Methodology For Privacy Risk Management - How To Implement The Data Protection Act (CNIL 2012)
Methodology For Privacy Risk Management - How To Implement The Data Protection Act (CNIL 2012)
Methodology For Privacy Risk Management - How To Implement The Data Protection Act (CNIL 2012)
Édition 2012
Methodology for Privacy Risk Management
Translation of June 2012 edition
Contents
FOREWORD ........................................................................................................ 4
INTRODUCTION.................................................................................................. 5
1. THEORY: RISK MANAGEMENT CONCEPTS .................................................... 6
1.1. The notion of privacy risk ........................................................................................6
Feared events: what has to be avoided ................................................................................ 6
Threats: what we have to protect from ................................................................................ 7
Level of risks: how to estimate them? .................................................................................. 8
1.2. The privacy risk management approach ..................................................................9
2. PRACTICE: EBIOS IN THE FIELD OF PRIVACY ............................................... 10
2.1. Background study: What is the context? ................................................................ 10
2.2. Feared events study: What does one fear happening? ........................................... 12
2.3. Threats study: How can it happen? (if needed) ...................................................... 15
2.4. Risk study: What is the risk level? (if needed) ........................................................ 18
2.5. Measures study: What can be done to treat risks? ................................................. 20
APPENDICES ..................................................................................................... 24
Generic threats ................................................................................................................ 24
Threats that may jeopardize confidentiality ....................................................................... 24
Threats that may jeopardize integrity ................................................................................. 25
Threats that may jeopardize availability ............................................................................. 26
Acronyms ......................................................................................................................... 28
Definitions ....................................................................................................................... 28
References ....................................................................................................................... 31
Tables
TABLE 1 – DETERMINING THE SEVERITY OF EACH FEARED EVENT ................................................................................................ 13
TABLE 2 – FEARED EVENTS STUDY ....................................................................................................................................... 14
TABLE 3 – DETERMINING THE LIKELIHOOD OF EACH THREAT ..................................................................................................... 16
TABLE 4 – THREATS STUDY ................................................................................................................................................ 17
TABLE 5 – SELECTED RISK-TREATMENT MEASURES .................................................................................................................. 23
TABLE 6 – THREATS THAT MAY JEOPARDIZE CONFIDENTIALITY ................................................................................................... 24
TABLE 7 – THREATS THAT MAY JEOPARDIZE INTEGRITY............................................................................................................. 25
TABLE 8 – THREATS THAT MAY JEOPARDIZE AVAILABILITY ......................................................................................................... 27
Figures
FIGURE 1 – DETERMINATION OF THE LEVEL OF EACH RISK........................................................................................................... 8
FIGURE 2 – RISK COMPONENTS ............................................................................................................................................ 8
FIGURE 3 – THE FIVE ITERATIVE STEPS OF THE APPROACH ........................................................................................................... 9
FIGURE 4 – RISK MAP ....................................................................................................................................................... 18
FIGURE 5 – RESIDUAL RISK MAP .......................................................................................................................................... 21
-2-
FRENCH REPUBLIC
8 rue Vivienne – CS 30223 – 75083 Paris Cedex 02 – Tel: +33 (0)1 53 73 22 22 – Fax: +33 (0)1 53 73 22 00
Methodology for Privacy Risk Management
Translation of June 2012 edition
METHODOLOGY OF TRANSLATION
As a principle, it was decided not to translate the original titles of French institutions or
procedures which appear in the text, when their translation may be misleading.
For example, the title of the “Commission Nationale de l’Informatique et des Libertés” (CNIL),
the French Data Protection Authority, was not translated and it appears as such or under its
acronym (CNIL) in the body of the text.
It has been decided not to translate the references tag [example] when the referred document
was not available in English.
This English version of “Gérer les risques sur les libertés et la vie privée, la méthode” is
provided for informative purposes, only as a courtesy for the non-French reading public.
While the CNIL has tried to provide an accurate translation of the original guide available in
French, in case of discrepancies between the two texts, the French version shall prevail.
-3-
FRENCH REPUBLIC
8 rue Vivienne – CS 30223 – 75083 Paris Cedex 02 – Tel: +33 (0)1 53 73 22 22 – Fax: +33 (0)1 53 73 22 00
Methodology for Privacy Risk Management
Translation of June 2012 edition
Foreword
This document was drawn up by the Expertise Department of the CNIL, with the kind support of
several reviewers1, and presented to different working groups2. It describes a method for
managing the risks that the processing of personal data can generate to individuals. Following
the guide [CNIL-SecPersonalData], this method consists in a complete analytical approach for
improving the management of processing of personal data, especially when they are complex
or when identified stakes are high. It is linked to a catalog of measures intended to address the
risks assessed with this method.
The use of this approach depends on the processing of personal data on which it is applied: it
will probably not be very useful for a single file created to monitor the progress of a project,
whereas it will be necessary for a complex processing of sensitive personal data.
Applying this method does not replace the formalities that data controllers have to fill in to
the CNIL prior to commencing data processing. This is a rational approach that is going to
facilitate their work.
This document is primarily intended for use by controllers, and in particular by stakeholders in
the creation or improvement of processing of personal data:
controllers, who may have to justify to the CNIL on what measures they have chosen to
implement in their systems;
project owners / business, who have to assess the risks to their systems and set security
objectives;
prime contractors / operation, who have to propose solutions to treat risks in
accordance with the objectives identified by the projects owners;
personal data protection officers (DPO), who have to accompany the project owners in
the protection of personal data;
chief information security officers (CISO), who have to accompany the project owners in
the field of information security (IS).
It aims to assist them in law [Act-I&L]3 enforcement and should enable them:
to have an rational view of risks arising from their processing of personal data;
to know how to determine security measures, necessary and sufficient to "take all
useful precautions, with regard to the nature of the data and the risks of the processing,
to preserve the security of the data and, in particular, prevent their alteration and
damage, or access by non-authorized third parties" ([Act-I & L] Article 34).
1
Barbara DASKALA (ENISA), Daniel LE METAYER (INRIA) and other anonymous contributors.
2
Including Club EBIOS (on risk management) and NETFOCUS (on information security).
3
Resolution No. 81-094 of 21 July 1981 on the adoption of a recommendation relative to general measures for
computer system security already stated that the risk assessment and the general security study are systematically
performed for any new processing, and reviewed for existing processing.
-4-
FRENCH REPUBLIC
8 rue Vivienne – CS 30223 – 75083 Paris Cedex 02 – Tel: +33 (0)1 53 73 22 22 – Fax: +33 (0)1 53 73 22 00
Methodology for Privacy Risk Management
Translation of June 2012 edition
Introduction
The personal data have to be distinguished from other information within information systems.
They can represent a value to the organization that processes them. But their processing causes
alsode factoa significant liability due to the risks brought upon on the privacy4 of data subjects.
They have value for data subjects as well. They can be useful for administrative or commercial
purpose, or may even contribute to their image. But security breaches in data protection can
also cause physical injury, material and moral damage.
Finally they have a value for others. This includes a market value if they are exploited for
commercial purposes (spam, targeted advertising…), or a nuisance value in the case of unfair
actions (discrimination, refusal of access to benefits, dismissal…) or malicious actions (identity
theft, defamation, threats, blackmail, burglary, assault…).
To this end, it is appropriate to adopt a global vision, that goes beyond the framework of the
organization's activities and the purposes determined for its processing, and allows to study
impacts on individuals concerned by those data.
4
Throughout this document the term "privacy" is used as shorthand to refer to "human identity, human rights,
privacy, or individual or public liberties".
-5-
FRENCH REPUBLIC
8 rue Vivienne – CS 30223 – 75083 Paris Cedex 02 – Tel: +33 (0)1 53 73 22 22 – Fax: +33 (0)1 53 73 22 00
Methodology for Privacy Risk Management
Translation of June 2012 edition
The feared event describes the situation and the potential impacts in the considered context.
5
Including the international standard [ISO31000].
6
Is needed, possible other considerations are:
- "compromise of the processing". Indeed, some processing, such as those involving State security, may
need to be kept secret, because knowledge of their existence may cause or aggravate the risk on data
subjects;
- "unavailability of the processing" in addition to the "disappearance of personal data". Sometimes it is
useful to distinguish the personal data and their processing, which would be indispensable to data
subjects, as in the case of certain benefits (health, administrative...);
- "modification of legal process". While this is uncommon and difficult to study, it is possible to appreciate
the risks associated with a legal process, for example the one which allow data subjects to exercise their
access right, that could change and cause them damage.
-6-
FRENCH REPUBLIC
8 rue Vivienne – CS 30223 – 75083 Paris Cedex 02 – Tel: +33 (0)1 53 73 22 22 – Fax: +33 (0)1 53 73 22 00
Methodology for Privacy Risk Management
Translation of June 2012 edition
The action of the risk sources on supporting assets may happen through different threats:
function creep: supporting assets are diverted from their intended context of use
without being altered or damaged;
espionage: supporting assets are observed without being damaged;
exceeded limits of operation: supporting assets are overloaded, over-exploited or used
under conditions not permitting them to function properly;
damage: supporting assets are partially or completely damaged,;
changes: supporting assets are transformed;
property losses: supporting assets are lost, stolen, sold or given away, so it is no longer
possible to exercise property rights.
-7-
FRENCH REPUBLIC
8 rue Vivienne – CS 30223 – 75083 Paris Cedex 02 – Tel: +33 (0)1 53 73 22 22 – Fax: +33 (0)1 53 73 22 00
Methodology for Privacy Risk Management
Translation of June 2012 edition
Examples of threats
A malicious attacker injects unexpected queries in the form of a website.
A competitor, visiting incognito, steals a portable hard drive.
A staff member removes tables from a database by mistake.
Water damage destroys the computer servers and telecommunications.
Risks
Supporting Potential
Risk sources Primary assets
assets impacts
7
Capabilities of the risk sources depends on their skills, time available, financial resources, distance to the system,
motivation, sense of impunity…
-8-
FRENCH REPUBLIC
8 rue Vivienne – CS 30223 – 75083 Paris Cedex 02 – Tel: +33 (0)1 53 73 22 22 – Fax: +33 (0)1 53 73 22 00
Methodology for Privacy Risk Management
Translation of June 2012 edition
Notes
Figure 3 – The five iterative steps of the approach
The validation of how risks have been handled as well as the acceptance of residual risk
(remaining risks after application of measures), are part of the controller’s responsibility.
Some risks can neither be neither modified nor retained, especially when sensitive data are
processed or when harm that data subjects may suffer is significant. In such cases, it may be
necessary to choose to avoid the risks, for example by failing to implement all or part of a
processing of personal data.
This approach does not prejudge the conformity assessment that can be made by the CNIL
when assessing formalities prior to commencing data processing.
-9-
FRENCH REPUBLIC
8 rue Vivienne – CS 30223 – 75083 Paris Cedex 02 – Tel: +33 (0)1 53 73 22 22 – Fax: +33 (0)1 53 73 22 00
Methodology for Privacy Risk Management
Translation of June 2012 edition
Notes
The approach should be implemented as soon as a new processing operation is designed.
Implementing this approach at the outset makes it possible to determine the necessary and
sufficient measures and thus to optimize costs. Conversely, implementing it after the creation
of the system and the implementation of measures, may call into question choices made.
Due to its compatibility with international standards on risk management, this approach can
easily be made part of overall risk management.
The aim at this stage is to gain a clear view of the scope under consideration by identifying all
the useful information for risk management by answering the following questions:
8
EBIOS (see acronym on page 28) is the name of the risk management method published by ANSSI (see acronym
on page 28). This recognized and proven methodology toolkit is widely used in both the public sector (ministries,
organizations under ministerial supervision, communities, etc.) and the private sector (manufacturers, key
accounts, consultants, etc.) in France and around the world (Quebec, Belgium, Luxembourg, European Union,
NATO, etc.) to manage information system security risks. Its high flexibility and compatibility with international risk
management standards allow it to be easily adapted to privacy protection and other needs.
9
Person(s) responsible for implementing the action.
10
May be delegated, represented or contracted out.
11
Legitimate person to approve the action.
12
Person(s) consulted to obtain useful information for the action.
13
Or the person in charge of data protection.
14
Person(s) informed about the action's results.
15
The reader is reminded that personal data are collected for specified, explicit and legitimate purposes.
16
Employees, users, members, customers (current or potential), visitors, patients, students/pupils, etc.
- 10 -
FRENCH REPUBLIC
8 rue Vivienne – CS 30223 – 75083 Paris Cedex 02 – Tel: +33 (0)1 53 73 22 22 – Fax: +33 (0)1 53 73 22 00
Methodology for Privacy Risk Management
Translation of June 2012 edition
Note
The inventory of personal data must serve as an opportunity to verify whether each item of
data is absolutely necessary for the processing operation and whether appropriate storage
periods have been set17.
What are the main benefits offered by processing to data subjects or society as a
whole?
What are the relevant sources of risk that might affect19 the specific context of the
processing operation under consideration?
Which internal individuals are to be considered (users, administrators, developers,
policymakers, etc.)?
Which external individuals are to be considered (customers, recipients, providers,
competitors, activists, curious persons, malicious individuals, government
organizations, surrounding human activity, etc.)?
Which non-human sources are to be considered (damaging event, malicious
software from an unknown source, natural phenomenon, natural or health
disasters, etc.)?
17
A period "not exceeding the period needed in order to achieve the purposes for which such data are collected
and processed" (Article 6 of [Act-I&L]), in the absence of another legal obligation imposing a longer retention
period.
18
Security solutions (products, procedures, measures, etc.) are not supporting assets. They are risk-treatment
measures that are determined at the end of the study (encryption, making backups, keeping a log of actions, using
a firewall, setting up a virtual private network, informing parties involved, etc.).
19
These sources may be accidental (blunder, thoughtlessness, poor understanding of commitment, lack of
motivation in one's relationship with the organization, etc.) or deliberate (game, ego, revenge, profit motive, etc.).
- 11 -
FRENCH REPUBLIC
8 rue Vivienne – CS 30223 – 75083 Paris Cedex 02 – Tel: +33 (0)1 53 73 22 22 – Fax: +33 (0)1 53 73 22 00
Methodology for Privacy Risk Management
Translation of June 2012 edition
The aim of this step is to obtain a detailed and prioritized list of all feared events that may
affect the processing operation under consideration. An example is provided in the table on
page 14.
Clarifying feared events requires identifying their potential impacts. In other words, what
consequences could each feared event have on the identity and privacy of data subjects and
human rights or civil liberties if:
The legal processes were unavailable?
The processing operation was modified?
An unauthorized person accessed personal data?
Personal data were modified?
Personal data disappeared?
These feared events are ranked by determining their severity based on the level of
identification of personal data and the prejudicial effect of these potential impacts.
First of all, the level of identification of all personal data (identified beforehand) must be
assessed. In other words, how easy is it to identify data subjects20 ?
1. Negligible: Identifying an individual using their personal data appears to be virtually
impossible (e.g. searching throughout the French population using only an
individual's first name).
2. Limited: Identifying an individual using their personal data appears to be difficult but
is possible in certain cases (e.g. searching throughout the French population using an
individual's full name).
3. Significant: Identifying an individual using their personal data appears to be
relatively easy (e.g. searching throughout the French population using an individual's
full name and date of birth).
4. Maximum: Identifying an individual using their personal data appears to be
extremely easy (e.g. searching throughout the French population using an
individual's full name, date of birth and mailing address).
20
"In order to determine whether an individual is identifiable, all means that would allow the said individual to be
identified and which are available to or accessible by the data controller or any other person must be taken into
consideration" (Article 2 of [Act-I&L]). This includes information that is public, held or obtained otherwise,
including over the Internet.
- 12 -
FRENCH REPUBLIC
8 rue Vivienne – CS 30223 – 75083 Paris Cedex 02 – Tel: +33 (0)1 53 73 22 22 – Fax: +33 (0)1 53 73 22 00
Methodology for Privacy Risk Management
Translation of June 2012 edition
The value of the level that best matches the personal data identified is then selected. Any
existing or planned measures that make personal data less easily identifiable should be listed as
justification as shown in the table on page 14.
Next, the prejudicial effect of each feared event should be estimated. In other words, how
much damage21 would be caused by all the potential impacts?
1. Negligible: Data subjects either will not be affected or may encounter a few
inconveniences, which they will overcome without any problem (time spent re-
entering information, annoyances, irritations, etc.).
2. Limited: Data subjects may encounter significant inconveniences, which they will be
able to overcome despite a few difficulties (extra costs, denial of access to business
services, fear, lack of understanding, stress, minor physical ailments, etc.).
3. Significant: Data subjects may encounter significant consequences, which they
should be able to overcome albeit with serious difficulties (misappropriation of
funds, blacklisting by banks, property damage, loss of employment, subpoena,
worsening of state of health, etc.).
4. Maximum: Data subjects may encounter significant, or even irreversible,
consequences, which they may not overcome (financial distress such as substantial
debt or inability to work, long-term psychological or physical ailments, death, etc.).
The value of the level that best matches the potential impacts identified is then selected.
Any existing or planned measures that make these potential impacts less harmful should be
listed as justification as shown in the table on page 14.
Finally, the severity is determined by adding the respective personal data level of identification
and prejudicial effects of potential impacts values obtained and locating the sum in the table
below:
Option: The severity level thus obtained may be raised or lowered by including additional
factors. For example, a large number of data subjects (which can open the door to a massive
damaging event) may raise the level of severity by one. A large number of interconnections
(especially with foreign sites) or recipients (which facilitates the correlation between originally
separated personal data) might also be considered as an aggravating factor. Conversely, a very
small number of data subjects or very few or no interconnections or recipients might lower the
severity level by one.
21
Damage to data subjects may be:
- physical (loss of amenity, disfigurement, or economic loss related to physical integrity),
- material (loss incurred or lost revenue with respect to an individual's assets),
- moral (physical or emotional suffering, disfigurement or loss of amenity, etc.).
- 13 -
FRENCH REPUBLIC
8 rue Vivienne – CS 30223 – 75083 Paris Cedex 02 – Tel: +33 (0)1 53 73 22 22 – Fax: +33 (0)1 53 73 22 00
Methodology for Privacy Risk Management
Translation of June 2012 edition
Tool
The result of this step can be summarized in a table such as the one below:
Level of
Most serious potential Prejudicial effects of Existing or planned Maximum
Feared events identification of
22 impacts potential impacts measures severity
personal data
Uncontrolled
circulation of
personal data
1. Unavailability
Inability to exercise No planned severity- 3.
of legal 4. Maximum 2. Limited
one's rights reduction measure Significant
processes
Blocking from
purchasing
procedures
Unsolicited
2. Change in No planned severity-
4. Maximum messages/mail from 1. Negligible 2. Limited
processing reduction measure
advertisers
3. Illegitimate Account theft
4.
access to 4. Maximum Use for commercial 3. Significant All data are required
Maximum
personal data purposes
4. Unwanted
Daily backups and
change of 4. Maximum Unfulfilled orders 1. Negligible 2. Limited
retrieval
personal data
5. Disappearance
Must re-register Daily backups and
of personal 4. Maximum 1. Negligible 2. Limited
Loss of benefits retrieval
data
Table 2 – Feared events study
22
In this example, the main types of personal data are customers' marital status, address and bank details as well
as products purchased by them and their login ID.
- 14 -
FRENCH REPUBLIC
8 rue Vivienne – CS 30223 – 75083 Paris Cedex 02 – Tel: +33 (0)1 53 73 22 22 – Fax: +33 (0)1 53 73 22 00
Methodology for Privacy Risk Management
Translation of June 2012 edition
Roles Stakeholders
5 1 Controller Prime contractor23
4 2 Approver Data controller
3 Consulted party DPO and/or CISO
Informed party -
The aim of this step is to obtain a detailed, prioritized list of all threats 24 that may allow feared
events to occur. It is possible to leave out threats relating to feared events of negligible (1) or
limited (2) severity. An example is provided in the table on page 17.
Since a threat is a possible action by risk sources on supporting assets, the supporting assets
should be identified and estimated for each threat.
First, the vulnerabilities of the supporting assets are estimated for each threat. In other words,
to what degree can the properties of supporting assets be exploited in order to carry out a
threat?
1. Negligible: Carrying out a threat by exploiting the properties of supporting assets
does not appear possible (e.g. theft of paper documents stored in a room protected
by a badge reader and access code).
2. Limited: Carrying out a threat by exploiting the properties of supporting assets
appears to be difficult (e.g. theft of paper documents stored in a room protected by
a badge reader).
3. Significant: Carrying out a threat by exploiting the properties of supporting assets
appears to be possible (e.g. theft of paper documents stored in offices that cannot
be accessed without first checking in at reception).
4. Maximum: Carrying out a threat by exploiting the properties of supporting assets
appears to be extremely easy (e.g. theft of paper documents stored in a lobby).
The value of the level that best matches the supporting asset vulnerabilities identified is then
selected.
Any existing or planned measures that reduce the vulnerabilities of supporting assets should be
listed as justification as shown in the table on page 17.
23
May also be delegated, represented or contracted out.
24
A list of 45 generic threats is provided in the Appendix. Taken from the [EBIOS] knowledge bases, these threats
are designed to be exhaustive, independent and applied to the specific aspects of privacy protection.
- 15 -
FRENCH REPUBLIC
8 rue Vivienne – CS 30223 – 75083 Paris Cedex 02 – Tel: +33 (0)1 53 73 22 22 – Fax: +33 (0)1 53 73 22 00
Methodology for Privacy Risk Management
Translation of June 2012 edition
Next, the capabilities of risk sources to exploit vulnerabilities (skills, available time, financial
resources, proximity to system, motivation, feeling of impunity, etc.) are estimated for each
threat.
1. Negligible: Risk sources do not appear to have any special capabilities to carry out a
threat (e.g. software function creep by an individual acting without malicious intent
and who has limited access privileges).
2. Limited: The capabilities of risks sources to carry out a threat are limited (e.g.:
software function creep by a malicious individual with limited access privileges).
3. Significant: The capabilities of risk sources to carry out a threat are real and
significant (e.g. software function creep by an individual acting without malicious
intent and who has unlimited administration privileges).
4. Maximum: The capabilities of risk sources to carry out a threat are definite and
unlimited (e.g. software function creep by a malicious individual with unlimited
administration privileges).
The value of the level that best matches the risk sources identified is then selected.
Any existing or planned measures that reduce the capabilities of risk sources should be listed as
justification as shown in the table on page 17.
Finally, the likelihood of the threats is determined by adding the values obtained for the
vulnerabilities of the supports and the capabilities of the risk sources and locating the sum in
the table below:
Option: The likelihood thus obtained may be raised or lowered by including additional factors.
For example, access to the Internet, exchanges of data with foreign sites, interconnections with
other systems and a high degree of system heterogeneity or variability may raise the likelihood
by one level. Conversely, a homogeneous, stable system that has no interconnections and is
closed off from the Internet may lower the likelihood by one level.
- 16 -
FRENCH REPUBLIC
8 rue Vivienne – CS 30223 – 75083 Paris Cedex 02 – Tel: +33 (0)1 53 73 22 22 – Fax: +33 (0)1 53 73 22 00
Methodology for Privacy Risk Management
Translation of June 2012 edition
Tool
The result of this step can be added to the feared events table from the previous step:
25
The likelihood is theoretically determined for each threat; only the highest value is kept.
- 17 -
FRENCH REPUBLIC
8 rue Vivienne – CS 30223 – 75083 Paris Cedex 02 – Tel: +33 (0)1 53 73 22 22 – Fax: +33 (0)1 53 73 22 00
Methodology for Privacy Risk Management
Translation of June 2012 edition
Roles Stakeholders
5 1 Controller Project owner
4 2 Approver Data controller
3 Consulted party DPO and/or CISO
Informed party Prime contractor
The aim of this step is to obtain a risk map in order to determine the order in which they should
be treated.
Since a risk consists of a feared event and all the threats that may allow it to occur:
its severity equals that of the feared event,
its likelihood equals the highest likelihood value of the threats associated with the
feared event.
The risks can then be mapped:
Severity
Illegitimate
4. Maximum access to
personal data
Unavailability
3. Significant of legal
processes
Change in
processing Unwanted
2. Limited change of
Disappearance personal data
of personal
data
1. Negligeable
Likelihood
- 18 -
FRENCH REPUBLIC
8 rue Vivienne – CS 30223 – 75083 Paris Cedex 02 – Tel: +33 (0)1 53 73 22 22 – Fax: +33 (0)1 53 73 22 00
Methodology for Privacy Risk Management
Translation of June 2012 edition
Option: Objectives may be set based on where risks are located on the map (in order of
priority):
1. Risks with a high severity and likelihood26 absolutely must be avoided or reduced by
implementing security measures that reduce both their severity and their likelihood.
Ideally, care should even be taken to ensure that these risks are treated by independent
measures of prevention (actions taken prior to a damaging event), protection (actions
taken during a damaging event) and recovery (actions taken after a damaging event).
2. Risks with a high severity but a low likelihood27 must be avoided or reduced by
implementing security measures that reduce either their severity or their likelihood.
Emphasis must be placed on preventive measures.
3. Risks with a low severity but a high likelihood must be reduced by implementing
security measures that reduce their likelihood. Emphasis must be placed on recovery
measures.
4. Risks with a low severity and likelihood may be taken, especially since the treatment of
other risks should also lead to their treatment.
26
Levels 3 (Significant) and 4 (Maximum).
27
Levels 1 (Negligible) and 2 (Limited).
- 19 -
FRENCH REPUBLIC
8 rue Vivienne – CS 30223 – 75083 Paris Cedex 02 – Tel: +33 (0)1 53 73 22 22 – Fax: +33 (0)1 53 73 22 00
Methodology for Privacy Risk Management
Translation of June 2012 edition
The aim of this step is to build a protection system that (i) allows risks to be treated in a
commensurate manner, that (ii) complies with [Act-I&L] and (iii) is consistent with the data
controller's requirements (legal, financial, technical, etc.).
First of all, risk-treatment measures must be determined. This is done by linking existing or
planned measures (identified earlier in the study or the applicable guidelines) to the risk(s) they
help to treat. Subsequent measures are added until the risk level is finally considered
acceptable.
Tools
These additional measures may be created from scratch or taken from good practices issued by
recognized institutions or international standards. Generally, they must be adapted to the
specific context of each processing operation under consideration.
28
In accordance with the legal requirements on prior notification.
- 20 -
FRENCH REPUBLIC
8 rue Vivienne – CS 30223 – 75083 Paris Cedex 02 – Tel: +33 (0)1 53 73 22 22 – Fax: +33 (0)1 53 73 22 00
Methodology for Privacy Risk Management
Translation of June 2012 edition
Notes
The higher the capabilities of the risk sources, the more robust measures must be in order to
withstand them.
Moreover, any incidents that may have already occurred (especially personal data breaches) as
well as any difficulties in implementing certain measures, may be used to improve the security
system.
Measures specified must be formally set out, implemented, regularly audited and continually
improved.
Next, the severity and likelihood of the residual risks (i.e. risks that remain after the selected
measures are implemented) should be re-estimated by factoring in these additional measures.
They can then be repositioned on the map:
Severity
Illegitimate
4. Maximum access to
personal data
Change in
processing Unwanted
Change in
2. Limited processing
change of
Disappearance personal data
of personal
data
Disappearance
of personal
data
1. Negligeable
Unwanted
change of
personal data Likelihood
- 21 -
FRENCH REPUBLIC
8 rue Vivienne – CS 30223 – 75083 Paris Cedex 02 – Tel: +33 (0)1 53 73 22 22 – Fax: +33 (0)1 53 73 22 00
Methodology for Privacy Risk Management
Translation of June 2012 edition
Finally, explanations about why residual risks may be accepted should be given. These
explanations may be based on the new severity and likelihood levels and on the benefits
offered by the processing operation identified previously (risk-benefit analysis) by applying the
following rules:
2. Risks with a high severity but a low likelihood30 may be taken only if it is demonstrated
that their severity cannot be reduced and if their likelihood is negligible.
3. Risks with a low severity but a high likelihood may be taken only if it is demonstrated
that their severity cannot be reduced and if their likelihood is negligible.
It may be acceptable to depart from these rules, but only if it is demonstrated that the benefits
of processing greatly outweigh the risks.
Note
Serious risks may thus be taken if their likelihood is sufficiently low. Certain risks may also be
taken if processing makes it possible to save human lives.
29
Levels 3 (Significant) and 4 (Maximum).
30
Levels 1 (Negligible) and 2 (Limited).
- 22 -
FRENCH REPUBLIC
8 rue Vivienne – CS 30223 – 75083 Paris Cedex 02 – Tel: +33 (0)1 53 73 22 22 – Fax: +33 (0)1 53 73 22 00
Methodology for Privacy Risk Management
Translation of June 2012 edition
Tool
The result of this step, which consists in presenting the measures selected to treat each risk and
in re-estimating the severity and likelihood of each risk, may be summarized in a table such as
the one below31:
Risks
1. 2. 3. 4. 5.
Change in Unavailability Illegitimate Unwanted Disappearance
processing of legal access to change of of personal
32
Selected risk-treatment measures processes personal data personal data data
1. Keep personal data to a minimum X X X X
2. Inform data subjects X
3. Back up personal data X X X X
… … … … … …
Residual severity 2. Limited 3. Significant 3. Significant 1. Negligible 1. Negligible
Residual likelihood 1. Negligible 2. Limited 1. Negligible 1. Negligible 1. Negligible
[…]
31
The measures should be identified (one per row) and the risk(s) they treat should be indicated (one per column).
32
The measures listed correspond to good practices.
- 23 -
FRENCH REPUBLIC
8 rue Vivienne – CS 30223 – 75083 Paris Cedex 02 – Tel: +33 (0)1 53 73 22 22 – Fax: +33 (0)1 53 73 22 00
Methodology for Privacy Risk Management
Translation of June 2012 edition
Appendices
Generic threats
Threats that may jeopardize confidentiality
The following table presents the generic threats that can lead to:
Illegitimate access to personal data,
Compromise of processing (if this feared event is considered).
- 25 -
FRENCH REPUBLIC
8 rue Vivienne – CS 30223 – 75083 Paris Cedex 02 – Tel: +33 (0)1 53 73 22 22 – Fax: +33 (0)1 53 73 22 00
Methodology for Privacy Risk Management
Translation of June 2012 edition
- 27 -
FRENCH REPUBLIC
8 rue Vivienne – CS 30223 – 75083 Paris Cedex 02 – Tel: +33 (0)1 53 73 22 22 – Fax: +33 (0)1 53 73 22 00
Methodology for Privacy Risk Management
Translation of June 2012 edition
Acronyms
ANSSI Agence Nationale de la Sécurité des Systèmes d’Information (the French
Network and Information Security Agency)
IS Information Security
Definitions
Controller The following terms and definitions are considered as equal for the
purpose of this document:
'Controller' shall mean the natural or legal person, public authority,
agency or any other body which alone or jointly with others determines
the purposes and means of the processing of personal data; where the
purposes and means of processing are determined by national or
Community laws or regulations, the controller or the specific criteria for
his nomination may be designated by national or Community law.
[Directive-1995-46]
The ‘data controller’ means, unless expressly designated by legislative or
regulatory provisions relating to this processing, a person, public
authority, department or any other organization who determines the
purposes and means of the data processing. [Act-I&L]
‘PII controller’: privacy stakeholder (or privacy stakeholders) that
determines the purposes and means for processing personally
identifiable information (PII) other than natural persons who use data
for personal purposes. [ISO29100]
Data subject The following terms and definitions are considered as equal for the
purpose of this document:
An identified or identifiable natural person ('data subject'); an
identifiable person is one who can be identified, directly or indirectly, in
particular by reference to an identification number or to one or more
factors specific to his physical, physiological, mental, economic, cultural
or social identity. [Directive-1995-46]
The ‘data subject’ of a processing of personal data means an individual
- 28 -
FRENCH REPUBLIC
8 rue Vivienne – CS 30223 – 75083 Paris Cedex 02 – Tel: +33 (0)1 53 73 22 22 – Fax: +33 (0)1 53 73 22 00
Methodology for Privacy Risk Management
Translation of June 2012 edition
Personal data The following terms and definitions are considered as equal for the
purpose of this document:
‘Personal data’ shall mean any information relating to an identified or
identifiable natural person ('data subject'); an identifiable person is one
who can be identified, directly or indirectly, in particular by reference to
an identification number or to one or more factors specific to his
physical, physiological, mental, economic, cultural or social identity.
[Directive-1995-46]
‘Personal data’ means any information relating to a natural person who
is or can be identified, directly or indirectly, by reference to an
identification number or to one or more factors specific to him. In order
to determine whether a person is identifiable, all the means that the
data controller or any other person uses or may have access to should
be taken into consideration. [Act-I&L]
‘Personally identifiable information (PII)’: any information that (a) can be
used to identify the PII principal to whom such information relates, or
(b) is or might be directly or indirectly linked to a PII principal.
[ISO29100]
Primary asset Process (those of the processing of personal data and those required by
[Act-I&L]) or data (processed or used by legal process) whose
availability, integrity or confidentiality has to be protected.
Processing of The following terms and definitions are considered as equal for the
personal data purpose of this document:
- 29 -
FRENCH REPUBLIC
8 rue Vivienne – CS 30223 – 75083 Paris Cedex 02 – Tel: +33 (0)1 53 73 22 22 – Fax: +33 (0)1 53 73 22 00
Methodology for Privacy Risk Management
Translation of June 2012 edition
Risk Scenario describing a feared event and all threats that make it possible.
It is estimated in terms of severity and likelihood.
Risk management Iterative process that allows to objectively manage the privacy risks on
the data subjects concerned by a processing of personal data. It
essentially consists in appreciating them (identification, estimation in
terms of severity and likelihood, and evaluation for comparison),
treating them (determining and implementing proportionate measures),
accepting residual risks, communicating (stakeholder consultation,
results presentation...), and monitoring changes over time (context, risk,
measures...).
Risk source Person or non-human source that can cause a risk, accidentally or
deliberately.
Supporting asset Asset on which some primary assets rely. It can be hardware, software,
networks, people, paper or paper transmission channels.
Threat Typical action used by risk sources that may cause a feared event.
Vulnerability Characteristic of a supporting asset, that can be used by risk sources and
allowing threats to occur.
- 30 -
FRENCH REPUBLIC
8 rue Vivienne – CS 30223 – 75083 Paris Cedex 02 – Tel: +33 (0)1 53 73 22 22 – Fax: +33 (0)1 53 73 22 00
Methodology for Privacy Risk Management
Translation of June 2012 edition
References
[Directive-1995-46] Directive 95/46/EC of the European Parliament and of the Council of 24
October 1995 on the protection of individuals with regard to the
processing of personal data and on the free movement of such data.
[Act-I&L] Act n°78-17 of 6 January 1978 on Information Technology, Data Files and
Civil Liberties34.
33
Amended by [Directive-2009-136].
34
Amended by the following laws:
- Act of 6 August 2004 relatiing to the protection of individuals with regard to the processing of
personal data;
- Act of 13 may 2009 relative to the simplification and clarification of law and lighter procedures;
- Law no.2009-526 dated 13/05/2009;
- Organic Law no.2010-704 dated 28/06/2010;
- Law no.2011-334 dated 29 March 2011 relative to the Défenseur des droits;
- Ordinance no.2011-1012 dated 24/08/2011.
Amended by French Act No. 2004-801 of August 6, 2004, on the protection of individuals with regard to the
processing of personal data, and by French Act No. 2009-526 of May 12, 2009, on the simplification and
clarification of French law and the facilitation of procedures.
- 31 -
FRENCH REPUBLIC
8 rue Vivienne – CS 30223 – 75083 Paris Cedex 02 – Tel: +33 (0)1 53 73 22 22 – Fax: +33 (0)1 53 73 22 00