Many businesses are looking to reap the benefits of digital transformation, evolving new services that provide value to and forge closer relationships with partners and customers.
Trust and responsible information management practices are becoming business differentiators as consumers become more aware of the impact of data breaches and the potential for misuse of personal information. With the proliferation of the Internet of Things, increasing quantities of personal or sensitive information are being collected through a wider variety of distributed devices. Digital transformation is leading to that information becoming a commodity. As that information is processed by more complex interconnected technology architectures and shared through a variety of channels, there is greater potential for impacts to the data subjects themselves.
Regulators around the world and sector-specific governance bodies are enacting increasingly stringent measures that require more mature and verifiable programs to protect personal information. For example, with the enactment of the European General Data Protection Regulation (GDPR), requirements to implement and demonstrate effective information management practices are becoming more stringent and accompanied by significant penalties (of up to 4% of Global Turnover). Other regions, countries, states and even some industries are implementing their own rules, making the compliance landscape appear to be a complex and sometimes seemingly contradictory minefield.
For an effective privacy plan in today's cybersecurity environment, we need to think differently about information management practices:
This change in perspective requires a focus on the information assets themselves, an understanding of the information lifecycle and permitted uses as they cross existing business and technology boundaries. The flow of information assets may follow a lengthy chain that crosses a number of technology domains that may include:
The traditional security model that many organizations have adopted -focused on the security of the individual systems, networks and applications -may not be able to meet the full requirements of this new focus on information assets. Consideration must be given to:
In my role on the Cisco Security Services team, I work with clients to improve their security, privacy, and cybersecurity management solutions. As our team has worked with organizations to establish or evolve successful privacy programs, we have learned that there are a number activities that will help you form a flexible privacy program and are critical to the quality of the outcome:
1. Gain a clear understanding of the drivers for the program:
2. Select an effective framework to manage the program that:
3. Prioritize activities based on consideration of the obligations and business model. Accept that this is an evolving program, not a point in time compliance project and there is no 'single standard solution' that fits all cases:
4. Establish effective program governance:
5. Develop solutions at a strategic level:
With the deluge of data breaches, effective information management programs are becoming foundational in establishing trust with customers and consumers, demonstrating compliance with applicable regulations as well as reducing the likelihood or impact of an incident. Establishing a program for responsible information management can build reputations and levels of confidence that can be a both a differentiator and business enabler, balancing creativity and trustworthiness.
If you are not sure your organizations' privacy program is effective or flexible to meet your business and customer requirements, enlist help from experts like the Cisco Security Services team. Our security advisors will work with you to understand your unique requirements, assess your current capabilities and develop a custom framework for evolving the privacy function. Our aim is to help you create a privacy program that will maintain customer trust and evolve with your business as it moves to a digital business foundation influenced by the Internet of Things.
Cisco is a Champion Sponsor of Data Privacy Day which will be recognized on Thursday, January 26, with a daylong event live from Twitter in San Francisco, CA, featuring exciting TED-style talks, segments and interviews focusing on the latest privacy issues for consumers and business. The event will be available online for the world to watch on Livestream, Periscope and Facebook Live. Learn more andregister to watch the event live here.
Read "Privacy is a Basic Human Right and it's Good for Business Too" by Michelle Dennedy, Chief Privacy Officer, Cisco.