Logo Passei Direto
Buscar
Material
páginas com resultados encontrados.
páginas com resultados encontrados.

Prévia do material em texto

©2022, International Association of Privacy Professionals, Inc. (IAPP) 
 
 
 
 
 PRIVACY IN TECHNOLOGY 
ONLINE TRAINING TRANSCRIPT 
MODULE 2: THE ROLE OF THE TECHNOLOGY PROFESSIONAL IN PRIVACY 
 
Introduction 
Introduction 
More and more our physical lives are merging with our digital ones. Our world is increasingly reliant on 
and held in an electronic format of some kind: as consumers, employees, students, patients, social media 
users or web surfers. Often our personal information is collected even when we are not actively 
participating. While more laws that aim to protect personal information are constantly emerging, 
expectations around privacy often go beyond what the law allows or what a company may state in its 
privacy notice. Privacy technologists are challenged with looking at their technology ecosystems through a 
privacy lens and designing systems that protect and preserve personal information. 
For an organization to establish a culture of trust and integrity, it must begin by setting forth a solid 
foundation that carefully considers the needs and values of the individuals whose information it holds. The 
policies an organization has in place and the processes by which it executes those policies should support 
that foundation. Module 2 looks at the privacy components of an organization and the role of privacy 
technologists within the technology ecosystem. 
 
Fundamentals of privacy-related IT 
Learning objective 
• Summarize the fundamentals of privacy-related technology 
Privacy notices 
A privacy notice is an external instrument published by an organization’s IT team that informs consumers, 
suppliers, business partners and individuals about the organization’s information privacy practices, values 
and commitments. Organizations must determine when to notify users of their agreement, for example, as 
soon as one enters the website, or prior to the collection of any personal information. Additionally, an 
organization’s IT team can communicate these notices using different methods depending on the type of 
information or services they are providing. Examples include requiring users to check a box indicating 
agreement to the privacy notice before entering the site or purchasing a product, or simply posting a 
conspicuous link to the privacy notice on the website. Prior to design, organizations must be aware of any 
legal and industry requirements regarding privacy notices as well as consumers’ expectations of the 
handling of their personal information. 
Privacy policies 
 
©2022, International Association of Privacy Professionals, Inc. (IAPP) 
A privacy policy is different than a privacy notice. We have discussed that privacy notices are external 
communications used to inform outside parties about an organization’s use of personal information. In 
contrast, privacy policies are internal statements designed to communicate best privacy practices and 
what information handling guidelines to follow, and when, for those within an organization. Policies 
address privacy and security, data management and data loss prevention. Privacy policies should be 
documented, easily accessible, and kept up-to-date, and all employees should be familiar with them. It is 
also important that these policies are endorsed and enforced by management and executives of the 
company. Designing internal policies is an integral part of preventing the loss or misuse of sensitive data. 
Security policies 
Adequate privacy protection of personal information is contingent on the quality of an internal security 
policy. A well-functioning internal security policy prevents unauthorized or unnecessary access to 
corporate data or resources—including intellectual property, financial data and personal information. 
Physical security measures, such as locks, safes, cameras and fences, offer further protections from both 
internal and external threats. Organizations should consider going beyond their minimal requirements for 
security, as consumer expectations dictate. Well-managed processes raise customer satisfaction and build 
consumer trust. Technical controls that secure company data will be discussed in greater depth in module 
4. 
Examine the ways in which measures are put in place to secure data. 
Data classification policies: Policies need to be established and enforced for both granting and 
revoking access to assets and information according to their classification. Employees that handle 
sensitive data should have their own user accounts that are secured by authentication 
mechanisms. These accounts should only be used to perform the user’s specific job functions. 
Data schema: A data schema is used to separate customer information. It formulates all the 
constraints to be applied on the data, defines its entities and the relationships among them. Access 
to database schemas are only available to those who need to see the information. For example, 
purchase history can be separated from personal information. Access to personal information may 
require a specific customer ID. 
Data retention: Laws and regulations may require data to be stored for a specific amount of time. 
Establish data retention schedules early in the system development life cycle. Backup storage 
devices must also be considered. Remove data on a periodic basis when older data is no longer of 
use toward a business’s objectives. 
Data deletion: When data is no longer needed, remove data and any derivatives from the system, 
ensuring that recovery methods are also removed. 
Data inventories (1) 
Keeping an inventory of data, helps to protect privacy adequately. This means knowing what data is 
collected, how it is handled, where it is stored, and how it is classified. Knowledge of data and its 
characteristics is a key part of the privacy technologist’s job. Data should be regularly monitored and 
inventoried, and device upgrades and updates should also be performed as necessary. This includes 
software updates, security patches or even replacing obsolete technology. 
Data inventories (2) 
Analyzing and interpreting data so that it can be classified and organized into information categories is an 
essential step. Common categories take the form of information assets, physical assets and intellectual 
property. Assets are then classified as confidential, internal use or public. Classifying and categorizing data 
enables an organization to properly manage and protect the assets in its possession. It can then assign 
owners to specific classifications of assets. Select each for a brief definition. 
 
©2022, International Association of Privacy Professionals, Inc. (IAPP) 
Types of assets 
Information assets: Customer and employee data as well as backup copies of data stored 
either on-site or off-site 
Physical assets: Servers, workstations, laptops, portable storage devices, backup media, 
paper files 
Intellectual property: Software code, trade secrets, brand 
Asset classifications 
Confidential: Information that should remain secure and private: customer information, 
employee Social Security numbers, payment account information 
Internal use: Business information intended for internal use only: company contact 
directories, business plans, sales forecasts, proprietary software codes 
Public: Information that can be safely shared with the public: physical address, marketing 
materials, customer service information 
Contracts and agreements 
When collected data is shared with third-party vendors, it should be handled in accordance with the 
commitments made to the data subject and data owner regardless of where their personal information is 
located or how it is used. Third-party contracts should be detailed with clear expectations of how data is to 
be managed while in their possession as well as the roles and responsibilities of vendors. Often 
organizations have obligations to specific compliance regulations that must beincluded in third-party 
contracts. For example, under the GDPR there are a specific set of guidelines that must be adhered to 
when issuing third-party contracts. It should also be made clear that the organization can perform audits 
on third-party vendors to ensure compliance. Penalties for breach of contract by a third-party vendor or 
contractor should sufficiently compensate the organization for any negative repercussions that a breach 
would cause. 
Risk analysis can assess the vulnerabilities of personal information that is in the hands of third parties and 
can inform privacy technologists on what actions need to be performed in an effort to mitigate these 
vulnerabilities and threats. Implementing controls such as separating collected data according to who is 
processing it, using data schemas, or requiring acceptance of enforcement policies when data is collected 
in the cloud. 
Privacy impact assessments (PIAs) 
A privacy impact assessment (PIA) is an analysis of how personal information is handled throughout the 
data life cycle within an organization. A PIA ensures that organizations apply legal, regulatory and policy 
requirements regarding privacy, assesses privacy risks, and recommends methods of risk mitigation. A 
significant goal of performing a PIA is to compel an organization to think about the choices it makes for its 
processes and how those choices will impact privacy. Privacy technologists can utilize the findings of a PIA 
to determine whether privacy risk is appropriately addressed using the privacy policies and procedures. 
Data protection impact assessments (DPIAs) 
Similarly, a data protection impact assessment (DPIA) is a structured approach to understanding and 
mitigating potential risks to individuals’ data you process. DPIAs are a requirement under certain privacy 
regulations and should be implemented prior to a new processing operation being put into effect. 
For example: 
 
©2022, International Association of Privacy Professionals, Inc. (IAPP) 
A PIA would be used to identify the legalities, regulations and policies a system is processing with and 
identifies necessary mitigation while a DPIA is used to determine how information covered by a PIA is 
protected and identifies any necessary mitigation. 
In the EU, the term DPIA has specific legal provisions as set out in the GDPR, although it is sometimes 
used synonymously with PIA. 
Select here for more resources on the different forms of privacy impact assessments. (Link: 
https://iapp.org/resources/topics/privacy-impact-assessment-2/#featured-resources) 
Perspectives: What are the best examples of preparedness? 
Liisa Thomas, Partner and Lead, Privacy and Cybersecurity Team, Sheppard Mullin 
So, what are the best examples of preparedness? Teams that work well together is a phenomenal example 
of preparedness and that’s something that people could do and be prepared for just in their daily work 
worlds. But actual, “OK, we’re going to sit down and we’re going to get ready for a data breach”? The 
thing other than teamwork that I’ve seen that really makes a difference during an incident—and teamwork 
takes the top, but after teamwork, I would say knowing what information you have and where it’s at. That 
is a massive, massive undertaking; don’t let anybody tell you differently. Working through and 
understanding what information you have, where it sits—that’s huge and can make a really big difference 
during an incident. 
And going along with that, when we say, “Knowing what information you have and where you have it,” it’s 
not just saying, “In System X, we maintain Social Security numbers.” It’s, “What Social Security numbers 
do we have in System X? Whose Social Security numbers do we have?” 
And a recent situation I worked on, one of the things the team had done that was such a lifesaver was 
they had the contact information for the impacted individuals. Now, obviously, you’re going to want to 
work with legal counsel to decide, “Do we want to collect more information than we need in order to fulfill 
the purposes for which we collected the information?” Data minimization is a huge way to prepare. You 
have less information, so you have less to be breached. But if you are in a situation where you had to 
have that information, and it was breached and you’ve got impacted individuals, knowing that you can 
contact them because you have their contact information can be really helpful. 
That particular situation that I’m thinking of—it was a situation where we needed to have the impacted 
individuals’ contact information. You may find yourself in a different situation and then this wouldn’t be 
applicable and that’s fine. And I think that’s actually a big takeaway for all data breach, incidents, 
management, preparedness is: each situation is unique, and you need to not worry if the way you are 
approaching this doesn’t exactly match something that you’re reading. So, there may be some materials—
here’s a guidebook, here’s a guidance—those are great. But know that the situation you are going through 
is unique to your company, it’s unique to the people at your company, and it’s unique to the fact pattern. 
So, the way that you go through that should similarly be unique. So, that, knowing that may also be a 
really great way to prepare. 
Summary 
• An organization’s privacy notice details information about that organization’s privacy practices, 
values and commitments and is externally facing. 
• In contrast, privacy policies are internal statements used for communicating best privacy practices 
and addressing privacy and security, data management and data loss prevention. 
• A well-functioning internal security policy prevents unauthorized or unnecessary access to 
corporate data or resources—including intellectual property, financial data and personal 
information. 
https://iapp.org/resources/topics/privacy-impact-assessment-2/#featured-resources
 
©2022, International Association of Privacy Professionals, Inc. (IAPP) 
• Data inventories allow organizations to track what data is collected, how it is handled, where it is 
stored and how it is classified. 
• Classifying and categorizing data enables an organization to properly manage and protect the 
assets in its possession such as, information assets (e.g., customer and employee data), physical 
assets (e.g., workstations, laptops, etc.) and intellectual property (software code, trade secrets). 
• Asset classifications include confidential (should remain secure and private), internal use (intended 
for use within the organization only) and public (can be safely shared externally). 
• When collected data is shared with third-party vendors, it should be handled according to the 
commitments made to the data subject and data owner regardless of where their personal 
information is located or how it is used. Third-party contracts should be detailed with clear 
expectations of how data is to be managed. 
• A privacy impact assessment (PIA) is an analysis of how personal information is handled during an 
organization’s data life cycle and ensures organizations apply legal, regulatory and policy 
requirements regarding privacy. A PIA also assesses privacy risks and recommends methods of risk 
mitigation. 
• A data protection impact assessment (DPIA) is a structured approach to mitigating risks and is 
required under certain privacy regulations. 
Review 
1. Which of the following is something a privacy impact assessment (PIA) does not accomplish? 
Ensures organizations apply legal, regulatory and policy requirements regarding privacy 
Assesses privacy risks 
Recommends methods of risk mitigation 
Implements controls on data collection 
 
The privacy responsibilities of the technology professional 
Learning objective 
• Understand what roles and responsibilities technology professionals hold when dealing with privacy 
Privacy responsibilities 
Data managementbegins with the business model and value stream. Most privacy-related solutions are 
hardcoded to the business process, including data models. The technology process is a tool to support the 
process and support the privacy objectives within the organization and the technology ecosystem. When 
the technology professional is brought into the conversation around the privacy objectives of the 
organization, they are better able to assist the organization in meeting those values and goals and taking 
steps to forecast and mitigate risk. Privacy technologists ensure that computers, networks, applications, 
websites, databases and security are maintained to protect data privacy according to company policy, 
regulatory requirements and industry standards. Privacy technologists create a common understanding of 
privacy needs and values concerning privacy. They make sense of the privacy issues through the controls 
put in place throughout the design. 
Evolving technology 
Technology is always evolving. Similarly, privacy laws are as well. Along with laws that are already in 
place and have been for decades, new laws continue to emerge. While laws and technology both continue 
to evolve, change and emerge, technology progresses at a much more rapid pace than laws. How then do 
privacy technologists design programs that are both flexible and innovative? 
Contractual and regulatory requirements 
 
©2022, International Association of Privacy Professionals, Inc. (IAPP) 
Privacy technologists should work closely with the organization’s legal team. This will help to identify the 
core requirements of various privacy laws and any potential risks that may impact the objectives and 
obligations of an organization. Not all obligations of an organization’s policy require a technical aspect, but 
knowing the key objectives affords a level of flexibility necessary for defining a governance program. It 
allows for privacy governance and technology solutions to evolve, for example, automating processes that 
were once manual. This strengthens the privacy policy of an organization and makes it more effective. 
Consider the following example. Comparing the objectives of different laws, an objective can be designed 
to meet both requirements. Privacy technologists can in turn orchestrate controls which support it. 
Providing feedback: policies 
As more privacy laws come into effect, evaluating privacy within an organization becomes clearer and 
more measurable. Assessing the effectiveness of a privacy policy begins with the structure of the 
compliance program, as it establishes the key objectives and associated internal controls to evaluate the 
health of the overall program. This in turn can evaluate how controls are enforced since organizations 
have a better understanding of where personal data is, and how and when it is used. This understanding 
leads to improvements in privacy governance, allowing for a more tangible risk evaluation and sufficient 
technological solutions to safeguard against privacy harms. 
Common compliance terminology engages privacy technologists and other stakeholders, and is valuable in 
creating a governance program and implementing the necessary privacy policies of any organization, 
particularly with differing privacy standards and regulations among jurisdictions. Examples of common 
terms include reasonable assurance. This implies that requirements and objectives are not absolute and 
are based on criteria that is practical to implement and manage. They are flexible and continuously 
monitored. Internal controls are objectives, tied to practical measurements, that are designed to evaluate 
privacy program components. There are two types of internal controls: preventative, which stops an 
activity, and detective, which identifies problematic activity. Overlapping safeguards is another common 
term and is key to improving resiliency of compliance and assures measurability. 
Together, these elements of compliance create structure that enables a clear and measurable framework 
which can be translated across varying elements of a privacy program. Building from the example in the 
previous slide, it is demonstrated how controls can be implemented to address both privacy and security. 
Privacy controls determine who the authorized personnel for data access are by looking at the type of 
personal information collected, its sensitivity and authorized users. 
Information governance I 
Security and privacy are intertwined, yet each have different roles in respect to technology. A security 
professional has the technical knowledge of administration, and an understanding of risk management 
practices that may allow them to integrate privacy into a technology system. Security is about protecting 
data against unauthorized access and malicious action, where privacy is about enforcing the appropriate 
use of that data within a secure environment. It addresses all ways that data is handled, including 
collection, use, sharing, maintenance and retention. Privacy professionals also address risk management. 
Security and privacy both rely on similar controls and technological capabilities. 
Technology frameworks such as ITIL, ISO 27000, Information Technology Infrastructure Library and 
COBIT (Control Objectives for Information and Related Technologies) provide service, process and 
program management to an organization’s technology environment. Because the information 
organizations collect is stored within technology systems, it is important that they can demonstrate 
compliance with any laws or regulations that govern them. 
Select each tool button for a brief overview of what each framework provides for an organization. 
ITIL: Governed and owned by AXELOS. Provides an overall measurable view of a technology 
system, service and functionality. ITIL reports on services provided by technology systems and 
 
©2022, International Association of Privacy Professionals, Inc. (IAPP) 
helps organizations use technology to support change and growth. It has a limited view of risk 
management. 
COBIT: A more comprehensive program that helps with management of a technology system that 
allows for technology governance. Technology governance focuses on systems and applications and 
supports personnel who manage data within a company. 
Information governance II 
When privacy and technology work together to meet industry standards, organizations can establish a 
common language of privacy controls and remain transparent. This is particularly critical when dealing 
with international standards. Using common and accessible terms without compromising confidentiality 
builds trust between organizations and stakeholders and is measurable against legal frameworks and 
privacy standards. Privacy determines who is authorized to access the personal information, while security 
implements the controls to that access. Review the example to see how privacy and security work 
together to meet industry standards. 
Information governance III 
Implementing an effective privacy governance program depends on the choreography of all stakeholders 
involved in processing personal data. A successful data privacy program depends on technical solutions to 
ensure that data processing meets legal requirements. Information security plays a significant role in 
controlling access to personal data. When internal groups work in concert to leverage skills, a strong 
ability to protect personal data within existing controls results. Compliance helps in defining the controls, 
both overlapping preventative and detective controls to further assure that legal and policy requirements 
are being met. All of these elements come together to support effectual information governance within an 
organization. 
Organizations need to take into account existing and developing privacy and security threats when 
identifying which technical approaches to implement. It ishighly advantageous for organizations to move 
to a more risk-based program and not focus solely on compliance. 
Summary 
• Privacy technologists ensure systems are maintained to protect data privacy and create a common 
understanding of privacy needs and values concerning privacy. 
• By working closely with an organization’s legal team, privacy technologists can more readily 
identify the core requirements of various privacy laws and any potential risks that may impact the 
objectives and obligations of an organization. 
• Assessing the effectiveness of a privacy policy begins with the structure of the compliance 
program, as that program establishes the key objectives and associated internal controls to 
evaluate the health of the overall program. 
• Common compliance terminology engages privacy technologists and other stakeholders and is 
valuable in creating a privacy governance program and implementing the necessary privacy policies 
of any organization. 
• Security and privacy are intertwined. Security is about protecting data against unauthorized access 
and malicious action, where privacy is about enforcing the appropriate use of the data within a 
secure environment. 
• Using common and accessible terms without compromising confidentiality builds trust between 
organizations and stakeholders and is measurable against legal frameworks and privacy standards. 
• A successful privacy program depends on technical solutions to ensure that data processing meets 
legal requirements. 
Review 
 
©2022, International Association of Privacy Professionals, Inc. (IAPP) 
1. Which of the following is not a privacy responsibility of a technology professional? 
Ensuring compliance 
Systems and process maintenance 
Risk mitigation 
Customer support 
 
Information security 
Learning objective 
• Explain the role of information security in protecting privacy 
 
Information security and privacy 
The worlds of security and privacy frequently intersect. Security provides privacy an avenue through which 
meaningful IT solutions can be developed to safeguard privacy. Similarly, security benefits from privacy, 
supporting security solutions and processes with privacy legal requirements, and, in consequence, 
reinforcing the mutual value of integrated privacy and security governance. Select "Next" to continue 
learning about how information security protects privacy. 
Transactions for confidential data 
The comprehensive overall organization design of a system, also known as the enterprise architecture, is 
designed to support the objectives of an organization. It recognizes that there is a relationship between all 
elements of a system. This includes servers, data elements, process models and data flow, which describe 
the order of operations and data exchanges, as well as the business processes of the organization. 
Privacy of information must be considered within both the front and back ends of a technological 
architecture, particularly when confidential information is collected for later use. Privacy is affected by 
both viewpoints in different ways. Privacy technologists must ensure that the front end is useable and 
notifies the user about the company’s privacy practices, while maintaining that the back-end design 
applies the privacy principles of the stored information pertaining to what data is collected, how it is used, 
shared and retained. Privacy technologists may consider using different architectures to achieve this 
balance of privacy between the two ends. 
Select each button to explore examples of architecture that allow for this balance and enable reuse of 
confidential information. 
Client-server architecture: With a client-server architecture, the client refers to a program that 
runs on a local computer, while the server is a program that runs on a remote computer. This 
architecture allows storing data on the client side for the purpose of completing a transaction. The 
server side includes back-end services that respond to the client’s requests, and mechanisms can 
be designed to track client behavior across multiple HTTP requests. It does not maintain shared 
data between the client and server. This type of architecture assumes that the client data is secure, 
and the storage and surveillance of the data is clear to the user. Otherwise, it poses a privacy 
threat. 
Service-oriented architecture: Service-oriented architecture is similar to client-server 
architecture in that it decouples services from the large-scale servers. It allows designers to 
replicate services across multiple machines. 
 
©2022, International Association of Privacy Professionals, Inc. (IAPP) 
Plug-in-based architecture: Plug-in based architecture extends a user’s experience with a 
website via the use of an app platform. Apps may have the ability to interact with a user and their 
data, including location or contact information. Privacy technologists must ensure that privacy 
notices are clear to prevent misuse of information. 
Breach and incident response 
Regardless of how secure an organization is, how detailed its privacy notices and policies are, or how well 
its staff are trained, data breaches and other privacy incidents may still occur. Incidents do not always 
result in data breaches, however. An incident is any event that can affect the confidentiality, integrity or 
availability of the data. When personally identifiable information is involved, then it is a privacy incident; 
examples include unauthorized disclosure, sharing or sale of data without consent, denial of service 
attacks, malware infection, hacking attempts, data exfiltration, lost or stolen devices, and misdirected 
emails. Some types of incidents are security incidents, some are privacy incidents, and some are both. It 
should also be noted that not all data incidents are personal data incidents. Proprietary or confidential 
data breaches are separate from a personal data breach. While many of the response actions are the 
same, different legal standards may apply. Data breaches are caused when the resulting incident has 
exposed the data to an unauthorized third party. Privacy technologists should understand the impact of 
privacy events upon data subjects and an organization’s handling of data subjects’ personal information 
and use that as input for identifying appropriate privacy technical measures. 
Developing an incident response team along with having a breach or incident response plan in place 
before an incident occurs is one more action an organization can take to be adequately prepared. Move 
the slider to review the elements of an effective incident response plan. 
Discovery: Actively monitoring system activity or suspicious changes to system activity is 
essential in detecting an incident that could lead to a breach. Monitoring activity on a system could 
detect tampering before any data is stolen. Users are also another line of defense in the detection 
of privacy incidents or data breaches, by reporting suspicious activity. 
Containment: A response plan should contain guidance on how to terminate an ongoing incident 
while preserving any evidence of the affected data and origin of the incident. Containment is key to 
stopping the threat before more damage is done. Do not wipe system logs. Remove and preserve 
affected systems from the network. Fully document your investigation and include timestamps 
while working through an investigation. Finally, a predetermined contingency plan should be 
executed that allows the organization to continue functioning at some capacity while data or 
resources are locked down during a privacy incident investigation. 
Analyze and notify: For data breaches and other types of privacy incidents, notification laws vary 
among jurisdictions. To be prepared, an organization should know what their notification 
obligations are in such an event. Once a privacy incident or a breach has been detectedand 
determined, legal counsel should be involved to advise the response team regarding all legal 
matters, including notification—to law enforcement, individuals and/or the public. 
Some organizations contract with a vendor to provide consumer breach notification services as 
they are up-to-date on laws surrounding breaches and can provide additional resources as needed. 
Repercussions: Fines, lawsuits and nonmonetary repercussions often follow privacy incidents or 
breaches. For example, media coverage of the incident may adversely affect an organization’s 
reputation, resulting in decreased business and loss of consumer trust. As part of the incident 
response team, a security analyst would handle an incident from start to finish including reporting 
to senior management. A privacy technologist would act as a subject matter expert to help 
diagnose the incident, mitigate the issue and provide information to the security analyst. 
 
©2022, International Association of Privacy Professionals, Inc. (IAPP) 
Prevention: Privacy incidents can be used as a learning tool to address holes in security and 
privacy procedures, review privacy policies to identify weaknesses and train employees as needed. 
Third parties: Personal information in the hands of a third party, still falls under the responsibility 
of the organization in the event of a breach, including provisions that describe the expectations and 
obligations of the vendor should an incident occur. 
Security and privacy in the systems development life cycle 
Keeping systems and data secure and meeting privacy goals and needs are large tasks to be accomplished 
throughout the life cycle of a system. Depending on the framework, these tasks are broken into phases. 
Following we will look at a model of a systems development life cycle (SLDC) using the NICE framework 
which divides security and privacy work into four categories: (1) Securely provision; (2) Operate and 
maintain; (3) Protect and defend; and (4) Investigate. 
(1) Securely provision 
This phase encompasses the tasks focused on software development. To accomplish this, privacy 
technologists will want to utilize a system development plan to ensure that all phases take place. Select 
the button to review the phases of systems development. 
Planning: Ensures that all security and regulatory and legal privacy requirements are considered. 
Design: Chooses the architecture design of the system based on the technology required to meet 
security and privacy mandates. 
Technology research and development: Explores alternatives if existing solutions do not meet 
those needs. 
Testing and evaluation: Ensures that each component of a system meets its requirements. 
Risk management: Identifies, documents and manages any risks related to the software quality, 
compliance with regulations, or security and privacy issues that present themselves within the 
system. 
(2) Operate and maintain 
Ensuring that the system is installed and configured correctly initially and throughout its use, is necessary 
to meet security and privacy goals. Customer service and technical support are employed to further 
strengthen a system’s security and privacy systems that are in place. Operation and maintenance also 
encompass data administration that manage large volumes of sensitive data that may be housed within a 
system, including analysis of an organization’s interoperation and management of the processes and tools 
used to keep track of systems and their operations. 
(3) Protect and defend 
Actively protecting the system via vulnerability assessments and management tools address potential 
threats and vulnerabilities to a system. A cyber defense infrastructure support also protects frameworks 
and may include firewalls and system monitoring, as well as having incident response plans in place. 
(4) Investigate 
In the event of a system compromise through an attack, a complete investigation is necessary. This allows 
for the discovery of: any specific data that was compromised, the method of compromise and may identify 
who may have perpetrated the attack. 
Summary 
• Information security and privacy intersect, forming a bond that is mutually beneficial. 
 
©2022, International Association of Privacy Professionals, Inc. (IAPP) 
• The comprehensive overall organizational design of a system, also known as the enterprise 
architecture, is designed to support the objectives of an organization and recognizes that there is a 
relationship between all elements of a system. Privacy technologists may use different 
architectures to ensure this relationship is present. 
• With a client-server architecture, the client refers to a program that runs on a local computer, while 
the server is a program that runs on a remote computer. This allows storing data on the client side 
for the purpose of completing a transaction. 
• Service-oriented architecture decouples services from the large-scale servers. It allows designers 
to replicate services across multiple machines. 
• Plug-in based architecture extends a user’s experience with a website via the use of an app 
platform, usually owned by a third party. 
• Regardless of how secure an organization is, how detailed its privacy notices and policies are, or 
how well its staff are trained, data breaches and other privacy incidents may still occur. 
• An incident is any event that affects the confidentiality, integrity or availability of data and data 
breaches occur when the resulting incident exposes data to an unauthorized third party. 
• Developing an incident response team along with having a breach or incident response plan in 
place before an incident occurs is one more action an organization can take to be adequately 
prepared. 
• Elements of an effective incident response plan include: discovery (actively monitoring to detect 
incidents before they occur); containment (stopping the threat before damage is done); analyze 
and notify (notifying those affected by an incident in the appropriate manner); repercussions (any 
fines, lawsuits or nonmonetary results from an incident); prevention (addressing holes in security 
and privacy procedures to negate future incidents); and third parties (how to account and plan for 
incident effects outside the main organization). 
• Keeping systems and data secure as well as meeting privacy goals and needs are large tasks to be 
accomplished throughout the life cycle of a system. Depending on the framework, these tasks are 
broken into phases. 
Review 
1. What term refers to the overall organizational design of a system and recognizes the relationship 
between all elements of that system? 
Enterprise architecture 
Plug-in architecture 
Client-based architecture 
Service-oriented architecture 
Review answers 
Fundamentals of privacy-related IT 
1. Implements controls on data collection 
The privacy responsibilities of the technology professional 
1. Customer support 
Information security 
1. Enterprise architecture 
 
 
*Quiz questions are intended to help reinforce key topics covered in the module. They are not meant to 
represent actual certification exam questions.

Mais conteúdos dessa disciplina