Cippit Bok
Cippit Bok
Cippit Bok
IT Privacy Certification
Outline of the Common Body of Knowledge (CBK) for The Certified Information Privacy Professional/Information Technology (CIPP/IT)
I.
b.
c.
B. The IT Development Lifecycle a. Privacy i. ii. iii. iv. v. intersections in the development process Release planning Definition Development Validation Deployment
Pease International Tradeport 75 Rochester Avenue. Suite 4 Portsmouth, NH 03801 USA + 603.427.9200 certification@privacyassociation.org
C. Data collection and transfer a. b. Responsibilities of the IT professional Determining data accountability i. Ownership of data ii. Data inventory iii. Degree of data sensitivity Purpose and uses of PII i. PCI regulated data Employee data uses Onward transfers of data i. External parties ii. Storage/transfer media iii. Routine and non-routine transfers Employee data challenges i. Locations and modes ii. Business use of mobile services
c. d. e.
f.
D. Data Security a. Top 20 i. ii. iii. iv. v. Credit i. ii. security risks (SANS) Client-side Server-side Security policy and personnel Application 1. SQL injection Network card information Cardholder data types Application of Payment Card Industry Data Security Standards (PCI DSS)
b.
E.
Data Storage a. Types of storage i. Persistent ii. Transient Location of storage i. Systems ii. Location
b.
F.
Data Processing a. b. Internal processing i. Primary and secondary uses Relationships with third parties i. Global resourcing and outsourcing ii. Vendor management
G. Data Retention and Destruction a. b. c. Period of retention Duplication of records Consistency of policy and practice
Pease International Tradeport 75 Rochester Avenue. Suite 4 Portsmouth, NH 03801 USA + 603.427.9200 certification@privacyassociation.org
H. Data Access and redress a. b. c. d. I. Legal requirements Business rationale Access mechanisms Handling requests
Privacy and System Design a. Applying Fair Information Practice principles i. Collection limitation ii. Data quality iii. Purpose specification iv. Use limitation v. Security safeguards vi. Openness vii. Individual participation viii. Accountability
II.
B. Privacy Responsibility Framework a. b. c. d. User sphere Joint sphere Recipient sphere Engineering issues and responsibilities
C. E-commerce Personalization a. b. End user benefits End user privacy concerns i. Unsolicited marketing ii. Inaccurate inferences iii. Price discrimination iv. Unauthorized account access or data sharing
Pease International Tradeport 75 Rochester Avenue. Suite 4 Portsmouth, NH 03801 USA + 603.427.9200 certification@privacyassociation.org
III.
B. Privacy by policy a. b. c. d. Notice and choice Security safeguards Access Accountability i. Audits
C. Identifiability a. b. c. d. Labels that point to individuals Strong and weak identifiers Pseudonymous and anonymous data Degrees of identifiability i. Definition under the EU Directive ii. Privacy stages and system characteristics 1. Identifiable versus identified 2. Linkable versus linked
D. Privacy-enhancing Techniques a. Web security protocols i. Transport Security Layer (TLS) ii. Secure Sockets Layer (SSL) iii. Hypertext Transfer Protocol-Secure (HTTPS) Automated data retrieval Automated system audits Data masking and data obfuscation Data encryption i. Cryptography 1. Crypto design and implementation considerations 2. Application or field encryption 3. File encryption 4. Disk encryption
b. c. d. e.
Pease International Tradeport 75 Rochester Avenue. Suite 4 Portsmouth, NH 03801 USA + 603.427.9200 certification@privacyassociation.org
E.
Privacy-enhancing Tools a. b. c. Limiting or preventing automated data capture Combating threats and exploits Anonymity tools i. Anonymizers ii. Privacy-preserving data mining iii. Applications of anonymity tools 1. Communication and publishing 2. Payment processing 3. Voting and surveying 4. Credentialing 5. Anonymity by Web proxy a. The Tor Anonymity System
IV.
B. Software-based notice and consent a. b. c. Guidelines End user license agreement (EULA) Mechanisms i. Out-of-box ii. Installation time iii. First-run iv. Just-in-time v. Collections and/or transfers of data vi. Online services 1. Redirecting Internet searches and queries 2. Modifying Web browser settings 3. Activating a feature function with system impact 4. Online advertising 5. Software updates 6. Software removal 7. Location-based services vii. Machine-readable privacy policy languages 1. Platform for Privacy Preferences Project (P3P) a. User agents b. Policy assertions c. Deployment 2. Application Preference Exchange Language (APPEL) 3. Enterprise Privacy Authorization Language (EPAL)
Pease International Tradeport 75 Rochester Avenue. Suite 4 Portsmouth, NH 03801 USA + 603.427.9200 certification@privacyassociation.org
V.
b.
c.
d.
B. Audits in the Context of Privacy a. b. Defining the audit Understanding the range of options i. Gap assessments (risk) ii. Legal reviews (compliance) iii. Attestation (third party) Generally Accepted Privacy Principles (GAPP) framework Role of the IT auditor i. Privacy impact assessments (PIA) ii. Control objectives iii. Evidence and documentation iv. Testing and verification IT internal audit i. Working with legal and compliance partners
c. d.
e.
VI.
C. Location-based services a. b. Global Positioning Systems (GPS) Geographic Information Systems (GIS)
Pease International Tradeport 75 Rochester Avenue. Suite 4 Portsmouth, NH 03801 USA + 603.427.9200 certification@privacyassociation.org
D. Identity and Access Management (IAM) a. b. c. Role-based access control (RBAC) User-based access controls Context of authority i. User to site ii. User to enterprise 1. Multiple enterprises Cross-enterprise authentication and authorization models i. Liberty Alliance Project ii. Open ID Federation iii. Identity Metasystem Architecture
d.
E.
Business Intelligence and Analytics a. b. c. Applications Demand among businesses and governments Risks
Pease International Tradeport 75 Rochester Avenue. Suite 4 Portsmouth, NH 03801 USA + 603.427.9200 certification@privacyassociation.org