当前位置:网站首页>Data security -- 14 -- Analysis of privacy protection governance
Data security -- 14 -- Analysis of privacy protection governance
2022-07-05 04:32:00 【Follow also】
One 、GRC brief introduction
GRC Governance 、 Risk management and compliance , By addressing uncertainty and acting with integrity , The ability set to ensure that the enterprise can reliably achieve its goals , It is a framework model of enterprise risk governance .
government (G) The main work of this project includes :
● Establish strategies and boundaries .
● Organizational structure and division of rights and responsibilities .
● Policy formulation and process control .
● Performance monitoring .
Risk management (R) The main work of this project includes :
● The classification of risks .
● Risk assessment method .
● Risk management .
● Risk reporting mechanism .
compliance (C) The main work of this project includes :
● Documentation of various non-compliance risks .
● Define and document compliance control points in the process .
● Evaluate the effectiveness of control points .
● Solve the compliance problems found .
Two 、 Introduction to privacy protection governance
If the enterprise faces greater compliance pressure , We can learn from the relevant practices of data security management and compliance requirements , Build a management system for privacy protection , Include :
● Establish the general outline of privacy protection policy , And reach a consensus in the management .
● Establish organizations and teams for privacy protection 、 Division of responsibilities , Be responsible for privacy protection supervision 、 Audit and communication with regulators .
● Establish policies and frameworks for privacy protection ( Establish a document system and apply it to practice ).
● Determine the list of applicable laws and regulations , And convert it into internal documents .
● Establish a Privacy Impact Assessment (PIA) Or data protection impact assessment (DPIA) Methodology and operation process .
● Management and implementation of privacy lifecycle ( Such as privacy statement 、 collect 、 The data subject agrees 、 Circulation approval process 、 Validity management and data cleaning ).
● Establish data directory and privacy operation support system , Used to measure privacy risk , Support the routine implementation of privacy protection , It can also be used to prove its compliance to regulators .
● Establish relevant processes and systems for data subject requests ( Used to support user queries 、 modify 、 Delete 、 Withdrawal of consent, etc ).
● Response and reporting mechanism for privacy data leakage events .
3、 ... and 、 Data protection governance GRC practice
Here we will GRC Integration of risk governance methodology PDCA Loop to discuss specific practices of privacy compliance .
3.1、 plan (P)
The main tasks in the planning stage include :
G: Set a goal 、 Organizational responsibility and Accountability Policy 、 Formulate overall policies .
R: Risk identification .
C: Determine compliance requirements , Decomposition and reorganization , Establish internal compliance benchmarks .
3.2、 perform (D)
The main tasks of the implementation phase include :
G: Refine the policy 、 supervise .
R: risk assessment 、 Risk control matrix 、 Integrate into the process 、 Risk management .
C: The internal compliance benchmark is transformed into a compliance control matrix 、 establish / Integrate into the process 、 Compliance improvement 、 Establish compliance records .
3.3、 Check (C)
The main tasks of the inspection phase include :
G: For the results of the team's efforts 、 The process 、 Attitude to performance appraisal .
R: Measurement of risk , It is to quantify risks with data , It can be used for comparison among business teams , Commend the advanced .
C: Inspection of compliance effectiveness 、 Inspection of compliance records ; Effectiveness here , Including but not limited to whether the privacy statement has been self checked 、 Whether there are data flow approval records 、 Whether there are due diligence records of suppliers 、 Whether the data subject request has been processed .
3.4、 Handle (A)
The main tasks of the processing phase include :
G: According to the results of compliance inspection 、 The result of risk measurement 、 Results of performance measurement , Implement decision-making and accountability .
R: Risk summary , Residual risks continue to move to the next round PDCA loop .
C: Compliance summary , The remaining non-compliance issues continue to move to the next round PDCA loop .
Four 、 Maturity of privacy protection capability
The commonly used capability maturity evaluation model in the field of privacy protection is AICPA/CICA PMM
, It is from American and Canadian Institute of accountants
To formulate the , Is based on GAPP( Accepted privacy guidelines ) and CMM( Capability Maturity Model ) And the developed privacy maturity model , It can be used to evaluate the current level of enterprise privacy protection system .
But in practice , It is generally not recommended to directly use external specifications , We need to transform it internally . In the process of internal transformation , Generally, the selected indicators need not be complete ( Indicators that do well in all businesses can be removed , Only include indicators with high risks ), The main purpose is to drive the compliance improvement of each business line . The result after transformation is Internal capability maturity model
.
The following are general recommendations , In practice , It should be formulated according to the actual situation of its own enterprise .
Capability maturity standard reference :
Level | Ability brief |
---|---|
Level five | Continuous optimization level , Based on quantitative feedback 、 Continuous improvement of audit , A lot of records are needed as evidence |
Level Four | measurable ( Quantification of privacy compliance risks ) Or manageable ( Such as visual tracking ), Be able to pass the effectiveness Review |
Level three | Fully defined and documented |
second level | Repeatable activity process |
Class A | Single case , Basically no repetition |
Internal capability maturity reference :
Segments | Level three ( Fully documented definitions ) | Level Four ( measurable / Manageable ) |
---|---|---|
Organization and policy | One 、 Two 、 Organizational system design and appointment documents of the three lines of defense 、 accountability system ; Relatively perfect policy document system 、 technological process . | Accountability records 、 Review records of policy documents 、 A revision history 、 Audit records |
Privacy statement | Privacy statement / Management regulations of notice 、 Templates 、 Checklist ; Checklist self inspection record . | Quantify the self check , Show scores uniformly |
choice / agree! | Fully guarantee the option of data subjects , Important options need to be checked by the user , Do not implement the package agreement ; Record the user's consent to each version of the privacy statement . | Consent of the data subject , Optimize management , Visual or searchable |
Data directory / classification | Policy documents for data classification ; Data catalogue and classification identification of data . | Data statistics and visual management |
The data flow | Management regulations on data circulation ; Circulation audit records ; If suppliers are involved 、 Have due diligence records 、 Data processing agreement signing record ; If cross-border is involved , Have the signing record of data transmission protocol . | Data record statistics and visual management |
Privacy design | design code 、 Checklist ; Checklist self inspection record . | Self test result measurement Statistics and analysis |
Data subject request | Management regulations 、 Processing flow ; Processing records . | Quantity measurement ( Statistics by type , Such as account cancellation 、 Correction, etc ; Statistics of business request data by business ); SLA Measure ( Timely completion rate, etc ) |
risk assessment | Risk management regulations 、 Evaluation methods 、 Grading criteria ; Evaluation record . | Evaluation report statistics and analysis 、 Risk classification |
Consciousness education | Management regulations ( Qualification requirements for employees 、 Training requirements, etc ); train / Exam records . | train / Test data quantification and statistical analysis |
Event management | Management regulations 、 Event handling process 、 Processing records . | Statistics and analysis |
边栏推荐
猜你喜欢
[thingsboard] how to replace the homepage logo
Threejs Internet of things, 3D visualization of farms (II)
Longyuan war "epidemic" 2021 network security competition web easyjaba
网络安全-记录web漏洞修复
Official announcement! The third cloud native programming challenge is officially launched!
可观测|时序数据降采样在Prometheus实践复盘
Network layer - forwarding (IP, ARP, DCHP, ICMP, network layer addressing, network address translation)
10 programming habits that web developers should develop
Matplotlib draws three-dimensional scatter and surface graphs
[phantom engine UE] only six steps are needed to realize the deployment of ue5 pixel stream and avoid detours! (the principles of 4.26 and 4.27 are similar)
随机推荐
美国5G Open RAN再遭重大挫败,抗衡中国5G技术的图谋已告失败
电源管理总线 (PMBus)
快手、抖音、视频号交战内容付费
PHP reads the INI file and writes the modified content
Invalid bound statement (not found) in idea -- problem solving
2022-2028 global and Chinese FPGA prototype system Market Research Report
Leetcode hot topic Hot 100 day 33: "subset"
MacBook installation postgresql+postgis
web资源部署后navigator获取不到mediaDevices实例的解决方案(navigator.mediaDevices为undefined)
Learning MVVM notes (1)
Ffmepg usage guide
【虚幻引擎UE】打包报错出现!FindPin错误的解决办法
Wenet: E2E speech recognition tool for industrial implementation
Fonction (sujette aux erreurs)
[uniapp] system hot update implementation ideas
American 5g open ran suffered another major setback, and its attempt to counter China's 5g technology has failed
Neural networks and deep learning Chapter 6: Circular neural networks reading questions
What are the building energy-saving software
windows下Redis-cluster集群搭建
【虚幻引擎UE】实现测绘三脚架展开动画制作