Confidentiality and Privacy Controls: Andreas Rudolf Anton

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 7

Andreas Rudolf Anton

Confidentiality and Privacy Controls

Organizations possess a myriad of sensitive information, including strategic plans, trade secrets,
cost information, legal documents, and process improvements. This intellectual property often is crucial
to the organization’s long-run competitive advantage and success. Consequently, preserving the
confidentiality of the organization’s intellectual property, and similar information shared with it by its
business partners, has long been recognized as a basic objective of information security.
Identify and

Classify

Information

Preservation of

Training Condentiality Encryption


and Privacy

Access

Controls

After the information that needs to be protected has been identified, the next step is to classify
the information in terms of its value to the organization. Control Objectives for Information and Related
Technology (COBIT) 5 management practice points out that classification is the responsibility of
information owners, not information security professionals, because only the former understand how
the information is used. Once the information has been classified, the appropriate set of controls can be
deployed to protect it.

Protecting Confidentiality with Encryption


Encryption (to be discussed later in this chapter) is an extremely important and effective tool to
protect confidentiality. It is the only way to protect information in transit over the Internet. It is also a
necessary part of defense-in-depth to protect information stored on websites or in a public cloud. For
example, many accounting firms have created secure portals that they use to share sensitive audit, tax,
or consulting information with clients. The security of such portals, however, is limited by the strength of
the authentication methods used to restrict access. In most cases, this involves only single factor
authentication via a password. Encrypting the client’s data that is stored on the portal provides an
additional layer of protection in the event of unauthorized access to the portal. Similarly, encrypting
information stored in a public cloud protects it from unauthorized access by employees of the cloud
service provider or by anyone else who is using that same cloud.

Controlling Acc ess to Sensitive Information


Chapter 8 discussed how organizations use authentication and authorization controls to restrict
access to information systems that contain sensitive information. Authentication and authorization
controls, however, are not sufficient to protect confidentiality because they only control initial access to
sensitive information that is stored digitally. As COBIT 5 management practice DSS06.06 explains,
organizations need to protect sensitive information throughout its entire life cycle, including distribution
and disposal, regardless of whether it is stored digitally or physically. Thus, the basic authentication and
authorization controls discussed in Chapter 8 need to be supplemented with additional digital and
physical access controls.
Information rights management (IRM) software provides an additional layer of protection to
sensitive information that is stored in digital format, offering the capability not only to limit access to
specific files or documents, but also to specify the actions (read, copy, print, download to USB devices,
etc.) that individuals who are granted access to that resource can perform. Some IRM software even has
the capability to limit those privileges to a specific period of time and to remotely erase protected files.
Either the creator of the information or the person responsible for managing it must assign the access
rights. To access an IRM-protected resource, a person must first authenticate to the IRM server, which
then downloads code to that person’s computer that enables access to the information.

Training
Training is arguably the most important control for protecting confidentiality. Employees need to
know what information they can share with outsiders and what information needs to be protected. For
example, employees often do not realize the importance of information they possess, such as time-
saving steps or undocumented features they have discovered when using a particular software program.
Therefore, it is important for management to inform employees who will attend external training
courses, trade shows, or conferences whether they can discuss such information or whether it should be
protected because it provides the company a cost savings or quality improvement advantage over its
competitors.

Privacy
The Trust Services Framework privacy principle is closely related to the confidentiality principle,
differing primarily in that it focuses on protecting personal information about customers, employees,
suppliers or business partners rather than organizational data. Consequently, the controls that need to
be implemented to protect privacy are the same ones used to protect confidentiality: identification of
the information that needs to be protected, encryption, access controls, and training.

Privacy Controls
As is the case for confidential information, the first step to protect the privacy of personal
information collected from customers, employees, suppliers and business partners is to identify what
information the organization possesses, where it is stored, and who has access to it. It is then important
to implement controls to protect that information because incidents involving the unauthorized
disclosure of personal information, whether intentional or accidental, can be costly.

Privacy Concerns
Two major privacy-related concerns are spam and identity theft. Spam Spam is unsolicited e-mail
that contains either advertising or offensive content. Spam is a privacy-related issue because recipients
are often targeted as a result of unauthorized access to e-mail address lists and databases containing
personal information. The volume of spam is overwhelming many e-mail systems. Spam not only reduces
the efficiency benefits of e-mail but also is a source of many viruses, worms, spyware programs, and
other types of malware. To deal with this problem, the U.S. Congress passed the Controlling the Assault
of Non-Solicited Pornography and Marketing (CAN-SPAM) Act in 2003. Thus, organizations need to be
sure to follow CAN-SPAM’s guidelines or risk sanctions. Key provisions include the following:
 The sender’s identity must be clearly displayed in the header of the message.
 The subject field in the header must clearly identify the message as an advertisement or
solicitation.
 The body of the message must provide recipients with a working link that can be used to opt out
of future e-mail. After receiving an opt-out request, organizations have 10 days to implement
steps to ensure they do not send any additional unsolicited e-mail to that address. This means
that organizations need to assign someone the responsibility for processing opt-out requests.
 The body of the message must include the sender’s valid postal address. Although not required,
best practice would be to also include full street address, telephone, and fax numbers.
 Organizations should not send commercial e-mail to randomly generated addresses, nor should
they set up websites designed to “harvest” e-mail addresses of potential customers. Experts
recommend that organizations redesign their own websites to include a visible means for visitors
to opt in to receive e-mail, such as checking a box.

Privacy Regulations and Generally Acc epted Privacy Principles


To help organizations cost-effectively comply with these myriad requirements, the American
Institute of Certified Public Accountants (AICPA) and the Canadian Institute of Chartered Accountants
(CICA) jointly developed a framework called Generally Accepted Privacy Principles (GAPP). GAPP
identifies and defines the following 10 internationally recognized best practices for protecting the privacy
of customers’ personal information:
 Management
 Notice
 Choice and consent
 Collection
 Use and retention
 Access
 Disclousre to third parties
 Security
 Quality
 Monitoring and enforcement

Factors That Influence Encryption Strength


Three important factors determine the strength of any encryption system: (1) key length,
(2) encryption algorithm, and (3) policies for managing the cryptographic keys.

Virtual Private Networks (VPNs)


To protect confidentiality and privacy, information must be encrypted not only within a system,
but also when it is in transit over the Internet. As Figure 9-5 shows, encrypting information while it
traverses the Internet creates a virtual private network (VPN), so named because it provides the
functionality of a privately owned secure network without the associated costs of leased telephone lines,
satellites, and other communication equipment. Using VPN software to encrypt information while it is in
transit over the Internet in effect creates private communication channels, often referred to as tunnels,
which are accessible only to those parties possessing the appropriate encryption and decryption keys.
VPNs also include controls to authenticate the parties exchanging information and to create an audit trail
of the exchange. Thus, VPNs ensure that sensitive information is exchanged securely and in a manner
that can provide proof of its authenticity. There are two basic types of VPNs. One type uses a browser,
encrypting the traffic with SSL (the same protocol that produces the familiar “lock” symbol whenever
you engage in online shopping or banking); the other type uses IPSec, a version of the IP protocol that
incorporates encryption as part of the process of creating IP packets. Both types of VPNs provide a
secure means of exchanging sensitive information over the Internet but create problems for
other components of information security.

Summary

Confidential information about business plans and personal information collected from
customers was encrypted both in storage and whenever it was transmitted over the Internet. Employee
laptops were configured with VPN software so that they could securely access the company’s
information systems when they worked at home or while traveling on business. The CISO had used GAPP
to develop procedures to protect personal information collected from customers.

Case

The U.S.
Department of Education
established the Privacy
Technical Assistance
Center (PTAC) as a “one-stop”
resource for education
stakeholders to learn about data privacy, confidentiality, and security practices related to student-level
longitudinal data systems and other uses of student data. PTAC provides timely information and updated
guidance through a variety of resources, including training materials and opportunities to receive direct
assistance with privacy, security, and confidentiality of student data systems.
In December 2011, the U.S. Department of Education (Department or we) released new
regulations governing the Family Educational Rights and Privacy Act (FERPA) and supplemental
nonregulatory guidance. We are providing the following case study to illustrate how specific provisions
of FERPA may be implemented. This case study uses fictional agencies, does not address individual
circumstances, and does not consider additional legal requirements that may be required under other
Federal, state, or local laws.
The state education agency (SEA) in State X operates a statewide longitudinal data system (SLDS)
that contains a large quantity of personally identifiable information (PII) from students’ K-12 and
postsecondary education records, which are protected from unauthorized disclosure by the Family
Educational Rights and Privacy Act (FERPA).
In order to minimize access to sensitive information within the SLDS, the SEA follows data
minimization best practices and implements role-based access controls on all student-level information.
SEA employees’ levels of access are determined by their job functions and responsibilities, in accordance
with State X’s SLDS data governance plan, and are implemented through appropriate physical and
information technology (IT) security controls. Because the data collected and maintained by the SEA are
also made available to external researchers and published in a variety of public reports (see below), the
data governance plan also establishes access controls and disclosure avoidance measures for external
dissemination of the data. The levels of access and their corresponding data minimization procedures
identified by the SEA are as follows:
 Raw Individual Student Data (contains direct identifiers, including Social Security Numbers
[SSNs])
Integrating students’ records into the SLDS requires the use of a number of direct identifiers
(typically student’s name, address, parents’ names, and student’s SSN or other unique student ID
number) to identify specific students’ records in datasets from different sources, and to link
those records together longitudinally
 Redacted Individual Student Data (direct identifiers have been removed)
Redacting the direct identifiers reduces the overall sensitivity of the file. However, the redacted
data file still contains PII, in the form of indirect identifiers (e.g., date of birth) and other
identifying characteristics (e.g., race, gender, and disability status), data on education program
participation, and on the student’s teacher(s) that could be used to re-identify specific
individuals. Consequently, the data are still protected by FERPA. Most of the statistical analysis
performed by the SEA’s employees is done using this redacted file.
 Aggregate Data Tables (the need to protect small cells)
To meet legal requirements, the SEA must publish various school and student performance
indicators in aggregate tables. For example, the SEA uses data in the SLDS to construct aggregate
data tables of student achievement broken down by various subgroups. Because many of these
aggregate data tables contain information for small subgroups, the tables contain numerous cells
with only one or two students in them.
 Public Aggregate Data Tables (disclosure avoidance measures have been applied)
In order to release the aggregate data tables to the public, the SEA must perform disclosure
avoidance analyses on the tables to identify potential disclosures, and then apply disclosure
avoidance techniques to mitigate the risk that a reasonable person in the school community
could identify specific students within the small cells of the tables. In this case, the SEA in State X
decides to accomplish this by utilizing a disclosure avoidance technique known as
“complementary cell suppression,” whereby all cells in the table that fall below a particular
threshold chosen by SEA are suppressed.
 De-identified Individual Student Data (disclosure avoidance measures have been applied)
After publishing the public aggregate data tables on its website, the SEA receives a number of
requests from researchers and advocacy groups requesting additional data. These requestors
explain that the public tables indicate that there may be some interesting trends in the data, and
that they want to perform more extensive analyses on the student-level data. Recognizing the
potential public value of these evaluations, the SEA decides to create a public-use version of the
file. To accomplish this, the SEA takes the redacted individual student data file and removes or
blurs any remaining indirect identifiers (e.g., replacing date of birth with year of birth). To de-
identify the data further, the SEA then applies additional disclosure avoidance on the data, in this
case by performing a perturbation technique, such as “swapping” (in which a statistical
algorithm is used to swap data elements for a small number of individuals).

FERPA permits the SEA’s employees and authorized representatives to access PII from education
records to audit or evaluate Federally- or state-supported education programs and requires that all PII
from education records be adequately protected from inadvertent or unauthorized redisclosure and
destroyed when no longer needed for the purposes of the evaluation. Using the FERPA requirements as a
minimum, it is then a widely accepted best practice for SEAs to adopt broad data minimization practices
and to apply additional restrictions and protections to those data, files, or systems containing PII
elements generally considered to have higher potential for harm or misuse, like SSN and other direct
identifiers.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy