SlideShare a Scribd company logo
1 of 53
Download to read offline
Best Privacy
Frameworks
by Andrey Prozorov, CISM, CIPP/E, CDPSE, LA 27001
1.0, 08.09.202
12
2
A framework is a basic
conceptual structure used
to solve or address
complex issues
Regulation: Rules or laws defined and enforced
by an authority to regulate conduct. ISACA
(e.g., GDPR)
Standard: A mandatory requirement, code of
practice or specification approved by a recognized
external standards organization (such as ISO). ISACA
(e.g.., ISO 27701, BS 10012, ISO 29100)
Guideline: Non-mandatory information leading to a
compliant solution for the related requirement. ISO
(e.g., NOREA Guide)
ISACA
All of them can be used as frameworks!
Main
Benefits
Comprehensive
approach /
Privacy
Baseline
Measurement
and
Benchmarking
Demonstration
of maturity
Certification
(proof of
compliance)
Common
language for
privacy pros
and business We don't need to
reinvent the wheel!
My TOP 12:
1. ISO 29100
2. ISO 27701
3. ICO Accountability Framework
4. TrustArc - Nymity Framework
5. MITRE Privacy Maturity Model
6. NIST Privacy Framework
7. AICPA Privacy Management Framework
8. NDMO Data Management and Personal Data
Protection Standards
9. NOREA Privacy Control Framework
10. PDPC Guide to Developing a Data Protection
Management Programme
11. Standard Data Protection Model (SDM)
12. SCF Privacy Management Principles (SCF-PMP)
4
5
1. ISO 29100
ISO/IEC 29100:2011 Information technology —
Security techniques — Privacy framework
This standard was last reviewed and confirmed in 2017.
ISO/IEC 29100:2011 provides a privacy framework which:
• specifies a common privacy terminology;
• defines the actors and their roles in processing personally
identifiable information (PII);
• describes privacy safeguarding considerations; and
• provides references to known privacy principles for information
technology.
ISO 29100 is applicable to natural persons and organizations
involved in specifying, procuring, architecting, designing,
developing, testing, maintaining, administering, and operating
information and communication technology systems or services
where privacy controls are required for the processing of PII.
• Organisation: ISO
• CHF 124 ($140)
6
7
8
2. ISO 27701
ISO/IEC 27701:2019 Security techniques —
Extension to ISO/IEC 27001 and ISO/IEC 27002 for
privacy information management —
Requirements and guidelines
This document specifies requirements and provides guidance for
establishing, implementing, maintaining and continually
improving a Privacy Information Management System (PIMS) in
the form of an extension to ISO/IEC 27001 and ISO/IEC 27002
for privacy management within the context of the organization.
This document specifies PIMS-related requirements and provides
guidance for PII controllers and PII processors holding
responsibility and accountability for PII processing.
This document is applicable to all types and sizes of
organizations, including public and private companies,
government entities and not-for-profit organizations, which are
PII controllers and/or PII processors processing PII within an
ISMS.
• Organisation: ISO
• CHF 187 ($210)
9
10
11
3. ICO Accountability
Framework
Accountability is one of the key principles in data protection law
– it makes you responsible for complying with the legislation and
says that you must be able to demonstrate your compliance.
The framework is an opportunity for you to assess your
organisation’s accountability. Depending on your circumstances,
you may use it in different ways. For example, you may want to:
• create a comprehensive privacy management programme;
• check your existing practices against the ICO’s expectations;
• consider whether you could improve existing practices,
perhaps in specific areas;
• understand ways to demonstrate compliance;
• record, track and report on progress;
• or increase senior management engagement and privacy
awareness across your organisation.
Organisation: ICO (UK)
Free
12
13
The framework is divided into 10 categories.
Selecting a category will display ICO’s key
expectations and a bullet-pointed list of ways
you can meet their expectations.
1. Leadership and oversight
2. Policies and procedures
3. Training and awareness
4. Individuals’ rights
5. Transparency
6. Records of processing and lawful basis
7. Contracts and data sharing
8. Risks and data protection impact
assessments (DPIAs)
9. Records management and security
10.Breach response and monitoring
14
4. TrustArc - Nymity
Framework
The TrustArc-Nymity integrated Privacy and Data
Governance Accountability Frameworks combine and
align privacy and data governance controls with privacy
management activities across the privacy program lifecycle
to help organizations effectively achieve these goals and
continuously improve upon them over time.
A framework-based approach can be implemented at any
stage of a privacy program.
• Organisation: TrustArc / Nymity
• Free
15
• The Core: The three pillars of Build, Implement, and
Demonstrate
• Standards and Controls: The 16 Standards and 55
Framework Controls
• Privacy Management Categories and Activities:
The 13 Privacy Management Categories and 139
Privacy Management Activities organized under the
Core three pillars
• Framework Mapping to Popular Laws:
The Framework is mapped to several popular laws,
regulations, and other standards
16
17
5. MITRE Privacy
Maturity Model
Framework for developing, implementing, maintaining, and
evaluating privacy programs. Privacy programs must be
comprehensive enough to address all requirements established by
authoritative sources (e.g., laws, regulations, guidance), and must
be supported by written policies, appropriate training, ongoing
practices, and appropriate assessment.
This model may be used to assess both completeness (whether an
organization has identified and implemented all elements of a
privacy program) and maturity level (an evaluation of to what
degree practices supporting each element are effective in achieving
their intended purpose).
It was developed based not only on comprehensive research of
relevant laws and guidance, but on practices that have been
assessed as effective in many organizations.
It is a part of the MITRE’s Privacy Engineering Tools:
https://www.mitre.org/news-insights/publication/mitres-privacy-
engineering-tools-and-their-use-privacy-assessment
• Organisation: MITRE
• Free
18
19
20
21
6. NIST Privacy
Framework
The NIST Privacy Framework is a voluntary tool developed in
collaboration with stakeholders intended to help organizations
identify and manage privacy risk to build innovative products and
services while protecting individuals’ privacy.
NIST is developing the framework to help organizations with:
• Building customer trust by supporting ethical decision-making
in product and service design or deployment that optimizes
beneficial uses of data while minimizing adverse consequences
for individuals’ privacy and society as a whole;
• Fulfilling current compliance obligations, as well as future-
proofing products and services to meet these obligations in a
changing technological and policy environment; and
• Facilitating communication about privacy practices with
customers, assessors, and regulators.
Organisation: NIST
Free
22
23
24
7. AICPA Privacy
Management
Framework
The Privacy Management Framework (PMF) can be used as
a foundational element in establishing and operating a
comprehensive information privacy program that addresses
privacy obligations and risks while facilitating current and
future business opportunities.
• Organisation: AICPA
• For Memebers Only
25
26
27
8. NDMO Standards
The National Data Management and Personal Data Protection
Standards document covers 15 Data Management and Personal
Data Protection domains. To support the development of the
Data Management and Personal Data Protection standards, a set
of international references, internal relevant policies and
regulations, and guiding principles were defined.
Government Entities (KSA) must implement the standards, and
compliance will be measured yearly to monitor progress and
drive efforts towards a successful implementation.
• Organisation: National Data Management Office (Saudi Arabia)
• Free
28
29
30
9. NOREA Privacy
Control Framework
This guide (in Dutch “Handreiking”) is issued by NOREA,
the professional association of IT auditors in the
Netherlands and was developed to guide Dutch chartered
IT-auditors in issuing assurance reports in alignment with
the European General Data Protection Regulation (GDPR)
and the relevant standards on assurance engagements.
• Organisation: NOREA (Netherlands)
• Free
31
32
The PCF contains:
95 controls in total, divided over
32 subjects in
9 Lifecycle Management phases
33
10. PDPC Guide
Guide to Developing a Data Protection Management
Programme
This guide seeks to help organisations develop or improve
their personal data protection policies and practices
through the implementation of a Data Protection
Management Programme (DPMP). Organisations may
benchmark their existing personal data protection policies
and practices against this guide.
• Organisation: PDPC (Singapure)
• Free
34
35
36
11. Standard Data
Protection Model
(SDM)
The Standard Data Protection Model (SDM)
A method for Data Protection advising and controlling on
the basis of uniform protection goals
The SDM provides appropriate measures to transform the
regulatory requirements of the GDPR to qualified technical
and organisational measures.
The SDM's catalogue of reference measures can be used to
check for each individual processing whether the legally
required ‘target’ of measures corresponds to the existing
‘actual’ of measures.
• Provider: Conference of the Independent Data Protection
Supervisory Authorities of the Federation and the Länder
(Germany)
• Free
37
38
39
12. SCF Privacy
Management Principle
(SCF-PMP)
The Secure Controls Framework™ (SCF) focuses on internal
controls.
The SCF is a metaframework – a framework of frameworks
• Organisation: SCF
• Free
40
41
42
One more thing:
CNIL DPO Guide
The objective of this guide is to support both organisations
in setting up the function of Data Protection Officer (DPO)
and such officers in the exercise of their profession.
This guide is a living tool which will be enriched by best
practices reported by professionals to the French Data
Protection Authority (CNIL).
• Organisation: CNIL (France)
• Free
43
44
[Concept] Mapping - An indication that one
concept is related to another concept. NIST
45
Mapping
The main question:
How does conforming to one framework help
the organization conform to another framework?
Five Important Assumptions for the Mapping
1. The intended users of the mapping
2. Why someone would want to use this mapping
3. The types of concepts to be mapped
4. The direction of the mapping
5. How exhaustive the mapping will be
csrc.nist.gov/pubs/ir/8477/ipd 46
www.patreon.com/posts/developing-and-88697200
47
48
TrustArc-Nymity Framework -> GDPR and ISO 27701
www.patreon.com/posts/mapping-of-to-61726397
49
Framework Why do I like it?
1. ISO 29100 Simple, Privacy Principles, Aligned with the ISO Standards
2. ISO 27701 Integrated with the ISMS (ISO 27001), Well-known international standard, Good
Structure, Certification, Mapping to GDPR
3. ICO Accountability Framework Recommendations from the Supervisory Authority (SA), Good Structure, Case studies,
Additional resources (self-assessment and tracker), GDPR, Free
4. TrustArc-Nymity Framework Simple, Good Structure, Free
5. MITRE Privacy Maturity Model Good Structure (Elements of a Privacy Program), Maturity Levels, Checklist, Additional
Resources, Free
6. NIST Privacy Framework Aligned with NIST CSF (cybersecurity), Tiers 1-4 (Partial, Risk Informed, Repeatable,
Adaptive), Free
7. AICPA Privacy Management
Framework
Simple, Good Structure, Mapping to GDPR, Free (for members)
8. NDMO Standards Recommendations from the SA, Data Management Guiding Principles, Set of controls,
Control description, Aligned with DAMA DMBoK, Free
9. NOREA Privacy Control Framework Focus on Audits, Good Structure, Set of controls, GDPR, Mapping to GDPR, Mapping to
ISO 27001, ISO 27701 and ISO 29100, Free
10. PDPC Guide Recommendations from the SA, Simple, Examples and Checklists, Training and
Communication Initiatives, Data Inventory Map, Free
11. Standard Data Protection Model
(SDM)
Recommendations from the SA, Protection goals, Data Life Cycle, SDM cube, Risks,
PDCA, Integrations with BSI Grundschutz, GDPR, Mapping to GDPR, Free
12. SCF-PM Metaframework, Good Structure, Mapping to many frameworks, Free
50
1. ISO 29100 www.iso.org/standard/45123.html
2. ISO 27701 www.iso.org/standard/71670.html
3. ICO Accountability Framework www.ico.org.uk/for-organisations/uk-gdpr-guidance-and-
resources/accountability-and-governance/accountability-framework
4. TrustArc - Nymity Framework www.trustarc.com/trustarc-privacy-data-governance-accountability-
framework
5. MITRE Privacy Maturity Model www.mitre.org/news-insights/publication/mitres-privacy-engineering-
tools-and-their-use-privacy-assessment
6. NIST Privacy Framework www.nist.gov/privacy-framework
7. AICPA Privacy Management Framework www.us.aicpa.org/interestareas/informationtechnology/privacy-
management-framework
8. NDMO Standards www.sdaia.gov.sa/en/SDAIA/about/Documents/PoliciesEN.pdf
9. NOREA Privacy Control Framework www.norea.nl/uploads/bfile/bb6ebde8-a436-43d0-b3df-ceef7a50556c
10. PDPC Guide www.pdpc.gov.sg/help-and-resources/2019/07/guide-to-developing-a-
data-protection-management-programme
11. Standard Data Protection Model (SDM) www.datenschutz-mv.de/datenschutz/datenschutzmodell
12. SCF-PM www.securecontrolsframework.com
CNIL DPO Guide www.cnil.fr/en/cnil-publishes-guide-dpos
All Privacy Standards and Frameworks www.patreon.com/posts/best-privacy-and-85140462
Thanks, and good luck!
May the Privacy Frameworks Force be with you!
www.linkedin.com/in/andreyprozorov
www.patreon.com/AndreyProzorov
51
52
www.patreon.com/posts/my-presentation-88795477 www.patreon.com/posts/my-presentation-81082595
Related presentations
53
P.S. Have you seen my Privacy
Implementation Toolkit?
www.patreon.com/posts/66191153

More Related Content

What's hot

Implementing ISO27001 2013
Implementing ISO27001 2013Implementing ISO27001 2013
Implementing ISO27001 2013scttmcvy
 
Isms awareness presentation
Isms awareness presentationIsms awareness presentation
Isms awareness presentationPranay Kumar
 
Why ISO27001 For My Organisation
Why ISO27001 For My OrganisationWhy ISO27001 For My Organisation
Why ISO27001 For My OrganisationVigilant Software
 
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information Standard
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information StandardQuick Guide to ISO/IEC 27701 - The Newest Privacy Information Standard
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information StandardPECB
 
Basic introduction to iso27001
Basic introduction to iso27001Basic introduction to iso27001
Basic introduction to iso27001Imran Ahmed
 
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?PECB
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkPECB
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentationMidhun Nirmal
 
ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?PECB
 
isms-presentation.ppt
isms-presentation.pptisms-presentation.ppt
isms-presentation.pptHasnolAhmad2
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security ManagementMark Conway
 
How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?PECB
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity frameworkShriya Rai
 
Introduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkIntroduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkTuan Phan
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standardsprimeteacher32
 

What's hot (20)

ISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdfISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
 
Implementing ISO27001 2013
Implementing ISO27001 2013Implementing ISO27001 2013
Implementing ISO27001 2013
 
ISO 27001:2022 What has changed.pdf
ISO 27001:2022 What has changed.pdfISO 27001:2022 What has changed.pdf
ISO 27001:2022 What has changed.pdf
 
Isms awareness presentation
Isms awareness presentationIsms awareness presentation
Isms awareness presentation
 
Why ISO27001 For My Organisation
Why ISO27001 For My OrganisationWhy ISO27001 For My Organisation
Why ISO27001 For My Organisation
 
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information Standard
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information StandardQuick Guide to ISO/IEC 27701 - The Newest Privacy Information Standard
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information Standard
 
Cybersecurity Frameworks for DMZCON23 230905.pdf
Cybersecurity Frameworks for DMZCON23 230905.pdfCybersecurity Frameworks for DMZCON23 230905.pdf
Cybersecurity Frameworks for DMZCON23 230905.pdf
 
Basic introduction to iso27001
Basic introduction to iso27001Basic introduction to iso27001
Basic introduction to iso27001
 
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentation
 
ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?
 
NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101  NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101
 
isms-presentation.ppt
isms-presentation.pptisms-presentation.ppt
isms-presentation.ppt
 
ISMS implementation challenges-KASYS
ISMS implementation challenges-KASYSISMS implementation challenges-KASYS
ISMS implementation challenges-KASYS
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security Management
 
How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
 
Introduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkIntroduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity Framework
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
 

Similar to 12 Best Privacy Frameworks

ISO27001_COBIT_Students.pptx
ISO27001_COBIT_Students.pptxISO27001_COBIT_Students.pptx
ISO27001_COBIT_Students.pptxjojo82637
 
CHAPTER 6INFORMATION GOVERNANCEInformation Governance Po.docx
CHAPTER 6INFORMATION GOVERNANCEInformation Governance Po.docxCHAPTER 6INFORMATION GOVERNANCEInformation Governance Po.docx
CHAPTER 6INFORMATION GOVERNANCEInformation Governance Po.docxrobertad6
 
Automatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security StandardsAutomatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security Standardsautomatskicorporation
 
In order to have a successful IG program, one of the eight (8) I
In order to have a successful IG program, one of the eight (8) IIn order to have a successful IG program, one of the eight (8) I
In order to have a successful IG program, one of the eight (8) IMalikPinckney86
 
Whitepaper iso 27001_isms | All about ISO 27001
Whitepaper iso 27001_isms | All about ISO 27001Whitepaper iso 27001_isms | All about ISO 27001
Whitepaper iso 27001_isms | All about ISO 27001Chandan Singh Ghodela
 
Governance and management of IT.pptx
Governance and management of IT.pptxGovernance and management of IT.pptx
Governance and management of IT.pptxPrashant Singh
 
Data Privacy Protection Competrency Guide by a Data Subject
Data Privacy Protection Competrency Guide by a Data SubjectData Privacy Protection Competrency Guide by a Data Subject
Data Privacy Protection Competrency Guide by a Data SubjectJohn Macasio
 
The IT Analysis Paralysis
The IT Analysis Paralysis The IT Analysis Paralysis
The IT Analysis Paralysis PYA, P.C.
 
Chapter 10 security standart
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standartnewbie2019
 
Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020Manuel Guillen
 
RuleBookForTheFairDataEconomy.pptx
RuleBookForTheFairDataEconomy.pptxRuleBookForTheFairDataEconomy.pptx
RuleBookForTheFairDataEconomy.pptxnoraelstela1
 
Iso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromIso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromMart Rovers
 
Iso 27001 foundation sample slides
Iso 27001 foundation sample slidesIso 27001 foundation sample slides
Iso 27001 foundation sample slidesStratos Lazaridis
 
Cloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor RiskCloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor RiskHealth Catalyst
 
Information Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO StandardsInformation Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO StandardsPECB
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview Ahmed Riad .
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology20CS024 Ethics in Information Technology
20CS024 Ethics in Information TechnologyKathirvel Ayyaswamy
 

Similar to 12 Best Privacy Frameworks (20)

ISO27001_COBIT_Students.pptx
ISO27001_COBIT_Students.pptxISO27001_COBIT_Students.pptx
ISO27001_COBIT_Students.pptx
 
CHAPTER 6INFORMATION GOVERNANCEInformation Governance Po.docx
CHAPTER 6INFORMATION GOVERNANCEInformation Governance Po.docxCHAPTER 6INFORMATION GOVERNANCEInformation Governance Po.docx
CHAPTER 6INFORMATION GOVERNANCEInformation Governance Po.docx
 
Automatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security StandardsAutomatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security Standards
 
In order to have a successful IG program, one of the eight (8) I
In order to have a successful IG program, one of the eight (8) IIn order to have a successful IG program, one of the eight (8) I
In order to have a successful IG program, one of the eight (8) I
 
Whitepaper iso 27001_isms | All about ISO 27001
Whitepaper iso 27001_isms | All about ISO 27001Whitepaper iso 27001_isms | All about ISO 27001
Whitepaper iso 27001_isms | All about ISO 27001
 
standards1.pdf
standards1.pdfstandards1.pdf
standards1.pdf
 
Governance and management of IT.pptx
Governance and management of IT.pptxGovernance and management of IT.pptx
Governance and management of IT.pptx
 
Data Privacy Protection Competrency Guide by a Data Subject
Data Privacy Protection Competrency Guide by a Data SubjectData Privacy Protection Competrency Guide by a Data Subject
Data Privacy Protection Competrency Guide by a Data Subject
 
The IT Analysis Paralysis
The IT Analysis Paralysis The IT Analysis Paralysis
The IT Analysis Paralysis
 
Chapter 10 security standart
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standart
 
Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020
 
RuleBookForTheFairDataEconomy.pptx
RuleBookForTheFairDataEconomy.pptxRuleBookForTheFairDataEconomy.pptx
RuleBookForTheFairDataEconomy.pptx
 
Khas bank isms 3 s
Khas bank isms 3 sKhas bank isms 3 s
Khas bank isms 3 s
 
Iso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromIso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interprom
 
Iso 27001 foundation sample slides
Iso 27001 foundation sample slidesIso 27001 foundation sample slides
Iso 27001 foundation sample slides
 
Cloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor RiskCloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor Risk
 
Information Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO StandardsInformation Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO Standards
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology
 
ISO 27005 - Digital Trust Framework
ISO 27005 - Digital Trust FrameworkISO 27005 - Digital Trust Framework
ISO 27005 - Digital Trust Framework
 

More from Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001

More from Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001 (20)

NIST Cybersecurity Framework (CSF) 2.0: What has changed?
NIST Cybersecurity Framework (CSF) 2.0: What has changed?NIST Cybersecurity Framework (CSF) 2.0: What has changed?
NIST Cybersecurity Framework (CSF) 2.0: What has changed?
 
pr ISMS Documented Information (lite).pdf
pr ISMS Documented Information (lite).pdfpr ISMS Documented Information (lite).pdf
pr ISMS Documented Information (lite).pdf
 
ISO Survey 2022: ISO 27001 certificates (ISMS)
ISO Survey 2022: ISO 27001 certificates (ISMS)ISO Survey 2022: ISO 27001 certificates (ISMS)
ISO Survey 2022: ISO 27001 certificates (ISMS)
 
My 15 Years of Experience in Using Mind Maps for Business and Personal Purposes
My 15 Years of Experience in Using Mind Maps for Business and Personal PurposesMy 15 Years of Experience in Using Mind Maps for Business and Personal Purposes
My 15 Years of Experience in Using Mind Maps for Business and Personal Purposes
 
From NIST CSF 1.1 to 2.0.pdf
From NIST CSF 1.1 to 2.0.pdfFrom NIST CSF 1.1 to 2.0.pdf
From NIST CSF 1.1 to 2.0.pdf
 
ISO 27001 How to use the ISMS Implementation Toolkit.pdf
ISO 27001 How to use the ISMS Implementation Toolkit.pdfISO 27001 How to use the ISMS Implementation Toolkit.pdf
ISO 27001 How to use the ISMS Implementation Toolkit.pdf
 
ISO 27001 How to accelerate the implementation.pdf
ISO 27001 How to accelerate the implementation.pdfISO 27001 How to accelerate the implementation.pdf
ISO 27001 How to accelerate the implementation.pdf
 
How to use ChatGPT for an ISMS implementation.pdf
How to use ChatGPT for an ISMS implementation.pdfHow to use ChatGPT for an ISMS implementation.pdf
How to use ChatGPT for an ISMS implementation.pdf
 
pr Privacy Principles 230405 small.pdf
pr Privacy Principles 230405 small.pdfpr Privacy Principles 230405 small.pdf
pr Privacy Principles 230405 small.pdf
 
ISO 27001:2022 Introduction
ISO 27001:2022 IntroductionISO 27001:2022 Introduction
ISO 27001:2022 Introduction
 
ISO 27005:2022 Overview 221028.pdf
ISO 27005:2022 Overview 221028.pdfISO 27005:2022 Overview 221028.pdf
ISO 27005:2022 Overview 221028.pdf
 
ISO Survey 2021: ISO 27001.pdf
ISO Survey 2021: ISO 27001.pdfISO Survey 2021: ISO 27001.pdf
ISO Survey 2021: ISO 27001.pdf
 
All about a DPIA by Andrey Prozorov 2.0, 220518.pdf
All about a DPIA by Andrey Prozorov 2.0, 220518.pdfAll about a DPIA by Andrey Prozorov 2.0, 220518.pdf
All about a DPIA by Andrey Prozorov 2.0, 220518.pdf
 
Supply management 1.1.pdf
Supply management 1.1.pdfSupply management 1.1.pdf
Supply management 1.1.pdf
 
Employee Monitoring and Privacy.pdf
Employee Monitoring and Privacy.pdfEmployee Monitoring and Privacy.pdf
Employee Monitoring and Privacy.pdf
 
GDPR RACI.pdf
GDPR RACI.pdfGDPR RACI.pdf
GDPR RACI.pdf
 
GDPR and Personal Data Transfers 1.1.pdf
GDPR and Personal Data Transfers 1.1.pdfGDPR and Personal Data Transfers 1.1.pdf
GDPR and Personal Data Transfers 1.1.pdf
 
GDPR and Security.pdf
GDPR and Security.pdfGDPR and Security.pdf
GDPR and Security.pdf
 
GDPR EU Institutions and bodies.pdf
GDPR EU Institutions and bodies.pdfGDPR EU Institutions and bodies.pdf
GDPR EU Institutions and bodies.pdf
 
Data protection RU vs EU
Data protection RU vs EUData protection RU vs EU
Data protection RU vs EU
 

Recently uploaded

Role and Responsibilities of Mediator and Approach
Role and Responsibilities of Mediator and ApproachRole and Responsibilities of Mediator and Approach
Role and Responsibilities of Mediator and Approach2020000445musaib
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝soniya singh
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书SD DS
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceMichael Cicero
 
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书srst S
 
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书SD DS
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaAbheet Mangleek
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书1k98h0e1
 
Sports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptxSports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptxmarielouisetulaytay
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsAbdul-Hakim Shabazz
 
Trial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionTrial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionNilamPadekar1
 
Group 2 Marlaw Definition of Bill of Lading .pptx
Group 2 Marlaw Definition of Bill of Lading .pptxGroup 2 Marlaw Definition of Bill of Lading .pptx
Group 2 Marlaw Definition of Bill of Lading .pptxjohnpazperpetua10
 
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 如何办理威斯康星大学密尔沃基分校毕业证学位证书 如何办理威斯康星大学密尔沃基分校毕业证学位证书
如何办理威斯康星大学密尔沃基分校毕业证学位证书Fir sss
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeBlayneRush1
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A HistoryJohn Hustaix
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书SD DS
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...shubhuc963
 
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiBlayneRush1
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxAbhishekchatterjee248859
 

Recently uploaded (20)

Role and Responsibilities of Mediator and Approach
Role and Responsibilities of Mediator and ApproachRole and Responsibilities of Mediator and Approach
Role and Responsibilities of Mediator and Approach
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
 
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
 
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in India
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
 
Sports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptxSports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptx
 
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in  Pusa Road🔝 9953330565 🔝 escort Serviceyoung Call Girls in  Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
 
Trial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionTrial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 sedition
 
Group 2 Marlaw Definition of Bill of Lading .pptx
Group 2 Marlaw Definition of Bill of Lading .pptxGroup 2 Marlaw Definition of Bill of Lading .pptx
Group 2 Marlaw Definition of Bill of Lading .pptx
 
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 如何办理威斯康星大学密尔沃基分校毕业证学位证书 如何办理威斯康星大学密尔沃基分校毕业证学位证书
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A History
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...
 
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptx
 

12 Best Privacy Frameworks

  • 1. Best Privacy Frameworks by Andrey Prozorov, CISM, CIPP/E, CDPSE, LA 27001 1.0, 08.09.202 12
  • 2. 2 A framework is a basic conceptual structure used to solve or address complex issues Regulation: Rules or laws defined and enforced by an authority to regulate conduct. ISACA (e.g., GDPR) Standard: A mandatory requirement, code of practice or specification approved by a recognized external standards organization (such as ISO). ISACA (e.g.., ISO 27701, BS 10012, ISO 29100) Guideline: Non-mandatory information leading to a compliant solution for the related requirement. ISO (e.g., NOREA Guide) ISACA All of them can be used as frameworks!
  • 3. Main Benefits Comprehensive approach / Privacy Baseline Measurement and Benchmarking Demonstration of maturity Certification (proof of compliance) Common language for privacy pros and business We don't need to reinvent the wheel!
  • 4. My TOP 12: 1. ISO 29100 2. ISO 27701 3. ICO Accountability Framework 4. TrustArc - Nymity Framework 5. MITRE Privacy Maturity Model 6. NIST Privacy Framework 7. AICPA Privacy Management Framework 8. NDMO Data Management and Personal Data Protection Standards 9. NOREA Privacy Control Framework 10. PDPC Guide to Developing a Data Protection Management Programme 11. Standard Data Protection Model (SDM) 12. SCF Privacy Management Principles (SCF-PMP) 4
  • 5. 5 1. ISO 29100 ISO/IEC 29100:2011 Information technology — Security techniques — Privacy framework This standard was last reviewed and confirmed in 2017. ISO/IEC 29100:2011 provides a privacy framework which: • specifies a common privacy terminology; • defines the actors and their roles in processing personally identifiable information (PII); • describes privacy safeguarding considerations; and • provides references to known privacy principles for information technology. ISO 29100 is applicable to natural persons and organizations involved in specifying, procuring, architecting, designing, developing, testing, maintaining, administering, and operating information and communication technology systems or services where privacy controls are required for the processing of PII. • Organisation: ISO • CHF 124 ($140)
  • 6. 6
  • 7. 7
  • 8. 8 2. ISO 27701 ISO/IEC 27701:2019 Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management — Requirements and guidelines This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization. This document specifies PIMS-related requirements and provides guidance for PII controllers and PII processors holding responsibility and accountability for PII processing. This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations, which are PII controllers and/or PII processors processing PII within an ISMS. • Organisation: ISO • CHF 187 ($210)
  • 9. 9
  • 10. 10
  • 11. 11 3. ICO Accountability Framework Accountability is one of the key principles in data protection law – it makes you responsible for complying with the legislation and says that you must be able to demonstrate your compliance. The framework is an opportunity for you to assess your organisation’s accountability. Depending on your circumstances, you may use it in different ways. For example, you may want to: • create a comprehensive privacy management programme; • check your existing practices against the ICO’s expectations; • consider whether you could improve existing practices, perhaps in specific areas; • understand ways to demonstrate compliance; • record, track and report on progress; • or increase senior management engagement and privacy awareness across your organisation. Organisation: ICO (UK) Free
  • 12. 12
  • 13. 13 The framework is divided into 10 categories. Selecting a category will display ICO’s key expectations and a bullet-pointed list of ways you can meet their expectations. 1. Leadership and oversight 2. Policies and procedures 3. Training and awareness 4. Individuals’ rights 5. Transparency 6. Records of processing and lawful basis 7. Contracts and data sharing 8. Risks and data protection impact assessments (DPIAs) 9. Records management and security 10.Breach response and monitoring
  • 14. 14 4. TrustArc - Nymity Framework The TrustArc-Nymity integrated Privacy and Data Governance Accountability Frameworks combine and align privacy and data governance controls with privacy management activities across the privacy program lifecycle to help organizations effectively achieve these goals and continuously improve upon them over time. A framework-based approach can be implemented at any stage of a privacy program. • Organisation: TrustArc / Nymity • Free
  • 15. 15
  • 16. • The Core: The three pillars of Build, Implement, and Demonstrate • Standards and Controls: The 16 Standards and 55 Framework Controls • Privacy Management Categories and Activities: The 13 Privacy Management Categories and 139 Privacy Management Activities organized under the Core three pillars • Framework Mapping to Popular Laws: The Framework is mapped to several popular laws, regulations, and other standards 16
  • 17. 17 5. MITRE Privacy Maturity Model Framework for developing, implementing, maintaining, and evaluating privacy programs. Privacy programs must be comprehensive enough to address all requirements established by authoritative sources (e.g., laws, regulations, guidance), and must be supported by written policies, appropriate training, ongoing practices, and appropriate assessment. This model may be used to assess both completeness (whether an organization has identified and implemented all elements of a privacy program) and maturity level (an evaluation of to what degree practices supporting each element are effective in achieving their intended purpose). It was developed based not only on comprehensive research of relevant laws and guidance, but on practices that have been assessed as effective in many organizations. It is a part of the MITRE’s Privacy Engineering Tools: https://www.mitre.org/news-insights/publication/mitres-privacy- engineering-tools-and-their-use-privacy-assessment • Organisation: MITRE • Free
  • 18. 18
  • 19. 19
  • 20. 20
  • 21. 21 6. NIST Privacy Framework The NIST Privacy Framework is a voluntary tool developed in collaboration with stakeholders intended to help organizations identify and manage privacy risk to build innovative products and services while protecting individuals’ privacy. NIST is developing the framework to help organizations with: • Building customer trust by supporting ethical decision-making in product and service design or deployment that optimizes beneficial uses of data while minimizing adverse consequences for individuals’ privacy and society as a whole; • Fulfilling current compliance obligations, as well as future- proofing products and services to meet these obligations in a changing technological and policy environment; and • Facilitating communication about privacy practices with customers, assessors, and regulators. Organisation: NIST Free
  • 22. 22
  • 23. 23
  • 24. 24 7. AICPA Privacy Management Framework The Privacy Management Framework (PMF) can be used as a foundational element in establishing and operating a comprehensive information privacy program that addresses privacy obligations and risks while facilitating current and future business opportunities. • Organisation: AICPA • For Memebers Only
  • 25. 25
  • 26. 26
  • 27. 27 8. NDMO Standards The National Data Management and Personal Data Protection Standards document covers 15 Data Management and Personal Data Protection domains. To support the development of the Data Management and Personal Data Protection standards, a set of international references, internal relevant policies and regulations, and guiding principles were defined. Government Entities (KSA) must implement the standards, and compliance will be measured yearly to monitor progress and drive efforts towards a successful implementation. • Organisation: National Data Management Office (Saudi Arabia) • Free
  • 28. 28
  • 29. 29
  • 30. 30 9. NOREA Privacy Control Framework This guide (in Dutch “Handreiking”) is issued by NOREA, the professional association of IT auditors in the Netherlands and was developed to guide Dutch chartered IT-auditors in issuing assurance reports in alignment with the European General Data Protection Regulation (GDPR) and the relevant standards on assurance engagements. • Organisation: NOREA (Netherlands) • Free
  • 31. 31
  • 32. 32 The PCF contains: 95 controls in total, divided over 32 subjects in 9 Lifecycle Management phases
  • 33. 33 10. PDPC Guide Guide to Developing a Data Protection Management Programme This guide seeks to help organisations develop or improve their personal data protection policies and practices through the implementation of a Data Protection Management Programme (DPMP). Organisations may benchmark their existing personal data protection policies and practices against this guide. • Organisation: PDPC (Singapure) • Free
  • 34. 34
  • 35. 35
  • 36. 36 11. Standard Data Protection Model (SDM) The Standard Data Protection Model (SDM) A method for Data Protection advising and controlling on the basis of uniform protection goals The SDM provides appropriate measures to transform the regulatory requirements of the GDPR to qualified technical and organisational measures. The SDM's catalogue of reference measures can be used to check for each individual processing whether the legally required ‘target’ of measures corresponds to the existing ‘actual’ of measures. • Provider: Conference of the Independent Data Protection Supervisory Authorities of the Federation and the Länder (Germany) • Free
  • 37. 37
  • 38. 38
  • 39. 39 12. SCF Privacy Management Principle (SCF-PMP) The Secure Controls Framework™ (SCF) focuses on internal controls. The SCF is a metaframework – a framework of frameworks • Organisation: SCF • Free
  • 40. 40
  • 41. 41
  • 42. 42 One more thing: CNIL DPO Guide The objective of this guide is to support both organisations in setting up the function of Data Protection Officer (DPO) and such officers in the exercise of their profession. This guide is a living tool which will be enriched by best practices reported by professionals to the French Data Protection Authority (CNIL). • Organisation: CNIL (France) • Free
  • 43. 43
  • 44. 44 [Concept] Mapping - An indication that one concept is related to another concept. NIST
  • 45. 45 Mapping The main question: How does conforming to one framework help the organization conform to another framework? Five Important Assumptions for the Mapping 1. The intended users of the mapping 2. Why someone would want to use this mapping 3. The types of concepts to be mapped 4. The direction of the mapping 5. How exhaustive the mapping will be
  • 47. 47
  • 48. 48 TrustArc-Nymity Framework -> GDPR and ISO 27701 www.patreon.com/posts/mapping-of-to-61726397
  • 49. 49 Framework Why do I like it? 1. ISO 29100 Simple, Privacy Principles, Aligned with the ISO Standards 2. ISO 27701 Integrated with the ISMS (ISO 27001), Well-known international standard, Good Structure, Certification, Mapping to GDPR 3. ICO Accountability Framework Recommendations from the Supervisory Authority (SA), Good Structure, Case studies, Additional resources (self-assessment and tracker), GDPR, Free 4. TrustArc-Nymity Framework Simple, Good Structure, Free 5. MITRE Privacy Maturity Model Good Structure (Elements of a Privacy Program), Maturity Levels, Checklist, Additional Resources, Free 6. NIST Privacy Framework Aligned with NIST CSF (cybersecurity), Tiers 1-4 (Partial, Risk Informed, Repeatable, Adaptive), Free 7. AICPA Privacy Management Framework Simple, Good Structure, Mapping to GDPR, Free (for members) 8. NDMO Standards Recommendations from the SA, Data Management Guiding Principles, Set of controls, Control description, Aligned with DAMA DMBoK, Free 9. NOREA Privacy Control Framework Focus on Audits, Good Structure, Set of controls, GDPR, Mapping to GDPR, Mapping to ISO 27001, ISO 27701 and ISO 29100, Free 10. PDPC Guide Recommendations from the SA, Simple, Examples and Checklists, Training and Communication Initiatives, Data Inventory Map, Free 11. Standard Data Protection Model (SDM) Recommendations from the SA, Protection goals, Data Life Cycle, SDM cube, Risks, PDCA, Integrations with BSI Grundschutz, GDPR, Mapping to GDPR, Free 12. SCF-PM Metaframework, Good Structure, Mapping to many frameworks, Free
  • 50. 50 1. ISO 29100 www.iso.org/standard/45123.html 2. ISO 27701 www.iso.org/standard/71670.html 3. ICO Accountability Framework www.ico.org.uk/for-organisations/uk-gdpr-guidance-and- resources/accountability-and-governance/accountability-framework 4. TrustArc - Nymity Framework www.trustarc.com/trustarc-privacy-data-governance-accountability- framework 5. MITRE Privacy Maturity Model www.mitre.org/news-insights/publication/mitres-privacy-engineering- tools-and-their-use-privacy-assessment 6. NIST Privacy Framework www.nist.gov/privacy-framework 7. AICPA Privacy Management Framework www.us.aicpa.org/interestareas/informationtechnology/privacy- management-framework 8. NDMO Standards www.sdaia.gov.sa/en/SDAIA/about/Documents/PoliciesEN.pdf 9. NOREA Privacy Control Framework www.norea.nl/uploads/bfile/bb6ebde8-a436-43d0-b3df-ceef7a50556c 10. PDPC Guide www.pdpc.gov.sg/help-and-resources/2019/07/guide-to-developing-a- data-protection-management-programme 11. Standard Data Protection Model (SDM) www.datenschutz-mv.de/datenschutz/datenschutzmodell 12. SCF-PM www.securecontrolsframework.com CNIL DPO Guide www.cnil.fr/en/cnil-publishes-guide-dpos All Privacy Standards and Frameworks www.patreon.com/posts/best-privacy-and-85140462
  • 51. Thanks, and good luck! May the Privacy Frameworks Force be with you! www.linkedin.com/in/andreyprozorov www.patreon.com/AndreyProzorov 51
  • 53. 53 P.S. Have you seen my Privacy Implementation Toolkit? www.patreon.com/posts/66191153