Privacy Ref Blog

Three privacy thoughts to start 2016

Over the past few days I have been pondering everything that has happened in privacy in 2015 and the impact on organizations. My intent was to write a retrospective blog entry, but this morning I decided to look ahead and not in the rear-view mirror. So here are three thoughts to kickoff 2016.

Organizations of all sizes are getting more serious about privacy

As we hold discussions with our clients and in the IAPP classes I facilitate, it is becoming more apparent that organizations are getting increasingly serious about protecting personal information. It is not just the large enterprises, but interest is increasing within SMBs. Driving this interest seems to be two factors: increased accountability in the boardroom and executive suite plus increased customer awareness.

However, SMBs often find it a challenge to allocate the resources, both human and financial, to establish an adequate privacy program. To be frank, I often find that the privacy programs in large enterprises have these same challenges. Those accountable for privacy for their organizations must find engaging, cost effective ways to ensure that the remainder of the staff understand their privacy responsibilities.

In 2016 Privacy Ref will be continue to offer solutions to assist these organizations.

Executive education remains key to success for a privacy program

One question I frequently ask clients and ask in the classes I facilitate is “Have your executives received privacy training?” The answer is usually a resounding “No!”

A tenet for establishing a privacy program is that executive support is a requirement for the success of a privacy program. If the executive team, or at least the executive sponsor, has not received training to understand basic privacy concepts, statutory requirements, and best practices, it will be difficult for the privacy owner to obtain meaningful support for a program.

At Privacy Ref we advocate that executives receive at least a one hour, focused privacy training or update each year. This is not the training every staff member should receive each year, but training that is tailored to be meaningful and actionable for the executives attending. We have witnessed a significant difference in the support and success of privacy programs when executives’ privacy knowledge and awareness is increased.

Staff awareness prevents data breaches

Every year there are several studies that delve into the causes of a data breach. Staff making mistakes, human error, in following procedures or creating new procedures remains a major contributing factor. While annual training helps, an on-going awareness program must be in place to support the training to keep privacy top-of-mind.

For example, consider utilizing the basic principles of Privacy by Design as part of your awareness effort. Privacy Ref has worked with our clients to establish checklists, rooted in PbD, for development teams to follow when creating new applications or business processes. These checklists not only increase the privacy awareness of and guide a development team, but serve as a core artifact for Privacy Impact Assessments.

 

As we enter 2016 the privacy landscape continues to change and the challenges for a privacy professional continue to increase. Privacy professionals need to continue to find easy to understand, easy to implement, easy to integrate approaches for their organizations to meet these privacy challenges.

  • author's avatar

    By: Bob Siegel

    Bob Siegel, the founder and President of Privacy Ref, Inc., has extensive professional experience in the development and improvement of privacy policies and procedures, the definition of performance metrics to evaluate privacy maturity, and the evaluation of compliance. He utilizes a combination of alignment, adaptability, and accountability strategies to guide organizations in achieving their privacy goals.

    He is a Fellow of Information Privacy and a Certified Information Privacy Professional, awarded from the International Association of Privacy Professionals, with concentrations in U.S. private-sector law (CIPP/US), European law (CIPP/E), and Canadian law (CIPP/C). He is also a Certified Information Privacy Manager (CIPM) and Privacy Technologist (CIPT).

    Siegel is a member of the IAPP faculty, has served on the Certification Advisory Board for the CIPM program the Publications Advisory Board.

    Siegel also writes the blog “Operational Privacy” on CIO.com

  • author's avatar

  • author's avatar

    Privacy Ref and CyberDefenses Bring Privacy and Security Together
    Happy Data Privacy Day
    What is the difference between privacy and security?
    My Mother Understands
    Human Errors Will Create Privacy Issues

    See all this author’s posts

Privacy Ref provides consulting and assessment services to build and improve organizational privacy programs. For more information call Privacy Ref at (888) 470-1528 or email us at info@privacyref.com

Posted on December 31, 2015 by Bob Siegel
Tags: , ,

« »

No Responses

Comments are closed.


« »

Subscribe to our mailing list

Please fill out the form below.

Required

Want to find out more?

Simply go to the contact page, fill out the form, and someone from Privacy Ref will be in touch with you. You can also send an email to info@privacyref.com or call (888) 470-1528.

News

May 10, 2017

Predictive Breach Cost Model
Download our predictive breach cost modelhere.

Latest Blog Posts

August 14, 2017

Privacy Ref and CyberDefenses Bring Privacy and Security Together
There is a saying that you can have security without privacy, but you cannot have privacy without security. While privacy and security are both concerned with the protection of information held by an organization, security provides the means to meet the business requirements identified to meet privacy demands from regulators, customers, employees, and other stakeholders. Privacy Ref works with our clients to improve their business and operational practices for protecting personal information. Increasingly our clients’ have been looking for services to supplement their security practices, tools, and expertise. CyberDefenses fills this role. Continue reading this post...

Can Consent Fall Short in GDPR?
Over the past several months, I have been taking a deeper dive into GDPR. I have found Article 6 on the legal basis for processing data particularly interesting. There is some discussion to be had for each company and how they will process data in a particular case, but I often hear that consent will be used. I have even heard arguments for consent as a catch-all for processing. This ignores the pitfalls that could come with the use of that certain legal basis. Continue reading this post...

Other Recent Posts

PRIVACY REF