Top Banner
1 Copyright © 1999-2008 International Security, Trust & Privacy Alliance -All Rights Reserved Making Privacy Operational International Security, Trust and Privacy Alliance (ISTPA) Michael Willett, Seagate John Sabo, CA, Inc. The Privacy Symposium Harvard University 20 August 2008
22

1 Copyright © 1999-2008 International Security, Trust & Privacy Alliance -All Rights Reserved Making Privacy Operational International Security, Trust.

Jan 08, 2018

Download

Documents

3 Copyright © International Security, Trust & Privacy Alliance -All Rights Reserved ISTPA’s Perspective on Privacy Operational – Technical, Operational Focus  …“making Privacy Operational”  based on legal, policy and business process drivers  privacy management is multi-dimensional with extended lifecycle requirements Privacy Framework v1.1 published in 2002  supports the full “Lifecycle” of Personal Information “Analysis of Privacy Principles: An Operational Study” published in 2007 See for downloads ISTPA
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 1 Copyright © 1999-2008 International Security, Trust & Privacy Alliance -All Rights Reserved Making Privacy Operational International Security, Trust.

1

Copyright © 1999-2008 International Security, Trust & Privacy Alliance -All Rights Reserved

Making Privacy Operational International Security, Trust and Privacy Alliance

(ISTPA)

Michael Willett, Seagate

John Sabo, CA, Inc.

The Privacy SymposiumHarvard University

20 August 2008

Page 2: 1 Copyright © 1999-2008 International Security, Trust & Privacy Alliance -All Rights Reserved Making Privacy Operational International Security, Trust.

2

Copyright © 1999-2008 International Security, Trust & Privacy Alliance -All Rights Reserved

What is the ISTPA?

The International Security, Trust and Privacy Alliance (ISTPA), founded in 1999, is a global alliance of companies, institutions and technology providers working together to clarify and resolve existing and evolving issues related to security, trust, and privacy

ISTPA’s focus is on the protection of personal information (PI)

ISTPA

Page 3: 1 Copyright © 1999-2008 International Security, Trust & Privacy Alliance -All Rights Reserved Making Privacy Operational International Security, Trust.

3

Copyright © 1999-2008 International Security, Trust & Privacy Alliance -All Rights Reserved

ISTPA’s Perspective on Privacy Operational – Technical, Operational Focus

…“making Privacy Operational” based on legal, policy and business process drivers privacy management is multi-dimensional with extended

lifecycle requirements

Privacy Framework v1.1 published in 2002 supports the full “Lifecycle” of Personal Information

“Analysis of Privacy Principles: An Operational Study” published in 2007

See www.istpa.org for downloads

ISTPA

Page 4: 1 Copyright © 1999-2008 International Security, Trust & Privacy Alliance -All Rights Reserved Making Privacy Operational International Security, Trust.

4

Copyright © 1999-2008 International Security, Trust & Privacy Alliance -All Rights Reserved

Three Dimensions of Privacy Management

Principles/Legislation/Policies Requirements and constraints on the collection and use of

personal information by government and private sector organizations

Business Processes Data collection, processing and storage systems and

business applications which make use of PI

Operational Privacy Management and Compliance Architectures and applications which incorporate

standardized privacy management services and controls

Page 5: 1 Copyright © 1999-2008 International Security, Trust & Privacy Alliance -All Rights Reserved Making Privacy Operational International Security, Trust.

5

Copyright © 1999-2008 International Security, Trust & Privacy Alliance -All Rights Reserved

“Analysis of Privacy Principles: An Operational

Study”

Principles/Legislation/Policies

Page 6: 1 Copyright © 1999-2008 International Security, Trust & Privacy Alliance -All Rights Reserved Making Privacy Operational International Security, Trust.

6

Copyright © 1999-2008 International Security, Trust & Privacy Alliance -All Rights Reserved

Laws, Directives, Codes Analyzed

The Privacy Act of 1974 (U.S.)OECD Privacy Guidelines UN Guidelines EU Data Protection Directive Canadian Standards

Association Model Code Health Insurance Portability and

Accountability Act (HIPAA)

US FTC Fair Information Practice PrinciplesUS-EU Safe Harbor Privacy PrinciplesAustralian Privacy Act Japan Personal Information Protection ActAPEC Privacy FrameworkCalifornia Security Breach Bill

Page 7: 1 Copyright © 1999-2008 International Security, Trust & Privacy Alliance -All Rights Reserved Making Privacy Operational International Security, Trust.

7

Copyright © 1999-2008 International Security, Trust & Privacy Alliance -All Rights Reserved

Analysis Methodology

Select representative international privacy laws and directives

Analyze disparate language, definitions and expressed requirements

Parse expressed requirements into working set of privacy categories

and terms

Cross-map common and unique requirements

Establish basis for a revised operational privacy framework to ensure

ISTPA Framework Services supports full suite of requirements

Page 8: 1 Copyright © 1999-2008 International Security, Trust & Privacy Alliance -All Rights Reserved Making Privacy Operational International Security, Trust.

8

Copyright © 1999-2008 International Security, Trust & Privacy Alliance -All Rights Reserved

Comparative Analysis-Sample OECD Guidelines – 1980

Collection Limitation Data Quality Purpose Specification Use Limitation Security Safeguards Openness Individual Participation Accountability

Australian Privacy Principles – 2001

Collection Use and Disclosure Data Quality Data Security Openness Access and Correction Identifiers Anonymity Transborder Data

Flows Sensitive Information

Page 9: 1 Copyright © 1999-2008 International Security, Trust & Privacy Alliance -All Rights Reserved Making Privacy Operational International Security, Trust.

9

Copyright © 1999-2008 International Security, Trust & Privacy Alliance -All Rights Reserved

Derived Privacy Requirements

Accountability Notice Consent Collection Limitation Use Limitation Disclosure Access & Correction Security/Safeguards

Data Quality Enforcement Openness

Less common: Anonymity Data Flow Sensitivity

Page 10: 1 Copyright © 1999-2008 International Security, Trust & Privacy Alliance -All Rights Reserved Making Privacy Operational International Security, Trust.

10

Copyright © 1999-2008 International Security, Trust & Privacy Alliance -All Rights Reserved

What we DiscoveredExample: Notice Principle

Notice: Information regarding an entity’s privacy policies and practices includes

1. definition of the personal information collected2. its use (purpose specification)3. its disclosure to parties within or external to the entity4. practices associated with the maintenance and protection of

the information5. options available to the data subject regarding the collector’s

privacy practices6. changes made to policies or practices7. information provided to data subject at designated times and

under designated circumstances

Page 11: 1 Copyright © 1999-2008 International Security, Trust & Privacy Alliance -All Rights Reserved Making Privacy Operational International Security, Trust.

11

Copyright © 1999-2008 International Security, Trust & Privacy Alliance -All Rights Reserved

PI Lifecycle Implications of “Notice”Notice: Information regarding an entity’s privacy policies and practices

PI Collection

Use, Linkage, Re-use, Aggregation Destruction?

PI over time

definition of the personal information collectedits use (purpose specification)

its disclosure to parties within or external to the entity

practices associated with the maintenance and protection of the information

options available to the data subject regarding the collector’s privacy practices

changes made to policies or practices

information provided to data subject at designated times and under designated circumstances

Page 12: 1 Copyright © 1999-2008 International Security, Trust & Privacy Alliance -All Rights Reserved Making Privacy Operational International Security, Trust.

12

Copyright © 1999-2008 International Security, Trust & Privacy Alliance -All Rights Reserved

Revising the Framework

Operational Privacy Management

Page 13: 1 Copyright © 1999-2008 International Security, Trust & Privacy Alliance -All Rights Reserved Making Privacy Operational International Security, Trust.

13

Copyright © 1999-2008 International Security, Trust & Privacy Alliance -All Rights Reserved

PI Life Cycle Perspective

PI

PI

PI

Subject Requestor

Collector Processor

Operational Privacy Management at each touch point

Page 14: 1 Copyright © 1999-2008 International Security, Trust & Privacy Alliance -All Rights Reserved Making Privacy Operational International Security, Trust.

14

Copyright © 1999-2008 International Security, Trust & Privacy Alliance -All Rights Reserved

Designing a Privacy Management System

Step by Step ….

Page 15: 1 Copyright © 1999-2008 International Security, Trust & Privacy Alliance -All Rights Reserved Making Privacy Operational International Security, Trust.

15

Copyright © 1999-2008 International Security, Trust & Privacy Alliance -All Rights Reserved

Personal Information

AGENT

INTERACTION

CONTROLNEGOTIATION

USAGE

ACCESSVALIDATIONCERTIFICATION

AuditENFORCEMENT

SECURITY

PI Touch Point Architecture

Page 16: 1 Copyright © 1999-2008 International Security, Trust & Privacy Alliance -All Rights Reserved Making Privacy Operational International Security, Trust.

16

Copyright © 1999-2008 International Security, Trust & Privacy Alliance -All Rights Reserved

Personal Information

AGENT

INTERACTION

CONTROLNEGOTIATION

USAGE

ACCESSVALIDATIONCERTIFICATION

AuditENFORCEMENT

SECURITY

PI Touch Point Architecture

SELF-ENCRYPTING

PRIVACY AGENT

Page 17: 1 Copyright © 1999-2008 International Security, Trust & Privacy Alliance -All Rights Reserved Making Privacy Operational International Security, Trust.

17

Copyright © 1999-2008 International Security, Trust & Privacy Alliance -All Rights Reserved

ISTPA Privacy Framework Services Control – policy – data management Certification – credentials, trusted processes Interaction - manages data/preferences/notice Negotiation – of agreements, rules, permissions Agent – software that carries out processes Usage – data use, aggregation, anonymization Audit – independent, verifiable accountability Validation - checks accuracy of PI Enforcement – including redress for violations Access - subject review/suggest updates to PI

Page 18: 1 Copyright © 1999-2008 International Security, Trust & Privacy Alliance -All Rights Reserved Making Privacy Operational International Security, Trust.

18

Copyright © 1999-2008 International Security, Trust & Privacy Alliance -All Rights ReservedLegal, Regulatory, and Policy Context

Security Foundation

Agent

Control

InteractionNegotiation

PI Touch Point

PI, Preferences& PIC Repository

PIContainer

(PIC)

EnforcementAuditCertificationValidation

Making Privacy Operational

Assurance Services

Usage

Access- Each Touch Point node configured with operational stack

- Privacy Policy is an input “parameter” to Control

- Agent is the Touch Point programming persona

-PIC contains PI and usage agreements

Page 19: 1 Copyright © 1999-2008 International Security, Trust & Privacy Alliance -All Rights Reserved Making Privacy Operational International Security, Trust.

19

Copyright © 1999-2008 International Security, Trust & Privacy Alliance -All Rights ReservedLegal, Regulatory, and Policy Context

Security Foundation

Agent

Control

InteractionNegotiation

Any two touch points in the PI life cycle

Usage

PI, Preferences& PIC Repository

Agent

Control

InteractionNegotiation

PIC RepositoryPI

Container(PIC)

EnforcementAuditCertificationValidation

Privacy SERVICES

Assurance Services

Usage

Access

Page 20: 1 Copyright © 1999-2008 International Security, Trust & Privacy Alliance -All Rights Reserved Making Privacy Operational International Security, Trust.

20

Copyright © 1999-2008 International Security, Trust & Privacy Alliance -All Rights Reserved

Converting Privacy Requirements to Privacy Management Operations

“Matrix” Conversion (ISTPA ToolKit Process):

10 Framework Services Privacy

Requirements (eg,

Principles,

Legislation)

Service FUNCTIONS

Page 21: 1 Copyright © 1999-2008 International Security, Trust & Privacy Alliance -All Rights Reserved Making Privacy Operational International Security, Trust.

21

Copyright © 1999-2008 International Security, Trust & Privacy Alliance -All Rights Reserved

Next Steps for the ISTPA Privacy Framework

Undergoing revision now Using the Analysis findings, major

revisions to Service definitions and lifecycle issues for integrating services

ISTPA has joined the OASIS standards organization as an institutional member to explore standards development

We welcome your input and support!

Page 22: 1 Copyright © 1999-2008 International Security, Trust & Privacy Alliance -All Rights Reserved Making Privacy Operational International Security, Trust.

22

Copyright © 1999-2008 International Security, Trust & Privacy Alliance -All Rights Reserved

Questions?

MAKING PRIVACY OPERATIONAL

Michael Willett, [email protected]

John Sabo, CA, [email protected]