Personally Identifiable Information Protection

PECB
PECB PECB

“If we’re going to be connected, then we need to be protected. As Americans, we shouldn’t have to forfeit our basic privacy when we go online to do our business. Each of us as individuals have a sphere of privacy around us that should not be breached, whether by our government, but also by commercial interests.” These words were spoken two weeks ago by the American president Barack Obama, who urged Congress to pass a series of cybersecurity and privacy laws that will protect even more the data privacy of customers and children in schools. Once again the data Privacy and Regulation topic became newspaper headlines.

www.pecb.org
Personally Identifiable
Information Protection
“If we’re going to be connected, then we need to be protected. As Americans, we shouldn’t have to forfeit our
basic privacy when we go online to do our business. Each of us as individuals have a sphere of privacy around
us that should not be breached, whether by our government, but also by commercial interests.” These words
were spoken two weeks ago by the American president Barack Obama, who urged Congress to pass a series of
cybersecurity and privacy laws that will protect even more the data privacy of customers and children in schools.
Once again the data Privacy and Regulation topic became newspaper headlines.
In 2014 Privacy and Regulation issues have continued affecting lots of levels, and looking ahead to 2015, according
to Information Security Forum (ISF), this topic will still dominate as one of the five security trends together with
cybercrime, threats from third-party providers, bring-your-own BYO, and people. Even more, it is predicted that in
2015 all these security trends will just continue to increase their complexity and sophistication.
So, for every organization the concept of privacy specifically the concept of Personally Identifiable Information (PII)
protection will have critical role to achieve organizations objectives. Nowadays every organization has to balance
its own interests with those of the customers. It has to comply with various applicable laws to reduce regulatory
sanctions inside the state where it functions, and also to treat data privacy protection as a business risk, all this to
reduce possible reputation damage and loss of customers due to privacy breaches.
However the massive numbers of information and communication technologies (ICT) which are used to transmit,
share, collect and carry data information and the enormous amount of data that pass everyday through these
processes have made privacy protection a very complex task. One of the reasons for this is that data privacy
breaches are influenced directly by technology innovations, and the fact that legislation can never be fast enough
to answer technology developments makes it very difficult to maintain regulations regarding this issue.
Another reason is that in different countries there are already different laws that regulate and protect the use of
Personally Identifiable Information (PII), and they have penalties for these kinds of threats. Compliance to all these
regulations is hard and confusing for international organizations. There are already some states in US and EU that
are developing stronger protections and have created several penalties for customers’ data loss. Since states are
creating regulation systems in independent way, to have to comply with all these laws its costly and it is bringing
more work for organizations which need to have resources, specific management structure and control toward
this issue.
2
As a result, it is more than needed to have international information security standards as a global point of reference
to PII protection. The International Organization for Standardization has already published some standards and is
intending to have specific standards that will protect PII from different points of view. Code of practice for information
security controls known as ISO 27002 is considered one of them. This standard was developed taking into account
the controls requirement already contained in ISO 27001. So, ISO 27002 is a technical standard providing a
number of requirements and good practices designed to ensure information security of data in general. Personally
Identifiable Information PII requires that organizations develop and implement a policy that will protect Personally
Identifiable Information.
In addition to this, standards such as ISO 29100 Privacy framework and ISO 29101 Privacy framework architecture
are developed to provide a higher level framework for the protection of Personally Identifiable Information PII within
information and communication technology systems. These standards can be used to design, implement, operate
and maintain information and communication technologies system that will enable the protection of PII and will
improve organizations’ privacy programs through the use of best practices.
The vast amount of data that nowadays is saved in cloud systems have ushered into scope
another standard, namely Code of practice for protection of PII or ISO 27018, which requires
PII protection at certain functions within the cloud services. This standard is useful for cloud
service providers to offer adequate quality and secure cloud services concerning the privacy
of data. Furthermore, given the prominence that the issue of privacy security enjoys among
customers, the aforementioned standard can facilitate the decision making process of
customers when selecting the most feasible option regarding cloud service providers.
Compliance with all standards controls will help organizations and will improve their information security system,
however in every country such controls implementation depend on national legislation which can impose different
obligation and can have different restrictions toward personally identifiable information. This is the reason why every
organization should give full attention to have security specialists who are certified on information security and have
appropriate knowledge and experience to link data security with company’s goals and to work under the legal and
regulatory requirements.
Professional Evaluation and Certification Board (PECB) is a personnel certification body on a wide range of
professional standards. It offers ISO 27001, ISO 27005, ISO 29100 and ISO 27002, training and certification
services for professionals wanting to support organizations on the implementation of these management systems.
Regarding privacy PECB offers Certified Lead Privacy Implementer training and certification based on ISO 29100.
ISO Standards and Professional Trainings offered by PECB:
•	 Certified Lead Implementer (5 days)
•	 Certified Lead Auditor (5 days)
•	 Certified Foundation (2 days)
•	 ISO Introduction (1 day)
Lead Auditor, Lead Implementer and Master are certification schemes accredited by ANSI ISO/IEC 17024.
Rreze Halili is the Security, Continuity, Recovery (SCR) Product Manager at PECB. She is in charge of developing
and maintaining training courses related to SCR. If you have any questions, please do not hesitate to contact:
scr@pecb.org.
For further information, please visit www.pecb.org/en/training
3

Mais conteúdo relacionado

Mais procurados(20)

Data protection act Data protection act
Data protection act
Iqbal Bocus7.7K visualizações
Eight principles of consumer data privacyEight principles of consumer data privacy
Eight principles of consumer data privacy
Solix Technologies, Inc118 visualizações
Cybersecurity Law and Risk ManagementCybersecurity Law and Risk Management
Cybersecurity Law and Risk Management
Keelan Stewart1.4K visualizações
Lily lim data privacy ownership and ethicsLily lim data privacy ownership and ethics
Lily lim data privacy ownership and ethics
MassTLC866 visualizações
Data Protection: Process InformationData Protection: Process Information
Data Protection: Process Information
Cristina Villavicencio423 visualizações
2015 09-22 Is it time for a Security and Compliance Assessment?2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?
Raffa Learning Community726 visualizações
Data protection and privacyData protection and privacy
Data protection and privacy
himanshu jain1.6K visualizações
Data goverance two_8.2.18 - copyData goverance two_8.2.18 - copy
Data goverance two_8.2.18 - copy
Sandra (Sandy) Dunn140 visualizações
Security Built Upon a Foundation of TrustSecurity Built Upon a Foundation of Trust
Security Built Upon a Foundation of Trust
lmgangi336 visualizações
Introduction to Hacking (101) FundamentalsIntroduction to Hacking (101) Fundamentals
Introduction to Hacking (101) Fundamentals
Toño Herrera38 visualizações
Law_Firm_Info_Security_Report_June2011 (1)Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)
Aspiration Software LLC301 visualizações
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
Anushka Perera289 visualizações
Ict Compliance (Sept 2004)Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)
Lance Michalson753 visualizações
Solutions for privacy, disclosure and encryptionSolutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryption
Trend Micro415 visualizações
Case for-secure-email-encryptionCase for-secure-email-encryption
Case for-secure-email-encryption
NeoCertified2.6K visualizações
Information PrivacyInformation Privacy
Information Privacy
imehreenx831 visualizações

Destaque(16)

Ch1 introduction to spi1.0Ch1 introduction to spi1.0
Ch1 introduction to spi1.0
Kittitouch Suteeca739 visualizações
Se423mid term previewSe423mid term preview
Se423mid term preview
Kittitouch Suteeca430 visualizações
Software EntrepreneurshipSoftware Entrepreneurship
Software Entrepreneurship
Krit Kamtuo759 visualizações
Mapping a Privacy Framework to  a Reference Model of Learning AnalyticsMapping a Privacy Framework to  a Reference Model of Learning Analytics
Mapping a Privacy Framework to a Reference Model of Learning Analytics
Open Cyber University of Korea425 visualizações
Ch5 software imprementation1.0Ch5 software imprementation1.0
Ch5 software imprementation1.0
Kittitouch Suteeca682 visualizações
Ch0 se423 outlineCh0 se423 outline
Ch0 se423 outline
Kittitouch Suteeca472 visualizações
Ch3 introduction to iso29110Ch3 introduction to iso29110
Ch3 introduction to iso29110
Kittitouch Suteeca1K visualizações
Ch2 introduction to standardCh2 introduction to standard
Ch2 introduction to standard
Kittitouch Suteeca648 visualizações
Introduction to ISO29110Introduction to ISO29110
Introduction to ISO29110
Krit Kamtuo1.5K visualizações
Ch4 project management processCh4 project management process
Ch4 project management process
Kittitouch Suteeca1.4K visualizações
Data classificationData classification
Data classification
Silicon3.6K visualizações
Ch 10 cost of software qualityCh 10 cost of software quality
Ch 10 cost of software quality
Kittitouch Suteeca2.8K visualizações
Data Classification PresentationData Classification Presentation
Data Classification Presentation
Derroylo14.5K visualizações
Classification & tabulation of dataClassification & tabulation of data
Classification & tabulation of data
Southern Range, Berhampur, Odisha116.8K visualizações
What is Big Data?What is Big Data?
What is Big Data?
Bernard Marr585.3K visualizações

Similar a Personally Identifiable Information Protection(20)

Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software development
MuhammadArif82317 visualizações
Data Protection and Data PrivacyData Protection and Data Privacy
Data Protection and Data Privacy
IT Governance Ltd590 visualizações
Automatski - The Internet of Things - Security StandardsAutomatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security Standards
automatskicorporation600 visualizações
Encryption During CommunicationEncryption During Communication
Encryption During Communication
PECB 262 visualizações
Fdic ffiec cyber_security_assessmentsFdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessments
Ken M. Shaurette625 visualizações
The Virtual Security Officer PlatformThe Virtual Security Officer Platform
The Virtual Security Officer Platform
Shanmugavel Sankaran258 visualizações
PREPARING FOR THE GDPRPREPARING FOR THE GDPR
PREPARING FOR THE GDPR
Annelore van der Lint93 visualizações
Case Study Of PCI DSS ComplianceCase Study Of PCI DSS Compliance
Case Study Of PCI DSS Compliance
Tammy Davis7 visualizações
Privacy  as a CareerPrivacy  as a Career
Privacy as a Career
DaviesParker3 visualizações
GDPR and ISO 27001 - how to be compliantGDPR and ISO 27001 - how to be compliant
GDPR and ISO 27001 - how to be compliant
Ilesh Dattani1.7K visualizações
Is it time for an IT Assessment?Is it time for an IT Assessment?
Is it time for an IT Assessment?
Raffa Learning Community427 visualizações
Managing Consumer Data PrivacyManaging Consumer Data Privacy
Managing Consumer Data Privacy
Gigya954 visualizações

Mais de PECB (20)

Último(20)

CXL at OCPCXL at OCP
CXL at OCP
CXL Forum203 visualizações
Web Dev - 1 PPT.pdfWeb Dev - 1 PPT.pdf
Web Dev - 1 PPT.pdf
gdsczhcet49 visualizações
Five Things You SHOULD Know About PostmanFive Things You SHOULD Know About Postman
Five Things You SHOULD Know About Postman
Postman22 visualizações
Spesifikasi Lengkap ASUS Vivobook Go 14Spesifikasi Lengkap ASUS Vivobook Go 14
Spesifikasi Lengkap ASUS Vivobook Go 14
Dot Semarang34 visualizações
MemVerge: Memory Viewer SoftwareMemVerge: Memory Viewer Software
MemVerge: Memory Viewer Software
CXL Forum117 visualizações
AMD: 4th Generation EPYC CXL DemoAMD: 4th Generation EPYC CXL Demo
AMD: 4th Generation EPYC CXL Demo
CXL Forum123 visualizações
Liqid: Composable CXL PreviewLiqid: Composable CXL Preview
Liqid: Composable CXL Preview
CXL Forum120 visualizações
MemVerge: Past Present and Future of CXLMemVerge: Past Present and Future of CXL
MemVerge: Past Present and Future of CXL
CXL Forum110 visualizações

Personally Identifiable Information Protection

  • 2. “If we’re going to be connected, then we need to be protected. As Americans, we shouldn’t have to forfeit our basic privacy when we go online to do our business. Each of us as individuals have a sphere of privacy around us that should not be breached, whether by our government, but also by commercial interests.” These words were spoken two weeks ago by the American president Barack Obama, who urged Congress to pass a series of cybersecurity and privacy laws that will protect even more the data privacy of customers and children in schools. Once again the data Privacy and Regulation topic became newspaper headlines. In 2014 Privacy and Regulation issues have continued affecting lots of levels, and looking ahead to 2015, according to Information Security Forum (ISF), this topic will still dominate as one of the five security trends together with cybercrime, threats from third-party providers, bring-your-own BYO, and people. Even more, it is predicted that in 2015 all these security trends will just continue to increase their complexity and sophistication. So, for every organization the concept of privacy specifically the concept of Personally Identifiable Information (PII) protection will have critical role to achieve organizations objectives. Nowadays every organization has to balance its own interests with those of the customers. It has to comply with various applicable laws to reduce regulatory sanctions inside the state where it functions, and also to treat data privacy protection as a business risk, all this to reduce possible reputation damage and loss of customers due to privacy breaches. However the massive numbers of information and communication technologies (ICT) which are used to transmit, share, collect and carry data information and the enormous amount of data that pass everyday through these processes have made privacy protection a very complex task. One of the reasons for this is that data privacy breaches are influenced directly by technology innovations, and the fact that legislation can never be fast enough to answer technology developments makes it very difficult to maintain regulations regarding this issue. Another reason is that in different countries there are already different laws that regulate and protect the use of Personally Identifiable Information (PII), and they have penalties for these kinds of threats. Compliance to all these regulations is hard and confusing for international organizations. There are already some states in US and EU that are developing stronger protections and have created several penalties for customers’ data loss. Since states are creating regulation systems in independent way, to have to comply with all these laws its costly and it is bringing more work for organizations which need to have resources, specific management structure and control toward this issue. 2
  • 3. As a result, it is more than needed to have international information security standards as a global point of reference to PII protection. The International Organization for Standardization has already published some standards and is intending to have specific standards that will protect PII from different points of view. Code of practice for information security controls known as ISO 27002 is considered one of them. This standard was developed taking into account the controls requirement already contained in ISO 27001. So, ISO 27002 is a technical standard providing a number of requirements and good practices designed to ensure information security of data in general. Personally Identifiable Information PII requires that organizations develop and implement a policy that will protect Personally Identifiable Information. In addition to this, standards such as ISO 29100 Privacy framework and ISO 29101 Privacy framework architecture are developed to provide a higher level framework for the protection of Personally Identifiable Information PII within information and communication technology systems. These standards can be used to design, implement, operate and maintain information and communication technologies system that will enable the protection of PII and will improve organizations’ privacy programs through the use of best practices. The vast amount of data that nowadays is saved in cloud systems have ushered into scope another standard, namely Code of practice for protection of PII or ISO 27018, which requires PII protection at certain functions within the cloud services. This standard is useful for cloud service providers to offer adequate quality and secure cloud services concerning the privacy of data. Furthermore, given the prominence that the issue of privacy security enjoys among customers, the aforementioned standard can facilitate the decision making process of customers when selecting the most feasible option regarding cloud service providers. Compliance with all standards controls will help organizations and will improve their information security system, however in every country such controls implementation depend on national legislation which can impose different obligation and can have different restrictions toward personally identifiable information. This is the reason why every organization should give full attention to have security specialists who are certified on information security and have appropriate knowledge and experience to link data security with company’s goals and to work under the legal and regulatory requirements. Professional Evaluation and Certification Board (PECB) is a personnel certification body on a wide range of professional standards. It offers ISO 27001, ISO 27005, ISO 29100 and ISO 27002, training and certification services for professionals wanting to support organizations on the implementation of these management systems. Regarding privacy PECB offers Certified Lead Privacy Implementer training and certification based on ISO 29100. ISO Standards and Professional Trainings offered by PECB: • Certified Lead Implementer (5 days) • Certified Lead Auditor (5 days) • Certified Foundation (2 days) • ISO Introduction (1 day) Lead Auditor, Lead Implementer and Master are certification schemes accredited by ANSI ISO/IEC 17024. Rreze Halili is the Security, Continuity, Recovery (SCR) Product Manager at PECB. She is in charge of developing and maintaining training courses related to SCR. If you have any questions, please do not hesitate to contact: scr@pecb.org. For further information, please visit www.pecb.org/en/training 3