Privacy Ref Blog

Playing the Privacy Metagame

If you attended our most recent quarterly data breach review, you probably heard a new term: “metagame.”  The idea, put in its simplest form, is to take information from outside a scenario and use it to influence your choices.  It is amazing how using information that is not necessarily inside your environment can allow you to adjust and prepare for a lot of scenarios.  This in turn keeps you ahead of the game.

What does “Metagame” mean?

When asked for an example of what a metagame is, I often talk about chess.  When you start a game of chess, there are only a set number of moves any player can take.  In fact, the only moves available are the eight pawns and the two knight pieces.  Most high level players need to think several moves ahead, but imagine if you knew what they would do in a given situation.  If you knew that they always took an aggressive strategy with their queen-side knight, you can adjust your strategy to counter that.  You can apply this to any situation where you know something from outside the given scenario.

How do we apply this to privacy?

Now think about a privacy program and the procedures you have in place.  You have heard about a W-2 phishing scam that has been going around, I am sure.  You know this targets the financial areas of a business, so you adjust your current strategy to combat it. You can gather this information from other privacy professionals, the news, or even just by having an alert set up for information on breaches or other privacy matters.

You may take more time than you usually would to go and visit accounting, let them know what is going on, and adjust their daily activities to alert you if a CEO or similar executive is supposedly asking for personal financial information.  This is metagaming.

Staying ahead of the game

You can even use metagaming when looking to future regulations.  A lot of us are talking about EU-US Privacy Shield.  What is it going to cover?  Who is affected?  What will I need to do to bring my company into compliance?  Many have publicly speculated as to what it will involve and you can take that information and plan accordingly.

You can bring in a third party for an assessment or a data inventory to know where you stand, plan out what changes you may need, and actually be ready for the arrival of Privacy Shield.  After that, all that is left is to see what happens and act according to your plans, taking the strongest possible course of action.

Privacy Ref provides consulting and assessment services to build and improve organizational privacy programs. For more information call Privacy Ref at (888) 470-1528 or email us at info@privacyref.com

Posted on May 25, 2016 by Ben Siegel


« »

No Responses

Comments are closed.


« »

Subscribe to our mailing list

Please fill out the form below.

Required

Want to find out more?

Simply go to the contact page, fill out the form, and someone from Privacy Ref will be in touch with you. You can also send an email to info@privacyref.com or call (888) 470-1528.

News

April 16, 2018

IAPP Training Classes
Privacy Ref is proud to announce that we are an official training partner of the IAPP. You now have the opportunity to learn from one of our knowledgeable privacy professionals using the most respected training content in the industry. The robust interactive training offered, aids in the understanding of critical privacy concepts. The contents of the courses are integral to obtaining your privacy certifications and to educate your new team. Learn more here.

Latest Blog Posts

April 30, 2018

Defining GDPR for Non-Privacy People
During the IAPP’s most recent Privacy Summit, I was approached with an interesting question. “I am a privacy professional and I know why GDPR is important. I know about the fines and requirements for compliance, but few others at my company do. How do I explain GDPR to my colleagues effectively?” I responded with a quick and simple answer that probably did not cover all the bases, so I wanted to write up some deeper thoughts on the subject. Continue reading this post...

Breach Notification and Follow Up
Unfortunately, it is a given that as an organization you will receive a notice from a third party that they had an incident or breach that may have compromised personal or sensitive employee or customer information.  A majority of the breach laws require immediate notification or notification within a 24hr to 48hr timeframe, not including notification times from a contractual perspective. The question then becomes what does the third party need to provide, the level of assurance in order for an organization to re-establish connectivity and/or to use third-party moving forward. Continue reading this post...

Other Recent Posts

PRIVACY REF