SlideShare ist ein Scribd-Unternehmen logo
1 von 31
Downloaden Sie, um offline zu lesen
OCTOBER 20, 2015
Cathy Nolan, Data Analyst
Ashley Wilson, Attorney
cnolan@allstate.com
wilsonsport17@gmail.com
 Corporate responsibilities for Personal Data
◦ Use secure handling and storage
◦ Tell users how data is being used
◦ No misrepresentation of uses of data
◦ Don’t use if adverse to user’s interests
without explicit consent.
◦ Honor commitments made
regarding handling of data
 Need to design Security from start of projects
◦ Less resource investment early in life-cycle
 Goals not the same for everyone
 Gaps between Builders and Defenders
◦ Put PII* security on “someone else”
Force Security through Compliance Reviews
*Personally Identifiable Information
 Builder
◦ Focus on delivering features
Speed to market
Security not a priority
Java and .net have most (perceived) security risks
 Defender
◦ Identify applications with PII information
◦ Fear of modifying production code
◦ Most concerned with public-facing aps
◦ Organizational silos between security and
application development
*Source HP
 Data Governance & Data Modelers uniquely
positioned to identify & safeguard PII data
◦ Work with Business & IT
◦ Have broad knowledge of company’s data
◦ Research & write the data definitions
 Need Buy-in of all stakeholders
◦ Continuing support
◦ Solicit feedback
 PII is a legal concept – not a technical concept
◦ Developers not equipped to classify PII data
It is the responsibility of every employee to
properly protect the personal data entrusted to
their organization.
Organizations need to have rules and processes
to decide how personal information is used
inside and outside the business.
 Sensitive data encompasses a wide range of
information and can include: your ethnic or
racial origin; political opinion; religious or
other similar beliefs; memberships; physical
or mental health details; personal life; or
criminal or civil offences. These examples of
information are protected by your civil rights.
Governance
Compliance
Risk
Ensure
Compliance
With Laws &
Regulations
Manage and
Control
Organization’s
Data
Identify, Monitor
& Mitigate Risks
Identify PII data pre-
database
implementation
Modeling
 Data Profiling
◦ Uncover sensitive data
◦ Determine where sensitive data is located
 Be Pro-active
◦ Look at older models
◦ Look for potential legal issues with data
 Help Define Data Masking Formats
◦ For testing, replace sensitive information with
realistic data based on masking rules.
 Data Modelers should be aware
 of laws concerning PII data
 Work with Data Governance to identify
where PII data is stored

Help Determine how long to keep data
◦ Business wants to keep data forever
◦ Risk the use in litigation
◦ Risk of old “sensitive” data in databases
 Organizations that do not model their data
….(have) data riddled with inconsistency and
misunderstanding. Ask any organization that
does not model their data if their data is
being governed. The sure answer will be “no”.
Robert Seiner
TDAN
 Recommend standards and procedures for
safeguarding personal data
 Partner with legal and IT to restrict
confidential and/or personal data
 Monitor compliance regulations and identify
exceptions
 Reconcile privacy and security issues
 Identify who has authority to make decisions
 Coach developers on privacy & security
 Data Profiling
◦ Uncovers sensitive data
◦ Determines where sensitive data is located
 Audit
◦ How many people have access to sensitive (internal)
data
◦ For what purpose?
◦ Who gives them access authority?
◦ Does the data leave the building?
PUBLIC
Will not harm organization
if data is available
internally or to the public
CONFIDENTIAL
Data available only to
authorized users
RESTRICTED
Could cause financial,
legal, regulatory or
reputational damage if
disclosed or compromised
TYPE OF DATA INFORMATION CATEGORY CLASSIFICATION
Age Personal Demographic Confidential
Customer Income Financial Confidential
Education Demographic Confidential
Weight Demographic Confidential
Truncated SSN Personal Identification Confidential
Telephone Number Contact (Personal) Confidential
Medical Test Results Medical Restricted
Date of Birth Personal Restricted
Driver's License Government Issued ID Restricted
Salary Financial Restricted
Passport Number Government Issued ID Restricted
License Plate Number Government Issued Restricted
Tribal ID Government Issued ID Restricted
Social Security Number Government Issued ID Restricted
Bank Account Number Financial Restricted
 Data Governance needs to be involved in RFP
◦ Does vendor’s data follow your organization’s
standards?
 Do they have data management & data governance?
 Will vendor share this information?
◦ Assess vendor’s security procedures
 Do they have a data security team?
 Do they have the technology to handle threats?
 Majority of Fortune 500 companies have
downloaded apps with known security
vulnerabilities
◦ Heartbleed, ShellShock, POODLE and FREAK
◦ National Vulnerability Database - SANS
 DG analysts don’t necessarily have to understand
the all the technical aspects but need to know
what to look out for when reviewing code
 Builders responsible for adding security into the
development life cycle
 In the US, there is no single, comprehensive
federal law regulating the collection & use of
personal data. The US has a patchwork of
federal & state laws, & regulations.
 Organizations often must decide between
conflicting compliance regulations
◦ Residence of Individual where PII was obtained
◦ Type of data collected
◦ How will data be used
 Written consent?
 FCRA - The Fair Credit Reporting Act
◦ Applies to consumer's creditworthiness, credit history, credit
capacity, character, and general reputation that is used to
evaluate a consumer's eligibility for credit or insurance.
 HIPAA – Health Insurance Portability &
Accountability Act
◦ Security Breach Notification Rule which requires covered entities
to provide notice of a breach of protected health information.
◦ 1.5 million fine by a health insurance company for alleged
violations of HIPAA privacy and security rules
 The House passed two information sharing
bills that would encourage voluntary sharing
of cyber threat information between
companies and the government, while
providing necessary privacy protections for
consumers and liability protection for
companies during the sharing process
 Personal Data Protection and Breach
Accountability Act of 2014 would require
business entities to do the following:
◦ Implement a comprehensive program that ensures
the privacy, security, & confidentiality of sensitive
PII
◦ Establish a federal security breach notification
procedure
 Data Broker Accountability & Transparency
Act
◦ Require data brokers to establish reasonable
procedures to ensure the accuracy of the personal
information it collects or maintains
◦ Provide consumers with the right to review data
collected by data brokers
◦ Require data brokers to offer consumers a
way to opt-out of having their personal
information shared for marketing purposes
 Data Security Law requires businesses to
implement and maintain reasonable security
procedures to protect personal information
from unauthorized access, destruction, use,
modification, or disclosure.
 Shine the Light law requires companies to
disclose details of the third parties with
whom they have shared their personal
information

Assess risks of future (data) security breaches

Help design a data privacy and security
program to control such risks

Decide how long to keep data
◦ Risk the use in litigation
◦ Risk of old “sensitive” data in databases
 Form a Task Force
◦ Speak with one voice
◦ Responsible for communication about Breach
 Internal – Data Governance, Security
 External –CIO, Legal, Public Relations
 Report Breach
◦ Customers
◦ Federal and/or State Agencies
 Look for other Potential Flaws
◦ Legacy data not updated?
◦ Sensitive data not encrypted?
◦ Data not secure on laptops taken out of building?
◦ Data not disposed of properly – shredded?
 Do an Honest Assessment of Breach
◦ What happened to cause the incident
 Incomplete developer training?
 Vendor Data introduced spyware?
 Theft of company data by insiders?
 Data Governance is key to Personal Data
Privacy and Security
 When dealing with PII:
◦ Proactively protect customer & employee data
◦ Preserve and enforce customer’s instructions
◦ Evaluate security and privacy risks
◦ Adopt rules for confidential & restricted data
◦ Assist risk management & compliance teams
 DG should insist on oversight of all
development phases
 Work with Risk Mgmt. to estimate
economic impact of breaches
 Coach developers on security
 Be Pro-active, don’t wait to be forced
to act
DAMA Webinar: The Data Governance of  Personal (PII) Data

Weitere ähnliche Inhalte

Was ist angesagt?

Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...DATUM LLC
 
GDPR: Threat or Opportunity?
GDPR: Threat or Opportunity?GDPR: Threat or Opportunity?
GDPR: Threat or Opportunity?Samuel Pouyt
 
GDPR Summit RDS May 2018 - DAMA VP Opening remarks and links to all presentat...
GDPR Summit RDS May 2018 - DAMA VP Opening remarks and links to all presentat...GDPR Summit RDS May 2018 - DAMA VP Opening remarks and links to all presentat...
GDPR Summit RDS May 2018 - DAMA VP Opening remarks and links to all presentat...DAMA Ireland
 
Safeguarding Your Brand With Secure IT Asset Disposition
Safeguarding Your Brand With Secure IT Asset DispositionSafeguarding Your Brand With Secure IT Asset Disposition
Safeguarding Your Brand With Secure IT Asset DispositionIron Mountain
 
Privacy Advisory Service
Privacy Advisory ServicePrivacy Advisory Service
Privacy Advisory ServiceIron Mountain
 
Sharp Cookie Advisors legal_botar_ai_dataskydd_gdpr
Sharp Cookie Advisors legal_botar_ai_dataskydd_gdprSharp Cookie Advisors legal_botar_ai_dataskydd_gdpr
Sharp Cookie Advisors legal_botar_ai_dataskydd_gdprSharp Cookie Advisors
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants- Mark - Fullbright
 
Build Your Foundation: Strategies and Tools for Managing Retention and Person...
Build Your Foundation: Strategies and Tools for Managing Retention and Person...Build Your Foundation: Strategies and Tools for Managing Retention and Person...
Build Your Foundation: Strategies and Tools for Managing Retention and Person...Iron Mountain
 
Where in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva incWhere in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva incDruva
 
Practical steps to GDPR compliance
Practical steps to GDPR compliance Practical steps to GDPR compliance
Practical steps to GDPR compliance Jean-Michel Franco
 
Driving Digital Transformation
Driving Digital TransformationDriving Digital Transformation
Driving Digital TransformationIron Mountain
 
An Introduction to the General Data Protection Regulation (GDPR)
An Introduction to the General Data Protection Regulation (GDPR)An Introduction to the General Data Protection Regulation (GDPR)
An Introduction to the General Data Protection Regulation (GDPR)Bright
 
Data privacy and security in uae
Data privacy and security in uaeData privacy and security in uae
Data privacy and security in uaeRishalHalid1
 
Beginning your General Data Protection Regulation (GDPR) Journey
Beginning your General Data Protection Regulation (GDPR) JourneyBeginning your General Data Protection Regulation (GDPR) Journey
Beginning your General Data Protection Regulation (GDPR) JourneyMicrosoft Österreich
 
Data Discovery & Search: Making it an Integral Part of Analytics, Compliance ...
Data Discovery & Search: Making it an Integral Part of Analytics, Compliance ...Data Discovery & Search: Making it an Integral Part of Analytics, Compliance ...
Data Discovery & Search: Making it an Integral Part of Analytics, Compliance ...DATUM LLC
 
Big Data: Beyond the Hype - Why Big Data Matters to You
Big Data: Beyond the Hype - Why Big Data Matters to YouBig Data: Beyond the Hype - Why Big Data Matters to You
Big Data: Beyond the Hype - Why Big Data Matters to YouDATAVERSITY
 
How to Integrate Data and Protect Privacy
How to Integrate Data and Protect PrivacyHow to Integrate Data and Protect Privacy
How to Integrate Data and Protect PrivacyDATAVERSITY
 
Getting Your House in Order: Cost-effective Litigation Readiness
Getting Your House in Order: Cost-effective Litigation ReadinessGetting Your House in Order: Cost-effective Litigation Readiness
Getting Your House in Order: Cost-effective Litigation ReadinessIron Mountain
 
Using GDPR to Transform Customer Experience
Using GDPR to Transform Customer ExperienceUsing GDPR to Transform Customer Experience
Using GDPR to Transform Customer ExperienceMongoDB
 
Geek Sync | Tackling Key GDPR Challenges with Data Modeling and Governance
Geek Sync | Tackling Key GDPR Challenges with Data Modeling and GovernanceGeek Sync | Tackling Key GDPR Challenges with Data Modeling and Governance
Geek Sync | Tackling Key GDPR Challenges with Data Modeling and GovernanceIDERA Software
 

Was ist angesagt? (20)

Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...
 
GDPR: Threat or Opportunity?
GDPR: Threat or Opportunity?GDPR: Threat or Opportunity?
GDPR: Threat or Opportunity?
 
GDPR Summit RDS May 2018 - DAMA VP Opening remarks and links to all presentat...
GDPR Summit RDS May 2018 - DAMA VP Opening remarks and links to all presentat...GDPR Summit RDS May 2018 - DAMA VP Opening remarks and links to all presentat...
GDPR Summit RDS May 2018 - DAMA VP Opening remarks and links to all presentat...
 
Safeguarding Your Brand With Secure IT Asset Disposition
Safeguarding Your Brand With Secure IT Asset DispositionSafeguarding Your Brand With Secure IT Asset Disposition
Safeguarding Your Brand With Secure IT Asset Disposition
 
Privacy Advisory Service
Privacy Advisory ServicePrivacy Advisory Service
Privacy Advisory Service
 
Sharp Cookie Advisors legal_botar_ai_dataskydd_gdpr
Sharp Cookie Advisors legal_botar_ai_dataskydd_gdprSharp Cookie Advisors legal_botar_ai_dataskydd_gdpr
Sharp Cookie Advisors legal_botar_ai_dataskydd_gdpr
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
 
Build Your Foundation: Strategies and Tools for Managing Retention and Person...
Build Your Foundation: Strategies and Tools for Managing Retention and Person...Build Your Foundation: Strategies and Tools for Managing Retention and Person...
Build Your Foundation: Strategies and Tools for Managing Retention and Person...
 
Where in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva incWhere in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva inc
 
Practical steps to GDPR compliance
Practical steps to GDPR compliance Practical steps to GDPR compliance
Practical steps to GDPR compliance
 
Driving Digital Transformation
Driving Digital TransformationDriving Digital Transformation
Driving Digital Transformation
 
An Introduction to the General Data Protection Regulation (GDPR)
An Introduction to the General Data Protection Regulation (GDPR)An Introduction to the General Data Protection Regulation (GDPR)
An Introduction to the General Data Protection Regulation (GDPR)
 
Data privacy and security in uae
Data privacy and security in uaeData privacy and security in uae
Data privacy and security in uae
 
Beginning your General Data Protection Regulation (GDPR) Journey
Beginning your General Data Protection Regulation (GDPR) JourneyBeginning your General Data Protection Regulation (GDPR) Journey
Beginning your General Data Protection Regulation (GDPR) Journey
 
Data Discovery & Search: Making it an Integral Part of Analytics, Compliance ...
Data Discovery & Search: Making it an Integral Part of Analytics, Compliance ...Data Discovery & Search: Making it an Integral Part of Analytics, Compliance ...
Data Discovery & Search: Making it an Integral Part of Analytics, Compliance ...
 
Big Data: Beyond the Hype - Why Big Data Matters to You
Big Data: Beyond the Hype - Why Big Data Matters to YouBig Data: Beyond the Hype - Why Big Data Matters to You
Big Data: Beyond the Hype - Why Big Data Matters to You
 
How to Integrate Data and Protect Privacy
How to Integrate Data and Protect PrivacyHow to Integrate Data and Protect Privacy
How to Integrate Data and Protect Privacy
 
Getting Your House in Order: Cost-effective Litigation Readiness
Getting Your House in Order: Cost-effective Litigation ReadinessGetting Your House in Order: Cost-effective Litigation Readiness
Getting Your House in Order: Cost-effective Litigation Readiness
 
Using GDPR to Transform Customer Experience
Using GDPR to Transform Customer ExperienceUsing GDPR to Transform Customer Experience
Using GDPR to Transform Customer Experience
 
Geek Sync | Tackling Key GDPR Challenges with Data Modeling and Governance
Geek Sync | Tackling Key GDPR Challenges with Data Modeling and GovernanceGeek Sync | Tackling Key GDPR Challenges with Data Modeling and Governance
Geek Sync | Tackling Key GDPR Challenges with Data Modeling and Governance
 

Andere mochten auch

Privacy & Security: The New Drivers of Brand, Reputation and Action
Privacy & Security: The New Drivers of Brand, Reputation and ActionPrivacy & Security: The New Drivers of Brand, Reputation and Action
Privacy & Security: The New Drivers of Brand, Reputation and ActionEdelman
 
Importance of Data Mining
Importance of Data MiningImportance of Data Mining
Importance of Data MiningScottperrone
 
Aivanhov, omraam mikhael a primi si a darui
Aivanhov, omraam mikhael   a primi si a daruiAivanhov, omraam mikhael   a primi si a darui
Aivanhov, omraam mikhael a primi si a daruiPascu Otilia
 
Arash Arabi - A guide to multi-organisational distributed scrum
Arash Arabi - A guide to multi-organisational distributed scrumArash Arabi - A guide to multi-organisational distributed scrum
Arash Arabi - A guide to multi-organisational distributed scrumScrum Australia Pty Ltd
 
Mainstreaming Green: The 9 Rules For Popularizing Purpose With Today's Consumer.
Mainstreaming Green: The 9 Rules For Popularizing Purpose With Today's Consumer.Mainstreaming Green: The 9 Rules For Popularizing Purpose With Today's Consumer.
Mainstreaming Green: The 9 Rules For Popularizing Purpose With Today's Consumer.North Venture Partners
 
Aigüestortes i estany de sant maurici núria a
Aigüestortes i estany de sant maurici núria aAigüestortes i estany de sant maurici núria a
Aigüestortes i estany de sant maurici núria aannarusinol30
 
London Hashicorp Meetup (8th Mar 2016)
London Hashicorp Meetup (8th Mar 2016)London Hashicorp Meetup (8th Mar 2016)
London Hashicorp Meetup (8th Mar 2016)Brett Mack
 
The Power of One by Steve Molis
The Power of One by Steve MolisThe Power of One by Steve Molis
The Power of One by Steve MolisSalesforce Admins
 
Microsoft word applications (edcp 610)
Microsoft word applications (edcp 610)Microsoft word applications (edcp 610)
Microsoft word applications (edcp 610)cstrelow
 
Presentación sobre Blog
Presentación sobre BlogPresentación sobre Blog
Presentación sobre Blogguest20abada4
 
Pencil Shavings: 4Q14 GPC, Beijing
Pencil Shavings: 4Q14 GPC, BeijingPencil Shavings: 4Q14 GPC, Beijing
Pencil Shavings: 4Q14 GPC, BeijingLeo Burnett
 
Making The Case For Local Search Optimization
Making The Case For Local Search OptimizationMaking The Case For Local Search Optimization
Making The Case For Local Search OptimizationJonathon Colman
 
75 frases de Rumi
75 frases de Rumi75 frases de Rumi
75 frases de RumiAna Sek
 
Վիքիպեդիան և մենք
Վիքիպեդիան և մենքՎիքիպեդիան և մենք
Վիքիպեդիան և մենքVachagan Gratian
 
Toronto Society of Architects 2013 Yearbook
Toronto Society of Architects 2013 YearbookToronto Society of Architects 2013 Yearbook
Toronto Society of Architects 2013 Yearbooktosoarch
 
Lista de-precios-compugreiff-agosto-31-2012
Lista de-precios-compugreiff-agosto-31-2012Lista de-precios-compugreiff-agosto-31-2012
Lista de-precios-compugreiff-agosto-31-2012xxxxx
 

Andere mochten auch (18)

Privacy & Security: The New Drivers of Brand, Reputation and Action
Privacy & Security: The New Drivers of Brand, Reputation and ActionPrivacy & Security: The New Drivers of Brand, Reputation and Action
Privacy & Security: The New Drivers of Brand, Reputation and Action
 
Importance of Data Mining
Importance of Data MiningImportance of Data Mining
Importance of Data Mining
 
Aivanhov, omraam mikhael a primi si a darui
Aivanhov, omraam mikhael   a primi si a daruiAivanhov, omraam mikhael   a primi si a darui
Aivanhov, omraam mikhael a primi si a darui
 
Arash Arabi - A guide to multi-organisational distributed scrum
Arash Arabi - A guide to multi-organisational distributed scrumArash Arabi - A guide to multi-organisational distributed scrum
Arash Arabi - A guide to multi-organisational distributed scrum
 
Mainstreaming Green: The 9 Rules For Popularizing Purpose With Today's Consumer.
Mainstreaming Green: The 9 Rules For Popularizing Purpose With Today's Consumer.Mainstreaming Green: The 9 Rules For Popularizing Purpose With Today's Consumer.
Mainstreaming Green: The 9 Rules For Popularizing Purpose With Today's Consumer.
 
Aigüestortes i estany de sant maurici núria a
Aigüestortes i estany de sant maurici núria aAigüestortes i estany de sant maurici núria a
Aigüestortes i estany de sant maurici núria a
 
London Hashicorp Meetup (8th Mar 2016)
London Hashicorp Meetup (8th Mar 2016)London Hashicorp Meetup (8th Mar 2016)
London Hashicorp Meetup (8th Mar 2016)
 
Zaragoza turismo 197
Zaragoza turismo 197Zaragoza turismo 197
Zaragoza turismo 197
 
The Power of One by Steve Molis
The Power of One by Steve MolisThe Power of One by Steve Molis
The Power of One by Steve Molis
 
Microsoft word applications (edcp 610)
Microsoft word applications (edcp 610)Microsoft word applications (edcp 610)
Microsoft word applications (edcp 610)
 
Presentación sobre Blog
Presentación sobre BlogPresentación sobre Blog
Presentación sobre Blog
 
Sound design
Sound designSound design
Sound design
 
Pencil Shavings: 4Q14 GPC, Beijing
Pencil Shavings: 4Q14 GPC, BeijingPencil Shavings: 4Q14 GPC, Beijing
Pencil Shavings: 4Q14 GPC, Beijing
 
Making The Case For Local Search Optimization
Making The Case For Local Search OptimizationMaking The Case For Local Search Optimization
Making The Case For Local Search Optimization
 
75 frases de Rumi
75 frases de Rumi75 frases de Rumi
75 frases de Rumi
 
Վիքիպեդիան և մենք
Վիքիպեդիան և մենքՎիքիպեդիան և մենք
Վիքիպեդիան և մենք
 
Toronto Society of Architects 2013 Yearbook
Toronto Society of Architects 2013 YearbookToronto Society of Architects 2013 Yearbook
Toronto Society of Architects 2013 Yearbook
 
Lista de-precios-compugreiff-agosto-31-2012
Lista de-precios-compugreiff-agosto-31-2012Lista de-precios-compugreiff-agosto-31-2012
Lista de-precios-compugreiff-agosto-31-2012
 

Ähnlich wie DAMA Webinar: The Data Governance of Personal (PII) Data

Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response PlanNext Dimension Inc.
 
Closing the Governance Gap - Enabling Governed Self-Service Analytics
Closing the Governance Gap  - Enabling Governed Self-Service AnalyticsClosing the Governance Gap  - Enabling Governed Self-Service Analytics
Closing the Governance Gap - Enabling Governed Self-Service AnalyticsPrivacera
 
How to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security ProgramHow to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security ProgramFinancial Poise
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptxRavindra Babu
 
2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?Raffa Learning Community
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsFinancial Poise
 
Internet security and privacy issues
Internet security and privacy issuesInternet security and privacy issues
Internet security and privacy issuesJagdeepSingh394
 
Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security ProgramRaymond Cunningham
 
The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law Owako Rodah
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachJim Brashear
 
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgePerficient, Inc.
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Financial Poise
 
2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA ComplianceRaffa Learning Community
 
Hivos and Responsible Data
Hivos and Responsible DataHivos and Responsible Data
Hivos and Responsible DataTom Walker
 
Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Druva
 
2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?Raffa Learning Community
 
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdfData Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdfCIOWomenMagazine
 

Ähnlich wie DAMA Webinar: The Data Governance of Personal (PII) Data (20)

Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response Plan
 
Closing the Governance Gap - Enabling Governed Self-Service Analytics
Closing the Governance Gap  - Enabling Governed Self-Service AnalyticsClosing the Governance Gap  - Enabling Governed Self-Service Analytics
Closing the Governance Gap - Enabling Governed Self-Service Analytics
 
How to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security ProgramHow to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security Program
 
Protecting Donor Privacy
Protecting Donor PrivacyProtecting Donor Privacy
Protecting Donor Privacy
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptx
 
2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and Requirements
 
Internet security and privacy issues
Internet security and privacy issuesInternet security and privacy issues
Internet security and privacy issues
 
Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security Program
 
The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data Breach
 
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
 
2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance
 
Hivos and Responsible Data
Hivos and Responsible DataHivos and Responsible Data
Hivos and Responsible Data
 
CDP_Engagement_Team_Training_BRADESCO.pdf
CDP_Engagement_Team_Training_BRADESCO.pdfCDP_Engagement_Team_Training_BRADESCO.pdf
CDP_Engagement_Team_Training_BRADESCO.pdf
 
Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?
 
2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?
 
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdfData Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
 
Data Privacy Compliance
Data Privacy ComplianceData Privacy Compliance
Data Privacy Compliance
 

Mehr von DATAVERSITY

Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...
Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...
Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...DATAVERSITY
 
Data at the Speed of Business with Data Mastering and Governance
Data at the Speed of Business with Data Mastering and GovernanceData at the Speed of Business with Data Mastering and Governance
Data at the Speed of Business with Data Mastering and GovernanceDATAVERSITY
 
Exploring Levels of Data Literacy
Exploring Levels of Data LiteracyExploring Levels of Data Literacy
Exploring Levels of Data LiteracyDATAVERSITY
 
Building a Data Strategy – Practical Steps for Aligning with Business Goals
Building a Data Strategy – Practical Steps for Aligning with Business GoalsBuilding a Data Strategy – Practical Steps for Aligning with Business Goals
Building a Data Strategy – Practical Steps for Aligning with Business GoalsDATAVERSITY
 
Make Data Work for You
Make Data Work for YouMake Data Work for You
Make Data Work for YouDATAVERSITY
 
Data Catalogs Are the Answer – What is the Question?
Data Catalogs Are the Answer – What is the Question?Data Catalogs Are the Answer – What is the Question?
Data Catalogs Are the Answer – What is the Question?DATAVERSITY
 
Data Catalogs Are the Answer – What Is the Question?
Data Catalogs Are the Answer – What Is the Question?Data Catalogs Are the Answer – What Is the Question?
Data Catalogs Are the Answer – What Is the Question?DATAVERSITY
 
Data Modeling Fundamentals
Data Modeling FundamentalsData Modeling Fundamentals
Data Modeling FundamentalsDATAVERSITY
 
Showing ROI for Your Analytic Project
Showing ROI for Your Analytic ProjectShowing ROI for Your Analytic Project
Showing ROI for Your Analytic ProjectDATAVERSITY
 
How a Semantic Layer Makes Data Mesh Work at Scale
How a Semantic Layer Makes  Data Mesh Work at ScaleHow a Semantic Layer Makes  Data Mesh Work at Scale
How a Semantic Layer Makes Data Mesh Work at ScaleDATAVERSITY
 
Is Enterprise Data Literacy Possible?
Is Enterprise Data Literacy Possible?Is Enterprise Data Literacy Possible?
Is Enterprise Data Literacy Possible?DATAVERSITY
 
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...DATAVERSITY
 
Emerging Trends in Data Architecture – What’s the Next Big Thing?
Emerging Trends in Data Architecture – What’s the Next Big Thing?Emerging Trends in Data Architecture – What’s the Next Big Thing?
Emerging Trends in Data Architecture – What’s the Next Big Thing?DATAVERSITY
 
Data Governance Trends - A Look Backwards and Forwards
Data Governance Trends - A Look Backwards and ForwardsData Governance Trends - A Look Backwards and Forwards
Data Governance Trends - A Look Backwards and ForwardsDATAVERSITY
 
Data Governance Trends and Best Practices To Implement Today
Data Governance Trends and Best Practices To Implement TodayData Governance Trends and Best Practices To Implement Today
Data Governance Trends and Best Practices To Implement TodayDATAVERSITY
 
2023 Trends in Enterprise Analytics
2023 Trends in Enterprise Analytics2023 Trends in Enterprise Analytics
2023 Trends in Enterprise AnalyticsDATAVERSITY
 
Data Strategy Best Practices
Data Strategy Best PracticesData Strategy Best Practices
Data Strategy Best PracticesDATAVERSITY
 
Who Should Own Data Governance – IT or Business?
Who Should Own Data Governance – IT or Business?Who Should Own Data Governance – IT or Business?
Who Should Own Data Governance – IT or Business?DATAVERSITY
 
Data Management Best Practices
Data Management Best PracticesData Management Best Practices
Data Management Best PracticesDATAVERSITY
 
MLOps – Applying DevOps to Competitive Advantage
MLOps – Applying DevOps to Competitive AdvantageMLOps – Applying DevOps to Competitive Advantage
MLOps – Applying DevOps to Competitive AdvantageDATAVERSITY
 

Mehr von DATAVERSITY (20)

Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...
Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...
Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...
 
Data at the Speed of Business with Data Mastering and Governance
Data at the Speed of Business with Data Mastering and GovernanceData at the Speed of Business with Data Mastering and Governance
Data at the Speed of Business with Data Mastering and Governance
 
Exploring Levels of Data Literacy
Exploring Levels of Data LiteracyExploring Levels of Data Literacy
Exploring Levels of Data Literacy
 
Building a Data Strategy – Practical Steps for Aligning with Business Goals
Building a Data Strategy – Practical Steps for Aligning with Business GoalsBuilding a Data Strategy – Practical Steps for Aligning with Business Goals
Building a Data Strategy – Practical Steps for Aligning with Business Goals
 
Make Data Work for You
Make Data Work for YouMake Data Work for You
Make Data Work for You
 
Data Catalogs Are the Answer – What is the Question?
Data Catalogs Are the Answer – What is the Question?Data Catalogs Are the Answer – What is the Question?
Data Catalogs Are the Answer – What is the Question?
 
Data Catalogs Are the Answer – What Is the Question?
Data Catalogs Are the Answer – What Is the Question?Data Catalogs Are the Answer – What Is the Question?
Data Catalogs Are the Answer – What Is the Question?
 
Data Modeling Fundamentals
Data Modeling FundamentalsData Modeling Fundamentals
Data Modeling Fundamentals
 
Showing ROI for Your Analytic Project
Showing ROI for Your Analytic ProjectShowing ROI for Your Analytic Project
Showing ROI for Your Analytic Project
 
How a Semantic Layer Makes Data Mesh Work at Scale
How a Semantic Layer Makes  Data Mesh Work at ScaleHow a Semantic Layer Makes  Data Mesh Work at Scale
How a Semantic Layer Makes Data Mesh Work at Scale
 
Is Enterprise Data Literacy Possible?
Is Enterprise Data Literacy Possible?Is Enterprise Data Literacy Possible?
Is Enterprise Data Literacy Possible?
 
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
 
Emerging Trends in Data Architecture – What’s the Next Big Thing?
Emerging Trends in Data Architecture – What’s the Next Big Thing?Emerging Trends in Data Architecture – What’s the Next Big Thing?
Emerging Trends in Data Architecture – What’s the Next Big Thing?
 
Data Governance Trends - A Look Backwards and Forwards
Data Governance Trends - A Look Backwards and ForwardsData Governance Trends - A Look Backwards and Forwards
Data Governance Trends - A Look Backwards and Forwards
 
Data Governance Trends and Best Practices To Implement Today
Data Governance Trends and Best Practices To Implement TodayData Governance Trends and Best Practices To Implement Today
Data Governance Trends and Best Practices To Implement Today
 
2023 Trends in Enterprise Analytics
2023 Trends in Enterprise Analytics2023 Trends in Enterprise Analytics
2023 Trends in Enterprise Analytics
 
Data Strategy Best Practices
Data Strategy Best PracticesData Strategy Best Practices
Data Strategy Best Practices
 
Who Should Own Data Governance – IT or Business?
Who Should Own Data Governance – IT or Business?Who Should Own Data Governance – IT or Business?
Who Should Own Data Governance – IT or Business?
 
Data Management Best Practices
Data Management Best PracticesData Management Best Practices
Data Management Best Practices
 
MLOps – Applying DevOps to Competitive Advantage
MLOps – Applying DevOps to Competitive AdvantageMLOps – Applying DevOps to Competitive Advantage
MLOps – Applying DevOps to Competitive Advantage
 

Kürzlich hochgeladen

The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...Operational Excellence Consulting
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxappkodes
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...ssuserf63bd7
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdfChris Skinner
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdfChris Skinner
 
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...ssuserf63bd7
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers referencessuser2c065e
 
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxShruti Mittal
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerAggregage
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfJamesConcepcion7
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOne Monitar
 
Send Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSendBig4
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckHajeJanKamps
 
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...Associazione Digital Days
 

Kürzlich hochgeladen (20)

The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptx
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors Data
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf
 
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers reference
 
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptx
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon Harmer
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdf
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
 
Send Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.com
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deck
 
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
 

DAMA Webinar: The Data Governance of Personal (PII) Data

  • 2. Cathy Nolan, Data Analyst Ashley Wilson, Attorney cnolan@allstate.com wilsonsport17@gmail.com
  • 3.  Corporate responsibilities for Personal Data ◦ Use secure handling and storage ◦ Tell users how data is being used ◦ No misrepresentation of uses of data ◦ Don’t use if adverse to user’s interests without explicit consent. ◦ Honor commitments made regarding handling of data
  • 4.  Need to design Security from start of projects ◦ Less resource investment early in life-cycle  Goals not the same for everyone  Gaps between Builders and Defenders ◦ Put PII* security on “someone else” Force Security through Compliance Reviews *Personally Identifiable Information
  • 5.  Builder ◦ Focus on delivering features Speed to market Security not a priority Java and .net have most (perceived) security risks  Defender ◦ Identify applications with PII information ◦ Fear of modifying production code ◦ Most concerned with public-facing aps ◦ Organizational silos between security and application development *Source HP
  • 6.  Data Governance & Data Modelers uniquely positioned to identify & safeguard PII data ◦ Work with Business & IT ◦ Have broad knowledge of company’s data ◦ Research & write the data definitions  Need Buy-in of all stakeholders ◦ Continuing support ◦ Solicit feedback  PII is a legal concept – not a technical concept ◦ Developers not equipped to classify PII data
  • 7. It is the responsibility of every employee to properly protect the personal data entrusted to their organization. Organizations need to have rules and processes to decide how personal information is used inside and outside the business.
  • 8.  Sensitive data encompasses a wide range of information and can include: your ethnic or racial origin; political opinion; religious or other similar beliefs; memberships; physical or mental health details; personal life; or criminal or civil offences. These examples of information are protected by your civil rights.
  • 9. Governance Compliance Risk Ensure Compliance With Laws & Regulations Manage and Control Organization’s Data Identify, Monitor & Mitigate Risks Identify PII data pre- database implementation Modeling
  • 10.  Data Profiling ◦ Uncover sensitive data ◦ Determine where sensitive data is located  Be Pro-active ◦ Look at older models ◦ Look for potential legal issues with data  Help Define Data Masking Formats ◦ For testing, replace sensitive information with realistic data based on masking rules.
  • 11.  Data Modelers should be aware  of laws concerning PII data  Work with Data Governance to identify where PII data is stored  Help Determine how long to keep data ◦ Business wants to keep data forever ◦ Risk the use in litigation ◦ Risk of old “sensitive” data in databases
  • 12.  Organizations that do not model their data ….(have) data riddled with inconsistency and misunderstanding. Ask any organization that does not model their data if their data is being governed. The sure answer will be “no”. Robert Seiner TDAN
  • 13.  Recommend standards and procedures for safeguarding personal data  Partner with legal and IT to restrict confidential and/or personal data  Monitor compliance regulations and identify exceptions  Reconcile privacy and security issues  Identify who has authority to make decisions  Coach developers on privacy & security
  • 14.  Data Profiling ◦ Uncovers sensitive data ◦ Determines where sensitive data is located  Audit ◦ How many people have access to sensitive (internal) data ◦ For what purpose? ◦ Who gives them access authority? ◦ Does the data leave the building?
  • 15. PUBLIC Will not harm organization if data is available internally or to the public CONFIDENTIAL Data available only to authorized users RESTRICTED Could cause financial, legal, regulatory or reputational damage if disclosed or compromised
  • 16. TYPE OF DATA INFORMATION CATEGORY CLASSIFICATION Age Personal Demographic Confidential Customer Income Financial Confidential Education Demographic Confidential Weight Demographic Confidential Truncated SSN Personal Identification Confidential Telephone Number Contact (Personal) Confidential Medical Test Results Medical Restricted Date of Birth Personal Restricted Driver's License Government Issued ID Restricted Salary Financial Restricted Passport Number Government Issued ID Restricted License Plate Number Government Issued Restricted Tribal ID Government Issued ID Restricted Social Security Number Government Issued ID Restricted Bank Account Number Financial Restricted
  • 17.
  • 18.  Data Governance needs to be involved in RFP ◦ Does vendor’s data follow your organization’s standards?  Do they have data management & data governance?  Will vendor share this information? ◦ Assess vendor’s security procedures  Do they have a data security team?  Do they have the technology to handle threats?
  • 19.  Majority of Fortune 500 companies have downloaded apps with known security vulnerabilities ◦ Heartbleed, ShellShock, POODLE and FREAK ◦ National Vulnerability Database - SANS  DG analysts don’t necessarily have to understand the all the technical aspects but need to know what to look out for when reviewing code  Builders responsible for adding security into the development life cycle
  • 20.  In the US, there is no single, comprehensive federal law regulating the collection & use of personal data. The US has a patchwork of federal & state laws, & regulations.  Organizations often must decide between conflicting compliance regulations ◦ Residence of Individual where PII was obtained ◦ Type of data collected ◦ How will data be used  Written consent?
  • 21.  FCRA - The Fair Credit Reporting Act ◦ Applies to consumer's creditworthiness, credit history, credit capacity, character, and general reputation that is used to evaluate a consumer's eligibility for credit or insurance.  HIPAA – Health Insurance Portability & Accountability Act ◦ Security Breach Notification Rule which requires covered entities to provide notice of a breach of protected health information. ◦ 1.5 million fine by a health insurance company for alleged violations of HIPAA privacy and security rules
  • 22.  The House passed two information sharing bills that would encourage voluntary sharing of cyber threat information between companies and the government, while providing necessary privacy protections for consumers and liability protection for companies during the sharing process
  • 23.  Personal Data Protection and Breach Accountability Act of 2014 would require business entities to do the following: ◦ Implement a comprehensive program that ensures the privacy, security, & confidentiality of sensitive PII ◦ Establish a federal security breach notification procedure
  • 24.  Data Broker Accountability & Transparency Act ◦ Require data brokers to establish reasonable procedures to ensure the accuracy of the personal information it collects or maintains ◦ Provide consumers with the right to review data collected by data brokers ◦ Require data brokers to offer consumers a way to opt-out of having their personal information shared for marketing purposes
  • 25.  Data Security Law requires businesses to implement and maintain reasonable security procedures to protect personal information from unauthorized access, destruction, use, modification, or disclosure.  Shine the Light law requires companies to disclose details of the third parties with whom they have shared their personal information
  • 26.  Assess risks of future (data) security breaches  Help design a data privacy and security program to control such risks  Decide how long to keep data ◦ Risk the use in litigation ◦ Risk of old “sensitive” data in databases
  • 27.  Form a Task Force ◦ Speak with one voice ◦ Responsible for communication about Breach  Internal – Data Governance, Security  External –CIO, Legal, Public Relations  Report Breach ◦ Customers ◦ Federal and/or State Agencies
  • 28.  Look for other Potential Flaws ◦ Legacy data not updated? ◦ Sensitive data not encrypted? ◦ Data not secure on laptops taken out of building? ◦ Data not disposed of properly – shredded?  Do an Honest Assessment of Breach ◦ What happened to cause the incident  Incomplete developer training?  Vendor Data introduced spyware?  Theft of company data by insiders?
  • 29.  Data Governance is key to Personal Data Privacy and Security  When dealing with PII: ◦ Proactively protect customer & employee data ◦ Preserve and enforce customer’s instructions ◦ Evaluate security and privacy risks ◦ Adopt rules for confidential & restricted data ◦ Assist risk management & compliance teams
  • 30.  DG should insist on oversight of all development phases  Work with Risk Mgmt. to estimate economic impact of breaches  Coach developers on security  Be Pro-active, don’t wait to be forced to act