Practical Tips for Managing Privacy Risk

Practical Tips for Managing Privacy Risk
Author: Andrea Tang, FIP, CIPP/E, CIPM, ISO27001LA
Date Published: 20 August 2020

Privacy risk is the likelihood that someone will experience problems resulting from data processing and the impact of these problems should they occur.

What is the impact of privacy risk? Numerous new privacy laws and regulations have gone into effect in the last couple of years: the EU General Data Protection Regulation (GDPR) went into effect 25 May 2018, the law amending the Act on the Protection of Personal Information (APPI) in Japan was enacted 5 June 2020, the amended California Consumer Privacy Act (CCPA) in the United States went into effect 1 July 2020 and the Brazilian General Data Protection Law (LGPD) in Brazil is the latest to come onto the landscape.

In China, the Standing Committee of the National People’s Congress plans to draft and issue the consolidated Personal Information Protection Law and the Data Security Law in 2020.

This increasing legislation trend prompts more organizations to focus on managing privacy risk to earn consumer trust and build reputation. 

What Is the Best Way to Manage Privacy Risk?

Privacy Risk Management Steps

Stage 1: Establish privacy governance

Stage 1-1: Define privacy governance goals

Stage 1-2: Establish an enterprise privacy risk management framework

Stage 1-3: Realize the benefits of privacy risk management

Stage 2: Conduct privacy risk management activities

Stage 2-1: Define privacy risk assessment frameworks

Stage 2-2: Conduct privacy risk assessments

Stage 3: Implement risk response

Stage 3-1: Establish response procedures for privacy risk

Stage 3-2: Respond to privacy risk

Stage 3-3: Evaluate privacy risk response


 

There are three stages to manage privacy risk:

  1. Stage 1: Establish privacy governance—Enterprises should define privacy governance goals and then establish their own privacy management framework. A mature privacy risk management framework can help weigh the benefits of data processing against the risk of doing so and determine which risk response measures should be adopted.
  2. Stage 2: Conduct privacy risk management activities—Enterprises should conduct privacy risk-related activities such as data protection impact assessment (DPIA), privacy impact assessment (PIA) and vendor risk assessment. Enterprises should conduct the appropriate activities when necessary.
  3. Stage 3: Implement risk response—Enterprises should establish suitable response procedures and select appropriate ones. Ongoing evaluation promotes evolving effective privacy risk management.

What Is the Practical Guidance for Chinese Enterprises?

Since the enactment of the Cybersecurity Law of the People’s Republic of China, a series of national standards and supporting recommended guidelines have been published. There are four steps Chinese enterprises should follow:

  1. Step 1: Determine scope of privacy legislations. A chapter has been added to the civil code to address general principles related to the right to privacy and protection of personal information; the long-awaited update to the national standard on personal information protection has been released: Information Security Technology-Personal Information Security Specification GB/T 35273-2020 (short for “the 2020 Specification”). There are also some sector-specific regulations on personal data protection (e.g., Personal Financial Information Protection Technical Specification JR/T 0171-2020 [short for “Financial Information Specification”]), Measures of the People's Bank of China for the Protection of the Rights and Interests of Financial Consumers (short for “Financial Consumers Protection Measures”), Financial Mobile Application Software Security Management Specification JR/T 0092-2019, etc.
  2. Step 2: Conduct personal information security impact assessment.
Personal Information Security Impact Assessment in China

Subject

Personal information controller in China

Target

  • Validate the legal compliance.
  • Assess the risk of harm to the legitimate rights and interests of the information subject.
  • Assess the effectiveness of the measures to protect the information subject.

Content

  • Whether the collection of personal information follows the principles of specific purpose, explicit consent, data minimization, etc.
  • Whether the processing of personal information has possible adverse influence on the legitimate rights and interests of information subject.
  • The effectiveness of personal information security measures.
  • The risk of re-identification of personal information subjects or recognition of information subject after data aggregation with other data sets.
  • Possible adverse influence on legitimate rights and interests of the personal information subject caused by the sharing, transfer and public disclosure of personal information.
  • Possible adverse influence on legitimate rights and interests of the personal information subject after a security breach incident..

Steps

  1. Establish procedures of personal information security impact assessment (at least once a year for financial personal information) and evaluate the security risk of personal information processing activities.
  2. Determine the content of a personal information security impact assessment.
  3. Determine whether to conduct a personal information security impact assessment
  4. Document using a personal information security impact assessment report and adopt measures to protect personal information.
  5. Keep the records of a personal information security impact assessment and appropriately make public disclosure information to ensure it is available to the relevant party.

 

 

  • Step 3: Implement risk response. The addition of the requirement of third-party access management to the 2020 Specification is one example of an approach to transferring risk. Enterprises should also share risk with customers (e.g., additional processing should only be performed after collecting the explicit consent of the personal information subject).
  • Step 4: Conduct ongoing risk evaluation. Financial consumers’ protection measures require that financial institutions check the potential risk of personal financial information security at least once every 6 months; the 2020 Specification regulates that Chinese enterprises audit the effectiveness of personal information protection policies, relevant procedures and security measures; prevent unauthorized reading, altering or deleting of audit records; safeguard audit records and ensure their retention period meets the applicable regulatory requirements
Conclusion

Privacy is not just a compliance issue anymore. It is about managing consumer trust and safeguarding personal data during the data life cycle. Implementing privacy risk management is a critical step to providing the foundation for effective privacy management.

Editor’s note: For further insights on this topic, read Andrea Tang’s recent Journal article, Privacy Risk Management,” ISACA Journal, volume 4, 2020.

ISACA Journal