Privacy Session PSUT

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 17

Privacy and Security

together in the Digital Era


AGENDA
Introduction

Privacy Vs Security

Terminologies

Privacy Principles

Data Subject Rights

Controller Vs Processor

Compliance Areas
https://myaccount.google.com/dashboard?pli=1
Introduction

What is What is Data Privacy


Data Data Vs. Security
Privacy ? Security ? !!
Introduction
Privacy Vs. Security
When it comes to data privacy vs data security, we can frequently hear or read those terms
being used interchangeably. However, are these indeed synonyms, or do they denote
slightly different concepts

Think for example of a window on a building; without it being in place an intruder can
sneak in and violate both the privacy and security of the occupants.
Once the window is mounted it will perform a decent job in keeping unwanted parties
from getting into the building. It will, however, not prevent them from peeking in,
interfering thus with the occupants’ privacy. At least not without a curtain.

In this (oversimplified) example the window is a security control, while the curtain is
privacy control.
Privacy Vs. Security
There are many definitions for ‘data privacy’. The
simplest way to think about it is that people
(customers, employees, anybody!) need to know
what personal data organizations are collecting
about them and how they are using it.

Data protection is essentially


amalgamated security and privacy.
Terminologies

DATA SUBJECT
The individual to whom Personal Data relates. Data subject
Introduction

DATA CONTROLLER Data controller


Any Public Entity, natural person or private
legal person that specifies the purpose
and manner of Processing Personal Data, Data processor
whether the Data is processed
by that Controller or by the Processor.

Authority
DATA PROCESSOR
Any Public Entity, natural person or private legal person
that processes Personal Data for the benefit and on behalf of the Controller.
Controller Vs. Processor
Controllers ‘determine the purpose of the
processing's’. This means that they make A simple way to think about
decisions about what information is captured this is as follows. A retailer
and why.
creates an
Introduction e-commerce
website and decides what
information they require from
customers to create an
account. The company uses a
cloud provider to host their
website and database. In this
case, the company is the data
Controller, and the cloud
provider is the data
Processors process personal data on Processor
behalf of a controller and in line with the
given instructions. If a processor sub-
Examples of Personal Data
General Personal Data Financial Information
 Name, Surname
 Social Security Numbers
 Gender Account numbers (bank accounts, credit cards,

 Date of birth etc.)

Personal Identification Numbers (PINs)
 Home Address 
 Passwords to financial accounts
 ID Number
Income information
 Personal email address
 Biometric data (photograph / video)
Personal Identifiable Information

Health Information Sensitive Information


 Racial or ethnic origin
 Medical records
 Religious beliefs
 Physical / mental health information
 Health Information
 Health plan
 Sexual orientation
 Health history
 Political views
 Criminal convictions / Security measures
Why is Data Privacy Important

Regulatory Reputational

Operational Financial
Controller Responsibilities

when selecting the Processor, the Controller shall :


• Select one that provides the guarantees necessary to
implement the provisions of this Law and the Regulations .
Introduction

• Verify the selected Processor’s compliance with the


provisions of this Law and the Regulations, without prejudice
to its responsibilities towards the Personal Data Subject or the
Competent Authority.

17
Controller Responsibilities

• Data controllers must assess projects, products, and services


to identify data protection risks posed to individualsIntroduction
(basically
Impact Assessments).

• Data controllers must implement a Privacy notice


• Data controllers will be expected to report data breaches to
the regulatory authority as soon as they become aware of an
incident.
Security and Privacy Collaboration

Collaboration between security and privacy is essential to ensure


that an organization's data protection efforts are effective and
Introduction
aligned

Privacy and Security are Interconnected

Privacy Needs Security

Better Together: Data Security and Privacy Go Hand-in-


Hand
Collaboration

Joint Risk Assessments: security and privacy teams can collaborate on conducting risk
assessments to identify potential threats and vulnerabilities to personal data they can
ensure that the risk assessment process considers both security and privacy risks.
Introduction

Data Classification: Security and privacy teams can collaborate on developing a data
classification scheme that categorizes data based on its sensitivity and the level of
protection required. This can help ensure that appropriate security and privacy
controls are applied to different types of data.

Incident Response:
Security and privacy teams can collaborate on developing and testing incident response
plans to ensure that they are aligned and effective. This can include procedures for
detecting, containing, and reporting security and privacy incidents.
Security and Privacy Interdependences

Introduction
Thank you

You might also like