| | JULY 20219CIOReviewinfo if you can't absolutely justify the need for it. After all, in Europe you will have to state the legal basis for collecting. Defaulting to "legitimate interest" isn't good enough.3. Classify and categorize your data.4. Draw out the flow. This may resemble a cracked windshield and that is ok. Use these questions to guide your drawing:a. What type of data is collected (PII, SPII, PHI)?b. What applications do you send it to internally?c. Who do you send it to externally?5. Once the picture is drawn, stand back and ask WHY, then ask WHY again. Keep asking until you are confident that you understand and can explain the data flow and why it flows that way. 6. Ask who holds that data, and how it is protected. Is it encrypted, at rest and in transit (internally and externally)? 7. Once you pick up your jaw from off the floor, it's time to get to work. Admittedly, this manual process isn't scalable long-term, and the result can be stale as soon as it's on paper. Hey, you have to start somewhere, right? As you think about how to move forward, plan to begin including privacy or security-by-design or conduct data protection impact assessments (DPIAs) when building or updating applications. These are not just trendy terms; they are descriptions of how to effectively manage and protect your data. In the same way that you build disaster recovery plans for your apps when you build them, you need to include an understanding of the data and how it will be used and managed. Including the foundational elements (what data do you have, why, where is it, who do you send it to, and how do you protect it?) as early and as regularly as possible will lead to big benefits down the road. Collecting and tracking this information up front and during the application update process provides intelligence that you will need, such as: · Understanding what data is held and why starts to answer the regulatory questions. These may not be in play yet. Count on them coming.· Providing the basis of how to protect your data. Naturally, you should encrypt everything. If you don't, this type of information can give you an idea of what you need to protect.· Giving you a head start when a breach occurs with your company or a third party. Wouldn't it be great to know whether you need to worry about a third-party breach and what your potential exposure might be? Much of IT, security and privacy work isn't as glamorous as it is made out to be. Analyzing hundreds of gigabytes or terabytes of logs, reviewing spreadsheets of vulnerability data, and checking out the latest in the NVD database can be tedious and monotonous. Mostly it's just plain hard work. So, roll up your sleeves and start doing the work. Data is currency, and you have to think about what you must do to protect it. You can bet that more regulation and pressure will come, so now is the time to get a solid understanding of your data at hand. Leon Ravenna
<
Page 8 |
Page 10 >