Data Privacy Protection Competency Framework Day 2 Privacy Policy Making Participants
Data Privacy Protection Competency Framework Day 2 Privacy Policy Making Participants
COMPETENCY FRAMEWORK
DICT Regional Office
Copyright notice: The cited and annotated content of cited standards are duly owned by their research organization or publishers.
R.A. 10173 –DATA PRIVACY ACT 2012
ACCOUNTABILITY AND RESPONSIBILITY
1. Privacy governance
The data protection
2. Information system registration
obligation of the head of
3. Privacy impact assessment
agency is listed in the
4. Privacy and security policy
National Privacy
5. Personnel training on privacy policy
Commission
6. Storage of personal data
Circular 06-01
7. Access to personal data
8. Transfer of personal data
Security of Personal Data
9. Disposal of personal data
in Government Agencies
10. Data breach management
Copyright notice: The cited and annotated content of cited standards are duly owned by their research organization or publishers.
DATA PROTECTION OFFICER
1) The responsibility for complying with the Act, its IRR,
issuances by the NPC, and all other applicable laws lies
with the Personal Information Controller (PIC) or Personal
Information Processor (PIP). When necessary, it must be
capable of demonstrating its capacity to comply.
Copyright notice: The cited and annotated content of cited standards are duly owned by their research organization or publishers.
DATA PROTECTION OFFICER
Monitoring Responsibilities
1) Collect information to identify the processing operations,
activities, measures, projects, programs, or systems of
the PIC or PIP, and maintain a record thereof.
Copyright notice: The cited and annotated content of cited standards are duly owned by their research organization or publishers.
WHAT IS PRIVACY IMPACT? (ISO 29134)
1) It is any thing that
has effect on the PRIVACY IMPACT ASSESSMENT
data privacy of 1) An instrument to assess the potential impacts on data
personal privacy and security of the filing system, automation,
information technology platform, program, software module, device or
other project that is defined to act the collection,
security of a data
processing, retention, sharing and disposal of a data
subject
subject’s personal data.
The developed, acquired and operated data processing system collects personal data
A change in applicable privacy related laws and regulations, internal policy and standards,
information system operation, purposes and means for processing data, new or changed data flows
A new or prospective technology, service or other initiative where personal information is, or to
be, processed
Copyright notice: The cited and annotated content of cited standards are duly owned by their research organization or publishers.
Who conducts Privacy Impact Assessment?
Copyright notice: The cited and annotated content of cited standards are duly owned by their research organization or publishers.
Critical Steps in Doing Privacy Impact Assessment
ADOPT a
privacy and
SCOPE the security risks
privacy impact criteria and the
JUSTIFY the IDENTIFY the
assessment by corresponding
conduct of stakeholders to
identifying and measurement
privacy impact participate in
describing that determine
assessment with creating privacy
system context the indicators
a privacy impact
and and rating of
threshold assessment
configuration threat,
analysis report
with impact to vulnerabilities
privacy and control in
the impact
assessment.
Copyright notice: The cited and annotated content of cited standards are duly owned by their research organization or publishers.
Critical Steps in Doing Privacy Impact Assessment
Copyright notice: The cited and annotated content of cited standards are duly owned by their research organization or publishers.
Measuring Impact
• The data subjects may • The data subjects will
encounter significant either not be affected or
inconveniences, which may encounter a few
they should be able to inconveniences, which
overcome but with they will overcome
serious difficulties without any problem
Significant Negligible
(4) (1)
Maximum Limited
(3) (2)
• The data subjects may • The data subject may
encounter significant encounter significant
inconveniences, or even inconveniences, which
irreversible, they will be able to
consequences, which overcome despite a few
they may not overcome difficulties
Copyright notice: The cited and annotated content of cited standards are duly owned by their research organization or publishers.
Measuring Probability
Likely Possible
(3) (2)
• Frequent occurrence. • Casual occurrence. It
There is a strong might happen at
possibility that it some time.
might occur
Copyright notice: The cited and annotated content of cited standards are duly owned by their research organization or publishers.
PRIVACY RISKS MAP
IMPACT PRIVACY AND SECURITY RISKS MAP
4
Unauthorized Unauthorized
MAXIMUM Malicious disclosure
processing purpose
3
Unauthorized Negligence in Combination of
SIGNIFICANT Intentional breach
disclosure access acts
2
Unauthorized
LIMITED Improper disposal
access
1
Concealment of
NEGLIGIBLE
breach
1 2 3 4
PROBABILITY UNLIKELY POSSIBLE LIKELY ALMOST CERTAIN
Copyright notice: The cited and annotated content of cited standards are duly owned by their research organization or publishers.
DISCUSSION POINTS
DAY 1
• R.A. 10173 – Data Privacy Act 2012 Goals, Objectives, Accountability and
Responsibility
• Data Privacy and Information Security Risks Management – Privacy
Impact Assessment Process
Day 2
• DATA PRIVACY AND SECURITY CONTROLS – PRIVACY AND
SECURITY POLICY MAKING
Day 3
• Breach and Security Incident Management
POLICY MAKING
Intentions and direction of an organization, as formally
expressed by its top management.
POLICY
(ISO 27000 -3.53)
Copyright notice: The cited and annotated content of cited standards are duly owned by their research organization or publishers.
POLICY CONCERN OF R.A. 10173
Policy
Making
NPC Circular 16-01
Copyright notice: The cited and annotated content of cited standards are duly owned by their research organization or publishers.
POLICY CONCERN OF R.A. 10173
DATA PROTECTION OFFICER
1) Monitor the PIC’s or PIP’s compliance with the DPA,
its IRR, issuances by the NPC and other applicable
laws and policies.
PRIVACY
is freedom from intrusion into the
private life or affairs of an individual
or person, when that intrusion
results from undue or illegal
gathering and use of data about that
individual.
Policy
(ISO 2382 – IT Vocabulary)
Making
Copyright notice: The cited and annotated content of cited standards are duly owned by their research organization or publishers.
PERSONAL DATA PROCESSING PRIVACY PROTECTION
Privacy Protection Requirements Management Results
1. Personal data and processing system Registry of personal data, filing
visibility system, automation program
Data privacy rights policy,
2. Respect data privacy rights
process, notification, consent
Inventory of process, system ,
3. Regulated personal data processing
technology and risks assessment
lifecycle of personal information and
and system data privacy by
sensitive personal information
design
4. Data privacy principles in personal data Data processing privacy policy
processing system and system conformity test
5. Privacy lawful criteria in processing
Statutory and regulatory registry
personal information
Copyright notice: The cited and annotated content of cited standards are duly owned by their research organization or publishers.
PERSONAL DATA PROCESSING PRIVACY PROTECTION
Privacy Protection Requirements Management Results
6. Conditions to process sensitive personal Privacy policy and system
information conformity test
Data sharing agreement, and
7. Accountability in personal data sharing
security measures
Organization, physical and
8. Security measures in personal technical measures – policy, role,
information protection activities, product, services and
technology
9. Breach and Privacy violation and Breach reporting and case
corresponding penalties management
10. Supplier Relationship – Privacy and
Privacy and Security Agreements
Security
Copyright notice: The cited and annotated content of cited standards are duly owned by their research organization or publishers.
POLICY CONCERN OF R.A. 10173
PRIVACY PROTECTION
represents the definitive act of
respecting the person's rights of
privacy and the security of personal
data that are being collected,
processed, retained, shared, and
disposed by the personal
information controller and processor
Policy
of business or government.
Making
Copyright notice: The cited and annotated content of cited standards are duly owned by their research organization or publishers.
PERSONAL DATA TO PROTECT
PERSONAL INFORMATION
PERSONAL DATA information which can directly identify an
individual
✔ Represent a set of
information that identifies an
SENSITIVE PERSONAL INFORMATION
individual or person who is considered as closer to the core of one’s
called a DATA SUBJECT identity and they can shape and define
✔ Refers to all types of an individual
personal information
PRIVILEGED INFORMATION
This can be: refers to certain kinds of communication
which can not be used as evidence in
• Personal Information
court
• Sensitive Personal
Information Copyright notice: The cited and annotated content of cited standards are duly owned by their research organization or publishers.
Personal Data Category
1. Name Given name, middle name, surname, alias
2. Identification number License number, tax number
3. Location data Address, GPS location
4. Online identifier e-mail, IP address
5. Digital identifier Biometric, CCTV data
6. Genetic Data DNA test result
7. Health Data Diagnostic report
8. Research Data Research question, enumerator interview logs
9. Physical factor Height, weight, sex
10. Physiological factor Body chemistry
11. Mental factor Intellectual aptitude test results
12. Economic factor Salary, debts, property
13. Cultural factor Nationality, tribe
14. Social identity factors Club membership, titles, legal record
Copyright notice: The cited and annotated content of cited standards are duly owned by their research organization or publishers.
SENSITIVE PERSONAL
INFORMATION (RA 10173 sec 3L)
1 2 3 4
Copyright notice: The cited and annotated content of cited standards are duly owned by their research organization or publishers.
PRIVACY RIGHTS ON PERSONAL DATA (R.A. 10173 IRR RULE VIII)
Privacy Rights of Data Subject Respect Indicators
1. The right to be informed Notification and consent
Written or recorded agreement to process
2. The right to give consent
personal data
3. The right to access Permission to view and participate
4. The right to object Ability to withhold or refuse
5. The right to erasure or Permission to withdraw and delete
blocking personal data
Permission to check accuracy and to
6. The right to rectify
correct
Ability to request and download personal
7. The right to data portability
data
8. The right to complain Rules of procedure to file complaint
9. The right to claim damages Rule of procedure to claim damages
Copyright notice: The cited and annotated content of cited standards are duly owned by their research organization or publishers.
PRIVACY PRINCIPLES OF PERSONAL DATA PROCESSING (Rule V)
Principles of Transparency, Legitimate Purpose and Proportionality
1. Transparency The data subject must be aware of the nature, purpose, and extent
of the processing of his or her personal data, including the risks and
safeguards involved, the identity of personal information controller,
his or her rights as a data subject, and how these can be exercised.
Any information and communication relating to the processing of
personal data should be easy to access and understand, using clear
and plain language.
2. Legitimate The processing of information shall be compatible with a declared
purpose and specified purpose which must not be contrary to law, morals, or
public policy.
The processing of information shall be adequate, relevant, suitable,
3. Proportionality necessary, and not excessive in relation to a declared and specified
purpose. Personal data shall be processed only if the purpose of the
processing could not reasonably be fulfilled by other means.
Copyright notice: The cited and annotated content of cited standards are duly owned by their research organization or publishers.
PRIVACY PRINCIPLES OF PERSONAL DATA PROCESSING (Rule V)
General principles in collection, processing and retention
1. Collection must be for a Consent is required prior to the collection and processing of
declared, specified, and personal data, subject to exemptions provided by the Act and
legitimate purpose. other applicable laws and regulations. When consent is
required, it must be time-bound in relation to the declared,
specified and legitimate purpose. Consent given may be
withdrawn.
The data subject must be provided specific information
regarding the purpose and extent of processing, including,
where applicable, the automated processing of his or her
personal data for profiling, or processing for direct marketing,
and data sharing.
Purpose should be determined and declared before, or as
soon as reasonably practicable, after collection.
Only personal data that is necessary and compatible with
declared, specified, and legitimate purpose shall be collected.
Copyright notice: The cited and annotated content of cited standards are duly owned by their research organization or publishers.
PRIVACY PRINCIPLES OF PERSONAL DATA PROCESSING (Rule V)
2. Personal data shall be Processing shall uphold the rights of the data subject, including the
processed fairly and lawfully. right to refuse, withdraw consent, or object. It shall likewise be
transparent and allow the data subject sufficient information to know
the nature and extent of processing.
Information provided to a data subject must always be in clear and
plain language to ensure that they are easy to understand and access.
Processing must be in a manner compatible with declared, specified,
and legitimate purpose.
Processed personal data should be adequate, relevant, and limited to
what is necessary in relation to the purposes for which they are
processed.
Processing shall be undertaken in a manner that ensures appropriate
privacy and security safeguards.
3. Processing should ensure Personal data should be accurate and where necessary for declared,
data quality. specified and legitimate purpose, kept up to date.
Inaccurate or incomplete data must be rectified, supplemented,
destroyed or their further processing restricted.
Copyright notice: The cited and annotated content of cited standards are duly owned by their research organization or publishers.
PRIVACY PRINCIPLES OF PERSONAL DATA PROCESSING (Rule V)
4. Personal Data shall not be Retention of personal data shall only for as long as necessary:
retained longer than necessary (a) for the fulfillment of the declared, specified, and legitimate
purpose, or when the processing relevant to the purpose has
been terminated;
(b) for the establishment, exercise or defense of legal claims; or
(c) for legitimate business purposes, which must be consistent
with standards followed by the applicable industry or approved
by appropriate government agency.
Retention of personal data shall be allowed in cases provided
by law.
Personal data shall be disposed or discarded in a secure
manner that would prevent further processing, unauthorized
access, or disclosure to any other party or the public, or
prejudice the interests of the data subjects.
Copyright notice: The cited and annotated content of cited standards are duly owned by their research organization or publishers.
PRIVACY PRINCIPLES OF PERSONAL DATA PROCESSING (Rule V)
5. Any authorized further Personal data originally collected for a declared, specified, or
processing shall have adequate legitimate purpose may be processed further for historical,
safeguards. statistical, or scientific purposes, and, in cases laid down in law, may
be stored for longer periods, subject to implementation of the
appropriate organizational, physical, and technical security
measures required by the Act in order to safeguard the rights and
freedoms of the data subject.
Personal data which is aggregated or kept in a form which does not
permit identification of data subjects may be kept longer than
necessary for the declared, specified, and legitimate purpose.
Personal data shall not be retained in perpetuity in contemplation of
a possible future use yet to be determined.
Copyright notice: The cited and annotated content of cited standards are duly owned by their research organization or publishers.
PRIVACY PRINCIPLES OF PERSONAL DATA PROCESSING (Rule V)
3. Data collected from When the personal data is publicly available, or has the consent of the
parties other than the data subject for purpose of research: Provided, that adequate
data subject for purpose safeguards are in place, and no decision directly affecting the
of research data subject shall be made on the basis of the data collected or
shall be allowed processed. The rights of the data subject shall be upheld without
compromising research integrity.
4. Data sharing between 1. Any or all government agencies party to the agreement shall comply
government agencies for with the Act, these Rules, and all other issuances of the Commission,
the purpose of a public including putting in place adequate safeguards for data privacy and
function or provision of a security.
public service shall be 2. The data sharing agreement shall be subject to review of the
covered a data sharing Commission, on its own initiative or upon complaint of data subject
agreement
Copyright notice: The cited and annotated content of cited standards are duly owned by their research organization or publishers.
PRIVACY VIOLATION
Privacy violation represents activities in the
personal data
(1) Collection
(2) Retention
(3) Use
(4) Disclosure
(5) Disposal
that undermine
Copyright notice: The cited and annotated content of cited standards are duly owned by their research organization or publishers.
DATA PRIVACY STAKEHOLDERS
CONFIDENTIALITY Authority
is enforced to keep secrecy and privacy of personal data
Trust
INTEGRITY is assured in the accuracy, completeness, immediacy, usefulness,
and reliability of personal data
Accessibility
AVAILABILITY is guaranteed in the connectivity, uptime, reach ability,
location, protection, and speed of personal information
exchange
Copyright notice: The cited and annotated content of cited standards are duly owned by their research organization or publishers.
DATA PRIVACY REGULATED PRIVACY & SECURITY POLICIES
INFORMATION PROCESSING REFERENCES
1. Privacy Governance
2. Privacy Regulation & Policies
Collection RA 10173 2016
1. 3. Privacy Rights Processes
Retention Implementing
2. 4. Privacy Principles
Use Rules and
3. 5. Criteria Lawful Processing
Sharing Regulation
4. 6. Condition SPI Processing
5. Disposal 7. Privacy Impact Assessment
National Privacy
8. Privacy Management System
Commission
9. Privacy Breach Management
advisory,
10. ISO 29100 Privacy Controls
circulars and
11. ISO 27701 ISMS Controls
case resolution
12. ISO 27017-18 Cloud Security
issuances
& Privacy
Copyright notice: The cited and annotated content of cited standards are duly owned by their research organization or publishers.
INVENTORY OF DATA AND APPLICATION SYSTEM
Business Data Data Information Data Share Processing
Business Process
Function and Collect, Store, Processing Collected And Control
Unit
Authority Use, Share System Stored Data Compliance
Official name of The name of the Name the category Name of the filing Identify the Identity the law,
the business process and of data being system if the data category of data regulation,
function database owner in created, collected, are being processed collected and advisories, and
carrying out the stored, use, reuse, manually stored by the agreement that
activities required share, disclose, business unit make valid the
for a mandated and disposed in Name of the that by authority, scope,
results of the achieving the information and regulation and input, process,
business function legitimate purpose communication agreement must output, location,
of business system if data are be shared to quality, quantity,
process being processed legitimate 3rd time, security,
with digital party privacy and cost
technology. of data and
application system
Administration Human Resource Personal Recruitment and CSC –Personal -CSC Rules
Management Information Hiring System Data Sheet -GSIS membership
GSIS –Personal policy
Information
Copyright notice: The cited and annotated content of cited standards are duly owned by their research organization or publishers.
INVENTORY OF DATA AND APPLICATION SYSTEM
Application
Business Related System
System of Development Database 3rd Party Service
Function For Data
Information Technology Technology Provider
Process Sharing
Processing
Official name of The name of the Name the kind of Name the kind of Identify the Identity how
the business information application database business entity system is
process to achieve processing system development technology being and the system developed,
the legitimate that is used to technology to used, and brand that are operated and
purpose of the create, collect, design, code, test, specification necessary for the maintain.
information to be store, transmit, release, maintain data sharing of
created use, share, the information information Who are the party
present, and and collection and involving in the
dispose data communication use service provision.
system
Administration Recruitment and Java Technology Open Source MYSQL CSC Information In-house
Human Resource Hiring System System development and
Management GSIS ILMAAMS support
Financial Financial Excel Worksheet Excel File Finance – In-house
Accounting Accounting Ledger Cashiering development and
System support
Copyright notice: The cited and annotated content of cited standards are duly owned by their research organization or publishers.
PERSONAL INFORMATION PROCESSING RESPONSIBILITY FLOW
DATA SUBJECT PI CONTROLLER PI PROCESSOR THIRD-PARTY
Execute
Receive, Accept and Instruct Processing of Personal Data
Provide Request for Personal Data Share
Processing Privacy
For Personal Information Retained or
Agreement
Receive
Collected
Personal
Personal Collect Information
Information Of
Data Disclosure or
Privacy Sharing Agreement
Regulations Retain
Informed
Consent Policies
Access Controls
Block Agreements Use
Erase
Change
Maintain Disclose Personal
Personal Information
Complain Information
Transfer Inventory
Claim Dispose
Copyright notice: The cited and annotated content of cited standards are duly owned by their research organization or publishers.
PERSONAL DATA
COLLECTION AND RETENTION PROCESS
Input
Request to
Give Personal Data
Personal Information
DATA SUBJECT
View
Consent Or
Requirement Block
Change
Correct
Request
Read Notification Delete
Copy
Data Privacy
PI CONTROLLER
Yes
PI PROCESSOR
Copyright notice: The cited and annotated content of cited standards are duly owned by their research organization or publishers.
PERSONAL DATA
USE AND DISCLOSURE PROCESS
Input View
Give Personal Data Block
Personal Information
DATA SUBJECT
Consent Or Correct
Requirement
Request Delete
Access Copy
Read Notification Complain
Data
PI CONTROLLER
Yes
Data
Execute Display
3rd PARTY
Copyright notice: The cited and annotated content of cited standards are duly owned by their research organization or publishers.
PERSONAL DATA DISPOSAL PROCESS
Give Input
Personal Information
DATA SUBJECT
Data
PI CONTROLLER
Yes
Data Execute
the Disposal or
3rd PARTY
Retention and
Disposal Destruction of File Shredded
Agreement Personal Data and Media
Media Destroyed
Copyright notice: The cited and annotated content of cited standards are duly owned by their research organization or publishers.
RULE AND STANDARD BASED MANAGEMENT OF DATA PRIVACY
Data Privacy Policy Information Security Policy
R.A. 10173 Implementing Rules
ISO 29100 ISO 27001 Annex A
Rule 1 – Policy and Definitions 5.2 Consent and choice A5. Information security policies
Rule 2 – Scope of Application 5.3 Purpose legitimacy and A6. Organization of information
Rule 3 – National Privacy Commission specification security
Rule 4 – Data Privacy Principles 5.4 Collection limitation A7. Human resource security
Rule 5 – Lawful Processing of Personal Data 5.5 Data minimization A8. Asset management
Rule 6 – Security Measures Protection of 5.6 Use, retention and A9. Access control
Personal Data disclosure limitation A10. Cryptography
Rule 7 - Security of Sensitive Personal 5.7 Accuracy and quality A11. Physical and environmental
Information in Government 5.8 Openness, transparency security
Rule 8 - Rights of Data Subject and notice A12. Operations security
Rule 9 - Data Breach Notification 5.9 Individual participation A13. Communications security
Rule 10 – Outsourcing and Subcontracting and access A14. System acquisition,
Rule 11 - Registration and Compliance 5.10 Accountability development and maintenance
Requirements 5.11 Information security A15. Supplier relationship
Rule 12 – Rules on Accountability 5.12 Privacy compliance A16. Information security incident
Rule 13 – Penalties management
Rule 14 – Miscellaneous Provisions A17. Information security aspects of
business continuity management
A18. Compliance
Copyright notice: The cited and annotated content of cited standards are duly owned by their research organization or publishers.
RULE AND STANDARD BASED MANAGEMENT OF DATA PRIVACY
Policy Inventory Risks Controls Operation
R.A. 10173 -2016 ISO 10007 – ISO 31000 – Risks R.A. 10173 Security NPC Circular 16-03
Implementing Rules and Configuration Management Measures Personal Data Breach
Regulation Management Management
ISO 27005 – Security ISO 29151 – Privacy
NPC Advisories and Risks Management Controls NYMITY
Circulars Accountability
ISO 27036 – Security Framework
Supplier Relationship
ISO 29100 – Data Privacy NPC Circular 17-01 ISO 29134 – Privacy ISO 27002 – Security ISO 27701 – Privacy
Framework Registration of Impact Assessment Controls Information
Data Processing Management System
ISO 27001 – Information System and ISO 22307 - Finance CSI Security CONTROL
Security Framework Automated Sector Privacy Impact ISO 27035 – Security
System Assessment ISO 27017 – Cloud Incident Management
ISO 29190 – Security
Privacy Management NPC Advisory No. ISO 27032 – Cyber
Capability 2017-03 PIA IS0 27018 – Cloud Security Guidelines
Guidelines Privacy
ISO 29184 – Notification ETSI Security ISO 27550 -Privacy
and Consent Indicators ISO 27045 – Big Data Engineering For
Security and Privacy System Life Cycle
National Cyber Security Processes
Plan 2022 OWASP Vulnerabilities
Copyright notice: The cited and annotated content of cited standards are duly owned by their research organization or publishers.
DATA PRIVACY RIGHTS AND PROCESSING POLICY
Personal Data Privacy Processing Policy
Data Privacy
Rights Collection Processing Retention Sharing Disposal
(Get) (Use) (Store) (Disclose) (Delete)
1. To be informed 1. Lawful criteria 1. Lawful criteria 1. Lawful criteria 1. Authorized by 1. Lawful criteria
2. To give 2. Transparency 2. Transparency 2. Transparency law 2. Transparency
consent 3. Legitimate 3. Legitimate 3. Legitimate 2. Data subject 3. Legitimate
3. To have purpose purpose purpose consent purpose
accessed 4. Proportionality 4. Proportionality 4. Proportionality 3. Adequate 4. Proportionality
4. To correct 5. Declared, 5. Declared, 5. Declared, Safeguard 5. Declared,
5. To block or specified, and specified, and specified, and 4. For research specified, and
erase legitimate legitimate legitimate using publicly legitimate
6. To complain purpose. purpose. purpose. available data purpose.
7. To claim 6. Fair and lawful; 6. Fair and lawful; 6. Fair and lawful; 5. Data sharing 6. Fair and lawful;
damage 7. Data Quality 7. Data Quality 7. Data Quality agreement 7. Data Quality
8. To transfer 8. Not retained 8. Not retained 8. Not retained 8. Not retained
rights longer longer longer longer
9. To claim data 9. Adequate 9. Adequate 9. Adequate 9. Adequate
portability Safeguard Safeguard Safeguard Safeguard
Copyright notice: The cited and annotated content of cited standards are duly owned by their research organization or publishers.
SECURITY MEASURES POLICY
Organizational Security Physical Security Technical Security
1. Compliance Officers. 1. Policies and Procedures on Limited 1. Security policy in processing
Physical Access personal data
2. Data Protection Policies 2. Security Design of Office Space and 2. Safeguards to protect computer
Room network again unlawful, illegitimate,
and destructive activities
3. Records of Processing Activities 3. Person Duties, Responsibility and 3. Confidentiality, integrity, availability,
Schedule Information and resilience of the processing
systems and services
Copyright notice: The cited and annotated content of cited standards are duly owned by their research organization or publishers.