24 - Domain 01 Lecture Notes BW
24 - Domain 01 Lecture Notes BW
Part 1
Program management and frameworks
In this lecture:
• Program management
• Program management examples
• Project examples
• Organized how?
• Framework
What is program management?
• Oversee, manage multiple projects (that make up a program)
• Provides holistic view of a discrete program within an organization
• Meet organization's strategic, business goals
• Manage change
• Measure performance (via metrics)
• Improve organization's performance
Program Management Examples
• Digital transformation (e.g., modernize IT infrastructure)
• Employee development (e.g., sponsor MBA)
• Health and wellness (e.g., company gym, meals)
• Sustainability (e.g., reduce environmental impact)
• Innovation and R&D
• Customer experience (e.g., enhance service delivery, customer
satisfaction)
Project Examples
• Digital transformation
• Cloud migration
• Data analytics and business intelligence
• Customer Relationship Management (CRM) systems
• Internet of Things (IoT)
• AI and ML
• Cybersecurity enhancements
Organized How?
• Adopt and implement applicable (risk management) framework(s)
What is a framework?
• Guidance and processes for managing a group of related projects
• Help to achieve strategic objectives
• Ensuring projects align, contribute to business goals
• Can include processes, tools, and best practices to facilitate effective
management
Review (1):
What is a framework?
• Guidance and processes for
managing a group of related
projects
Introductory Concepts
Part 2
Privacy program management and governance
In this lecture:
• Privacy program management
• Privacy program’s goals
• How to create a privacy program framework
• What is governance?
• What is a privacy professional?
Privacy Program Management
• Organized approach to protecting PII and the rights of individuals
Privacy Program’s Goals
• Provide an auditable framework
• Comply with legal, regulatory requirements
• Meet client, customer expectations (e.g., promote trust, confidence)
• Prevent and mitigate risk
How to Create a Privacy Framework
• Models exist
• Tailor to organization existing models and applicable laws,
regulations, best practices
• Incorporate
• Program management principles
• Privacy by Design (PbD)
• Privacy by Default
• Privacy program framework: what you learn throughout this course
What is governance?
• System of rules, practices, processes
• How program is directed
• Mechanisms through which objectives achieved, risks managed,
performance optimized
• Balance interests of various stakeholders (e.g., management,
customers, other programs)
What is a privacy professional?
• Any member of a privacy team
• Responsible for implementing privacy program framework
Review (1):
Other reasons
• Promote ethical data-processing
throughout organization
• Facilitate global operations
• Identify, mitigate risk
• Competitive differentiator
• Increase data quality, value
Privacy as a Competitive
Differentiator
How does a robust privacy program improve your organization’s brand?
In this lecture:
• Increased trust and loyalty
• Enhanced brand reputation
• Compliance and risk mitigation
Increased Trust and Loyalty
• Cisco 2020 report, “From Privacy to Profit: Achieving Positive Returns
on Privacy Investments”
• For every USD $1 spent, $2.70 returned
Enhanced Brand Reputation
• Apple’s App Tracking Transparency (ATT)
• Within weeks of 2021 feature release, 96% of users had opted out
• Recent surveys:
• 26% consumers had left a brand over data-handling concerns (Marketing
Charts, 2021)
• 73% attracted to brands with greater sense of safety and security (Edelman
Trust Barometer, 2023)
• 88% will buy from trusted brand more often (Marketing Charts, 2024)
Compliance & Risk Mitigation
• Compliance with laws, regulations
• Minimize fines, sanctions, legal actions
• Proactivity protects company, reassures consumers
Examples
• Safegrog’s 2022 B2B Trusted Brands Report
• Good
• Apple
• Adobe
• Under Armour
• Bad
• Meta (e.g., Facebook, Instagram)
• TikTok (e.g., children’s privacy)
Review:
Policy Process
• High-level, overarching • Series of interrelated tasks that
guideline/requirement produce a specific outcome
• Outlines organization’s • “What” needs to be done
principles, values, rules
• Framework for decision-making
• “Why” behind decisions and
actions
Review (2):
Procedure
• Detailed, step-by-step
instructions
• “How” to perform certain task,
process
Privacy Governance
Roadmap
The different stages of developing a privacy governance framework
In this lecture:
• What is governance? (review)
• What is privacy governance?
• Privacy governance roadmap
What is governance? (review)
• System of rules, practices, processes
• How program is directed
• Mechanisms through which objectives achieved, risks managed,
performance optimized
• Balance interests of various stakeholders (e.g., management,
customers, other programs)
What is privacy governance?
• System of rules, practices, processes for managing a privacy program
• Elements:
• Draft, publish vision and mission statements
• Define program scope
• Create a strategy
• Develop a framework
• Structure team
Vision and Mission Create Strategy Structure Team
Statements
Step 2 Step 4
Define Program Develop
Scope Framework
Review (1):
Roadmap
• Draft, publish vision and mission
statements
• Define program scope
• Create a strategy
• Develop a framework
• Structure team
US Privacy Laws 101
The United States’ sectoral approach to privacy
In this lecture:
• Sectoral approach
• Finance and banking
• Healthcare
• Children's privacy
• Payment card processing
• Data breach notification laws
Sectoral Approach
• What does “sectoral” mean?
• Laws apply to specific sectors
• E.g., healthcare, finance, education, telemarketing
• Each sector has different regulators
• Department of Education
• Department of Health and Human Services (HHS)
• Federal Trade Commission (FTC)
• Federal Communications Commission (FCC)
Finance and Banking
• Gramm-Leach-Bliley Act (GLBA)
Healthcare
• Health Insurance Portability and Accountability Act (HIPAA)
• Applies to “covered entities”
• Healthcare providers, insurance plans, clearing houses
Children’s Privacy
• Children’s Online Privacy Protection Act (COPPA)
• Regulates collection of data for children under 13
• Regulated by FTC
Payment Card Processing
• Payment Card Industry Data Security Standards (PCI-DSS)
• Governs debit, credit, e-wallet, point of sale (POS)
• Industry standard, not law
• Adopted as part of legal requirements
Data Breach Notification Laws
• No U.S. Federal Government law
• All 50 states have own data breach notification law
• Compromised, unencrypted PII subject to these laws
• Notification required to residents, government bodies, attorneys
general
• Notification thresholds vary
Review (1):
Healthcare Finance
• HIPAA • FCRA
• HITECH • FACTA
• GLBA
U.S. Federal Laws to Know
Part 2
Telecommunications, government, and education
In this lecture:
• Telecommunications
• TCPA
• DNC registry
• Government
• The Privacy Act of 1974
• ECPA
• Education
• FERPA
Telecommunications
• Telephone Consumer Protection Act (TCPA)
• Regulator: FTC, FCC, state AGs
• Covers: limits automatic dialing, pre-recorded messages, texts, faxes
• Do Not Call (DNC) Registry
• Regulator: FTC
• Covers: telemarketing opt-out
Government
• The Privacy Act of 1974
• Regulator: Department of Justice (DOJ)
• Covers: PII held by federal agencies in systems of records; FIPPs
• Electronic Communications Protection Act (ECPA)
• Regulator: states, law enforcement
• Covers: wiretapping, eavesdropping, unauthorized access to electronic
communications
Education
• Family Education Rights and Privacy Act (FERPA)
• Regulator: Department of Education
• Covers: PII in education records, directory information
Review (1):
Telecommunications Government
• TCPA • The Privacy Act of 1974
• DNC registry • ECPA
Review (2):
Education
• FERPA
U.S. Federal Laws to Know
Part 3
Marketing, video, and “other”
In this lecture:
• Marketing
• CAN-SPAM
• Video
• VPPA
• “Other”
• FTC Act
• DPPA
• COPPA
Marketing
• Controlling the Assault of Non-Solicited Pornography and Marketing
(CAN-SPAM)
• Regulator: FTC
• Covers: unsolicited commercial email
Video
• Video Privacy Protection Act (VPPA)
• Regulator: private right of action
• Covers: PII in video rental records
“Other”
• Federal Trade Commission (FTC) Act
• Establishes FTC’s rights to investigate and enforce against “unfair or deceptive
acts or practices”
• Drivers Privacy Protection Act (DPPA)
• Regulator: state AGs
• Covers: PII held by Departments of Motor Vehicles (DMVs)
• Children’s Online Privacy Protection Act (COPPA)
• Regulator: FTC
• Covers: children’s PII
Review (1):
Marketing Video
• CAN-SPAM • VPPA
Review (2):
“Other”
• FTC Act
• DPPA
• COPPA
California Consumer Privacy
Act (CCPA)
Basic rights, requirements, and regulator actions
In this lecture:
• Timeline
• Consumer rights
• Organization requirements
• Regulator actions
CCPA signed CCPA CPRA takes
into law enforceable effect
Regulator actions
• State AG + California Privacy
Protection Agency (CPPA)
enforce
• Alleged violation unaddressed
within 30 days: USD $7,500
fine/violation
• Unintentional violations: USD
$2,500
California Privacy Rights Act
(CPRA)
Amendments to the CCPA via the CPRA
In this lecture:
• Expanded consumer rights
• New definitions, scope
• New regulatory body
• Additional business obligations
• Compliance and enforcement
Expanded Consumer Rights
• Correct data
• Limit use of sensitive personal information
• Opt-out of sharing
New Definitions, Scope
• Sensitive personal information
• Expanded “business” criteria
• Buy, sell, share PII of 100,000 or more consumers, households, devices
• Increase from 50,000
New Regulatory Body
• California Privacy Protection Agency
Additional Business Obligations
• Contractual requirements (with third parties)
• Privacy by design
Compliance and Enforcement
• Increased penalties: higher penalties for violations involving minors
• Data retention policies: businesses must disclose periods, retain only
as long as needed
Review (1):
Privacy standards
• ISO/IEC 27701: Security
techniques for privacy
information management
• ISO/IEC 29134: Guidelines for
privacy impact assessment
General Data Protection
Regulation (GDPR)
A short introduction to the GDPR
In this lecture:
• What is the GDPR?
• GDPR timeline
• Article 1, Subject-Matter and Objectives
• Article 2, Material Scope
• Article 3, Territorial Scope
What is the GDPR?
• EU/EEA’s comprehensive data protection law
• Global standard
• Provides individuals with greater control over how their personal data
is collected, processed, maintained
• Extraterritorial
GDPR Timeline
• 2012: proposed
• December 2016: EU Parliament, Council agree
• May 2018: enforceable
Article 1
• “Subject-Matter and Objectives”
• Outlines main goals
• Set rules for processing of personal data
• Protect individuals' rights and freedoms regarding personal data
• Ensure free movement of personal data within EU
Article 2
• “Material Scope”
• Defines types of data processing activities covered by the GDPR
• Applies to personal data that is
• Automated
• Part of a filing system
• Does not apply to
• Purely personal or domestic activities
• Certain law enforcement activities
Article 3
• “Territorial Scope”
• Data controller: determines the purpose and means of processing
personal data
• Data processor: processes data on behalf of the data controller
• Applies to
• Any data processing activities conducted within EU, regardless of where data
processor is located
• Organizations outside the EU that offer goods or services to, or monitor
behavior of, individuals within EU
Review (1):
Article 1 Article 2
• “Subject-Matter and Objectives” • “Material Scope”
• Outlines main goals: • Defines types of data processing
• Protect individuals’ rights and activities covered by the GDPR
freedoms regarding personal
data
• Ensure free movement of
personal data within EU
Review (3):
Article 3
• “Territorial Scope”
• Data controller: determines the
purpose and means of
processing personal data
• Data processor: processes data
on behalf of the data controller
Rights, Requirements, and
Regulators
A brief overview of GDPR rights, requirements, and regulator actions
In this lecture:
• Consumer rights
• Organization requirements
• Regulator actions
Consumer Rights
• Withdraw consent
• Request data
• Request deletion
• Data portability
• Object to automated decision-making (ADM)
Organization Requirements (1)
• Implement PbD, safeguards, including cross-border transfers
• Notify DPAs, consumers of data breach within 72 hours
• DPA: Data Protection Authority
• Obtain consent, parental consent for children under 16
• Record of Processing Activities (RoPA)
• Appoint Data Protection Officer (DPO)
Organization Requirements (2)
• Responsible for third-parties
• DPIAs (new or high-risk processing)
• DPIA: Data Protection Impact Assessment
• Consult with regulators before carrying out some activities
• Demonstrate compliance
• Training and awareness
Regulator Actions
• Ask for RoPA, evidence of compliance
• Impose data-processing bans
• Require breach notification, data deletion
• Suspend cross-border transfers
• Enforce penalties up to 20 million Euros, or 4% annual revenue
Review (1):
Regulator actions
• Ask for RoPA, evidence of
compliance
• Impose data-processing bans
• Require breach notification, data
deletion
• Suspend cross-border transfers
• Enforce penalties
GDPR & Cross-Border Data
Transfers
Regulations on transferring border to “third countries”
In this lecture:
• Cross-border data transfers
• GDPR Article 45
• Inadequate countries
• Data Transfer Impact Assessment (D/TIA)
• DPA TIA considerations
Cross-Border Data Transfer
• Definition: transmission of personal data to an outside recipient
country or territory
• Many laws require protective assurance measures
• GDPR’s regulations strictest worldwide
• Data may be transferred provided adequate protections in place
Article 45
• “Transfers on the basis of an adequacy decision”
• Data may be transferred based on an “adequacy decision”
• Adequacy decision
• EU determination that third country, territory, international organization,
ensures adequate data protection
• Adequacy = “essential equivalence” (i.e., essentially equivalent to EU
protections)
Inadequate Countries
• Standard Contractual Clauses (SCCs):
• Pre-approved contractual terms between data exporters and importers
• Binding Corporate Rules (BCRs):
• Policies for multinational corporations
• Appropriate safeguards assessed on case-by-case basis
• Code of conduct and certification mechanism
• Derogation (i.e., exemption)
Data Transfer Impact Assessment
• D/TIA
• Evaluates risks associated with transferring data between third
countries
• Includes:
• Map transfer
• Identify, assess methods of transfer
• Implement, monitor safeguards
• Ensure process aligns with business requirements
DPA D/TIA Considerations
• Government access to data
• Intelligence and law enforcement activities
• Safeguards
• Receiving country’s applicable privacy, security, human rights
standards
Review (1):
Organization requirements
• Implement PbD • Notice of intent to process
• Incident response, remediation • Appoint DPO
program • Responsible for third-parties
• Implement, monitor safeguards • Conduct personal data
• Notify data subjects, regulators protection impact report (RIPD)
of data breaches • Demonstrate compliance
• Follow process rules concerning • Comply with cross-border
children’s data transfer requirements
Review (3):
Regulator actions
• Request evidence of compliance
• Implement sanctions
• Enforce penalties
PRC’s PIPL
Personal Information Protection Law (PIPL)
In this lecture:
• Personal Information Protection Law (PIPL)
• Fines
PIPL
• Effective November 2021
• Commercial aspects similar to GDPR
• Impacts private sector
• Does not prevent central government from accessing data
PIPL Fines
• General violations: up to RMB 1 million (~ USD $141,000)
• Grave violations: up to RMB 50 million (~ USD $7 million) or 5%
annual revenue
Review:
PIPL Fines
• Effective November 2021 • General violations: up to RMB 1
• Commercial aspects similar to million (~ USD $141,000)
GDPR • Grave violations: up to RMB 50
• Impacts private sector million (~ USD $7 million) or 5%
annual revenue
• Does not prevent central
government from accessing data
Self-Regulatory Standards
And codes of conduct
In this lecture:
• Standard
• Self-regulatory bodies
• Trust marks
• Codes of conduct
What is a standard? (review)
• A set of established guidelines or specifications designed to ensure
quality, safety, interoperability
PCI-DSS
• Payment Card Industry Data Security Standard (PCI-DSS)
• E.g., organizations that accept, transmit, store cardholder data
associated with Visa, Mastercard, American Express, Discover, JCB
International
Self-Regulatory Bodies
• Direct Marketing Association (DMA)
• Network Advertisers Initiative (NAI)
Trust Marks
• What is a trust mark?
• Logo, badge, or symbol on a website
• Signifies certain security, privacy, or business standard met
• Examples:
• Verisign
• TrustArc
• McAfee
• Paypal
Codes of Conduct
• DMA Guidelines for Ethical Business Practice
• Children Advertising Review Unit (CARU) Advertising Guidelines
• NAI Code of Conduct
• EU Code of Conduct
• Applies to B2B cloud service providers when acting as a processor under
GDPR Article 28
• Outlined in Article 40, Codes of Conduct
Review (1):
Codes of conduct
• DMA Guidelines for Ethical
Business Practice
• Children Advertising Review Unit
(CARU) Advertising Guidelines
• NAI Code of Conduct
• EU Code of Conduct
Noncompliance Penalties
Fines and other penalties
In this lecture:
• Why issue penalties?
• Who issues penalties?
• Examples
• GDPR penalties
• GDPR tiers
• Non-financial penalties
• CCPA penalties
• Facebook 2019
• Final note
Why issue penalties?
• Accountability
• Enforce behavior
• Encourage behavior modification
• Help organization to prioritize remediations
Who issues penalties?
• Government agency
• Industry regulatory body (e.g., self-regulation)
Example: HIPAA
• HITECH, amended HIPAA privacy and security rules
• Max penalty for breach of PHI: USD $1.5 million/year
• Max fines per violation tier, per calendar year
• Tier 1 (unaware): $100 to 50,000/violation up to 25,000/year
• Tier 2 (CE should have known): $1,000 to 50,000/violation up to 100,000/year
• Tier 3 (willful neglect, remediated within 30 days): $10,000 to 50,000 up to
250,000/year
• Tier 4 (willful neglect, no effort to correct): $50,000/violation up to 1.5
million/year
GDPR Penalty Factors
• Nature, duration, history
• Number of affected individuals
• Severity of damage
• Mitigation
• Intent or negligence
GDPR Tiers
• Tier 1: Higher of up to 20 million Euros, or 4% of total turnover
• Example violations: violation of principles, individual rights, international
transfers, member state responsibilities (more substantive)
• Tier 2: Higher of up to 10 million Euros, or 2% of total turnover
• Typically, administrative in nature
Non-financial Penalties
• Warnings
• Processing restrictions, suspensions, bans, temporary or permanent
• Data erasure
• Requirement to recertify
CCPA Penalties
• CA AG, CPPA enforce
• Violation up to $2,500/violation
• Intentional violation up to $7,500/violation
• Private right of action (for data breaches)
• $100 to 750/incident/consumer
Facebook 2019
• FTC fined USD $5 billion
• Violated 2011 privacy settlement
Final Note
• Compliance
• Is the floor, not the ceiling
• Creates opportunity for program improvement
• Should disrupt business as little as possible
• Balance PbD with business objectives
Review (1):