Privacy and Data Protection Part 2
Privacy and Data Protection Part 2
Privacy and Data Protection Part 2
AND DATA
PROTECTION
Part 2: Internal Auditors’ Views on
Risks, Responsibilities, and Opportunities
R. Michael Varney, CPA, CIA; Adam Pajakowski, CIPM, CFE, CIA; and Amanda M. Marderosian
Published by the Internal Audit Foundation
1035 Greenwood Blvd., Suite 401
Lake Mary, Florida 32746, USA
Limit of Liability: The Internal Audit Foundation publishes this document for
informational and educational purposes and is not a substitute for legal or
accounting advice. The Foundation does not provide such advice and makes
no warranty as to any legal or accounting results through its publication of this
document. When legal or accounting issues arise, professional assistance
should be sought and retained.
The IIA and the Foundation work in partnership with researchers from around
the globe who conduct valuable studies on critical issues affecting today’s
business world. Much of the content presented in their final reports is a result
of Foundation-funded research and prepared as a service to the Foundation
and the internal audit profession. Expressed opinions, interpretations, or points
of view represent a consensus of the researchers and do not necessarily reflect
or represent the official position or policies of The IIA or the Foundation.
ISBN-13: 978-1-63454-135-0
26 25 24 23 22 1 2 3 4 5 6
2 theiia.org/foundation crowe.com
Privacy and Data Protection: Internal Auditors’ Views
Table of contents
theiia.org/foundation crowe.com
3
Introduction and executive summary
As the second part of a three-part series of research activities, this report
builds on a foundation laid in early 2020 with the publication of “Privacy
and Data Protection Part 1: Internal Audit’s Role in Establishing a Resilient
Framework.” Where the stated purpose of that report was to assist internal
auditors in assessing their current level of preparedness regarding privacy and
data protection issues, the purpose of this report is to present the findings
of an Internal Audit Foundation (Foundation) survey and field interviews to
examine how internal audit as a profession is responding to these issues.
As noted in Part 1 of this series, privacy and data protection have become
critical areas of concern for all types of organizations – large and small, public
and private, commercial and not-for-profit. The International Association
of Privacy Professionals (IAPP) notes that privacy, which Supreme Court
Justice Louis Brandeis famously defined as the “right to be let alone,” actually
encompasses several related concepts including information privacy, bodily
privacy, territorial privacy, and communications privacy.1 Of these four
areas, information privacy is most directly affected by an organization’s data
protection policies and practices.
More specifically, this report explores ways in which internal audit can
become involved earlier in the data security and privacy processes, providing
both guidance and support to the initial risk assessment and remediation
activities. These functions need to be performed, of course, without
jeopardizing the essential objectivity and independence that are hallmarks
of the internal audit profession.
4 theiia.org/foundation crowe.com
Privacy and Data Protection: Internal Auditors’ Views
1
“Glossary of Privacy Terms,” International Association of Privacy Professionals online resource,
https://iapp.org/resources/glossary/
2
Ibid.
3
Renato Leite Monteiro, “The New Brazilian General Data Protection Law – A Detailed Analysis,”
International Association of Privacy Professionals Privacy Tracker, Aug. 15, 2018,
https://iapp.org/news/a/the-new-brazilian-general-data-protection-law-a-detailed-analysis/
4
Josh Horwitz, “China Passes New Personal Data Privacy Law, to Take Effect Nov. 1,” Reuters,
Aug. 20, 2021, https://www.reuters.com/world/china/china-passes-new-personal-data-privacy-law-
take-effect-nov-1-2021-08-20/
5
Sarah Rippy, “Virginia Passes the Consumer Data Protection Act,” International Association of Privacy
Professionals Privacy Tracker, March 3, 2021, https://iapp.org/news/a/virginia-passes-the-consumer-
data-protection-act/
6
Sarah Rippy, “Colorado Privacy Act Becomes Law,” International Association of Privacy Professionals,
The Privacy Advisor, July 8, 2021, https://iapp.org/news/a/colorado-privacy-act-becomes-law/
theiia.org/foundation crowe.com
5
1) About the survey participants
The IIA’s Internal Audit Foundation emailed survey invitations to CAEs and
directors throughout North America and also publicized the survey through
a social media campaign. Seventy-six people completed the survey: 78%
were CAEs or equivalent, while the other 22% were either directors or senior
managers who have responsibility for assurance services.
Participants also were asked for information regarding the size and scope
of their organizations’ internal audit functions and about the general size
and nature of the organizations themselves. These questions revealed the
following characteristics:
Other 4%
Within the survey population there was especially strong representation from
the finance and insurance industries, which accounted for slightly more than
one-third of the participants. Educational services (16%) and public administration
(9%) also had relatively high representation compared to other industries.
6 theiia.org/foundation crowe.com
Privacy and Data Protection: Internal Auditors’ Views
Assurance 59%
Compliance 54%
Consulting 55%
theiia.org/foundation crowe.com
7
In particular, it appears internal auditors often might become more involved
earlier in the overall data privacy risk management process. For example, internal
audit can provide insights that could be particularly helpful in enabling process
owners to identify and quantify risks so they can more effectively prioritize and
allocate resources. Internal audit also can offer valuable feedback and guidance
on data privacy policies and governance issues. Such early involvement could
help internal auditors build or strengthen their internal relationships with other
departments and business functions within their organizations.
Internal audit departments can take on these roles without sacrificing their
essential objectivity. Section 6 of this report discusses this concept further
and offers additional examples of how some organizations are pursuing these
suggested opportunities.
General counsel 9%
Other IT role 4%
Human resources 4%
Other 1%
8 theiia.org/foundation crowe.com
Privacy and Data Protection: Internal Auditors’ Views
theiia.org/foundation crowe.com
9
Exhibit 4: Materiality of data privacy risk
Yes, 52%
Not sure/
not applicable,
11%
No, 37%
The OnRisk rating appears to present a significant disparity with this survey’s
findings, but digging deeper into the OnRisk responses provides some potential
explanation for the difference. For example, only 33% of CAEs gave a high rating to
their organizations’ capabilities in this area, and only 53% gave themselves a high
rating regarding their personal knowledge of data privacy issues.
Viewing both surveys’ responses in this context, it could be argued that internal
auditors’ views regarding the responsibility for data privacy within their organizations
(as discussed in Section 2), coupled with uncertainty about their own understanding
of data privacy issues (as revealed by the OnRisk responses), might be leading them
to underestimate the level of risk associated with data protection and privacy issues.
Of particular interest are some of the specific concerns raised by CAEs and
directors who identified data privacy as a material risk. Their open text responses
were analyzed and grouped into general categories. The five most commonly
cited concern areas were:
1. Regulatory requirements
2. Risk to reputation
3. The sensitivity or importance of the data held by their organizations (such as
personal financial or healthcare information)
4. Decentralization of data systems and a lack of consistent procedures
5. The generally increasing likelihood of data breaches
10 theiia.org/foundation crowe.com
Privacy and Data Protection: Internal Auditors’ Views
Some of the participants’ most revealing text comments are shown here:
“ Our policies and practices are improving rapidly but are still not fully in
place and lack a data governance framework. In addition, third-party risk
involving suppliers and partners is a significant concern in protecting
our data.”
– Medium-sized privately held business
theiia.org/foundation crowe.com
11
4) Internal auditors’ views of program effectiveness
Survey participants were asked several questions regarding their perceptions of
the effectiveness of their organizations’ data privacy and protection efforts. Their
responses raise several questions that should be of concern to the profession,
and they merit further discussion.
26%
5%
4%
1%
Put another way, almost four out of 10 (38%) said their policies were just fair or
worse, and 4% were unsure what to think. In part, this finding relates back to the
survey participants’ response to the earlier question about ownership of data
privacy initiatives. As noted in Section 2, a majority of respondents said their
organizations assigned ownership of these issues to the IT department, rather than
to risk management functions. This situation again suggests that internal auditors
can provide value to their organizations by engaging earlier in the data privacy
process, and becoming more proactively involved in policy updates, in addition to
assessing the quality of data privacy policies as part of their compliance function.
Section 6 of this report expands on this potential role for internal audit.
12 theiia.org/foundation crowe.com
Privacy and Data Protection: Internal Auditors’ Views
For example, 69% of the survey respondents either agreed or strongly agreed
that their organizations’ privacy policies are clear and accessible, and 74% of
respondents either agreed or strongly agreed that data privacy requirements
are included in third-party contracts.
Data privacy
requirements
74% 12% 8% 6%
are included in
third-party contracts
Data privacy
policies are clear 69% 13% 15% 3%
and accessible
Regional regulations
for data privacy 58% 21% 11% 10%
are addressed in
data processes
But when asked about specific data privacy practices, some weaknesses were
exposed, particularly in the areas of data inventory and classification practices.
For example, only 39% of respondents agreed or strongly agreed that data
inventories are created and maintained, even though an accurate and complete
data inventory is a critical and typically the first component of any data privacy
framework. This could mean the policies for areas such as data inventories do
not exist or are not formally executed and adhered to.
theiia.org/foundation crowe.com
13
Exhibit 7: Effectiveness of data privacy practices
Employees receive
training about data 64% 12% 20% 4%
privacy regulations
Personal data is
classified according to 61% 7% 25% 7%
handling requirements
Data subject
requests are handled 51% 17% 15% 17%
appropriately
A data inventory
has been created 39% 20% 33% 8%
and maintained
Responses to survey questions about other basic issues also raised concerns.
For example, when asked if personal data is classified according to handling
requirements, one out of four (25%) disagreed. This percentage would appear
to be a very high failure rate for something that is an essential early step in any
data privacy initiative. And barely half (51%) of the respondents agreed that
data subject requests are handled appropriately in their organizations – again,
a notably low level of effectiveness for such a basic requirement.
14 theiia.org/foundation crowe.com
Privacy and Data Protection: Internal Auditors’ Views
Top concerns varied widely, but data inventory and classification was cited by
the largest number of those responding (23%). This is not altogether surprising,
given the earlier observation that only a minority of respondents said their
organizations maintain data inventories. As mentioned in Section 4, creating
data inventories and classification are key first steps in establishing a formal
privacy program. When these activities are not done, items such as data
deletion and data breach processes become more difficult.
Attacks against
6%
the organization
Legal compliance 6%
Other 7%
theiia.org/foundation crowe.com
15
These are issues that all internal audit functions should consider as they review
data privacy at their organizations. A review of individual responses reveals
some potentially significant patterns. For example, in many cases, respondents
who listed weak data privacy policies and processes as a top concern also
expressed concerns about employees not being well-informed about privacy
and data protection issues in general.
16 theiia.org/foundation crowe.com
Privacy and Data Protection: Internal Auditors’ Views
In general, such efforts involve working with the owners of a data privacy
program within their organization to assess and build out specific initiatives.
Drawing on their own understanding of privacy regulations and requirements,
most internal auditors are well positioned to help assess where the greatest
data privacy risk lies – and thus where the data privacy owners or team can
allocate resources most effectively.
Internal audit also can help the process owner identify which factors have
the greatest impact on data privacy risk. In some organizations, a focus on
certain physical locations might be most effective; in others, specific product
or service lines require special attention; in still others, policy, personnel,
or training issues merit review and enhancement. By helping the process
owner identify these priorities, internal audit can help contribute to a more
effective allocation of resources, while at the same time improving the overall
effectiveness of the data privacy effort.
• Risk assessment surveys. One effective tool for helping to identify data
privacy risks is an internal survey of key managers and executives. By
asking targeted questions, the data privacy team and process owners can
gain the insight needed to quantify the relevant risk and recognize potential
mitigating solutions. In addition to contributing their extensive knowledge
and understanding of the risks, internal auditors also can provide the initial
impetus to launch such an effort, as well as help diagnose results for further
compliance or audit efforts.
• Policy review team. In addition to reviewing privacy policies after they have
been finalized as part of their audit function, many organizations have turned
to internal audit for input during the policy development process. While
the actual drafting of privacy policy is outside the scope of an objective
internal audit function, audit executives can offer feedback and guidance as
policies are being shaped. In addition, they can help gather other key privacy
documents such as consent forms to ensure those items are refreshed and
in line with policy updates.
theiia.org/foundation crowe.com
17
• Governance committee. In many organizations internal audit plays a valuable
role as part of a high-level data privacy governance committee. In addition to
overseeing the basic structure and framework of the privacy program, such
governance committees meet on a regular basis – typically quarterly – to
address privacy risk concerns and any associated governance issues that
arise. This is an opportunity for internal auditors to have a regular audience with
board-level individuals and help advance the program through their insights.
• Cross-training. Just as internal audit departments often engage in
temporary rotation of their personnel into the compliance office or other
areas in the organization, a six-month rotation into the department that
is responsible for data privacy compliance can provide both valuable
experience and enhanced credibility. Auditors also can contribute
significantly to developing and maturing the data privacy and protection
program. Although such cross-training rotations are more workable in larger
internal audit departments that have adequate resources to devote to such
efforts, they also can be done less formally in smaller organizations.
• Continuous monitoring and quality assurance. One fundamental way
internal audit can add value to an organization is through ongoing monitoring
and review of compliance efforts, rather than limiting auditors’ involvement
to after-the-fact review and assessment. For example, GDPR Article 30
requires organizations to maintain records of processing activities if personal
data is being collected, stored, or processed. Internal audit often can
serve as a quality assurance partner, operating in real time to review how
these processes are being documented and identify any gaps. As noted
throughout the article, the formal data inventory and processing records
needed to satisfy Article 30 appear to be an issue for organizations, so
internal audit assisting in this area could have tremendous value.
One common component of this effort is the distribution of privacy
assessments to business process owners. Such assessments offer a
structure or format that process owners can use to submit a high-level
summary of the personal information being collected, any applications they
use, and other relevant information as it relates to the associated personal
data. By being part of the initial review process, internal audit can help see
to it that the right questions are being asked, in addition to serving as a final
check to validate all questions were answered.
Objectivity and lack of bias make internal audit an ideal partner in such
efforts. Because internal audit has no direct or vested interest in the
underlying business processes, it is able to provide detached guidance and
counsel to process owners. Internal audit’s objectivity can be particularly
helpful in the governance and policy review functions mentioned earlier.
18 theiia.org/foundation crowe.com
Privacy and Data Protection: Internal Auditors’ Views
Even more important, as this report described, an analysis of the survey responses
reveals a number of potentially valuable opportunities for internal audit to take an earlier
and proactive role in helping to recognize, manage, and mitigate these risks, while still
fulfilling their role as defined by the International Professional Practices Framework:
By building on the initial research that was reported in Part 1 of this series and
taking into consideration the opportunities described in this report, internal auditors
can more effectively meet the challenges of adding value and improving their
organizations’ operations.
Looking forward, Part 3 of this series will examine how various stakeholders view
data privacy issues and how they perceive internal audit’s role and performance
in this important area of risk. Through field interviews with privacy officers and
other participants, the authors hope to uncover additional opportunities for internal
auditors to contribute to their organizations’ risk management, control, and
governance processes.
1
Law Insider online dictionary, https://www.lawinsider.com/search?q=material+risk
2
“OnRisk: A Guide to Understanding, Aligning, and Optimizing Risk, 2022,” Institute of Internal Auditors, 2021,
https://na.theiia.org/periodicals/OnRisk/Pages/default.aspx?gclid=CjwKCAiAs92MBhAXEiwAXTi252EdF-
IZEaJsoCRGKdE-XX6uZGLnyRSy_2l-rhdkTdTuC7cysZv78xoCFAcQAvD_BwE
3
Institute of Internal Auditors Standards & Guidance, Code of Ethics,
https://na.theiia.org/standards-guidance/mandatory-guidance/Pages/Code-of-Ethics.aspx
theiia.org/foundation crowe.com
19
Published February 2022.
The Internal Audit Foundation strives to be an essential global resource for advancing the internal audit profession. The Foundation’s research and
educational products provide insight on emerging topics to internal audit practitioners and their stakeholders and promote and advance the value of the
internal audit profession globally. Through the Academic Fund, the Foundation supports the future of the profession by providing grants to students and
educators who participate in The IIA’s Internal Auditing Education Partnership Program. For more information, visit www.theiia.org/Foundation.
“Crowe” is the brand name under which the member firms of Crowe Global operate and provide professional services, and those firms together form the
Crowe Global network of independent audit, tax, and consulting firms. “Crowe” may be used to refer to individual firms, to several such firms, or to all firms
within the Crowe Global network. The Crowe Horwath Global Risk Consulting entities, Crowe Healthcare Risk Consulting LLC, and our affiliate in Grand
Cayman are subsidiaries of Crowe LLP. Crowe LLP is an Indiana limited liability partnership and the U.S. member firm of Crowe Global. Services to clients
are provided by the individual member firms of Crowe Global, but Crowe Global itself is a Swiss entity that does not provide services to clients. Each
member firm is a separate legal entity responsible only for its own acts and omissions and not those of any other Crowe Global network firm or other party.
Visit www.crowe.com/disclosure for more information about Crowe LLP, its subsidiaries, and Crowe Global.
The information in this document is not – and is not intended to be – audit, tax, accounting, advisory, risk, performance, consulting, business, financial,
investment, legal, or other professional advice. Some firm services may not be available to attest clients. The information is general in nature, based on
existing authorities, and is subject to change. The information is not a substitute for professional advice or services, and you should consult a qualified
professional adviser before taking any action based on the information. Crowe is not responsible for any loss incurred by any person who relies on the
information discussed in this document. © 2022 Crowe LLP. CFS2202-001A