the skeletal structure needed to support
program management. Each organization’s privacy program framework will be created
by analyzing the applicable laws, regulations, and best practices that are tailored
SA
1
Privacy Program Management
ongoing adherence. The world is demanding that organizations are accountable for the
data they collect, how they manage the data, and how they use personal information to
protect and respect the rights of individuals. A structured privacy program exhibits an
organization’s thoughtful and intentional plan to protect personal information and the
rights of individuals.
Since privacy is a subject of global importance, organizations can no longer ignore the
requirements necessary to protect personal information imposed by laws, regulations,
and industry best practices. As governments continue to impose tighter laws and
regulations, consumers continue to demand more protection from organizations they
choose to entrust with their information. Consequently, organizations must meet
these demands through placement of greater controls, processes, and procedures on
information under their custodial control. With so many spheres of influence and
pressure, global privacy teams must now seek to track, manage, and monitor the
E
dynamic changes that appear to occur continuously.
As shown with all business management tasks, a privacy governance life cycle
PL
provides the methods to assess, protect, sustain, and respond to the positive and
negative effects of all influencing factors. This framework and life cycle thereby
provides reusable procedures and processes that outline the courses of action. Like
maps, frameworks provide inquiry topics and direction (e.g., problem definition,
purpose, literature review, methodology, data collection, and analysis) to ensure
M
quality through repeatable programmatic steps, thereby reducing errors or gaps in
knowledge or experience. For the purpose of this book, this framework and life cycle is
called the “privacy program framework.” Although a dedicated privacy team or privacy
SA
professional (e.g., a data protection officer) owns this framework, it shares ownership
and management aspects with other stakeholders throughout the organization,
including employees, executive leadership, managers, and external entities, such as
partners, vendors, and customers.
“Assess” is the first of four phases of the privacy operational life cycle that
will provide the steps, checklists, and processes necessary to assess any gaps in a
privacy program as compared to industry best practices, corporate privacy policies,
applicable privacy laws and regulations, and the privacy framework developed for
2
Introduction to Privacy Program Management
your organization. The privacy professional should note that although the assessing
of a privacy program is explained sequentially, in actual practice, the elements may
be performed simultaneously, in separate components, or tailored to organizational
requirements. For example, you may be assessing a program through measurement and
alignment of organization standards/guidelines, privacy management to regulatory
and legislative mandates, through industry best practices, or a hybrid or combination of
both approaches.
There are currently many models and frameworks that allow measurement and
alignment of these activities to include privacy maturity models, such as the AICPA/
CICA Privacy Maturity Model, Generally Accepted Privacy Principles (GAPP)
framework, and privacy by design (PbD).
“Protect” is the second of four phases of the privacy operational life cycle. It provides
the data life cycle, information security practices, and PbD principles to protect
E
personal information. Although technical, containing information security, information
assurance, or cybersecurity practices, this chapter provides a generic, high-level
PL
overview for the privacy professional. The protect phase of the privacy operational life
cycle embeds privacy principles and information security management practices within
the organization to address, define, and establish privacy practices.
For any organization, domestic and global privacy management is further
complemented through each of the operational life cycle phases related to jurisdiction,
M
compliance, and laws. Understanding and analyzing each of these phases as they relate
to an organization provides the privacy professional a greater understanding of how to
protect personal information.
SA
Privacy spans across the entire organization, from HR, legal, and other supporting
functions to businesses and procurement. Therefore, do not forget to take into account
laws and regulations applying to other areas, such as labor or telecommunications law,
as these may well interact with privacy laws.
“Sustain” is the third of four phases of the privacy operational life cycle that provides
privacy management through the monitoring, auditing, and communication aspects
of the management framework. Monitoring throughout several functions in the
organization, to include audit, risk, and security practices, ensures “business as usual”
for identification, mitigation, and reporting of risk in variation or gaps in operations to
meet regulatory, industry, and business objectives.2 Monitoring should be continuous
and based on the organization’s risk appetite through defined roles and responsibilities
that may include privacy, audit, risk, and security roles.
“Respond” is the fourth of four phases of the privacy operational life cycle. It
includes the respond principles of information requests, legal compliance, incident-
response planning, and incident handling. The “respond” phase of the privacy
3
Privacy Program Management
operational life cycle aims to reduce organizational risk and bolster compliance to
regulations. Every corporation needs to be prepared to respond to its customers,
partners, vendors, employees, regulators, shareholders, or other legal entities. The
requests can take a broad form, from simple questions over requests for data corrections
to more in-depth legal disclosures about individuals. No matter the type of request, you
need to be prepared to properly receive, assess, and respond to them.
Businesses are motivated today, more than ever, to ensure they are compliant with
privacy laws and regulations around the globe—in part, because they want to protect
their brand name, reputation, and consumer trust. Large data breaches frequently
make news headlines, and organizations have paid significant penalties, particularly
through class-action lawsuits to affected individuals, lost revenue, or lost consumer
trust. Millions of people have been affected by sloppy data protection practices of the
past. This must change, and organizations must take seriously how they handle personal
E
information entrusted to them.
It is time for the privacy profession to recognize the value of a holistic data privacy
PL
program and ever-important privacy program manager. This textbook delves into the
requirements for becoming a privacy program manager. The Certified Information
Privacy Manager (CIPM) certification indicates that a privacy program manager has the
proper understanding of concepts, frameworks, life cycles, and regulations to hold the
role of privacy program manager for their employer. 3
M
1.1 Responsibilities of a Privacy Program Manager
SA
The role and responsibilities of a privacy program manager may vary widely depending
on the type, size, complexity of the organization, and its business objectives and may be
performed by one of more privacy professional(s) who form part of the central privacy
team. This role also may not always carry such job title, e.g., a data protection officer
and a data privacy analyst could undertake specific responsibilities of a privacy program
manager in some organizations. It is important to remember to align the various parts
of a privacy program to business objectives so as not to be in contention. The privacy
program and operations should align and support the business as a valued partner, not
be seen as a “blocker.” The person who ultimately leads the endeavor is usually referred
to as the privacy program manager.
The goals of a privacy program manager are to:
• Define privacy obligations for the organization
• Identify and mitigate business, employee, vendor, and customer privacy risks
4
Introduction to Privacy Program Management
E
• Highlight that an organization takes its data privacy obligations seriously
PL
• Respond effectively to privacy breaches and data subject requests
• Continually monitor, maintain, and improve the maturity of the privacy
program
The specific responsibilities of the privacy program manager include:
M
• Policies, privacy notices, procedures, and governance
• Privacy-related awareness and training
SA
5
Privacy Program Management
E
• Privacy-specific or -enhancing software
• Privacy-related certification seals
PL
• Cross-functional collaboration with legal, information technology (IT),
information security (sometimes referred to as IS or infosec), cybersecurity,
and ethics teams, among others
M
• Internal and external reporting
As you can see by the preceding list, which is not exhaustive, the roles and
responsibilities of the privacy program manager can be far and wide. This text is not
meant to clarify every obligation of the privacy program manager but instead give a
SA
holistic view so you may tailor a specific privacy program for your organization.
1.2 Accountability
What is accountability? Accountable organizations have the proper policies and
procedures to promote best practices in handling personal information and, generally,
can demonstrate they have the capacity to comply with applicable privacy laws. They
promote trust and transparency to provide individuals with confidence in their abilities
to protect their personal information and respect their data rights.
The concept of accountability is one of the most important concepts introduced by
new data protection laws. It is about not only saying the organization is taking action,
but also being able to prove that it is. In other words, the organization is accountable
for the actions it takes or does not take to protect personal data. The idea is that, when
6
Introduction to Privacy Program Management
organizations collect and process information about people, they must be responsible
for it. They need to take ownership and take care of it throughout the data life cycle.
If an organization has a data protection policy in place, the organization should
comply with that policy and document any deviations and actions taken for any failures
in complying with the policy.
Accountability, as defined by laws, can benefit organizations, although it may impose
obligations to take ownership and demonstrate how the organization is compliant. In
exchange, it can give organizations a degree of flexibility about exactly how they will
comply with their obligations. Privacy program managers, as well as chief information
security officers (CISOs) and data protection officers (DPOs), may be accountable for
the safekeeping and responsible use of personal information—not just to investors and
regulators, but also to everyday consumers and their fellow employees.
E
1.3 Beyond Law and Compliance
PL
Numerous laws and requirements affect businesses today, and the topic of privacy is
receiving extra attention from legislators and non-privacy regulators. However, it is not
just about laws and compliance. There are various motivators driving businesses to be
more responsible with an individual’s personal data.
One such motivator is consumer trust. Fines and fees from regulators are usually
M
clearly defined and have a finite value to them. However, consumer trust can be broad,
unbounded, and have much more severe repercussions. Loss of consumer trust can be
ruinous to organizations. It is hard to obtain and harder to get back once lost. Therefore,
SA
many organizations are motivated to have a mature privacy program to ensure they do
not lose consumer trust.
Obviously, organizations that are business-to-consumer (B2C) will be more
interested in consumer trust than business-to-business (B2B) companies. However,
all organizations have an interest in keeping trust with their partners, employees,
contractors, and customers. Proper handling of personal data is in every organization’s
best interest.
7
Privacy Program Management
The reasons for having a privacy program may include but are not limited to:
• Enhancing an organization’s brand and public trust
• Meeting regulatory obligations
• Encouraging ethical data-processing practices
• Enabling global operations, such as mergers and acquisitions (M&A)
• Preventing and mitigating the effects of data breaches
• Providing a competitive differentiator
• Increasing the value and quality of data (business asset)
• Reducing the risk of employee and consumer class-action lawsuits
E
• Being a good corporate citizen
• Meeting expectations of consumers and business clients
PL
• Integrating data ethics into organizations decision making
Good accountability through a robust privacy program may lead to trust with an
organization. Trust, especially when it is consumer trust, may have great benefit to
M
the organization. Being transparent, accountable, and good data stewards of personal
information shows an organization is trustworthy of the information entrusted to them.
8
Introduction to Privacy Program Management
from a privacy perspective. They may report to both the senior marketing manager and
head of privacy. Buy-in and a sense of ownership from key functions also assist with
better acceptance of privacy and sharing of the responsibility across the organization
rather than in one office. Based on the individual culture, politics, and protocols of
the organization, privacy professionals will need to determine the best methods, style,
and practices to work within the organization or individual functions. Initially, this
effort may be onerous, but building and maintaining good relationships with other key
stakeholders ensure privacy is built into the DNA of business process and design rather
than just an afterthought.
Many functions directly support the various activities required by the privacy
program. Among these activities are the adoption of privacy policies and procedures,
development of privacy training and communications, deployment of privacy- and
security-enhancing controls, contract development with and management of third
E
parties that process the personal information of the organization, and the assessment of
compliance with regulations and established control mechanisms.
PL
Privacy policies and procedures should be created and enforced at a functional level,
i.e., by the central privacy team. Policies imposing general obligations on employees
may also reside with other functions, such as ethics, legal, and compliance; therefore, it
is important to align with other policy owners and reference other policies as applicable.
Information technology (IT) may be responsible for policies and procedures related to
M
employee use of technical infrastructure. Policies that govern privacy requirements for
providers of third-party services that have implications for personal data typically sit
with procurement, while those concerning the use and disclosure of employee health
SA
9
Privacy Program Management
E
that information security deploys—from encryption to perimeter security
controls and data loss prevention (DLP) tools—helps the privacy program
PL
meet its requirements for implementing security controls to protect personal
information. As an example, EU data protection law incorporates security
provisions into the law as one of its key principles. The information security
team ensures that appropriate technological controls are employed (e.g.,
complex passwords, encryption, role-based access) and determines whether
M
the various groups within an organization are aware of and comply with
the organizational and technical controls that govern their activities and
behaviors.
SA
• The IT team can enhance the effectiveness of the privacy program by adding
processes and controls that support privacy principles. For example, creating
processes to develop and test software and applications in a manner that does
not require the use of production data may decrease the chances that the data
will be compromised. This may also keep individuals who have no business
need to view personal data from accessing it. Creating systems that support
role-based access also supports the larger purposes of the privacy program by
specifically identifying and limiting who can access the personal information
in a particular system. The IT team should carry the mantle of PbD by
implementing privacy principles into the realm of technology development, for
instance, by limiting the data fields built into a tool or application to only those
actually required to perform a process or action, or by building in functions that
enable the user to easily delete data according to a retention schedule.
10
Introduction to Privacy Program Management
E
behalf of the organization and that the appropriate data privacy contractual
language is imposed on these service providers. Most privacy laws require data
PL
controllers or other entities directly subject to data protection laws to ensure
their privacy requirements are fulfilled. Procurement teams usually support
the privacy and/or legal teams in facilitating or, in some cases, performing
due diligence, taking action based on the results, and making sure contractual
M
language reduces the organization’s exposure. In smaller organizations, a legal
department may create contract requirements if there is no procurement.
• Human resources (HR) ensures employee information is handled in
SA
accordance with privacy policies and procedures. This function is most likely to
handle sensitive employee information, such as health information and, in some
organizations’ information collected, for vetting staff.
• Ethics and compliance manages whistleblowing and complaints relating to
how an individual’s personal data may have been handled.
• Marketing and advertising creates awareness on how to handle customer
personal data for marketing and media purposes.
• Business development and strategy helps understand how “good data
protection” can drive more business.
• Finance ensures Payment Card Industry (PCI), Sarbanes-Oxley (SOX), and
other financial regulations are collaborated on with the privacy office.
11
Privacy Program Management
• Legal keeps current on privacy regulations and requirements that affect your
organization.
• Risk ensures data protection risks are included in the organization’s Enterprise
Risk Management framework.
• Data governance develops a data governance framework that supports data
privacy requirements.
• Product research and development performs privacy impact assessments
(PIAs), as well as privacy by design and default (PbDD) consulting in new
product development.
E
Protecting personal data and building a program that drives privacy principles into the
organization cannot be the exclusive job of the privacy officer or privacy team, any more
PL
than playing a symphony is the exclusive responsibility of the conductor. As with an
orchestra, many people, functions and talents will merge to execute on a vision.
Many organizations create a privacy committee, council composed of the
stakeholders, or representatives of functions, often referred to as “privacy champions,”
M
that were identified at the start of the privacy program implementation process. These
individuals and functions will launch the privacy program, and their expertise and
involvement will continue to be tapped as remediation needs—some of which may sit
within their areas of responsibility—are identified. They will be instrumental in making
SA
12
Introduction to Privacy Program Management
1.7 Summary
Privacy program managers are responsible for the safekeeping and responsible use
of personal information—not just to investors and regulators, but also to everyday
consumers and their fellow employees. Privacy program managers should be ready to
demonstrate compliance with applicable data privacy laws, reduce risk, build trust and
confidence in the brand, and enhance competitive and reputational advantages for the
organization.
Endnotes
1 Ann Cavoukian, Privacy by Design: The 7 Foundational Principles, accessed November 2018,
https://iab.org/wp-content/IAB-uploads/2011/03/fred_carter.pdf.
E
2 “Business As Usual,” Mr. Simon McDougall, interview, November 15, 2012.
3 “CIPM Certification,” IAPP, accessed November 2018, https://iapp.org/certify/cipm/.
PL
M
SA
13
SA
M
PL
E
About the Contributors
E
of Investigation for support against cybercriminals.
Densmore is renowned for information security, cyber forensic investigations,
PL
privacy program management, and physical security. He is a proven cybersecurity
professional with a record of establishing and managing multiple cross-functional data
protection teams.
Densmore co-chairs the National Defense Industrial Association (NDIA)
cybersecurity, privacy subcommittee with longtime colleague and contributing author
M
Edward Yakabovicz. He is actively involved with the Privacy Engineering Section
of the IAPP and, as a privacy pioneer, often speaks at IAPP and other privacy events
to promote the profession. He chairs the OneTrust Privacy Connect chapter for Los
Angeles, as well as mentoring others on how to obtain the most benefit from privacy
SA
295
Privacy Program Management
Contributors
E
She is experienced in providing thought leadership and implementing effective,
comprehensive global solutions in the areas of enterprise risk management, data
PL
governance, data privacy, IT security, and business continuity. She also serves as an adjunct
professor in the Cybersecurity Master’s Program at Washington University in St. Louis.
She is an active member of the IAPP, Executive Women in Privacy, Chief Privacy
Council Board, Future of Privacy Forum (FPF), ISACA, CISO Coalition, and FBI
Citizen Academy.
M
João Torres Barreiro, CIPP/E, CIPP/US
João Torres Barreiro is a privacy leader with a long experience on designing and
implementing privacy programs in multinationals operating in the pharmaceutical, IT,
SA
296
About the Contributors
John Brigagliano
John Brigagliano focuses his practice on data privacy and technology licensing with
a particular emphasis on guiding clients through California Consumer Privacy Act
(CCPA)/California Privacy Right Act (CPRA) and EU General Data Protection
Regulation (GDPR) compliance issues. With respect to California privacy, for
example, Brigagliano currently co-leads CCPA and CPRA compliance for a marketing
automation platform and regularly advises a cloud-based security and interactive home
services provider on CCPA compliance matters. He also regularly advises U.S. retailers
on CCPA-related digital advertising issues.
Prior to launching his legal career, Brigagliano was a special education teacher at
Seaford Senior High School in Seaford, Delaware, where he was placed as part of Teach
for America and, along with teaching students with disabilities, he coached varsity golf.
He earned an undergraduate degree from Wake Forest University and graduated from
E
Vanderbilt Law School.
PL
Ron De Jesus, CIPP/A, CIPP/C, CIPP/E, CIPP/US, CIPM, CIPT, FIP
Ron De Jesus is the head of global privacy at Grindr, the world’s largest social
networking application for the LGBTQ+ community, and founder and CEO of De Jesus
Consulting, a boutique privacy consulting firm specializing in privacy program and
privacy strategy development, controls implementation, and privacy assessments and
M
reviews.
Previously, De Jesus led the privacy function at Tinder, where he was responsible
for developing and operationalizing the company’s EU General Data Protection
SA
Regulation (GDPR) strategy. De Jesus later served as privacy program manager for all
North American brands owned and operated by Match Group, Inc., including Tinder,
PlentyOfFish, OKCupid, Match.com, and Hinge.
Prior to Tinder, De Jesus served as the global privacy director for Tapestry, Inc.,
based in New York, where he developed its global privacy program and managed privacy
compliance efforts for all its brands, including Coach, Stuart Weitzman, and Kate Spade.
In 2013, De Jesus helped establish PwC’s Data Protection & Privacy Practice in
New York, where he led privacy engagements globally. Prior to PwC, he consulted
with Deloitte, where he designed functional privacy controls and managed company
registrations with EU authorities. In his early career, De Jesus consulted for Anzen, Inc.,
a boutique data privacy firm based in Toronto, Ontario, where he led numerous privacy
impact assessments (PIAs) for large health IT system implementations across Canada.
De Jesus has also served as privacy director for American Express’s Global Network
Services (GNS), where he developed the business unit’s privacy policy, developed its
297
Privacy Program Management
privacy-by-design (PbD) program, led its strategy to comply with the EU ePrivacy
Directive, and served on the Amex Privacy Board.
De Jesus sits on the IAPP Diversity in Privacy Advisory Board and was a former
member of the IAPP Publications Board and CIPT Exam Development Board. He
previously co-chaired the Los Angeles IAPP KnowledgeNet and New York IAPP
KnowledgeNet chapters and is a regular contributor to the Privacy Advisor. De Jesus is
also an IAPP Training Partner and Faculty Member and delivers both IAPP-approved
and IAPP-sponsored trainings.
E
With more than 20 years of privacy experience, Fox’s principal areas of focus have
been product development, government relations, mergers and acquisitions (M&A),
Prior to Cisco, Fox was senior privacy engineer at Intel. His previous roles include
director of data privacy at McAfee, director of privacy at eBay, deputy chief privacy
officer at Sun Microsystems, and editor-in-chief at Sun.com.
M
Fox frequently speaks at industry events and is a member of the IEEE P7002 Personal
Data Privacy Working Group and chair of the U.S. Technical Advisory Group for ISO/
PC 317 Consumer protection: privacy by design for consumer goods and services.
SA
298
About the Contributors
incident response and the role of the “breach coach,” as well as define proportionate
search in e-discovery; and in the 2010s, he helped pioneer governance of “big
data” and protection of “crown jewels.”
Neiditz has been selected as a “Cybersecurity Trailblazer” by the National Law
Journal, Ponemon Fellow, and by Who’s Who Legal for Data Law. Neiditz’s JD is from
Yale Law School his bachelor’s of arts from Dartmouth College.
E
During the prior 12 years at the same company, as a privacy professional, Pahl
helped develop overarching enterprise privacy programs while providing ongoing
PL
advisory services to business units, including customer service, information technology
(IT), human resources (HR), sales, marketing, legal, and procurement, determining
compliance with ethical and regulatory requirements pertaining to the collection,
protection, use, and transfer of personally identifiable information (PII). He was
responsible for privacy-related activities on matters such as privacy impact assessments
M
(PIAs), regulatory audits, and company due diligence encompassing 14 million
customers and 50,000 employees and retirees.
Pahl chaired the multidisciplinary Privacy Incident Response Teams investigating
SA
potential privacy incidents and managing remediation actions. He has built and
operationalized privacy compliance programs, completing multiple privacy assessments
in the areas of enterprise data transfers and customer and employee support systems.
Pahl worked on engagements supporting system inventories and audits, data
encryption, and implementation of data loss prevention (DLP) applications in live
operating environments and implemented DLP solutions. He excels in developing
ground-up privacy and programs for large companies.
Pahl holds a doctorate degree in Strategic Leadership, certifications in privacy
and project management, and Six Sigma green and black belts. He actively writes for
industry publications.
Liisa Thomas
Liisa Thomas is a partner in Sheppard Mullin’s Chicago and London offices and lead of
its privacy and cybersecurity team, providing thoughtful legal analysis combined with
real-world practical advice. She also serves as an adjunct professor at Northwestern
299
Privacy Program Management
Law School teaching privacy and data security courses, where she is the recipient of the
Edward Avery Harriman Law School Lectureship award.
Thomas is the author of the definitive treatise on data breach, Thomas on Data Breach:
A Practical Guide to Handling Worldwide Data Breach Notification, described as “a no-
nonsense roadmap for in-house and external practitioners alike.” She is also the author
of the new treatise on data privacy, Thomas on Big Data: A Practical Guide to Global
Privacy Laws, described as a “key text” and “perfect for the busy practitioner.”
As an industry leader in the privacy and data security space, she has been recognized
by Leading Lawyers Network, Chambers, and the Legal 500 for her depth of privacy
knowledge. Thomas was named to Cybersecurity Docket’s “Incident Response 30,”
recognized as 2017 Data Protection Lawyer of the Year–USA by Global 100, 2017
“U.S. Data Protection Lawyer of the Year” by Finance Monthly, and a “Leading Woman
Lawyer” by Crain’s in 2018.
E
Thomas received her JD from the University of Chicago and is admitted to the bar in
Illinois and the District of Columbia.
connected devices.
She is a frequent presenter on topics related to U.S., EU, and global privacy, as well
as technology-related topics, such as artificial intelligence (AI), and has published
articles on cybersecurity, privacy, cloud computing, electronic signatures, security laws,
outsourcing, and media.
Witt earned her LLM in international intellectual property, magna cum laude, from
Catholic University at Leuven, Belgium, and her JD, cum laude, from Emory University
School of Law. She earned a bachelor’s of arts, magna cum laude, from the University of
Florida, where she was inducted into Phi Beta Kappa.
300
About the Contributors
E
PL
M
SA
301
SA
M
PL
E
Index
E
withdrawals of, 234–235 Artificial intelligence (AI) systems, 47, 91–93
Access, rectification, cancellation, and Asia-Pacific Economic Cooperation (APEC)
opposition rights (ARCO rights [Mexico]), Privacy Framework, 29, 49
238
Access control, 122, 132–133
Accountability, 6–7
PL Assess, 2–3. See also Data assessments
Asset management, 122
Attestation, 93–94
Acquisitions, divestitures, and mergers, data Audience, 168, 197
assessments in, 103–105 Auditing, 177–181. See also Sustain phase:
M
Active scanning tools for monitoring, 176 monitoring and auditing performance
Activity monitoring, 34 Audit log wiping, 152
Act on the Protection of Personal Information AUP (acceptable use policies). See Acceptable
(APPI, Japan), 239 use policies (AUP)
SA
303
Privacy Program Management
E
Brigagliano, John, 205, 297 Code, 29
Brown University’s Executive Master in CAN-SPAM (Controlling the Assault of Non-
Cybersecurity, 41
PL
B2B (business-to-business) organizations, 7
B2C (business-to-consumer) organizations, 7
Business continuity management, 123
Solicited Pornography and Marketing) Act of
2003, 59, 214
Carnegie Mellon’s Master of Science in
Information Technology—Privacy
Business continuity plan, incident response in, Engineering (MSIT-PE), 41
M
261–264 Carnegie Mellon University, 209
Business development team CARU (Children’s Advertising Review Unit)
in data breaches, 277 Advertising Guidelines, 60
in incident planning, 257, 259 CASL (Canadian anti-spam legislation), 238
privacy procedures and, 11 Cavoukian, Ann, 31, 111–113, 115
SA
304
Index
E
CIPM (Certified Information Privacy Manager) Confidentiality, integrity, and availability (CIA)
certification, 4, 30 of personal data, 222
Cisco Privacy Maturity Benchmarking Study
(2021), 131
PL
CISO (chief information security officers), 7
CJEU (Court of Justice of the European Union),
Consent
of children, 211–213
in data subject rights, 210–211
management of, 34
32 withdrawals of, 234–235
M
Class-action lawsuits, 250 Consultative Expert Group on Digital Ethics in
Cloud-based threats, 119 insurance, 93
Cloud computing Consumer Privacy Protection Act of 2021
acceptable use of, 155–156 (Canada), 238
assessing vendors of, 98–101 Consumers, trust of, 7
SA
305
Privacy Program Management
E
(Proposition 24), 54, 218 privacy impact assessment: overview, 82–84
Cranor, Lorrie Faith, 209 privacy impact assessment: U.S., 84–85
Credential theft, 186
Credit card incidents, 282
Cronk, R. Jason, 115
Cross-border data transfers, 60–62
PL vendor assessments: overview, 96–101
vendor assessments under CCPA, 102–103
vendor assessments under GDPR, 101–102
Data breaches, 249–293
Cryptography, 122 benefiting from, 292
M
CSA (Canadian Standards Association) Privacy board of directors role in, 280
Code, 29 business development role in, 277
Currency metrics, 165 CEO role in, 279–280
Customer care role of company privacy notices, 206
in data breaches, 276–277 customer care role in, 276–277
SA
306
Index
E
Data discovery, 34 European and UK: data portability, 230–232
Data governance, 12, 75–77 European and UK: erasure, 227–229
Data inventory, 207
Data loss prevention (DLP) tools, 10
Data management, 75–76
Data Management Association (DAMA)
PL European and UK: overview, 220–221
European and UK: personal data protection,
220–221
European and UK: processing restrictions,
International, 75–76 229–230
M
Data mapping, 34, 207 European and UK: rectification, 226–227
Data minimization, technical controls for, 135 European and UK: restrictions of rights, 234
Data portability, in data subject rights, 230–232 European and UK: right to access, 223–225
Data privacy dashboards, 169 European and UK: right to information, 222
Data protection authorities (DPAs), 32 European and UK: right to object, 232–233
SA
Data Protection by Design and by Default, European and UK: transparency, 222–223
113–115 Latin American, 238
Data Protection Commission v. Facebook Ireland, opt-in versus opt-out, 211
Schrems, 32 overview, 205
Data protection impact assessments (DPIA) privacy notices and policies, 205–210
conditions requiring, 87–89 U.S. federal laws on, 213–216
contents of, 89–90 U.S. state laws on, 216–220
methodology of, 91 withdrawals of consent and data access,
overview, 86–87 234–235
privacy workshops on, 27 “Data transfer impact assessment” (DTIA or
supervisory authorities and, 90–91 TIA), 60–61
Data protection officers (DPOs) Data transfers, cross-border, 60–62
accountability of, 7 Decentralized governance, 36–37
need for, 42–43 Deepfakes, 120
overview, 42 Deidentification, 34
qualifications and responsibilities of, 38–39, 43 De Jesus, Ron, 15, 297–298
307
Privacy Program Management
E
DOPPA (Delaware Online Privacy Protection security of, 122
Act), 216–217 Erasure, in data subject rights, 227–229
DPAs (data protection authorities), 32
PL
DPIA (data protection impact assessments). See
Data protection impact assessments (DPIA)
DPOs (data protection officers). See Data
Ethics, 11, 150
ETSI (European Telecommunications
Standards Institute), 30
EU Code of Conduct, 60
protection officers (DPOs) EU Data Protection Directive, 29
M
Driver’s Privacy Protection Act (DPPA)of 1994, EU General Data Protection Regulation
58 (GDPR). See General Data Protection
DSARs (data subject access requests), 34, Regulation (GDPR)
234–237 European Data Protection Board (EDPB), 18, 207
DTIA (data transfer impact assessment), 60–61 European Data Protection Law and Practice: Data
SA
Dublin City University’s Master of Arts in Data Subjects’ Rights (Schultze-Melling), 220
Protection and Privacy Law, 41 Europe and UK data subject rights
Due diligence, 34 automated decision-making, 233–234
Dutch Data Protection Authority, 31 data portability, 230–232
erasure, 227–229
overview, 220–221
E personal data protection, 220–221
East Asia, data subject rights in, 239–240
processing restrictions, 229–230
ECPA (Electronic Communications Privacy
rectification, 226–227
Act) of 1986, 58
restrictions of rights, 234
EDPB (European Data Protection Board), 18,
right to access, 223–225
207
right to information, 222
Education data, privacy protections for, 56
right to object, 232–233
E-Government Act of 2002, 84
transparency, 222–223
EIOPA (European Insurance and Occupational
European Insurance and Occupational Pensions
Pensions Authority), 93
Authority (EIOPA), 93
308
Index
E
Family Educational Rights and Privacy Act General Data Protection Regulation (GDPR)
(FERPA) of 1974, 57 access rights under, 223–225
FCRA (Fair Credit Reporting Act) of 1970, 57, Article 30 of, 20, 77–78, 80
213–214 PL
Federal Bureau of Investigation (FBI), 216
Federal Privacy Act of 1974, 58f
automated decision-making, right to not be
subject to, in, 233–234
Awareness Guide of, 52
Federal Trade Commission (FTC) children, privacy notices to, 211
on advertising to children, 23 in cross-border data transfer, 60
M
data breaches and, 271, 284–285 data assessment requirements of, 80–81
Data Privacy Day resources from, 192 data portability rights under, 230–232
Do Not Call Registry of, 214 data protection by design and by default,
enforcement actions of, 206 113–115
SA
309
Privacy Program Management
E
Incident response
Global Privacy Enforcement Network, 18
budgeting for, 263
Global privacy teams, 2
plan for, 253–254
Governance, data assessments and, 75–77.
See also Privacy governance
PL
Governance, risk, and compliance (GRC) tools,
34–35, 79, 177
teams for, 185–186
tools for, 34
Incidents of data breaches
business continuity plan integration,
Government data, privacy protections for, 56
261–264
M
Gramm-Leach-Bliley Act (GLBA), 22–23, 58
detection of, 264
handling, 264–269
H planning for, 249–251
Health data, privacy protections for, 56 See also Data breaches
SA
310
Index
E
Internal announcements of data breaches, Brazil’s Lei Geral de Proteção de Dados
284–285 (LGPD), 54–55, 238
311
Privacy Program Management
E
assessments MSIR-PE (Carnegie Mellon’s Master of
Limited sectoral approach, 22 Science in Information Technology—Privacy
Litigation exposure, 250
Living off the land (LotL) attacks, 120
PL
Local data protection authorities (DPAs), 32
Local governance, 36–37
Engineering), 41
N
NAI (Network Advertising Initiative), 60, 208
National Do Not Call (DNC) Registry, 59, 214
M
M National Institute of Standards and Technology
Machine learning (ML), 47 (NIST)
Malicious threats, 151, 251 NIST 800-60 classification system, 94
Malvertising, 120 NIST SP 800-88 Guidelines for Media
SA
312
Index
E
Payment Card Industry Data Security Standard
O (PCI DSS), 23, 59
Obfuscation, technical controls for, 135 PayPal trust marks, 60
OECD (Organisation for Economic PL
Co-operation and Development) Guidelines
on the Protection of Privacy and Transborder
PbD (privacy by design). See Privacy by design
(PbD)
PCPD (Office of the Privacy Commissioner for
Flows of Personal Data, 29, 49 Personal Data, Hong Kong), 67
Office of the Australian Information PDPA (Personal Data Protection Act, Malaysia)
M
Commissioner (OAIC), 66, 212 of 2010, 239–240
Office of the Privacy Commissioner (OPC, PDPA (Personal Data Protection Act, Thailand)
New Zealand), 67 of 2021, 240
Office of the Privacy Commissioner for Personal PDPC (Personal Data Protection Commission,
SA
313
Privacy Program Management
E
Phishing attacks, 120, 186 privacy impact assessment to facilitate, 82
Physical assessments, 94–96 protecting personal information by, 113–115
Physical controls, 121
Physical security, 122, 267
PL
PII (personally identifiable information).
See Personally identifiable information (PII)
in research and development, 12
Privacy dashboard, 209
Privacy director/manager, 38
Privacy engineering, 39, 115
PIPC (Personal Information Protection Privacy-enhancing technologies (PETs), 129, 135
M
Commission, South Korea), 68 Privacy governance, 15–44
PIPEDA (Personal Information Protection and framework development, 28–33
Electronic Documents Act), 29, 31, 238 model, responsibilities, and reporting, 38–43
PIPL (People’s Republic of China Personal overview, 15
Information Protection Law), 55, 84 scope of, 19–24
SA
314
Index
E
manager responsibilities, 4–6
need for, 7–8 R
organization-wide, 8–12
overview, 1–2
terminology, 2–4
PL
Privacy Protection Authority (PPA, Israel), 67
Ramirez, Edith, 206
Ransomware attacks, 120, 186, 251
Records of Processing Activities (GDPR), 207
Recovering from data breaches, 289–292
Privacy technologists, 39 Rectification, in data subject rights, 226–227,
M
Privacy threshold analysis (PTA), 84 235
Privacy Tracker, 69 Regulations. See Laws and regulations
Procurement team, privacy procedures and, 11 Regulators, reporting data breaches to, 285
Product research and development team, Regulatory scrutiny, 250
privacy procedures and, 12 Remediation
SA
315
Privacy Program Management
E
Routing patterns, 151 in investigations, 282
RTBF (“right to be forgotten”), 227–229 in privacy strategy, 25–27
316
Index
leveraging privacy incidents, 191–192 TrustArc trust marks, 23, 33, 60, 130
methods for, 199–201 Turkey Kişisel Verileri Koruma Kurumu
metrics for, 201–203 (KVKK), 68
operational actions, 196
overview, 185–187
strategies for, 198–199
U
UK data subject rights. See Europe and UK data
Systems acquisition, development, maintenance,
subject rights
and disposal, 123
UK Information Commissioner’s Office (ICO),
19, 49, 68, 90, 210–211
T UN Convention on the Rights of the Child in
Tableau software, data privacy dashboards in, Child Friendly Language, 212
169 Union leadership role
Tabletop exercises, in incident training, 262 in data breaches, 279
TC260 (Chinese National Information Security in incident planning, 257, 259–260
E
Standardization Technical Committee), 239 University of Auckland’s Postgraduate Diploma
TCPA (Telephone Consumer Protection Act) of in Information Governance, 41
1991, 58 U.S. Department of Commerce (DOC), 94
Third parties
CCPA assessments of, 102–103
as external privacy resources, 69
for cloud computing, 98–101, 155–156
forensics by, 282
contract for engaging, 154–155
in incident handling, 268
contract language for privacy protection, 98
in independent audits, 181
as data breach incident sources, 256
Thomas, Liisa, 249, 299–300
GDPR assessments of, 101–102
Three Lines Model, 75
human resources policies and, 156–158
TIA (data transfer impact assessment), 60–61
monitoring, 155
Training
policies for engaging, 153–154
budgeting for, 263
print, 278
for data breach preparedness, 252–253
selection standards for, 96–98
of employees on data breaches, 264–265
Verisign trust marks, 60
monitoring, 176
Verizon, Inc., 186
See also Sustain phase: training and
Video data, privacy protections for, 57
awareness
Video Privacy Protection Act (VPPA) of 1988, 58
Transparency, in data subject rights, 222–223
Virginia’s Consumer Data Protection Act
Trend analysis, 169–170
317
Privacy Program Management
W Y
Website scanning, 34 Yakabovicz, Edward, 141, 165, 300–301
WebTrust, 23 YouTube.com, 206
E
PL
M
SA
318