当前位置:网站首页>Data security -- 14 -- Analysis of privacy protection governance
Data security -- 14 -- Analysis of privacy protection governance
2022-07-05 04:32:00 【Follow also】
One 、GRC brief introduction
GRC Governance 、 Risk management and compliance , By addressing uncertainty and acting with integrity , The ability set to ensure that the enterprise can reliably achieve its goals , It is a framework model of enterprise risk governance .
government (G) The main work of this project includes :
● Establish strategies and boundaries .
● Organizational structure and division of rights and responsibilities .
● Policy formulation and process control .
● Performance monitoring .
Risk management (R) The main work of this project includes :
● The classification of risks .
● Risk assessment method .
● Risk management .
● Risk reporting mechanism .
compliance (C) The main work of this project includes :
● Documentation of various non-compliance risks .
● Define and document compliance control points in the process .
● Evaluate the effectiveness of control points .
● Solve the compliance problems found .
Two 、 Introduction to privacy protection governance
If the enterprise faces greater compliance pressure , We can learn from the relevant practices of data security management and compliance requirements , Build a management system for privacy protection , Include :
● Establish the general outline of privacy protection policy , And reach a consensus in the management .
● Establish organizations and teams for privacy protection 、 Division of responsibilities , Be responsible for privacy protection supervision 、 Audit and communication with regulators .
● Establish policies and frameworks for privacy protection ( Establish a document system and apply it to practice ).
● Determine the list of applicable laws and regulations , And convert it into internal documents .
● Establish a Privacy Impact Assessment (PIA) Or data protection impact assessment (DPIA) Methodology and operation process .
● Management and implementation of privacy lifecycle ( Such as privacy statement 、 collect 、 The data subject agrees 、 Circulation approval process 、 Validity management and data cleaning ).
● Establish data directory and privacy operation support system , Used to measure privacy risk , Support the routine implementation of privacy protection , It can also be used to prove its compliance to regulators .
● Establish relevant processes and systems for data subject requests ( Used to support user queries 、 modify 、 Delete 、 Withdrawal of consent, etc ).
● Response and reporting mechanism for privacy data leakage events .
3、 ... and 、 Data protection governance GRC practice
Here we will GRC Integration of risk governance methodology PDCA Loop to discuss specific practices of privacy compliance .
3.1、 plan (P)
The main tasks in the planning stage include :
G: Set a goal 、 Organizational responsibility and Accountability Policy 、 Formulate overall policies .
R: Risk identification .
C: Determine compliance requirements , Decomposition and reorganization , Establish internal compliance benchmarks .
3.2、 perform (D)
The main tasks of the implementation phase include :
G: Refine the policy 、 supervise .
R: risk assessment 、 Risk control matrix 、 Integrate into the process 、 Risk management .
C: The internal compliance benchmark is transformed into a compliance control matrix 、 establish / Integrate into the process 、 Compliance improvement 、 Establish compliance records .
3.3、 Check (C)
The main tasks of the inspection phase include :
G: For the results of the team's efforts 、 The process 、 Attitude to performance appraisal .
R: Measurement of risk , It is to quantify risks with data , It can be used for comparison among business teams , Commend the advanced .
C: Inspection of compliance effectiveness 、 Inspection of compliance records ; Effectiveness here , Including but not limited to whether the privacy statement has been self checked 、 Whether there are data flow approval records 、 Whether there are due diligence records of suppliers 、 Whether the data subject request has been processed .
3.4、 Handle (A)
The main tasks of the processing phase include :
G: According to the results of compliance inspection 、 The result of risk measurement 、 Results of performance measurement , Implement decision-making and accountability .
R: Risk summary , Residual risks continue to move to the next round PDCA loop .
C: Compliance summary , The remaining non-compliance issues continue to move to the next round PDCA loop .
Four 、 Maturity of privacy protection capability
The commonly used capability maturity evaluation model in the field of privacy protection is AICPA/CICA PMM, It is from American and Canadian Institute of accountants To formulate the , Is based on GAPP( Accepted privacy guidelines ) and CMM( Capability Maturity Model ) And the developed privacy maturity model , It can be used to evaluate the current level of enterprise privacy protection system .
But in practice , It is generally not recommended to directly use external specifications , We need to transform it internally . In the process of internal transformation , Generally, the selected indicators need not be complete ( Indicators that do well in all businesses can be removed , Only include indicators with high risks ), The main purpose is to drive the compliance improvement of each business line . The result after transformation is Internal capability maturity model .
The following are general recommendations , In practice , It should be formulated according to the actual situation of its own enterprise .
Capability maturity standard reference :
| Level | Ability brief |
|---|---|
| Level five | Continuous optimization level , Based on quantitative feedback 、 Continuous improvement of audit , A lot of records are needed as evidence |
| Level Four | measurable ( Quantification of privacy compliance risks ) Or manageable ( Such as visual tracking ), Be able to pass the effectiveness Review |
| Level three | Fully defined and documented |
| second level | Repeatable activity process |
| Class A | Single case , Basically no repetition |
Internal capability maturity reference :
| Segments | Level three ( Fully documented definitions ) | Level Four ( measurable / Manageable ) |
|---|---|---|
| Organization and policy | One 、 Two 、 Organizational system design and appointment documents of the three lines of defense 、 accountability system ; Relatively perfect policy document system 、 technological process . | Accountability records 、 Review records of policy documents 、 A revision history 、 Audit records |
| Privacy statement | Privacy statement / Management regulations of notice 、 Templates 、 Checklist ; Checklist self inspection record . | Quantify the self check , Show scores uniformly |
| choice / agree! | Fully guarantee the option of data subjects , Important options need to be checked by the user , Do not implement the package agreement ; Record the user's consent to each version of the privacy statement . | Consent of the data subject , Optimize management , Visual or searchable |
| Data directory / classification | Policy documents for data classification ; Data catalogue and classification identification of data . | Data statistics and visual management |
| The data flow | Management regulations on data circulation ; Circulation audit records ; If suppliers are involved 、 Have due diligence records 、 Data processing agreement signing record ; If cross-border is involved , Have the signing record of data transmission protocol . | Data record statistics and visual management |
| Privacy design | design code 、 Checklist ; Checklist self inspection record . | Self test result measurement Statistics and analysis |
| Data subject request | Management regulations 、 Processing flow ; Processing records . | Quantity measurement ( Statistics by type , Such as account cancellation 、 Correction, etc ; Statistics of business request data by business ); SLA Measure ( Timely completion rate, etc ) |
| risk assessment | Risk management regulations 、 Evaluation methods 、 Grading criteria ; Evaluation record . | Evaluation report statistics and analysis 、 Risk classification |
| Consciousness education | Management regulations ( Qualification requirements for employees 、 Training requirements, etc ); train / Exam records . | train / Test data quantification and statistical analysis |
| Event management | Management regulations 、 Event handling process 、 Processing records . | Statistics and analysis |
边栏推荐
- Sequelize. JS and hasmany - belongsto vs hasmany in serialize js
- 线上故障突突突?如何紧急诊断、排查与恢复
- Realize the attention function of the article in the applet
- Fonction (sujette aux erreurs)
- About the project error reporting solution of mpaas Pb access mode adapting to 64 bit CPU architecture
- Hexadecimal to decimal
- [untitled]
- Decryption function calculates "task state and lifecycle management" of asynchronous task capability
- Hypothesis testing -- learning notes of Chapter 8 of probability theory and mathematical statistics
- How to remove installed elpa package
猜你喜欢

What are the building energy-saving software

Managed service network: application architecture evolution in the cloud native Era

函数(易错)

Longyuan war "epidemic" 2021 network security competition web easyjaba

直播预告 | 容器服务 ACK 弹性预测最佳实践

Reading and visualization of DICOM, MHD and raw files in medical imaging

Qt蓝牙:搜索蓝牙设备的类——QBluetoothDeviceDiscoveryAgent

Fonction (sujette aux erreurs)

2022-2028 global and Chinese video coding and transcoding Market Research Report
![[moteur illusoire UE] il ne faut que six étapes pour réaliser le déploiement du flux de pixels ue5 et éviter les détours! (4.26 et 4.27 principes similaires)](/img/eb/a93630aff7545c6c3b71dcc9f5aa61.png)
[moteur illusoire UE] il ne faut que six étapes pour réaliser le déploiement du flux de pixels ue5 et éviter les détours! (4.26 et 4.27 principes similaires)
随机推荐
Moco is not suitable for target detection? MsrA proposes object level comparative learning target detection pre training method SOCO! Performance SOTA! (NeurIPS 2021)...
All in one 1413: determine base
Discussion on the dimension of confrontation subspace
Interview related high-frequency algorithm test site 3
Ffmepg usage guide
A real day for Beijing programmers!!!!!
[uniapp] system hot update implementation ideas
取余操作是一个哈希函数
Threejs Internet of things, 3D visualization of farms (I)
Basic analysis of IIC SPI protocol
Network security - record web vulnerability fixes
The scale of computing power in China ranks second in the world: computing is leaping forward in Intelligent Computing
Setting up redis cluster cluster under Windows
Fonction (sujette aux erreurs)
【虚幻引擎UE】打包报错出现!FindPin错误的解决办法
Mxnet imports various libcudarts * so、 libcuda*. So not found
Hexadecimal to octal
Neural networks and deep learning Chapter 3: linear model reading questions
解密函数计算异步任务能力之「任务的状态及生命周期管理」
Fuel consumption calculator