Most organisations rightly view Information Security as mission-critical, while concerningly few view Privacy Management beyond a mere regulatory obligation. However, Privacy and Security are two sides of the same coin — Data Protection — and it pays to start thinking of them this way.
While Information Security (InfoSec) is thoroughly documented, proficiently applied, and well financed, Privacy Management has only recently shifted into focus — mainly because of GDPR — and, as a result, is not particularly well financed or implemented, as those (admittedly few) who have been handed hefty fines by Data Protection Authorities (DPAs) have found out.
This article makes the case for a more productive and efficient relationship between Privacy Management and Information Security Management, while keeping the two activities relatively compartmentalised and independent where needed.
Depending on your familiarity with some of the sub-topics, feel free to navigate the article according to your interests, by consulting this summary:
The Information Security Perspective
Privacy Management + InfoSec = Data Protection
Privacy Management is a set of activities focused on establishing and maintaining a system that ensures the rights of individuals are protected when an organisation processes personal data.
In a way, you can think of personal data as money.
When you entrust a bank with your money, the money is and always remains yours, and at any moment, you can decide to withdraw it. Also, the bank needs to take the necessary measures to protect it and follow specific regulations.
Similarly, when you entrust your personal data to an organisation in exchange for some benefits, the organisation can use the data according to a set of rules and you have the right to withdraw (delete) or update your data as you see fit.
In a nutshell, privacy management ensures that the organisation is prepared to protect personal data just like a financial institution protects their client’s money.
Because it primarily focuses on protecting the rights of the data subjects, in practice, Privacy Management is often compartmentalised and independent from Security Management and even IT Management, for that matter.
This is also why the Data Protection Officer (DPO) is normally prohibited from holding a leading managerial position within the organisation. One cannot both set the data-processing purposes and means, and also oversee their lawful compliance, as it would constitute a conflict of interests.
One common task of the privacy team is to create comprehensive records of processing activities (ROPA) with the ultimate purpose of analysing each activity in order to see whether the required lawfulness and security controls are in place.
The privacy team also checks whether the necessary documentation exists, offering the organisation the ability to demonstrate that it processes personal data lawfully and securely.
For some of the activities, deemed to present a high risk for data subjects rights and freedoms, a Data Processing Impact Assessment (DPIA) is required, which basically entails a more thorough analysis.
As initially stated, many organisations find Privacy Management tedious or they view it as a mere regulatory obligation. To address this problem, the intersection between the interests held by organisations and their data subjects’ interests is worth a closer look.
Data-subject rights and organisation interests overlap, at least up to a certain point. For example, both the organisation and the data subject want to make sure that unauthorised parties cannot access, delete, or modify their data.
However, there are areas where these interests differ. The data subject might not want an online store to hold on to their personal data after they’ve finished the ordering process, but the retailer might want (or have) to retain the data for further use.
Or, in some cases, the organisation might not care what happens to personal information that is no longer valuable to them, but for the data subject it might be a completely different story. If assets containing the personal data are not properly discarded, third parties might still use them to collect personal data and use it for nefarious purposes, such as identity theft.
InfoSec focuses on the protection of every information asset that the organisation deems valuable; naturally, this includes assets that encompass personal data.
Unlike the Privacy team, which looks primarily at data-processing activities, the InfoSec team is primarily focused on data-supporting assets to determine or establish:
Often referred to as the C-I-A triad, there are three crucial elements that must be addressed so that Information Security is achieved at a satisfactory level:
Data Protection is often used interchangeably with both Data Privacy and Information Security, so distinctions are in order. We use Data Protection as an umbrella term that encompasses both Privacy Management AND Information Security.
When it boils down to protecting data (of all sorts), the distinctions between Privacy and Security are remarkably clear:
Nonetheless, there are also clear overlaps between Privacy and Security, in terms of:
Since every organisation needs to ensure both the privacy and security of the personal information processed, it makes perfect sense to save time and increase operational efficiency by coordinating these activities and eliminating redundant work.
Although there is no “one-size-fits-all solution,” here are the things that we find to be useful when attempting to unify and streamline the Privacy Management and Information Security activities.
👉Correlate the records of processing activities (ROPA) & data supporting assets register
As there can be no data processing activity without data supporting assets, organisations should connect each data-processing activity with the relevant data-supporting assets instead of documenting each of them on separate flows.
The main benefits of doing this are:
👉Avoid the department-specific jargon when collaborating, or at least be mindful of everyone’s level of knowledge.
👉Create a centralised risk & compliance information repository and implement a common plan for security and privacy initiatives.
This will not only help save time and work, by enabling both teams to reuse commonly available information, but it will also help identify potential gaps stemming from the different perspectives Privacy Management and InfoSec take when analysing compliance.
For example, as most of the data and information found within an organisation is digital, the InfoSec team generally uses various technical tools to find and classify it, but might find it hard to keep track of the physical documents flowing in and out of the organisation.
On the other hand, as the privacy team has a more people focused approach - frequently discussing with colleagues each department - they have the opportunity to discover these assets and bring them into the analysis flow.
We have explored the benefits of connecting the ROPA with the data-asset register and those of a centralised risk & compliance information repository.
However, beyond any procedures and foreseeable technical solutions, nothing beats common sense when building lasting collaborations.
So, here are the three thoughts with which we wish to leave you:
Did you find this article helpful? Stay tuned for more by 📌 following our Social Media pages and/or 👉 clicking the link below to subscribe to our Newsletter. We'll keep you up to date on topics such as Privacy Management, Information Security, and GDPR compliance.