0% found this document useful (0 votes)
166 views5 pages

Auditing-Data-Privacy Joa Eng 0518

Auditing-Data-Privacy Joa Eng 0518

Uploaded by

Spit Fire
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
166 views5 pages

Auditing-Data-Privacy Joa Eng 0518

Auditing-Data-Privacy Joa Eng 0518

Uploaded by

Spit Fire
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

IS AUDIT

BASICS

Auditing Data Privacy


I consider myself a private person, so, naturally, distinct categories of data in use for different areas
this tendency is reflected in my online profile. I do of the business, they should probably be recorded Do you have
have Facebook and Instagram accounts, but these as separate audit universe items. Fundamentally, something
were initially created to monitor my children’s online though, when considering privacy, the data can to say about this
activity and I rarely, if ever, post on them. I also have be broken down to data stored on customers and article?
Twitter and LinkedIn accounts, which I use to post employees (the right of an individual).7 Besides
technology-, audit- and cybersecurity-related news. databases, files and documents, it is important to Visit the Journal
pages of the ISACA®
My only real online presence is reflected in this also consider where the data are stored and/or from
website (www.isaca.
column, related blogs and anything ISACA® posts to where they are derived, including:8
org/journal), find the
promote same. article and click on
• Social media
the Comments link to
So, is my privacy maintained? With the advent of • Cloud computing share your thoughts.
machine learning, it is possible to classify text in
• Mobile devices
any number of ways. Web services1 exist that use https://bit.ly/2J4c5Ql
labeled training texts to determine the mood, gender, • Big data analytics/machine learning/AI
age and personality2 of content authors. I have fed
• Internet of Things (IoT)
some of my previous columns into the site and
some of the classifications are scarily accurate. • Personal devices (bring your own device [BYOD])

• Tracking/surveillance technologies—drones, radio


Privacy is the right of an individual to trust that
frequency identification (RFID) tags, closed circuit
others will appropriately and respectfully use, store,
television (CCTV), global positioning satellite
share and dispose of his/her associated personal
(GPS) devices
and sensitive information within the context and
according to the purposes for which it was collected
The key is to consider categories of data and
or derived.3 The context is important. I am aware
determine the audit subject(s). You need to answer
that this column is posted online and does not
the key question: What are you auditing?
require a password to access, therefore, I cannot
reasonably expect my privacy to be fully maintained.
Ian Cooke, CISA, CRISC, CGEIT, COBIT Assessor and Implementer,
However, now consider your last audit report. CFE, CPTE, DipFM, ITIL Foundation, Six Sigma Green Belt
How would you feel if it was used to classify your Is the group IT audit manager with An Post (the Irish Post Office based
personality? Could your next promotion be decided in Dublin, Ireland) and has 30 years of experience in all aspects of
information systems. Cooke has served on several ISACA committees
by artificial intelligence (AI)? Is this acceptable?
and is a current member of ISACA’s CGEIT® Exam Item Development
Probably not without consent. So how can we audit
Working Group. He is the community leader for the Oracle Databases,
to help mitigate this and other privacy risk?
SQL Server Databases, and Audit Tools and Techniques discussions in
the ISACA Knowledge Center. Cooke supported the update of the CISA®
In previous columns,4, 5 I advocated the use of an Review Manual for the 2016 job practices and was a subject matter
ISACA paper on creating audit programs.6 This expert for ISACA’s CISA® and CRISCTM Online Review Courses. He is the
article will once again apply this process to build an recipient of the 2017 John W. Lainhart IV Common Body of Knowledge
audit program for privacy for your organization. Award for contributions to the development and enhancement of ISACA
publications and certification training modules. He welcomes comments
or suggestions for articles via email ([email protected]), Twitter
Determine Audit Subject (@COOKEI), or on the Audit Tools and Techniques topic in the ISACA
The first thing to establish is the audit subject. What Knowledge Center. Opinions expressed are his own and do not necessarily
does privacy mean in your enterprise? If there are represent the views of An Post.

ISACA JOURNAL VOL 3 1


• Finally, consider the audit objectives. This is likely
to include compliance to laws and regulations
(e.g., the US Health Insurance Portability and
Accountability Act [HIPAA],11 the EU General Data
Protection Regulation [GDPR]12, 13) and possibly
the use of a framework such as International
Organization for Standardization (ISO) and
International Electrotechnical Commission’s (IEC)
ISO/IEC 29100:2011 Information technology—
Security techniques—Privacy framework.14
However, I also recommend considering the ISACA
Privacy Principles (figure 2) for Audit Objectives.
Why? Because the principles were developed by
considering privacy laws, standards, frameworks
and principles from around the world. They can,
Define Audit Objective therefore, act as an overarching framework and
will likely cover all privacy objectives.
Once you have decided what you are auditing, you
need to establish the objective of the audit. Why are
Set Audit Scope
you auditing it? From an auditor’s perspective, it is
advisable to adopt a risk-based view and define the When you have defined the objectives of the audit, you
objectives accordingly: should use a scoping process to identify the actual
data that need to be audited. In other words, what
• First, consider the seven categories of privacy:
are the limits to the audit? This could include data in
1. Privacy of person
a specific application, process, location or stored by
2. Privacy of behavior and action
certain devices. Again, this should be risk based.
3. Privacy of communication
4. Privacy of data and image (information)
5. Privacy of thoughts and feelings
Perform Pre-Audit Planning
6. Privacy of location and space (territorial) Now that you have identified the risk, it should be
7. Privacy of association9 evaluated to determine its significance. Conducting
a risk assessment is critical in setting the final
• Next, consider the risk across the seven categories
scope of a risk-based audit. The more significant
(figure 1).10 Privacy risk can lead to adverse
the risk, the greater the need for assurance. Sample
publicity and reputational damage resulting in
assurance considerations based upon the privacy
customer and economic loss, including fines.
principles include:15

Figure 1—Examples of Privacy Risk


Privacy Category Example Risk
Privacy of behavior and action Social media contains information, images, video and audio that reveal
personal activities, orientations and preferences, many of which are
sensitive in nature and can impact the data subjects.
Privacy of thoughts and feelings Big data analytics has the potential to take large amounts of data and reveal
the thoughts or feelings of specific individuals based on data they provide
or others provide about them. Such insights can result in negative impact if
actions are taken because of the analytics findings.
Privacy of location and space (territorial) Privately owned computing devices that are used for business activities
may also be able to record images and audio. Such images and audio create
privacy risk if the devices are also used to perform business activities within
the workplace.
Source: Adopted from ISACA, ISACA Privacy Principles and Program Management Guide, USA, 2016. Reprinted with permission.

2 ISACA JOURNAL VOL 3


Figure 2—ISACA Privacy Principles
Principle Number Principle
1 Choice and consent
2 Legitimate purpose specification and use limitation
3 Personal information and sensitive information life cycle
4 Accuracy and quality
5 Openness, transparency and notice
6 Individual participation
7 Accountability
8 Security safeguards
9 Monitoring, measuring and reporting
10 Preventing harm
11 Third-party/vendor management
12 Breach management
13 Security and privacy by design
14 Free flow of information and legitimate restriction
Source: ISACA, ISACA Privacy Principles and Program Management Guide, USA, 2016. Reprinted with permission.

• Choice and consent—Does the enterprise ensure • Security safeguards—Does the enterprise ensure
that appropriate consent has been obtained prior that appropriate security safeguards are in place
to the transfer of personal information to other for all personal information?
jurisdictions?
• Monitoring, measuring and reporting—Does
• Legitimate purpose specification and use the enterprise report compliance with policies,
limitation—Does the enterprise specify the standards and laws?
purpose(s) for which personal information
• Preventing harm—Does the enterprise establish
is collected?
processes to mitigate any personal harms that
• Personal information and sensitive information may occur to data subjects?
life cycle—Does the enterprise retain personal
• Third-party/vendor management—Does the
information for only as long as necessary?
enterprise implement governance processes to
• Accuracy and quality—Does the enterprise ensure the appropriate protections and use of
implement practices and processes to ensure that personal information that are transferred to
personal information is accurate, complete and up third parties?
to date?
• Breach management—Has the enterprise
• Openness, transparency and notice—Does the established a documented policy and supporting
enterprise provide clear and easily accessible procedure for identifying, escalating and reporting
information about its privacy policies and practices? incidents?
• Individual participation—Does the enterprise • Security and privacy by design—Does the
provide data subjects a process to access their enterprise ensure executive support for the
personal information? identification of personal information and privacy
risk within enterprise events?
• Accountability—Does the enterprise assign roles,
• Free flow of information and legitimate
responsibility, accountability and authority for
restriction—Does the enterprise follow the
performing privacy processes?
requirements of applicable data protection

ISACA JOURNAL VOL 3 3


authorities for the transfer of personal information select the audit approach or strategy and start
across country borders? developing the audit program.17 You now have
enough information to decide what documents you
Interviewing the auditee to inquire about activities expect to see, what laws and regulations apply, the
or areas of concern that should be included in criteria, and whom you are going to interview. You
the scope of the engagement. Once the subject, do, however, need to define the testing steps.
objective and scope are defined, the audit team can In the latter half of 2017, ISACA released an audit/
identify the resources that will be needed to perform assurance program that defines testing steps for
the audit work.16 data privacy.18 As always, this should be considered
a starting point and should be adjusted based upon
risk and criteria that are relevant to the organization
you are auditing. It is worth spending the time
IT IS IMPORTANT TO REMEMBER THAT to consider the risk and the resulting need for
SECURITY DOES NOT MEAN PRIVACY. assurance (figure 3).

Key testing steps in the audit program are security


related. However, it is important to remember that
Determine Audit Procedures and Steps for security does not mean privacy. Confidentiality is
preserving authorized restrictions on access and
Data Gathering
disclosure, including means for protecting privacy
At this stage of the audit process, the audit team and proprietary information.19 Privacy is a possible
should have enough information to identify and outcome of security.20

Figure 3—Assurance Consideration to Audit Program Mapping


Privacy
Principle
Number Audit Program Sample Control
1 When personally identifiable information (PII) is obtained from individuals, consent is obtained.
2 Clear guidelines are in place to ensure the appropriate use and retention of data throughout the enterprise.
3 Clear guidelines are in place to ensure the appropriate use and retention of data throughout the enterprise.
4 Determine if the record management guideline describes the enterprise’s strategy and procedures
regarding maintenance, retention and destruction of records in accordance with all state and federal laws
and regulations.
5 When PII is obtained from individuals, consent is obtained.
6 Purpose and scope/applicability of the record management process are clearly defined.
7 Roles and responsibilities of the people involved in the management of data governance for privacy,
confidentiality and compliance for the enterprise have been clearly defined.
8 Appropriate data encryption standards are in place for data at rest, and appropriate awareness campaigns
are conducted to train employees.
9 Awareness is accounted for and key metrics are utilized for conformance and compliance to required training.
10 Integration of privacy impact assessments (PIAs) is firmly established in the enterprise and proper tools
and monitoring are in place for the validation of compliance.
11 Contractual language for third-party management of PII is appropriately included and agreed upon.
12 The breach escalation plan is in place to react to PII breaches.
13 Data deidentification across the enterprise is enforced appropriately through tools and automated means.
14 Global privacy policies and requirements have been modified to align with region- or country-specific
requirements.

4 ISACA JOURNAL VOL 3


Conclusion 7  Op cit ISACA, ISACA Privacy Principles and

New and emerging technologies will enable


Program Management Guide, p.11 Enjoying
8 Ibid. p. 31
enterprises to derive increased insight and, thus, value this article?
9 Ibid. p. 28
from data. This will, no doubt, provide competitive 10 Ibid. p. 31
advantage. ISACA’s Privacy Principles can be used • Learn more about,
11 Department of Health and Human Services,
as an overarching framework in conjunction with discuss and
Health Insurance Portability and Accountability
these technologies to provide assurance that an collaborate on it audit
Act, USA, https://www.hhs.gov/hipaa/index.html
enterprise respects the privacy rights of an individual. tools and techniques
12 European Commission, 2018 Reform of EU
Demonstrating this to those individuals will also in the Knowledge
Data Protection Rules, https://ec.europa.eu/
provide a competitive advantage. Center.
commission/priorities/justice-and-fundamental-
www.isaca.org/
rights/data-protection/2018-reform-eu-data-
Endnotes it-audit-tools-and-
protection-rules_en
techniques
1 uClassify is a free machine learning web 13 Herold, R.; “Using ISACA Privacy Principles for
service. https://www.uclassify.com/ GDPR Compliance,” COBIT Focus, August 2017,
2 The Myers and Briggs Foundation, The www.isaca.org/COBIT/focus/Pages/using-isaca-
Myers-Briggs Type Indicator, www.myersbriggs. privacy-principles-for-gdpr-compliance.aspx
org/my-mbti-personality-type/mbti-basics/ 14 International Organization for Standardization,
3 ISACA, ISACA Privacy Principles and Program ISO/IEC 29100:2011, Information technology—
Management Guide, USA, 2016, Security techniques—Privacy framework,
www.isaca.org/Knowledge-Center/Research/ https://www.iso.org/standard/45123.html
ResearchDeliverables/Pages/ISACA-Privacy- 15  Op cit ISACA, ISACA Privacy Principles and
Principles-and-Program-Management-Guide.aspx Program Management Guide, p. 44
4 Cooke, I.; “Audit Programs,” ISACA® Journal, 16 ISACA, Audit Plan Activities: Step-By-Step, 2016,
vol. 4, 2017, https://www.isaca.org/Journal/ https://www.isaca.org/cobit/documents/Audit-
archives Plan-Activities_res_eng_0316.pdf
5 Cooke, I.; “Auditing Mobile Devices,” ISACA 17 Ibid.
Journal, vol. 6, 2017, https://www.isaca.org/ 18 ISACA, IS Audit/Assurance Program, Data
Journal/archives Privacy, USA, 2017, www.isaca.org/Knowledge-
6 ISACA, Information Systems Auditing: Tools Center/Research/ResearchDeliverables/Pages/
and Techniques, Creating Audit Programs, USA, data-privacy-audit-program.aspx
2016, https://www.isaca.org/Knowledge-Center/ 19 Op cit ISACA, ISACA Privacy Principles and
Research/Documents/IS-auditing-creating-audit- Program Management Guide, p. 13
programs_whp_eng_0316.pdf 20 Ibid.

ISACA JOURNAL VOL 3 5

You might also like