EY - Protecting Your Data PDF

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

Protecting your data

EY’s approach to data privacy and


information security
Overview
Digital networks are a key enabler in the globalization of business. They dramatically
enhance our ability to communicate, share and store information and connect with
colleagues and clients. New technologies bring new capabilities and, perhaps, a greater
risk of non-controlled data disclosure. This reality has prompted a number of regulators
to increase data privacy constraints, including limits on international transfers of
personal data, and specify information security requirements designed to protect the
confidentiality, integrity and availability of business and personal information.

At EY, we believe that a strong business reputation depends on a robust data privacy
and information security program.

EY views data privacy and information security as fundamental components of doing


business. We are committed to protecting information assets, personal data and client
information. We believe that a solid data privacy and information security program is an
essential component of a leading professional services organization.

The purpose of this document is to summarize our approach to data privacy and
information security. It provides an overview of how we secure client information and our
systems housing this information, keeping in mind that the specifics of these measures
may vary depending on the service and the applicable country regulatory requirements.

Our data privacy and information security program and practices are focused on
sharing information appropriately and lawfully, while providing confidentiality, integrity
and availability.

2 Protecting your data


A well-articulated security
and privacy strategy
Our ability to provide seamless, consistent, The following are the principles of our global example, our US member firm is registered
high-quality client service worldwide is data privacy policy: with the U.S. Department of Commerce for
supported by a well-articulated data privacy the Safe Harbor certification, which aims to
• We protect personal data using appropriate
and information security strategy. We protect harmonize data privacy practices in trading
physical, technical and organizational
information assets, personal data and client between the US and the stricter controls of
security measures.
information whenever and wherever they are the European Union Directive 95/46/EC.
created, processed, transmitted or stored. • We process, store and disclose personal
We develop and maintain ongoing compliance data only for legitimate business purposes.
with applicable domestic and international Binding corporate rules
• We make sure our contracts with third-party EY is working toward introducing binding
regulatory standards.
processors contain terms that confirm data corporate rules (BCR) to the existing global
The implementation of our data privacy is managed according to the same standards personal data privacy program to legitimize
and information security program and we implement across the enterprise. international data transfers. Our BCR policy
practices is managed by two distinct yet is currently being reviewed as part of the
• We give additional attention and care to
aligned groups: the Global Data Privacy European Data Protection Authorities
sensitive personal data, making sure we
Network and the Information Security (DPA) Mutual Recognition process and,
respect local laws and customs.
organization. Their mission is to protect once finalized, will be available on our
the information assets of EY and its clients • We’ve established appropriate measures global website as a public statement of EY’s
from unauthorized collection, retention, use, to ensure personal data remains accurate, commitment to good data management
disclosure, modification or destruction. This complete, current, adequate and reliable. practices.
is accomplished through appropriate policies,
• Where applicable, we provide notice to
procedures, guidelines and technical security
individuals with whom EY member firms Global code of conduct
architecture.
engage, advising them of the purpose for We hold our professionals to the applicable
Our Global Data Privacy Network and which we are processing their personal professional and technical standards and
Information Security organization are information. require strict adherence to our global code of
aligned under global priorities which are conduct. These principles are publicly available
consistently implemented worldwide within for viewing on our global website (http://www.
the EY organization. This provides a single, International intra-group data
ey.com/GL/en/Home/Global-Code-of-Conduct)
cohesive vision around the protection of our protection agreement
and represent binding standards that apply to
information assets, personal data and client All EY member firms that process personal
all member firms globally.
information. data have entered into an international
intra-group data protection agreement The global code of conduct is based on
(IGA). The purpose of the IGA is to set out a comprehensive behavioral and ethical
Key initiatives the relationship between these entities with framework. It guides the daily decisions
respect to international transfers of personal made by all our people, regardless of their
Global data privacy policy data. The IGA is consistent with the standards individual role, position or member firm. It
Our global data privacy policy addresses the established by the European Union Directive demands that employees respect and protect
issues raised by modern data management 95/46/EC on the protection of personal data. both personal and confidential information
tools and systems. We apply a common set The IGA legitimizes transfers of personal data obtained from, or relating to, EY, our clients
of personal data management principles to between member firms around the world, in or third parties.
all our member firms, providing a framework compliance with international standards and
for processing personal data in compliance local data privacy laws.
with their local privacy laws and professional When necessary, in addition to the IGA,
standards, as well as their own internal policies. further initiatives are undertaken. As an

Protecting your data 3


Data privacy and information security We are committed to protecting our people, About our information
awareness facilities, infrastructure, business processes
As attack methods change, so must the and data during and after a catastrophic security technology controls
information, guidance and training we offer event. The response and system recovery to
our people. Raising awareness of threats to our critical business environment has been Our approach to information security
data privacy and information security is an carefully planned and tested to demonstrate does not rely solely upon written security
ongoing and dynamic process. It is one that that our most critical business applications policy or standards. We also maintain the
EY takes very seriously, and it is reflected are readily available in the event of a confidentiality, integrity and availability of
not only in specialized formal training for declared disaster. information through the protection of our
employees in each of our service lines, but in technology resources and assets. Measures
EY’s disaster recovery methodology
numerous other activities to raise awareness include, but are not limited to:
incorporates the following:
within the entire global EY population.
• Full disk laptop/desktop encryption
• Mission-critical disaster recovery plans
• Removable media encryption tools (e.g.,
built on industry-leading standards
Information security strategy and USB “thumb” drives)
• Support from certified disaster recovery
mindset • Desktop/laptop firewall
planners
Our global information security program • Antivirus/anti-malware software
• Regular testing of disaster recovery plans
is designed to drive and promote the • Multi-factor authentication solutions
to ensure operational readiness
confidentiality, integrity and availability of • Automated patching and security
our personal and client information assets. vulnerability assessments
We support this effort through our global
About our information • Strong physical, environmental and
information security policy in concert with security policy perimeter controls
our focus on data protection technologies. • Intrusion detection and prevention
We implement technical security controls technologies
Our multifaceted and detailed security
to manage data in accordance with privacy program is anchored by our global information In addition, we invest considerable time
law, regulatory requirements and generally security and personal conduct policies. This and resources into future-state security
accepted security principles. enables us to consistently apply appropriate technologies through our technology security
We are proactive in securing and properly security standards, controls and guidance. strategy. We align our information security
managing confidential and personal strategy to our technology product road
Our information security policy and its
information through our ISO 27002–based map and maintain close association with our
supporting standards and controls are
information security program, which includes: technology service offerings. This properly
continually reviewed, vetted and approved
positions us to address security issues that
• Appropriate policies, standards, guidelines by senior management. We conduct these
might otherwise threaten the confidentiality,
and program management reviews to confirm that the material remains
integrity or availability of our technology
• Strong technical security controls timely and accurate, and that it correlates to
resources.
• A security compliance program involving legal or regulatory requirements applicable to
security reviews, certifications and audits our organization. This policy is built upon the
• A clearly defined security strategy and internationally accepted standards for security
road map that consider the following: program management, ISO 27001/2.
• Data privacy: legal, regulatory and Mandatory and recommended security
procedural requirements policy statements span nearly a dozen widely
• Business: mandated procedures and recognized information security areas,
requirements including but not limited to:
• Technology: policies, standards and
procedures • Access control
• External threats: changes to the security • Asset management: classification
threat landscape and control
• A security incident management program • Communications and operations
to effectively control and remediate management
security-related incidents • Human resources security: personnel
• Information systems acquisition,
development and maintenance
Disaster recovery program
• Physical and environmental security
EY’s continued commitment to protecting
organization and client data is demonstrated
through our disaster recovery capabilities.

4 Protecting your data


At EY, we believe that a strong
business reputation depends on a
robust data privacy and information
security program.

Protecting your data 5


Compliance and audit
We have a strong data privacy and information European Union, as established by the local • Network vulnerability scans, which focus
security program. We maintain an effective regulators in the region. on the technical aspects of the global
governance function, and we conduct information security policy, such as patch
The appropriate policies and guidance have
compliance reviews through formal audit management, application security and
been published to enable all new global
exercises. We manage compliance with data infrastructure security
applications to be designed and developed
privacy and information security obligations by • Foundation audits, which review
according to data privacy standards driven by
executing the following reviews and programs. technical controls and build processes of
the global systems and process review.
components such as operating systems,
databases and infrastructure
Security certification process • On-site field audits, which include
Information security self-assessments
We rely on our applications and systems to interviews with key management
Information security self-assessments are a
service, manage and store our information and personnel, detailed site walk-throughs,
core element of our annual compliance and
that of our clients. All applications and systems documentation reviews and network
review activities. IT managers responsible for
are subject to our security certification process, vulnerability scans. These on-location
development and operations of our global
where they are reviewed by information investigations are the most significant
technology services must indicate compliance
security professionals prior to implementation. and detailed form of audit, assessing
with relevant security policy statements
This is to confirm that the applications and compliance with all aspects of global
or standards. Information security self-
systems have been developed in accordance information security policy
assessments are also completed by managers
with our information security policy and secure
of data centers and other facilities that Information security compliance audit
application development standards.
house or process client data. All findings are findings are compiled and vetted by senior
The security certification process is recursive documented through our governance, risk management. These findings are weighed
in nature and incorporates risk assessment, and compliance processes. against the results from the initial self-
documentation reviews, penetration testing assessment exercise, and any identified gaps
This enables us to gauge the efficiency,
and vulnerability assessments. It is applied are included in the final report. Corrective
effectiveness and completeness by which
to any application or system used to create, action plans are determined and accepted,
information security controls are implemented.
store or manage information on behalf of should they be required.
It also enables us to evaluate information
EY. This process helps us to maintain the
security controls in terms of their
confidentiality, integrity and availability of
implementation and continued management,
our information and that of our clients. Information security exceptions
as required by our global information
If an issue cannot be managed through a
security policy.
corrective action plan, an exception process
Global privacy impact assessments is employed to generate the necessary
We conduct regular, thorough privacy impact dialogue around the issue. The exception
Information security audits
assessments (PIAs) of our global applications process includes, but is not limited to, a
To obtain a more complete view of our
and business initiatives that handle personal formal approval process, regular reviews of
information security compliance, our global
information. Each PIA reviews the application each exception and a security assessment
technology products, services and data
or initiative against global standards and, with an assigned risk rating. Compensating
centers are subject to audits. We conduct
where necessary, provides advice to mitigate controls typically accompany any approved
several forms of audit:
data privacy and confidentiality risks. exception to help properly mitigate risks
• Annual ISAE 3402 audits of our three that may arise as a consequence of the
Following a PIA, a list of data privacy and
global data centers in the US, Germany and modification.
confidentiality recommendations, with
Singapore, in which our security controls
detailed guidelines, is prepared for all users This exception process confirms that
are audited and verified by an independent
and administrators of that system. This exceptions and any subsequent corrective
third-party auditor
detailed assessment satisfies data transfer actions are properly documented, managed
requirements for EY member firms in the and readdressed at a future date.

6 Protecting your data


Summary
EY secures information assets for our clients through the use of an integrated data
privacy and information security strategy:

• We align our information security governance with our data privacy governance to
provide a consistent, cohesive vision around the protection of our information assets,
personal data and client information.
• We subject our global applications and systems to both data privacy impact
assessments and security certification reviews, which enable a robust, consistent
approach in deployment and operation.
• We protect personal data within our network using appropriate physical, technical and
organizational security measures.
• We provide assurance that our contracts with third-party processors contain provisions
that are commensurate with our own policies, practices and controls to confirm
your data is managed properly and securely, in accordance with legal and regulatory
requirements.
Clients and individuals rightfully demand accountability from any organization handling
their personal and confidential data. We understand the importance of taking appropriate
steps to safeguard information assets and are committed to protecting information
relating to our clients and to our people.

If you have any questions or require further information on the ways in which we protect
you and your business, please contact your EY representative.

Protecting your data 7


EY | Assurance | Tax | Transactions | Advisory

About EY
EY is a global leader in assurance, tax, transaction and advisory
services. The insights and quality services we deliver help build
trust and confidence in the capital markets and in economies the
world over. We develop outstanding leaders who team to deliver
on our promises to all of our stakeholders. In so doing, we play a
critical role in building a better working world for our people, for
our clients and for our communities.
EY refers to the global organization and may refer to one or more
of the member firms of Ernst & Young Global Limited, each of
which is a separate legal entity. Ernst & Young Global Limited, a
UK company limited by guarantee, does not provide services to
clients. For more information about our organization, please
visit ey.com.

© 2013 EYGM Limited.


All Rights Reserved.

EYG No. CN0031


ED none

This material has been prepared for general informational purposes only and is
not intended to be relied upon as accounting, tax, or other professional advice.
Please refer to your advisors for specific advice.

ey.com

You might also like