SlideShare a Scribd company logo
DLP Monitoring Legal Obligations,
Managing the Challenges
Maura McAulay
Contents
Part One – DLP Monitoring, the Legal Obligations
Part Two – Dealing with the Challenges
DLP Monitoring – Legal Obligations
DLP Monitoring of users communications such as (but not limited to) email and web
uploads is governed by a number of legal and regulatory factors:
• Data Protection Act
• EU Data Protection Regulation
• Regulation of Investigatory Powers Act (RIPA)
• Lawful Business Practice (LBP) Regulations
• ICO Employment Practices Code – Monitoring at Work
Data Protection Act
The UK Data Protection Act was set up in 1998 to regulate the use of 'personal data'
and consists of 8 Data Protection Principles.
These Principles specify that personal data must be:
1. Processed fairly and lawfully
2. Obtained for specified and lawful purposes
3. Adequate, relevant and not excessive
4. Accurate and up to date
5. Not kept for any longer than necessary
6. Processed in accordance with the 'data subject's' (the individual's) rights
7. Securely kept
1. That "appropriate technical and organisational measures shall be taken against
unauthorised or unlawful processing of personal data and against accidental loss or
destruction of, or damage to personal data"
8. Not transferred to any other country without adequate protection in situ.
EU Data Protection Regulation
The EU have stated completion of the reform of data protection rules in the EU is a
policy priority for 2015. Shortly afterward organisations will be legally required to be
compliant.
In terms of DLP there are four key elements
• It is a Regulation, and not a previously a Directive
• Tougher sanctions for security breaches of up to €100m or 5% of organisations global
revenue, whichever is highest
• New requirement to report data loss/security incidents within 72 hours of the event
being known
• Tokenised, encrypted or pseudo-anonomised data meets requirement of individuals'
reasonable expectations of privacy
• But be wary. Encrypting all data isn't the answer and comes with its own set of
challenges.
Regulation of Investigatory Powers Act (RIPA)
Under RIPA it is against the law for a business to intercept an electronic communication
on its, or anyone else's system.
There are some exceptions, however, most of the exceptions contained in RIPA itself are
unlikely to apply to the monitoring of communications by employers, for example where
an interception is authorised under a warrant. The RIPA exceptions that may be relevant
are:
• Where the interception takes place with the consent from all parties of the
communication
• Where the interception is connected with the operation of the communications
service itself.
In addition to the exceptions in RIPA itself, the Lawful Business Practice Regulations
set out further exceptions where, in connection with the carrying on of a business, an
interception will not contravene RIPA.
An interception of communications that does not come within the exceptions in the LBP
Regulations or in RIPA itself is against the law.
Lawful Business Practice (LBP) Regulations
The LBP Regulations set out the circumstances in which a business is authorised to
carry out an interception for the purpose of running its business. They are designed to
meet the legitimate needs of businesses to manage their information systems, making
use of the capabilities of modern communications technology, but in a way that is
consistent with high standards of privacy.
There are 4 essential pre-requisites of the LBP Regulations:
1. The regulations apply to business communications only
2. Interception that is targeted at personal communications that do not relate to
the business is not allowed regardless of whether the use of the system for such
communications is authorised
3. Interceptions must be authorised by the relevant business owner
4. Interceptions are authorised only if all reasonable efforts to inform all potential
users that interceptions may be made, why and for what purpose the
information will be used.
Lawful Business Practice (LBP) Regulations
The Regulations
Interception without consent is allowed if it is part of monitoing (or recording) business
communications for one of the following purposes:
• To establish the existence of facts (e.g. to prove that a customer has been given
certain advice)
• To check that the business is complying with regulatory or self-regulatory
procedures
• To check the standards that workers are achieving (e.g. to check the quality of
email responses sent to customer enquiries)
• To show standards workers ought to achieve (e.g. for staff training)
• To prevent or detect crime
• To investigate or detect unauthorised use of the telecommunications system
(e.g. sending confidential information by email without using encryption if this
is not allowed)
• To ensure the security of the system and its effective operation (e.g. to check for
viruses or other threats to the system or to enable automated processes such as
caching or load distribution.
ICO Employment Practices Code – Monitoring at Work
The following are a few of the key obligations employers must meet in relation to
monitoring employee activities
• Workers must be clearly informed that monitoring takes place, the purpose of the
monitoring and the potential outcomes on workers of the monitoring
• Monitoring must meet the workers' legal right to privacy
• Take steps to ensure that any intrusion is no more than absolutely necessary
• Monitoring must be carried out in a way that is lawful and fair to workers
• Any adverse impact on workers must is justified by the benefits to the employer
and others
• Ensure information about workers collected through monitoring is kept securely and
handled in accordance with the DPA
• Ensure that all cases requiring further investigation and/or disciplinary action are
treated in a fair and consistent manner.
Dealing wth the Challenges
Not having DLP Controls in place is not an option if organisations are to meet DPA and
EU Data Protection Regulations obligations to protect any personal data collected
and/or processed, and meet stakeholder expectatations that they also protect other
important business data.
The challenge is how to carry out these activities within the parameters of RIPA and
LBP Regulations, especially in today's world where most organisations allow some
personal use of the systems.
Know your data and how it is used, and remember DLP is not simply
about monitoring
Think:
• Data Governance
• Stakeholder Engagement
• Education and Awareness
• Culture
Data Governance
Know your data:
• Know what it is
• Know how it is used
• Know how important it is to you
• Know how important it is to others
Know your risk and what remediation is required to carry out effective monitoring of
your business data.
Have the right policies in place:
• Information Security/Records Management/Privacy
• Acceptable Use
• Change Management
Make sure policies are precise and easily understood by all users (not just us!) and back
them up with fit for purpose standards and procedures.
Data Governance
Provide the tools needed to meet policy:
• Policy needs to be achievable. There's little point requiring users to treat
information in ways they can't because:
a. Tools aren't available
b. Tools are difficult to use
c. Inadequate guidance provided on how and when to use the tools
• Remember tools aren't always technical. Don't forget the importance of business
tools such as data risk evaluation matrices, data inventory templates, etc.
Don't set users up to fail and remember you need this information to build business
focussed monitoring policies.
Stakeholder Engagement
Don't operate in isolation. Know your stakeholders and engage with them.
Business
• Put simply how can you know the data you need to protect if you don't engage with
the business who own and use the data
Privacy/Legal
• How can you be assured that the monitoring you carry out and the resulting
activities are legally compliant
HR
The following are a few ways that engageing with HR is beneficial:
• Reference point to confirm that investigatory processes are consistent and fair to
colleagues and help cascade any required business activities downstream
• Help ensure communications are colleague focussed
• Support any disciplinary activities
• Where required assist with any engagement with unions or other colleague support
parties
Education & Awareness
Remember information security is our day job – not theirs. We have a responsibility
to make sure the business understand and get it right.
Effective Education
• Make sure policies and guidance are easily understood and easy to find
• Don't rely on annual refresher training. Provide additional guidance, helpful hints &
tips, worked examples, etc.
• Tell the story – explain why data security is important, e.g. the impacts of sending
work to home email, even thought the intention is good
• Provide solutions, e.g. remote secure access
Communications
• Tell users clearly monitoring is carried out
• Make communications (including education and guidance) visible, present and
frequent
• Don't rely on policy, intranet and newsletters – use posters, screensavers and
backgrounds, and pop-up awareness stalls
• Keep it relevant and cascade messages via execs within the business areas
Education & Awareness
Consequences
• Be clear about the consequences of not following policy and abiding by Acceptable
Use
• Provide clear guidance to be followed should a user realise they have breached
policy and data has been lost. Stress hiding will make it worse
• Users need to understand the importance and potential severity but don't
scaremonger
Culture
Aim
The aim of Information Security within an organisaton should be to embed an ethos of
data security mindfulness among its users where users feel confident they are carrying
out their day to day activities securely and can identify and highlight weakness in
business processes.
• Security becomes just part of how you do business, no longer a painful extra and a
blocker
• Enabling organisations to embrace new technologies securely and meet colleague
and customer demands to keep pace
"Aligned information security and business objectives—The model must enable and
support business objectives. The information security program should align with the
organization from the boardroom to end users, and information security controls
should be practical and provide real, measurable risk reduction." - ISACA
Culture
Fear Factor
The facts:
• Most people want to do the right thing
• Some will make mistakes
• Only a small number act maliciously
If you want to avoid a culture of fear, action following an identified data loss event
must be appropriate to the nature and severity of the incident
Number of people disciplined – a mark of success or indicator of failings?
Ask:
• Are your policies fit for purpose?
• Are you educating users effectively?
• Do your users have the right tools?
• Are the wrong types of people getting through vetting procedures?
Culture
Senior Executives
Enabling or sabotaging?
Too often in organisations the experience is that
executives make the right noises about data security but see themselves as being
exempt.
Why is this? Is it because:
• They believe the rules don't apply to them?
• They don't fully understand?
• No-one is prepared to put their head above the parapet and challenge?
• Is their support staff smoothing the way because applying security is a pain and its
their job to take that pain away?
• Have we made security just too damned hard and delivered it without any thought
to the business?
Questions?

More Related Content

What's hot

Topic 3 Current Legislation.pptx
Topic 3 Current Legislation.pptxTopic 3 Current Legislation.pptx
Topic 3 Current Legislation.pptx
AmandaWeaver21
 
COBIT and IT Policy Presentation
COBIT and IT Policy PresentationCOBIT and IT Policy Presentation
COBIT and IT Policy Presentation
Sarah Cortes
 
GDPR & IBM i Security
GDPR & IBM i SecurityGDPR & IBM i Security
GDPR & IBM i Security
Precisely
 
Data protection within development
Data protection within developmentData protection within development
Data protection within development
owaspsuffolk
 
Kevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram Security Summit
Kevin Wharram Security Summit
Kevin Wharram
 
08 pdf show-239
08   pdf show-23908   pdf show-239
08 pdf show-239
#TheFraudTube
 
How to keep printing processes GDPR compliant
How to keep printing processes GDPR compliantHow to keep printing processes GDPR compliant
How to keep printing processes GDPR compliant
Xenith Document Systems Ltd
 
Information Technology policy
Information Technology policyInformation Technology policy
Information Technology policy
marindi
 
Chapter 3: Information Security Framework
Chapter 3: Information Security FrameworkChapter 3: Information Security Framework
Chapter 3: Information Security Framework
Nada G.Youssef
 
needforsecurity
needforsecurityneedforsecurity
17 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_201217 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_2012
RECIPA
 
Lesson 1 - Technical Controls
Lesson 1 - Technical ControlsLesson 1 - Technical Controls
Lesson 1 - Technical Controls
MLG College of Learning, Inc
 
Establishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital WorldEstablishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital World
E Radar
 
Secuntialesse
SecuntialesseSecuntialesse
Secuntialesse
Anne Starr
 
Lesson 2
Lesson 2Lesson 2
GDPR – The Practicalities of a New Reality
GDPR – The Practicalities of a New Reality GDPR – The Practicalities of a New Reality
GDPR – The Practicalities of a New Reality
Susan Moran
 
Payroll Data & GDPR: What you need to know?
Payroll Data & GDPR: What you need to know?Payroll Data & GDPR: What you need to know?
Payroll Data & GDPR: What you need to know?
BrightPay Payroll and Auto Enrolment Software
 
Flash Friday: Data Quality & GDPR
Flash Friday: Data Quality & GDPRFlash Friday: Data Quality & GDPR
Flash Friday: Data Quality & GDPR
Precisely
 
GDPR & the Travel Industry: Practical recommendations for holiday rental owners
GDPR & the Travel Industry: Practical recommendations for holiday rental ownersGDPR & the Travel Industry: Practical recommendations for holiday rental owners
GDPR & the Travel Industry: Practical recommendations for holiday rental owners
Spain-Holiday.com
 
Maloney Slides
Maloney SlidesMaloney Slides
Maloney Slides
ecommerce
 

What's hot (20)

Topic 3 Current Legislation.pptx
Topic 3 Current Legislation.pptxTopic 3 Current Legislation.pptx
Topic 3 Current Legislation.pptx
 
COBIT and IT Policy Presentation
COBIT and IT Policy PresentationCOBIT and IT Policy Presentation
COBIT and IT Policy Presentation
 
GDPR & IBM i Security
GDPR & IBM i SecurityGDPR & IBM i Security
GDPR & IBM i Security
 
Data protection within development
Data protection within developmentData protection within development
Data protection within development
 
Kevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram Security Summit
Kevin Wharram Security Summit
 
08 pdf show-239
08   pdf show-23908   pdf show-239
08 pdf show-239
 
How to keep printing processes GDPR compliant
How to keep printing processes GDPR compliantHow to keep printing processes GDPR compliant
How to keep printing processes GDPR compliant
 
Information Technology policy
Information Technology policyInformation Technology policy
Information Technology policy
 
Chapter 3: Information Security Framework
Chapter 3: Information Security FrameworkChapter 3: Information Security Framework
Chapter 3: Information Security Framework
 
needforsecurity
needforsecurityneedforsecurity
needforsecurity
 
17 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_201217 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_2012
 
Lesson 1 - Technical Controls
Lesson 1 - Technical ControlsLesson 1 - Technical Controls
Lesson 1 - Technical Controls
 
Establishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital WorldEstablishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital World
 
Secuntialesse
SecuntialesseSecuntialesse
Secuntialesse
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
GDPR – The Practicalities of a New Reality
GDPR – The Practicalities of a New Reality GDPR – The Practicalities of a New Reality
GDPR – The Practicalities of a New Reality
 
Payroll Data & GDPR: What you need to know?
Payroll Data & GDPR: What you need to know?Payroll Data & GDPR: What you need to know?
Payroll Data & GDPR: What you need to know?
 
Flash Friday: Data Quality & GDPR
Flash Friday: Data Quality & GDPRFlash Friday: Data Quality & GDPR
Flash Friday: Data Quality & GDPR
 
GDPR & the Travel Industry: Practical recommendations for holiday rental owners
GDPR & the Travel Industry: Practical recommendations for holiday rental ownersGDPR & the Travel Industry: Practical recommendations for holiday rental owners
GDPR & the Travel Industry: Practical recommendations for holiday rental owners
 
Maloney Slides
Maloney SlidesMaloney Slides
Maloney Slides
 

Similar to DLP: Monitoring Legal Obligations, Managing The Challenges

Internet security and privacy issues
Internet security and privacy issuesInternet security and privacy issues
Internet security and privacy issues
JagdeepSingh394
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Qualsys Ltd
 
Introduction to data protection
Introduction to data protectionIntroduction to data protection
Introduction to data protection
Rachel Aldighieri
 
Members evening - data protection
Members evening - data protectionMembers evening - data protection
Members evening - data protection
MRS
 
What is CT- DPO.pdf
What is CT- DPO.pdfWhat is CT- DPO.pdf
What is CT- DPO.pdf
tsaaroacademy
 
CCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
CCPA Compliance from Ground Zero: Start to Finish with TrustArc SolutionsCCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
CCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
TrustArc
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach risk
Livingstone Advisory
 
Introduction to data protection - Edinburgh - 29/04/15
Introduction to data protection - Edinburgh - 29/04/15Introduction to data protection - Edinburgh - 29/04/15
Introduction to data protection - Edinburgh - 29/04/15
Rachel Aldighieri
 
An introduction to data protection - 2/09/2015
An introduction to data protection - 2/09/2015An introduction to data protection - 2/09/2015
An introduction to data protection - 2/09/2015
Rachel Aldighieri
 
An introduction to data protection - Edinburgh
An introduction to data protection - EdinburghAn introduction to data protection - Edinburgh
An introduction to data protection - Edinburgh
Rachel Aldighieri
 
CLE-Unit-III.ppt
CLE-Unit-III.pptCLE-Unit-III.ppt
CLE-Unit-III.ppt
20214Mohan
 
12 security policies
12 security policies12 security policies
12 security policies
Saqib Raza
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to compliance
IT Governance Ltd
 
An introduction to data protection - Manchester - 24/06/15
An introduction to data protection - Manchester - 24/06/15An introduction to data protection - Manchester - 24/06/15
An introduction to data protection - Manchester - 24/06/15
Rachel Aldighieri
 
PACE-IT: Security Policies and Other Documents
PACE-IT: Security Policies and Other DocumentsPACE-IT: Security Policies and Other Documents
PACE-IT: Security Policies and Other Documents
Pace IT at Edmonds Community College
 
Legal and data protection update
Legal and data protection updateLegal and data protection update
Legal and data protection update
Rachel Aldighieri
 
Ready for the GDPR, Ready for the Digital Economy
Ready for the GDPR, Ready for the Digital EconomyReady for the GDPR, Ready for the Digital Economy
Ready for the GDPR, Ready for the Digital Economy
Ray ABOU
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
PECB
 
ABM Display Advertising Success in the World of GDPR [PPT]
ABM Display Advertising Success in the World of GDPR [PPT]ABM Display Advertising Success in the World of GDPR [PPT]
ABM Display Advertising Success in the World of GDPR [PPT]
Kwanzoo Inc
 
Ppt
PptPpt

Similar to DLP: Monitoring Legal Obligations, Managing The Challenges (20)

Internet security and privacy issues
Internet security and privacy issuesInternet security and privacy issues
Internet security and privacy issues
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
 
Introduction to data protection
Introduction to data protectionIntroduction to data protection
Introduction to data protection
 
Members evening - data protection
Members evening - data protectionMembers evening - data protection
Members evening - data protection
 
What is CT- DPO.pdf
What is CT- DPO.pdfWhat is CT- DPO.pdf
What is CT- DPO.pdf
 
CCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
CCPA Compliance from Ground Zero: Start to Finish with TrustArc SolutionsCCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
CCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach risk
 
Introduction to data protection - Edinburgh - 29/04/15
Introduction to data protection - Edinburgh - 29/04/15Introduction to data protection - Edinburgh - 29/04/15
Introduction to data protection - Edinburgh - 29/04/15
 
An introduction to data protection - 2/09/2015
An introduction to data protection - 2/09/2015An introduction to data protection - 2/09/2015
An introduction to data protection - 2/09/2015
 
An introduction to data protection - Edinburgh
An introduction to data protection - EdinburghAn introduction to data protection - Edinburgh
An introduction to data protection - Edinburgh
 
CLE-Unit-III.ppt
CLE-Unit-III.pptCLE-Unit-III.ppt
CLE-Unit-III.ppt
 
12 security policies
12 security policies12 security policies
12 security policies
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to compliance
 
An introduction to data protection - Manchester - 24/06/15
An introduction to data protection - Manchester - 24/06/15An introduction to data protection - Manchester - 24/06/15
An introduction to data protection - Manchester - 24/06/15
 
PACE-IT: Security Policies and Other Documents
PACE-IT: Security Policies and Other DocumentsPACE-IT: Security Policies and Other Documents
PACE-IT: Security Policies and Other Documents
 
Legal and data protection update
Legal and data protection updateLegal and data protection update
Legal and data protection update
 
Ready for the GDPR, Ready for the Digital Economy
Ready for the GDPR, Ready for the Digital EconomyReady for the GDPR, Ready for the Digital Economy
Ready for the GDPR, Ready for the Digital Economy
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
ABM Display Advertising Success in the World of GDPR [PPT]
ABM Display Advertising Success in the World of GDPR [PPT]ABM Display Advertising Success in the World of GDPR [PPT]
ABM Display Advertising Success in the World of GDPR [PPT]
 
Ppt
PptPpt
Ppt
 

More from Napier University

Intrusion Detection Systems
Intrusion Detection SystemsIntrusion Detection Systems
Intrusion Detection Systems
Napier University
 
Networks
NetworksNetworks
Memory, Big Data and SIEM
Memory, Big Data and SIEMMemory, Big Data and SIEM
Memory, Big Data and SIEM
Napier University
 
What is Cyber Data?
What is Cyber Data?What is Cyber Data?
What is Cyber Data?
Napier University
 
Open Source Intelligence
Open Source IntelligenceOpen Source Intelligence
Open Source Intelligence
Napier University
 
10. Data to Information: NumPy and Pandas
10. Data to Information: NumPy and Pandas10. Data to Information: NumPy and Pandas
10. Data to Information: NumPy and Pandas
Napier University
 
2. Defence Systems
2. Defence Systems2. Defence Systems
2. Defence Systems
Napier University
 
1. Cyber and Intelligence
1. Cyber and Intelligence1. Cyber and Intelligence
1. Cyber and Intelligence
Napier University
 
The Road Ahead for Ripple, Marjan Delatinne
The Road Ahead for Ripple, Marjan DelatinneThe Road Ahead for Ripple, Marjan Delatinne
The Road Ahead for Ripple, Marjan Delatinne
Napier University
 
Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt
 Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt
Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt
Napier University
 
ARTiFACTS, Emma Boswood
ARTiFACTS, Emma BoswoodARTiFACTS, Emma Boswood
ARTiFACTS, Emma Boswood
Napier University
 
RMIT Blockchain Innovation Hub, Chris Berg
RMIT Blockchain Innovation Hub, Chris BergRMIT Blockchain Innovation Hub, Chris Berg
RMIT Blockchain Innovation Hub, Chris Berg
Napier University
 
Keynote, Naseem Naqvi
Keynote, Naseem Naqvi Keynote, Naseem Naqvi
Keynote, Naseem Naqvi
Napier University
 
Browser-based Crypto M, C. F Mondschein
Browser-based Crypto M, C. F MondscheinBrowser-based Crypto M, C. F Mondschein
Browser-based Crypto M, C. F Mondschein
Napier University
 
Should we transform or adapt to blockchain - a public sector perspective?, Al...
Should we transform or adapt to blockchain - a public sector perspective?, Al...Should we transform or adapt to blockchain - a public sector perspective?, Al...
Should we transform or adapt to blockchain - a public sector perspective?, Al...
Napier University
 
IoT device attestation system using blockchain, Alistair Duke
IoT device attestation system using blockchain, Alistair DukeIoT device attestation system using blockchain, Alistair Duke
IoT device attestation system using blockchain, Alistair Duke
Napier University
 
Robust Programming of Smart Contracts in Solidity+, RK Shyamasundar
Robust Programming of Smart Contracts in Solidity+, RK ShyamasundarRobust Programming of Smart Contracts in Solidity+, RK Shyamasundar
Robust Programming of Smart Contracts in Solidity+, RK Shyamasundar
Napier University
 
Using Blockchain for Evidence Purpose, Rafael Prabucki
Using Blockchain for Evidence Purpose, Rafael PrabuckiUsing Blockchain for Evidence Purpose, Rafael Prabucki
Using Blockchain for Evidence Purpose, Rafael Prabucki
Napier University
 
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...
Napier University
 
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata Fereirra
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata FereirraEmerging Regulatory Approaches to Blockchain-based Token Economy, Agata Fereirra
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata Fereirra
Napier University
 

More from Napier University (20)

Intrusion Detection Systems
Intrusion Detection SystemsIntrusion Detection Systems
Intrusion Detection Systems
 
Networks
NetworksNetworks
Networks
 
Memory, Big Data and SIEM
Memory, Big Data and SIEMMemory, Big Data and SIEM
Memory, Big Data and SIEM
 
What is Cyber Data?
What is Cyber Data?What is Cyber Data?
What is Cyber Data?
 
Open Source Intelligence
Open Source IntelligenceOpen Source Intelligence
Open Source Intelligence
 
10. Data to Information: NumPy and Pandas
10. Data to Information: NumPy and Pandas10. Data to Information: NumPy and Pandas
10. Data to Information: NumPy and Pandas
 
2. Defence Systems
2. Defence Systems2. Defence Systems
2. Defence Systems
 
1. Cyber and Intelligence
1. Cyber and Intelligence1. Cyber and Intelligence
1. Cyber and Intelligence
 
The Road Ahead for Ripple, Marjan Delatinne
The Road Ahead for Ripple, Marjan DelatinneThe Road Ahead for Ripple, Marjan Delatinne
The Road Ahead for Ripple, Marjan Delatinne
 
Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt
 Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt
Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt
 
ARTiFACTS, Emma Boswood
ARTiFACTS, Emma BoswoodARTiFACTS, Emma Boswood
ARTiFACTS, Emma Boswood
 
RMIT Blockchain Innovation Hub, Chris Berg
RMIT Blockchain Innovation Hub, Chris BergRMIT Blockchain Innovation Hub, Chris Berg
RMIT Blockchain Innovation Hub, Chris Berg
 
Keynote, Naseem Naqvi
Keynote, Naseem Naqvi Keynote, Naseem Naqvi
Keynote, Naseem Naqvi
 
Browser-based Crypto M, C. F Mondschein
Browser-based Crypto M, C. F MondscheinBrowser-based Crypto M, C. F Mondschein
Browser-based Crypto M, C. F Mondschein
 
Should we transform or adapt to blockchain - a public sector perspective?, Al...
Should we transform or adapt to blockchain - a public sector perspective?, Al...Should we transform or adapt to blockchain - a public sector perspective?, Al...
Should we transform or adapt to blockchain - a public sector perspective?, Al...
 
IoT device attestation system using blockchain, Alistair Duke
IoT device attestation system using blockchain, Alistair DukeIoT device attestation system using blockchain, Alistair Duke
IoT device attestation system using blockchain, Alistair Duke
 
Robust Programming of Smart Contracts in Solidity+, RK Shyamasundar
Robust Programming of Smart Contracts in Solidity+, RK ShyamasundarRobust Programming of Smart Contracts in Solidity+, RK Shyamasundar
Robust Programming of Smart Contracts in Solidity+, RK Shyamasundar
 
Using Blockchain for Evidence Purpose, Rafael Prabucki
Using Blockchain for Evidence Purpose, Rafael PrabuckiUsing Blockchain for Evidence Purpose, Rafael Prabucki
Using Blockchain for Evidence Purpose, Rafael Prabucki
 
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...
 
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata Fereirra
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata FereirraEmerging Regulatory Approaches to Blockchain-based Token Economy, Agata Fereirra
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata Fereirra
 

Recently uploaded

7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
ukwwuq
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
Trending Blogers
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
Azure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdfAzure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdf
AanSulistiyo
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
bseovas
 

Recently uploaded (20)

7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
Azure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdfAzure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdf
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
 

DLP: Monitoring Legal Obligations, Managing The Challenges

  • 1. DLP Monitoring Legal Obligations, Managing the Challenges Maura McAulay
  • 2. Contents Part One – DLP Monitoring, the Legal Obligations Part Two – Dealing with the Challenges
  • 3. DLP Monitoring – Legal Obligations DLP Monitoring of users communications such as (but not limited to) email and web uploads is governed by a number of legal and regulatory factors: • Data Protection Act • EU Data Protection Regulation • Regulation of Investigatory Powers Act (RIPA) • Lawful Business Practice (LBP) Regulations • ICO Employment Practices Code – Monitoring at Work
  • 4. Data Protection Act The UK Data Protection Act was set up in 1998 to regulate the use of 'personal data' and consists of 8 Data Protection Principles. These Principles specify that personal data must be: 1. Processed fairly and lawfully 2. Obtained for specified and lawful purposes 3. Adequate, relevant and not excessive 4. Accurate and up to date 5. Not kept for any longer than necessary 6. Processed in accordance with the 'data subject's' (the individual's) rights 7. Securely kept 1. That "appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to personal data" 8. Not transferred to any other country without adequate protection in situ.
  • 5. EU Data Protection Regulation The EU have stated completion of the reform of data protection rules in the EU is a policy priority for 2015. Shortly afterward organisations will be legally required to be compliant. In terms of DLP there are four key elements • It is a Regulation, and not a previously a Directive • Tougher sanctions for security breaches of up to €100m or 5% of organisations global revenue, whichever is highest • New requirement to report data loss/security incidents within 72 hours of the event being known • Tokenised, encrypted or pseudo-anonomised data meets requirement of individuals' reasonable expectations of privacy • But be wary. Encrypting all data isn't the answer and comes with its own set of challenges.
  • 6. Regulation of Investigatory Powers Act (RIPA) Under RIPA it is against the law for a business to intercept an electronic communication on its, or anyone else's system. There are some exceptions, however, most of the exceptions contained in RIPA itself are unlikely to apply to the monitoring of communications by employers, for example where an interception is authorised under a warrant. The RIPA exceptions that may be relevant are: • Where the interception takes place with the consent from all parties of the communication • Where the interception is connected with the operation of the communications service itself. In addition to the exceptions in RIPA itself, the Lawful Business Practice Regulations set out further exceptions where, in connection with the carrying on of a business, an interception will not contravene RIPA. An interception of communications that does not come within the exceptions in the LBP Regulations or in RIPA itself is against the law.
  • 7. Lawful Business Practice (LBP) Regulations The LBP Regulations set out the circumstances in which a business is authorised to carry out an interception for the purpose of running its business. They are designed to meet the legitimate needs of businesses to manage their information systems, making use of the capabilities of modern communications technology, but in a way that is consistent with high standards of privacy. There are 4 essential pre-requisites of the LBP Regulations: 1. The regulations apply to business communications only 2. Interception that is targeted at personal communications that do not relate to the business is not allowed regardless of whether the use of the system for such communications is authorised 3. Interceptions must be authorised by the relevant business owner 4. Interceptions are authorised only if all reasonable efforts to inform all potential users that interceptions may be made, why and for what purpose the information will be used.
  • 8. Lawful Business Practice (LBP) Regulations The Regulations Interception without consent is allowed if it is part of monitoing (or recording) business communications for one of the following purposes: • To establish the existence of facts (e.g. to prove that a customer has been given certain advice) • To check that the business is complying with regulatory or self-regulatory procedures • To check the standards that workers are achieving (e.g. to check the quality of email responses sent to customer enquiries) • To show standards workers ought to achieve (e.g. for staff training) • To prevent or detect crime • To investigate or detect unauthorised use of the telecommunications system (e.g. sending confidential information by email without using encryption if this is not allowed) • To ensure the security of the system and its effective operation (e.g. to check for viruses or other threats to the system or to enable automated processes such as caching or load distribution.
  • 9. ICO Employment Practices Code – Monitoring at Work The following are a few of the key obligations employers must meet in relation to monitoring employee activities • Workers must be clearly informed that monitoring takes place, the purpose of the monitoring and the potential outcomes on workers of the monitoring • Monitoring must meet the workers' legal right to privacy • Take steps to ensure that any intrusion is no more than absolutely necessary • Monitoring must be carried out in a way that is lawful and fair to workers • Any adverse impact on workers must is justified by the benefits to the employer and others • Ensure information about workers collected through monitoring is kept securely and handled in accordance with the DPA • Ensure that all cases requiring further investigation and/or disciplinary action are treated in a fair and consistent manner.
  • 10. Dealing wth the Challenges Not having DLP Controls in place is not an option if organisations are to meet DPA and EU Data Protection Regulations obligations to protect any personal data collected and/or processed, and meet stakeholder expectatations that they also protect other important business data. The challenge is how to carry out these activities within the parameters of RIPA and LBP Regulations, especially in today's world where most organisations allow some personal use of the systems. Know your data and how it is used, and remember DLP is not simply about monitoring Think: • Data Governance • Stakeholder Engagement • Education and Awareness • Culture
  • 11. Data Governance Know your data: • Know what it is • Know how it is used • Know how important it is to you • Know how important it is to others Know your risk and what remediation is required to carry out effective monitoring of your business data. Have the right policies in place: • Information Security/Records Management/Privacy • Acceptable Use • Change Management Make sure policies are precise and easily understood by all users (not just us!) and back them up with fit for purpose standards and procedures.
  • 12. Data Governance Provide the tools needed to meet policy: • Policy needs to be achievable. There's little point requiring users to treat information in ways they can't because: a. Tools aren't available b. Tools are difficult to use c. Inadequate guidance provided on how and when to use the tools • Remember tools aren't always technical. Don't forget the importance of business tools such as data risk evaluation matrices, data inventory templates, etc. Don't set users up to fail and remember you need this information to build business focussed monitoring policies.
  • 13. Stakeholder Engagement Don't operate in isolation. Know your stakeholders and engage with them. Business • Put simply how can you know the data you need to protect if you don't engage with the business who own and use the data Privacy/Legal • How can you be assured that the monitoring you carry out and the resulting activities are legally compliant HR The following are a few ways that engageing with HR is beneficial: • Reference point to confirm that investigatory processes are consistent and fair to colleagues and help cascade any required business activities downstream • Help ensure communications are colleague focussed • Support any disciplinary activities • Where required assist with any engagement with unions or other colleague support parties
  • 14. Education & Awareness Remember information security is our day job – not theirs. We have a responsibility to make sure the business understand and get it right. Effective Education • Make sure policies and guidance are easily understood and easy to find • Don't rely on annual refresher training. Provide additional guidance, helpful hints & tips, worked examples, etc. • Tell the story – explain why data security is important, e.g. the impacts of sending work to home email, even thought the intention is good • Provide solutions, e.g. remote secure access Communications • Tell users clearly monitoring is carried out • Make communications (including education and guidance) visible, present and frequent • Don't rely on policy, intranet and newsletters – use posters, screensavers and backgrounds, and pop-up awareness stalls • Keep it relevant and cascade messages via execs within the business areas
  • 15. Education & Awareness Consequences • Be clear about the consequences of not following policy and abiding by Acceptable Use • Provide clear guidance to be followed should a user realise they have breached policy and data has been lost. Stress hiding will make it worse • Users need to understand the importance and potential severity but don't scaremonger
  • 16. Culture Aim The aim of Information Security within an organisaton should be to embed an ethos of data security mindfulness among its users where users feel confident they are carrying out their day to day activities securely and can identify and highlight weakness in business processes. • Security becomes just part of how you do business, no longer a painful extra and a blocker • Enabling organisations to embrace new technologies securely and meet colleague and customer demands to keep pace "Aligned information security and business objectives—The model must enable and support business objectives. The information security program should align with the organization from the boardroom to end users, and information security controls should be practical and provide real, measurable risk reduction." - ISACA
  • 17. Culture Fear Factor The facts: • Most people want to do the right thing • Some will make mistakes • Only a small number act maliciously If you want to avoid a culture of fear, action following an identified data loss event must be appropriate to the nature and severity of the incident Number of people disciplined – a mark of success or indicator of failings? Ask: • Are your policies fit for purpose? • Are you educating users effectively? • Do your users have the right tools? • Are the wrong types of people getting through vetting procedures?
  • 18. Culture Senior Executives Enabling or sabotaging? Too often in organisations the experience is that executives make the right noises about data security but see themselves as being exempt. Why is this? Is it because: • They believe the rules don't apply to them? • They don't fully understand? • No-one is prepared to put their head above the parapet and challenge? • Is their support staff smoothing the way because applying security is a pain and its their job to take that pain away? • Have we made security just too damned hard and delivered it without any thought to the business?

Editor's Notes

  1. 1st & 2nd tie back to LBP
  2. Communications 1st bullet goes back to LBP & ICO Employment Practices Code