SlideShare a Scribd company logo
1 of 12
Download to read offline
Privacy Requirements and Best
        Practices for Uses of
Third-Party Websites and Applications

                June 2011
Agenda
What is Privacy?


What is a Third-Party Website and Application
 (TPWA)?


What Do I Need to Do?



6/27/2011           TPWA Privacy Requirements    Page 2
What is Privacy?
Notice/Awareness
Choice/Consent
Access/Participation
Integrity/Security
Enforcement/Redress




6/27/2011             TPWA Privacy Requirements   Page 3
What is a TPWA?
 TPWAs are defined as Web-based
  technologies that are not exclusively
  operated or controlled by a government
  entity, or Web-based technologies that
  involve significant participation of a
  nongovernment entity. Often these
  technologies are located on a ‘.com’
  Website or other location that is not part
  of an official government domain.
  However, third-party applications can
  also be embedded or incorporated on an
  agency’s official Website.

6/27/2011                TPWA Privacy Requirements   Page 4
What is a TPWA?
Office of Management and Budget (OMB) Memorandum (M)10-23,
 Guidance for Agency Use of Third-Party Websites and Applications,
 allows the use of TPWAs in support of Open Government
 principles.
The purpose of the Memorandum is to ensure that agency uses of
 TPWAs protect privacy and are consistent with the law through:
     – Transparency of privacy policies;
     – Notification of individuals; and
     – Careful analysis of the privacy implications whenever Federal
       agencies choose to use TPWAs to engage the public.

6/27/2011                    TPWA Privacy Requirements                 Page 5
What Do I Need to Do?
1. Inventory current and proposed uses of TPWAs.
2. Review and assess the privacy policy of the TPWA prior to using the third-
   party’s services.
3. Update TPWA Privacy Practices
     a) Update Operating Division (OPDIV) Privacy Policy and Machine-Readable
        Privacy Policy to describe the use of a TPWA.
     b) Post a Privacy Notice on the TPWA (when feasible).
     c) Implement alerts or statements notifying the public when redirected to a
        nongovernmental Website that may have different privacy policies. (Sample
        language on page 5 of HHS Office of the Chief Information (OCIO)
        Memorandum, Implementation of OMB M-10-22 and M-10-23).
     d) Apply appropriate branding to distinguish OPDIV activities on a TPWA.
4. Conduct a TPWA privacy impact assessment (PIA) on each use of a TPWA
   using the TPWA PIA form.
6/27/2011                      TPWA Privacy Requirements                        Page 6
An example of OMB M-10-23 Updates (not
comprehensive)
   – Twitter
             Apply appropriate
              branding.
             Post a privacy notice,
              when feasible.
             Add a popup alert or
              disclaimer where the
              .gov site directs the
              visitor to the TPWA.




6/27/2011                              TPWA Privacy Requirements   Page 7
Each TPWA may require slightly different
implementation of the requirements
 – Facebook                                        – YouTube

       Add a tab for the “Privacy Notice”                    Within the video information, add
                                                               a link to the official .gov website
                                                               and Privacy Notice.




6/27/2011                        TPWA Privacy Requirements                                       Page 8
Complete a TPWA PIA Questionnaire

Step 1: Complete TPWA PIA
 questionnaire


Step 2: Submit completed
 questionnaire to your Senior
 Official for Privacy (SOP) for
 review and approval


Step 3: Periodically review
 practices on the TPWA to ensure
 the TPWA PIA responses are
 current



6/27/2011                         TPWA Privacy Requirements   Page 9
Getting Started

Step 1: Coordinate TPWA Privacy Compliance with your OPDIV
 SOP


Step 2: Review TPWA Resources




6/27/2011                TPWA Privacy Requirements            Page 10
TPWA Resources on the OCIO Intranet
http://intranet.hhs.gov/it/cybersecurity/privacy/index.html

TPWA PIA Standard Operating Procedures
     – Included a question-by-question guide of the TPWA PIA questionnaire
     – Includes example TPWA PIAs
TWAP PIA Training offered bi-weekly on Fridays at 1pm. Next training on
 Friday, June 24th. Email hhs.cybersecurity@hhs.gov for information.
     – Background
     – Requirements
     – Process
     – Questionnaire
TPWA Frequently Asked Questions



6/27/2011                            TPWA Privacy Requirements               Page 11
Contact Information


                      The HHS Cybersecurity Program
                        Telephone: (202) 205-9581
                  Email: HHS.Cybersecurity@hhs.gov
            Intranet: http://intranet.hhs.gov/infosec/index.html




6/27/2011                  TPWA Privacy Requirements               Page 12

More Related Content

Similar to Third Party Websites and Applications - Kris O'Neil (HHS Cybersecurity)

regtech-call-for-input
regtech-call-for-inputregtech-call-for-input
regtech-call-for-input
Barry West
 
Study_Policy_Regulatory_Framework
Study_Policy_Regulatory_FrameworkStudy_Policy_Regulatory_Framework
Study_Policy_Regulatory_Framework
Joseph Noronha
 

Similar to Third Party Websites and Applications - Kris O'Neil (HHS Cybersecurity) (20)

IS Projects Failures and Recommendations
IS Projects Failures and Recommendations IS Projects Failures and Recommendations
IS Projects Failures and Recommendations
 
A Look At The Consequences Of Internet Censorship Through An ISP Lens
A Look At The Consequences Of Internet Censorship Through An ISP LensA Look At The Consequences Of Internet Censorship Through An ISP Lens
A Look At The Consequences Of Internet Censorship Through An ISP Lens
 
Policy as a Platform: Delivering Agility & Simplicity
Policy as a Platform: Delivering Agility & SimplicityPolicy as a Platform: Delivering Agility & Simplicity
Policy as a Platform: Delivering Agility & Simplicity
 
Study of E-Governance in Flourishing Right to Information Act in India
Study of E-Governance in Flourishing Right to Information Act in IndiaStudy of E-Governance in Flourishing Right to Information Act in India
Study of E-Governance in Flourishing Right to Information Act in India
 
Homeland Open Security Technologies (HOST)
Homeland Open Security Technologies (HOST)Homeland Open Security Technologies (HOST)
Homeland Open Security Technologies (HOST)
 
Open ID in Government
Open ID in GovernmentOpen ID in Government
Open ID in Government
 
Building A Modern Security Policy For Social Media and Government
Building A  Modern  Security  Policy For  Social  Media and GovernmentBuilding A  Modern  Security  Policy For  Social  Media and Government
Building A Modern Security Policy For Social Media and Government
 
regtech-call-for-input
regtech-call-for-inputregtech-call-for-input
regtech-call-for-input
 
Introduction to linked data
Introduction to linked dataIntroduction to linked data
Introduction to linked data
 
Delivering mobile analytics
Delivering mobile analyticsDelivering mobile analytics
Delivering mobile analytics
 
Policy On Collaborative Application Development by Opening the Source Code of...
Policy On Collaborative Application Development by Opening the Source Code of...Policy On Collaborative Application Development by Opening the Source Code of...
Policy On Collaborative Application Development by Opening the Source Code of...
 
Five Steps To Building Push-enabled Mobile Apps
Five Steps To Building Push-enabled Mobile AppsFive Steps To Building Push-enabled Mobile Apps
Five Steps To Building Push-enabled Mobile Apps
 
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablementWeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
 
Privacy Frameworks: The Foundation for Every Privacy Program
Privacy Frameworks: The Foundation for Every Privacy ProgramPrivacy Frameworks: The Foundation for Every Privacy Program
Privacy Frameworks: The Foundation for Every Privacy Program
 
Policy on Open Application Programming Interfaces (APIs) for Government of India
Policy on Open Application Programming Interfaces (APIs) for Government of IndiaPolicy on Open Application Programming Interfaces (APIs) for Government of India
Policy on Open Application Programming Interfaces (APIs) for Government of India
 
Study_Policy_Regulatory_Framework
Study_Policy_Regulatory_FrameworkStudy_Policy_Regulatory_Framework
Study_Policy_Regulatory_Framework
 
BSAD 372 - CH 4
BSAD 372 - CH 4BSAD 372 - CH 4
BSAD 372 - CH 4
 
Information Security Policies
Information Security PoliciesInformation Security Policies
Information Security Policies
 
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
 
Blockchain Overview for North Dakota Information Technology Committee
Blockchain Overview for North Dakota Information Technology CommitteeBlockchain Overview for North Dakota Information Technology Committee
Blockchain Overview for North Dakota Information Technology Committee
 

More from HHS Digital

HHS New Media Webinar: Twitter Chats
HHS New Media Webinar: Twitter ChatsHHS New Media Webinar: Twitter Chats
HHS New Media Webinar: Twitter Chats
HHS Digital
 
Webinar: HHS Open Government Plan Version #2
Webinar: HHS Open Government Plan Version #2Webinar: HHS Open Government Plan Version #2
Webinar: HHS Open Government Plan Version #2
HHS Digital
 
Strategies for Efficiently (and Effectively) Using New Media
Strategies for Efficiently (and Effectively) Using New MediaStrategies for Efficiently (and Effectively) Using New Media
Strategies for Efficiently (and Effectively) Using New Media
HHS Digital
 
Webinar: Innovations in Mobile Health: Highlights and Future Directions
Webinar: Innovations in Mobile Health: Highlights and Future DirectionsWebinar: Innovations in Mobile Health: Highlights and Future Directions
Webinar: Innovations in Mobile Health: Highlights and Future Directions
HHS Digital
 
Webinar: Building a Case for Social Media
Webinar: Building a Case for Social MediaWebinar: Building a Case for Social Media
Webinar: Building a Case for Social Media
HHS Digital
 
Online Community Webinar
Online Community WebinarOnline Community Webinar
Online Community Webinar
HHS Digital
 
Challenges and Competitions: How HHS is using this new tool to foster innovation
Challenges and Competitions: How HHS is using this new tool to foster innovationChallenges and Competitions: How HHS is using this new tool to foster innovation
Challenges and Competitions: How HHS is using this new tool to foster innovation
HHS Digital
 

More from HHS Digital (11)

HHS New Media Webinar: Twitter Chats
HHS New Media Webinar: Twitter ChatsHHS New Media Webinar: Twitter Chats
HHS New Media Webinar: Twitter Chats
 
HHS New Media Webinar Series: YouTube
HHS New Media Webinar Series: YouTubeHHS New Media Webinar Series: YouTube
HHS New Media Webinar Series: YouTube
 
Webinar: HHS Open Government Plan Version #2
Webinar: HHS Open Government Plan Version #2Webinar: HHS Open Government Plan Version #2
Webinar: HHS Open Government Plan Version #2
 
Webinar: Online Outreach Tactics
Webinar: Online Outreach TacticsWebinar: Online Outreach Tactics
Webinar: Online Outreach Tactics
 
Webinar: Social Media Integration
Webinar: Social Media Integration Webinar: Social Media Integration
Webinar: Social Media Integration
 
Webinar: Ideation
Webinar: IdeationWebinar: Ideation
Webinar: Ideation
 
Strategies for Efficiently (and Effectively) Using New Media
Strategies for Efficiently (and Effectively) Using New MediaStrategies for Efficiently (and Effectively) Using New Media
Strategies for Efficiently (and Effectively) Using New Media
 
Webinar: Innovations in Mobile Health: Highlights and Future Directions
Webinar: Innovations in Mobile Health: Highlights and Future DirectionsWebinar: Innovations in Mobile Health: Highlights and Future Directions
Webinar: Innovations in Mobile Health: Highlights and Future Directions
 
Webinar: Building a Case for Social Media
Webinar: Building a Case for Social MediaWebinar: Building a Case for Social Media
Webinar: Building a Case for Social Media
 
Online Community Webinar
Online Community WebinarOnline Community Webinar
Online Community Webinar
 
Challenges and Competitions: How HHS is using this new tool to foster innovation
Challenges and Competitions: How HHS is using this new tool to foster innovationChallenges and Competitions: How HHS is using this new tool to foster innovation
Challenges and Competitions: How HHS is using this new tool to foster innovation
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Recently uploaded (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 

Third Party Websites and Applications - Kris O'Neil (HHS Cybersecurity)

  • 1. Privacy Requirements and Best Practices for Uses of Third-Party Websites and Applications June 2011
  • 2. Agenda What is Privacy? What is a Third-Party Website and Application (TPWA)? What Do I Need to Do? 6/27/2011 TPWA Privacy Requirements Page 2
  • 4. What is a TPWA? TPWAs are defined as Web-based technologies that are not exclusively operated or controlled by a government entity, or Web-based technologies that involve significant participation of a nongovernment entity. Often these technologies are located on a ‘.com’ Website or other location that is not part of an official government domain. However, third-party applications can also be embedded or incorporated on an agency’s official Website. 6/27/2011 TPWA Privacy Requirements Page 4
  • 5. What is a TPWA? Office of Management and Budget (OMB) Memorandum (M)10-23, Guidance for Agency Use of Third-Party Websites and Applications, allows the use of TPWAs in support of Open Government principles. The purpose of the Memorandum is to ensure that agency uses of TPWAs protect privacy and are consistent with the law through: – Transparency of privacy policies; – Notification of individuals; and – Careful analysis of the privacy implications whenever Federal agencies choose to use TPWAs to engage the public. 6/27/2011 TPWA Privacy Requirements Page 5
  • 6. What Do I Need to Do? 1. Inventory current and proposed uses of TPWAs. 2. Review and assess the privacy policy of the TPWA prior to using the third- party’s services. 3. Update TPWA Privacy Practices a) Update Operating Division (OPDIV) Privacy Policy and Machine-Readable Privacy Policy to describe the use of a TPWA. b) Post a Privacy Notice on the TPWA (when feasible). c) Implement alerts or statements notifying the public when redirected to a nongovernmental Website that may have different privacy policies. (Sample language on page 5 of HHS Office of the Chief Information (OCIO) Memorandum, Implementation of OMB M-10-22 and M-10-23). d) Apply appropriate branding to distinguish OPDIV activities on a TPWA. 4. Conduct a TPWA privacy impact assessment (PIA) on each use of a TPWA using the TPWA PIA form. 6/27/2011 TPWA Privacy Requirements Page 6
  • 7. An example of OMB M-10-23 Updates (not comprehensive) – Twitter  Apply appropriate branding.  Post a privacy notice, when feasible.  Add a popup alert or disclaimer where the .gov site directs the visitor to the TPWA. 6/27/2011 TPWA Privacy Requirements Page 7
  • 8. Each TPWA may require slightly different implementation of the requirements – Facebook – YouTube  Add a tab for the “Privacy Notice”  Within the video information, add a link to the official .gov website and Privacy Notice. 6/27/2011 TPWA Privacy Requirements Page 8
  • 9. Complete a TPWA PIA Questionnaire Step 1: Complete TPWA PIA questionnaire Step 2: Submit completed questionnaire to your Senior Official for Privacy (SOP) for review and approval Step 3: Periodically review practices on the TPWA to ensure the TPWA PIA responses are current 6/27/2011 TPWA Privacy Requirements Page 9
  • 10. Getting Started Step 1: Coordinate TPWA Privacy Compliance with your OPDIV SOP Step 2: Review TPWA Resources 6/27/2011 TPWA Privacy Requirements Page 10
  • 11. TPWA Resources on the OCIO Intranet http://intranet.hhs.gov/it/cybersecurity/privacy/index.html TPWA PIA Standard Operating Procedures – Included a question-by-question guide of the TPWA PIA questionnaire – Includes example TPWA PIAs TWAP PIA Training offered bi-weekly on Fridays at 1pm. Next training on Friday, June 24th. Email hhs.cybersecurity@hhs.gov for information. – Background – Requirements – Process – Questionnaire TPWA Frequently Asked Questions 6/27/2011 TPWA Privacy Requirements Page 11
  • 12. Contact Information The HHS Cybersecurity Program Telephone: (202) 205-9581 Email: HHS.Cybersecurity@hhs.gov Intranet: http://intranet.hhs.gov/infosec/index.html 6/27/2011 TPWA Privacy Requirements Page 12