SlideShare a Scribd company logo
ISO/IEC27001vs.
CCPAvs.NYShieldAct:
Whatarethe
similaritiesand
differences?
• Overview of current state of data
security/privacy
• Current trends driving adoption of
stronger data protection
standards/laws
• Data Protection in ISO/IEC 27001,
CCPA, and NY Shield Act
• Roundtable: Comparison of ISO/IEC
27001, CCPA and NY Shield Act
• Roundtable: Lessons to be applied
Agenda
Currentstateof
data
privacy/security
• Privacy of Personally Identifiable
Information (PII) and Patient Health
Information (PHI) is becoming a focus of
concern for governments, organizations, and
individuals around the globe.
• Cyberattacks are targeting data more than
any other resource.
• Ransomware and data breaches are making
headlines globally and on a recurring and
frequent basis.
DataProtectionEvolutions
Underway
• Block Chain driven data authenticity,
integrity, and protection
• Protective measures for cloud-hosted
data
• Fake news and deep fake detections are
being matured
• Artificial Intelligence is being used as
both a weapon and a defensive measure
Threeexamplesofsecurity
guidancefordataprotection.
ISO/IEC 27001
OverviewofData
Protection/Privacyin
ISO/IEC27001
ISO/IEC 27001 is:
• An international standard that “specifies the
requirements for establishing, implementing, maintaining
and continually improving an information security
management system within the context of the
organization”
• Focused on information security overall from governance
of an ISMS to secure development practices and more
• Not a mandatory/legislated standard with which an
organization must comply
• A standard against which an individual or an organization
can be certified
• A baseline for many other standards, frameworks and
even some legislations
ISO/IEC 27001 specifically references privacy and protection
of personally identifiable information in A.18.1.4:
• “Privacy and protection of personally identifiable
information shall be ensured as required in relevant
legislation and regulation where applicable” and
generally covers the topic in section A.18 Compliance
Implementing
ISO/IEC27001
• A.18 Compliance
• A.18.1 Compliance with legal
and contractual requirements
• Objective: To avoid breaches
of legal, statutory, regulatory or
contractual obligations related
to information security and of
any security
requirements.
A.18.1.1
Identification of applicable legislation
and contractual requirements
Control
All relevant legislative statutory, regulatory,
contractual require- ments and the
organization’s approach to meet these
requirements shall be explicitly identified,
documented and kept up to date for each
information system and the organization.
A.18.1.2 Intellectual property rights
Control
Appropriate procedures shall be implemented
to ensure compliance with legislative,
regulatory and contractual requirements
related to intellectual property rights and use
of proprietary soft- ware products.
A.18.1.3 Protection of records
Control
Records shall be protected from loss,
destruction, falsification, unauthorized access
and unauthorized release, in accordance with
legislatory, regulatory, contractual and business
requirements.
A.18.1.4
Privacy and protection of personally
identifiable information
Control
Privacy and protection of personally
identifiable information shall be ensured as
required in relevant legislation and regulation
where applicable.
A.18.1.5 Regulation of cryptographic controls
Control
Cryptographic controls shall be used in
compliance with all relevant agreements,
legislation and regulations.
Compliance
Requirements
for ISO/IEC
27001
Compliance with ISO/IEC 27001 is typically
voluntary unless otherwise required in
specific instances (e.g., in state lottery and
gaming, compliance with ISO/IEC 27001 is
often required).
Certification of an organization against
ISO/IEC 27001 is possible via a certified
and authorized certification and audit
entity.
“Gotchas”for ISO/IEC27001
Although only section A.18.1 specifically mentions privacy and protection of PII, the remainder of
this standard include vital security controls for protecting data in its many states. For example, A.17
covers business continuity, A.16 covers information security incident management, etc.
Adding ISO/IEC 27701:2019 to ISO/IEC 27001 will add privacy controls to your security compliance
toolkit – highly recommended given today’s privacy regulation landscape.
ISO/IEC 27002:2013 is often confused or conflated with ISO/IEC 27001 but 27002 is a set of best
practice guidance to help an organization implement 27001 and is not a standard against which an
organization can achieve certification (that is achieved against 27001).
California
Consumer
ProtectionAct
(CCPA)
OverviewofData
Protection/Privacyin
CCPA
• Inspired by the GDPR as a stronger privacy
legislation for residents of California.
• Emphasis on privacy rights for consumers.
• Excludes employee data, “publicly available
information”, de-identified and aggregate
information.
• Consumers may pursue civil action as “a
result of the business’ violation of the duty to
implement and maintain reasonable security
procedures and practices appropriate to the
nature of the information to protect the
personal information.”
ImplementingCCPA
Determine what
your organization
is: are you a
business, service
provider, or third
party?
Have a Privacy
Notice that
includes:
Categories of PI
collected, how is
collected and the
purpose of use.
Explains the user’s
rights under CCPA,
OR have separate
page for California
residents.
If selling PI,
provide a notice to
the user about on
the sale.
This must include
an option for the
user to “opt out”
of the sale of their
information.
Set up at least two
methods for users
to contact your
business if they
have privacy
concerns.
At minimum, have
a website or toll-
free number.
Much of CCPA
relies around
recognizing
”categories” of
data. Data
classification is
therefor your
friend.
Train staff: how do
they direct
consumers wishing
to exercising their
rights?
Compliance
Requirements
forCCPA
• Update contracts
• Specify organization’s definition under CCPA
• Service provider contracts: must prohibit retention, use and
disclosure of PI outside specific purposes of providing services.
• Web page updates:
• A section on website (Do Not Sell My Personal Information) that
allows users to opt-out of information sales. Section should be easy
to find from home page.
• User rights:
• The right to request a business delete information collected on the
consumer (exemptions may apply)
• The right to request what information is collected, processed, why,
and when PI is shared or disclosed
• The right to request, when PI is sold, the categories of PI sold and
categories to whom it was sold
• The right to request a business not sell their information (the right
to opt-out)
• The right not to be discriminated against for exercising privacy rights
“Gotchas”for
CCPA
• ALWAYS verify requests for data, per the law.
Unverified requests are a gold-mine for attackers.
• Very little advice for data protection implementation.
However, makes references to “unencrypted”
information as insecure.
• Exemptions for other laws: if your business is a
“covered entity” or “business associate” that deals
with protected health information under the Health
Insurance Portability and Accountability Act (HIPAA) it
may be exempt.
• Admittedly lots of confusion, even among industry
pros, on implementation.
• CCPA 2.0 is already on the ballot for November, 2020.
• If passed CCPA 2.0 will be in force in 2023.
NewYork (NY)
SHIELDAct
OverviewofData
Protection/Privacy
inNYSHIELDAct
• "Stop Hacks and Improve Electronic Data Security Act
(SHIELD Act)"
• The SHIELD Act requires "any person or business that
owns or licenses computerized data which includes private
information of a resident of New York [state]" to implement
the Act's Data Security Program.
• This applies to companies across the entire world,
regardless of whether they have any presence in New York or
even the United States.
• This bill broadens the scope of information covered under
the notification law and updates the notification
requirements when there has been a breach of data.
• It also broadens the definition of a data breach to include
an unauthorized person gaining access to information. It also
requires reasonable data security and provides standards
tailored to the size of a business.
Implementing
NYSHIELDAct
• Reasonable administrative safeguards, such as the following:
• designates one or more employees to coordinate the security program
• identifies reasonably foreseeable internal and external risks
• assesses the sufficiency of safeguards in place to control the identified risks
• trains and manages employees in the security program practices and procedures
• selects service providers capable of maintaining appropriate safeguards and
requires those safeguards by contract; and adjusts the security program in light of
business changes or new circumstances.
• Reasonable technical safeguards, such as the following:
• assesses risks in network and software design
• assesses risks in information processing, transmission, and storage
• detects, prevents, and responds to attacks or system failures
• regularly tests and monitors the effectiveness of key controls, systems, and
procedures.
• Reasonable physical safeguards, such as the following:
• assesses risks of information storage and disposal
• detects, prevents, and responds to intrusions
• protects against unauthorized access to or use of private information during or
after the collection, transportation, and destruction or disposal of information
within a reasonable amount of time after it is no longer needed for business
purposes by erasing electronic media so that the information cannot be read or
reconstructed.
ComplianceRequirements
forNYSHIELDAct
• The SHIELD Act requires organizations to adopt “reasonable” security
practices, policies and procedures to safeguard sensitive data in three
critical ways: administrative safeguards, technical safeguards and physical
safeguards.
• Taking into account differing sizes and resources of businesses, the
SHIELD Act emphasizes that the programs should be reasonable. At a
minimum, requires ongoing monitoring of the implemented policies and
procedures, regular risk assessment of the business’s technical
infrastructure and physical premises, training personnel, reasonable
vendor due diligence, as well as designating an individual responsible for
the required policies, practices, assessment and maintenance.
• Small business exemptions do exist, however, still require a security
program that is modifiable and scaled in accordance with: Size and
complexity of the business, Nature and scope of activities, and the
sensitivity of the personal information collected
• You are automatically considered compliant if your business is
regulated by and compliant with the Health Information Portability and
Accountability Act (HIPAA), Health Information Technology for Economic
and Clinical Health Act (HITECH), the Gramm-Leach Bliley Act, New York’s
Cybersecurity Requirements for Financial Services Companies, and any
other federal or New York cybersecurity legislation.
“Gotchas”forNY
SHIELDAct
• Similar to the CCPA and the GDPR, the SHIELD Act
expands liability to any organization that collects private
information of New York residents, regardless of where it
was collected. This means that an organization does not
necessarily have to conduct business in New York in order to
come under the purview of the SHIELD Act
• New York’s data and privacy laws require that in the event
of a breach, the business must notify any and all New York
residents whose private information may have been
compromised. Now, with the expanded definitions of breach
and private information, there is the potential for more
events that will trigger New York’s breach notification
requirements. Further, with these laws applying to any
business that has New York residents’ information regardless
of where the business is located, such breach notifications
will apply to far more businesses and any breaches they may
experience.
• “Private information” is a subset of personal information –
under the SHIELD Act, private information has been
expanded to include any account information, biometric data
(like iris scans, fingerprints, voiceprints, images, etc.) used to
authenticate someone’s identity, and usernames or emails in
combination with passwords, security questions or
passcodes.
Round Table
Commonalities
• Similar to the CCPA and the GDPR, the NY SHIELD Act
expands liability to any organization that collects private
information of New York residents, regardless of where it
was collected. This means that an organization does not
necessarily have to conduct business in New York in order
to come under the purview of the NY SHIELD Act.
• At a minimum, the NY SHIELD Act requires ongoing
monitoring of the implemented policies and procedures,
regular risk assessment of the business’s technical
infrastructure and physical premises, training personnel,
reasonable vendor due diligence, as well as designating an
individual responsible for the required policies, practices,
assessment and maintenance. CCPA is similar in these
requirements and ISO/IEC 27001 would have similar
requirements as well.
Differences • Whereas CCPA and the NY SHIELD Act require compliance
from the entities to which they apply, ISO/IEC 27001 is not a
mandatory standard.
• CCPA and NY SHIELD Act focus on protecting the data of the
person while ISO/IEC 27001 focuses on protecting all types
of critical data, infrastructure, applications and the
organization itself.
Takeaways
• One standard/legislation can be used to support compliance with another
• When implementing compliance with a standard or legislation, it is
important to maintain evidence of your compliance and to self-audit as well
• No one security standard or legislation should ever be relied upon as your
only elements in your security program
• Designate a Privacy Officer or security team to manage your privacy/data
protection (note that a Privacy Officer is required in many cases!)
• Complete an organizational risk assessment and ensure you have also
classified your data as part of this exercise prior to implementing any security
or privacy controls
ISO/IEC 27001
Training Courses
• ISO/IEC 27001 Introduction
1 Day Course
• ISO/IEC 27001 Foundation
2 Days Course
• ISO/IEC 27001 Lead Implementer
5 Days Course
• ISO/IEC 27001 Lead Auditor
5 Days Course
Exam and certification fees are included in the training price.
https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27001
www.pecb.com/events
THANK YOU
?
bloom@victoriamcintosh.com linkedin.com/in/victoriamcintosh/
asenglish@hotmail.com
derekrs@gmail.com
linkedin.com/in/englishtony
linkedin.com/in/derek-stephenson-90628b113

More Related Content

What's hot

ISO/IEC 27701 vs GDPR: What you need to know
ISO/IEC 27701 vs GDPR: What you need to knowISO/IEC 27701 vs GDPR: What you need to know
ISO/IEC 27701 vs GDPR: What you need to know
PECB
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
William McBorrough
 
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
IGN MANTRA
 
Compliance mapping GDPR vs ISO_en
Compliance mapping GDPR vs ISO_enCompliance mapping GDPR vs ISO_en
Compliance mapping GDPR vs ISO_en
Balázs Antók
 
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
PECB
 
7 Key GDPR Requirements & the Role of Data Governance
7 Key GDPR Requirements & the Role of Data Governance7 Key GDPR Requirements & the Role of Data Governance
7 Key GDPR Requirements & the Role of Data Governance
DATUM LLC
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to compliance
IT Governance Ltd
 
Legal And Regulatory Dp Challenges For The Financial Services Sector
Legal And Regulatory Dp Challenges For The Financial Services SectorLegal And Regulatory Dp Challenges For The Financial Services Sector
Legal And Regulatory Dp Challenges For The Financial Services SectorMSpadea
 
[null] Iso 27001 a business view by Sripathi
[null] Iso 27001   a business view by Sripathi[null] Iso 27001   a business view by Sripathi
[null] Iso 27001 a business view by SripathiPrajwal Panchmahalkar
 
Data protection and data integrity
 Data protection and data integrity Data protection and data integrity
Data protection and data integrity
Axon Lawyers
 
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
IGN MANTRA
 
Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?
PECB
 
Payroll Data & GDPR: What you need to know?
Payroll Data & GDPR: What you need to know?Payroll Data & GDPR: What you need to know?
Payroll Data & GDPR: What you need to know?
BrightPay Payroll and Auto Enrolment Software
 
Information Security Lesson 11 - Policies & Procedures - Eric Vanderburg
Information Security Lesson 11 - Policies & Procedures - Eric VanderburgInformation Security Lesson 11 - Policies & Procedures - Eric Vanderburg
Information Security Lesson 11 - Policies & Procedures - Eric Vanderburg
Eric Vanderburg
 
Migration approachquestionnaire checklist
Migration approachquestionnaire checklistMigration approachquestionnaire checklist
Migration approachquestionnaire checklist
Nandeep Nagarkar
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
Information Technology Society Nepal
 
GDPR Workshop
GDPR WorkshopGDPR Workshop
GDPR Workshop
Curt Lewis
 
Pindad iso27000 2016 smki
Pindad   iso27000 2016 smkiPindad   iso27000 2016 smki
How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation?
PECB
 
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to Know
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to KnowISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to Know
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to Know
PECB
 

What's hot (20)

ISO/IEC 27701 vs GDPR: What you need to know
ISO/IEC 27701 vs GDPR: What you need to knowISO/IEC 27701 vs GDPR: What you need to know
ISO/IEC 27701 vs GDPR: What you need to know
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
 
Compliance mapping GDPR vs ISO_en
Compliance mapping GDPR vs ISO_enCompliance mapping GDPR vs ISO_en
Compliance mapping GDPR vs ISO_en
 
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
 
7 Key GDPR Requirements & the Role of Data Governance
7 Key GDPR Requirements & the Role of Data Governance7 Key GDPR Requirements & the Role of Data Governance
7 Key GDPR Requirements & the Role of Data Governance
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to compliance
 
Legal And Regulatory Dp Challenges For The Financial Services Sector
Legal And Regulatory Dp Challenges For The Financial Services SectorLegal And Regulatory Dp Challenges For The Financial Services Sector
Legal And Regulatory Dp Challenges For The Financial Services Sector
 
[null] Iso 27001 a business view by Sripathi
[null] Iso 27001   a business view by Sripathi[null] Iso 27001   a business view by Sripathi
[null] Iso 27001 a business view by Sripathi
 
Data protection and data integrity
 Data protection and data integrity Data protection and data integrity
Data protection and data integrity
 
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
 
Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?
 
Payroll Data & GDPR: What you need to know?
Payroll Data & GDPR: What you need to know?Payroll Data & GDPR: What you need to know?
Payroll Data & GDPR: What you need to know?
 
Information Security Lesson 11 - Policies & Procedures - Eric Vanderburg
Information Security Lesson 11 - Policies & Procedures - Eric VanderburgInformation Security Lesson 11 - Policies & Procedures - Eric Vanderburg
Information Security Lesson 11 - Policies & Procedures - Eric Vanderburg
 
Migration approachquestionnaire checklist
Migration approachquestionnaire checklistMigration approachquestionnaire checklist
Migration approachquestionnaire checklist
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
 
GDPR Workshop
GDPR WorkshopGDPR Workshop
GDPR Workshop
 
Pindad iso27000 2016 smki
Pindad   iso27000 2016 smkiPindad   iso27000 2016 smki
Pindad iso27000 2016 smki
 
How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation?
 
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to Know
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to KnowISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to Know
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to Know
 

Similar to ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Differences?

HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good Business
Stephen Cobb
 
Complying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataComplying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and Data
Precisely
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data Breach
Jim Brashear
 
Is it time for an IT Assessment?
Is it time for an IT Assessment?Is it time for an IT Assessment?
Is it time for an IT Assessment?
Raffa Learning Community
 
2018 01-25 Introduction to PCI and HIPAA Compliance
2018 01-25 Introduction to PCI and HIPAA Compliance 2018 01-25 Introduction to PCI and HIPAA Compliance
2018 01-25 Introduction to PCI and HIPAA Compliance
Raffa Learning Community
 
2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance
Raffa Learning Community
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and Requirements
Financial Poise
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Financial Poise
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpa
Ulf Mattsson
 
It industry regulations
It industry regulationsIt industry regulations
It industry regulationsNicholas Davis
 
It Industry Regulations
It Industry RegulationsIt Industry Regulations
It Industry RegulationsNicholas Davis
 
Internet security and privacy issues
Internet security and privacy issuesInternet security and privacy issues
Internet security and privacy issues
JagdeepSingh394
 
2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?
Raffa Learning Community
 
2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?
Raffa Learning Community
 
Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security Program
Raymond Cunningham
 
Examples of international privacy legislation
Examples of international privacy legislationExamples of international privacy legislation
Examples of international privacy legislation
Ulf Mattsson
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Sirius
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
Black Duck by Synopsys
 
2017 06-27 Time for an IT Assessment
2017 06-27 Time for an IT Assessment2017 06-27 Time for an IT Assessment
2017 06-27 Time for an IT Assessment
Raffa Learning Community
 
2017 06-27 Time for an IT Assessment
2017 06-27 Time for an IT Assessment2017 06-27 Time for an IT Assessment
2017 06-27 Time for an IT Assessment
Rachel Caldwell
 

Similar to ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Differences? (20)

HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good Business
 
Complying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataComplying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and Data
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data Breach
 
Is it time for an IT Assessment?
Is it time for an IT Assessment?Is it time for an IT Assessment?
Is it time for an IT Assessment?
 
2018 01-25 Introduction to PCI and HIPAA Compliance
2018 01-25 Introduction to PCI and HIPAA Compliance 2018 01-25 Introduction to PCI and HIPAA Compliance
2018 01-25 Introduction to PCI and HIPAA Compliance
 
2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and Requirements
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpa
 
It industry regulations
It industry regulationsIt industry regulations
It industry regulations
 
It Industry Regulations
It Industry RegulationsIt Industry Regulations
It Industry Regulations
 
Internet security and privacy issues
Internet security and privacy issuesInternet security and privacy issues
Internet security and privacy issues
 
2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?
 
2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?
 
Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security Program
 
Examples of international privacy legislation
Examples of international privacy legislationExamples of international privacy legislation
Examples of international privacy legislation
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
 
2017 06-27 Time for an IT Assessment
2017 06-27 Time for an IT Assessment2017 06-27 Time for an IT Assessment
2017 06-27 Time for an IT Assessment
 
2017 06-27 Time for an IT Assessment
2017 06-27 Time for an IT Assessment2017 06-27 Time for an IT Assessment
2017 06-27 Time for an IT Assessment
 

More from PECB

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
PECB
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
PECB
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
PECB
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
PECB
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
PECB
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
PECB
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
PECB
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
PECB
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
PECB
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
PECB
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
PECB
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
PECB
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
PECB
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
PECB
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
PECB
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
PECB
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
PECB
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
PECB
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
PECB
 

More from PECB (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 

Recently uploaded

June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 

Recently uploaded (20)

June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 

ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Differences?

  • 1.
  • 2. ISO/IEC27001vs. CCPAvs.NYShieldAct: Whatarethe similaritiesand differences? • Overview of current state of data security/privacy • Current trends driving adoption of stronger data protection standards/laws • Data Protection in ISO/IEC 27001, CCPA, and NY Shield Act • Roundtable: Comparison of ISO/IEC 27001, CCPA and NY Shield Act • Roundtable: Lessons to be applied Agenda
  • 3. Currentstateof data privacy/security • Privacy of Personally Identifiable Information (PII) and Patient Health Information (PHI) is becoming a focus of concern for governments, organizations, and individuals around the globe. • Cyberattacks are targeting data more than any other resource. • Ransomware and data breaches are making headlines globally and on a recurring and frequent basis.
  • 4. DataProtectionEvolutions Underway • Block Chain driven data authenticity, integrity, and protection • Protective measures for cloud-hosted data • Fake news and deep fake detections are being matured • Artificial Intelligence is being used as both a weapon and a defensive measure
  • 7. OverviewofData Protection/Privacyin ISO/IEC27001 ISO/IEC 27001 is: • An international standard that “specifies the requirements for establishing, implementing, maintaining and continually improving an information security management system within the context of the organization” • Focused on information security overall from governance of an ISMS to secure development practices and more • Not a mandatory/legislated standard with which an organization must comply • A standard against which an individual or an organization can be certified • A baseline for many other standards, frameworks and even some legislations ISO/IEC 27001 specifically references privacy and protection of personally identifiable information in A.18.1.4: • “Privacy and protection of personally identifiable information shall be ensured as required in relevant legislation and regulation where applicable” and generally covers the topic in section A.18 Compliance
  • 8. Implementing ISO/IEC27001 • A.18 Compliance • A.18.1 Compliance with legal and contractual requirements • Objective: To avoid breaches of legal, statutory, regulatory or contractual obligations related to information security and of any security requirements. A.18.1.1 Identification of applicable legislation and contractual requirements Control All relevant legislative statutory, regulatory, contractual require- ments and the organization’s approach to meet these requirements shall be explicitly identified, documented and kept up to date for each information system and the organization. A.18.1.2 Intellectual property rights Control Appropriate procedures shall be implemented to ensure compliance with legislative, regulatory and contractual requirements related to intellectual property rights and use of proprietary soft- ware products. A.18.1.3 Protection of records Control Records shall be protected from loss, destruction, falsification, unauthorized access and unauthorized release, in accordance with legislatory, regulatory, contractual and business requirements. A.18.1.4 Privacy and protection of personally identifiable information Control Privacy and protection of personally identifiable information shall be ensured as required in relevant legislation and regulation where applicable. A.18.1.5 Regulation of cryptographic controls Control Cryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations.
  • 9. Compliance Requirements for ISO/IEC 27001 Compliance with ISO/IEC 27001 is typically voluntary unless otherwise required in specific instances (e.g., in state lottery and gaming, compliance with ISO/IEC 27001 is often required). Certification of an organization against ISO/IEC 27001 is possible via a certified and authorized certification and audit entity.
  • 10. “Gotchas”for ISO/IEC27001 Although only section A.18.1 specifically mentions privacy and protection of PII, the remainder of this standard include vital security controls for protecting data in its many states. For example, A.17 covers business continuity, A.16 covers information security incident management, etc. Adding ISO/IEC 27701:2019 to ISO/IEC 27001 will add privacy controls to your security compliance toolkit – highly recommended given today’s privacy regulation landscape. ISO/IEC 27002:2013 is often confused or conflated with ISO/IEC 27001 but 27002 is a set of best practice guidance to help an organization implement 27001 and is not a standard against which an organization can achieve certification (that is achieved against 27001).
  • 12. OverviewofData Protection/Privacyin CCPA • Inspired by the GDPR as a stronger privacy legislation for residents of California. • Emphasis on privacy rights for consumers. • Excludes employee data, “publicly available information”, de-identified and aggregate information. • Consumers may pursue civil action as “a result of the business’ violation of the duty to implement and maintain reasonable security procedures and practices appropriate to the nature of the information to protect the personal information.”
  • 13. ImplementingCCPA Determine what your organization is: are you a business, service provider, or third party? Have a Privacy Notice that includes: Categories of PI collected, how is collected and the purpose of use. Explains the user’s rights under CCPA, OR have separate page for California residents. If selling PI, provide a notice to the user about on the sale. This must include an option for the user to “opt out” of the sale of their information. Set up at least two methods for users to contact your business if they have privacy concerns. At minimum, have a website or toll- free number. Much of CCPA relies around recognizing ”categories” of data. Data classification is therefor your friend. Train staff: how do they direct consumers wishing to exercising their rights?
  • 14. Compliance Requirements forCCPA • Update contracts • Specify organization’s definition under CCPA • Service provider contracts: must prohibit retention, use and disclosure of PI outside specific purposes of providing services. • Web page updates: • A section on website (Do Not Sell My Personal Information) that allows users to opt-out of information sales. Section should be easy to find from home page. • User rights: • The right to request a business delete information collected on the consumer (exemptions may apply) • The right to request what information is collected, processed, why, and when PI is shared or disclosed • The right to request, when PI is sold, the categories of PI sold and categories to whom it was sold • The right to request a business not sell their information (the right to opt-out) • The right not to be discriminated against for exercising privacy rights
  • 15. “Gotchas”for CCPA • ALWAYS verify requests for data, per the law. Unverified requests are a gold-mine for attackers. • Very little advice for data protection implementation. However, makes references to “unencrypted” information as insecure. • Exemptions for other laws: if your business is a “covered entity” or “business associate” that deals with protected health information under the Health Insurance Portability and Accountability Act (HIPAA) it may be exempt. • Admittedly lots of confusion, even among industry pros, on implementation. • CCPA 2.0 is already on the ballot for November, 2020. • If passed CCPA 2.0 will be in force in 2023.
  • 17. OverviewofData Protection/Privacy inNYSHIELDAct • "Stop Hacks and Improve Electronic Data Security Act (SHIELD Act)" • The SHIELD Act requires "any person or business that owns or licenses computerized data which includes private information of a resident of New York [state]" to implement the Act's Data Security Program. • This applies to companies across the entire world, regardless of whether they have any presence in New York or even the United States. • This bill broadens the scope of information covered under the notification law and updates the notification requirements when there has been a breach of data. • It also broadens the definition of a data breach to include an unauthorized person gaining access to information. It also requires reasonable data security and provides standards tailored to the size of a business.
  • 18. Implementing NYSHIELDAct • Reasonable administrative safeguards, such as the following: • designates one or more employees to coordinate the security program • identifies reasonably foreseeable internal and external risks • assesses the sufficiency of safeguards in place to control the identified risks • trains and manages employees in the security program practices and procedures • selects service providers capable of maintaining appropriate safeguards and requires those safeguards by contract; and adjusts the security program in light of business changes or new circumstances. • Reasonable technical safeguards, such as the following: • assesses risks in network and software design • assesses risks in information processing, transmission, and storage • detects, prevents, and responds to attacks or system failures • regularly tests and monitors the effectiveness of key controls, systems, and procedures. • Reasonable physical safeguards, such as the following: • assesses risks of information storage and disposal • detects, prevents, and responds to intrusions • protects against unauthorized access to or use of private information during or after the collection, transportation, and destruction or disposal of information within a reasonable amount of time after it is no longer needed for business purposes by erasing electronic media so that the information cannot be read or reconstructed.
  • 19. ComplianceRequirements forNYSHIELDAct • The SHIELD Act requires organizations to adopt “reasonable” security practices, policies and procedures to safeguard sensitive data in three critical ways: administrative safeguards, technical safeguards and physical safeguards. • Taking into account differing sizes and resources of businesses, the SHIELD Act emphasizes that the programs should be reasonable. At a minimum, requires ongoing monitoring of the implemented policies and procedures, regular risk assessment of the business’s technical infrastructure and physical premises, training personnel, reasonable vendor due diligence, as well as designating an individual responsible for the required policies, practices, assessment and maintenance. • Small business exemptions do exist, however, still require a security program that is modifiable and scaled in accordance with: Size and complexity of the business, Nature and scope of activities, and the sensitivity of the personal information collected • You are automatically considered compliant if your business is regulated by and compliant with the Health Information Portability and Accountability Act (HIPAA), Health Information Technology for Economic and Clinical Health Act (HITECH), the Gramm-Leach Bliley Act, New York’s Cybersecurity Requirements for Financial Services Companies, and any other federal or New York cybersecurity legislation.
  • 20. “Gotchas”forNY SHIELDAct • Similar to the CCPA and the GDPR, the SHIELD Act expands liability to any organization that collects private information of New York residents, regardless of where it was collected. This means that an organization does not necessarily have to conduct business in New York in order to come under the purview of the SHIELD Act • New York’s data and privacy laws require that in the event of a breach, the business must notify any and all New York residents whose private information may have been compromised. Now, with the expanded definitions of breach and private information, there is the potential for more events that will trigger New York’s breach notification requirements. Further, with these laws applying to any business that has New York residents’ information regardless of where the business is located, such breach notifications will apply to far more businesses and any breaches they may experience. • “Private information” is a subset of personal information – under the SHIELD Act, private information has been expanded to include any account information, biometric data (like iris scans, fingerprints, voiceprints, images, etc.) used to authenticate someone’s identity, and usernames or emails in combination with passwords, security questions or passcodes.
  • 22. Commonalities • Similar to the CCPA and the GDPR, the NY SHIELD Act expands liability to any organization that collects private information of New York residents, regardless of where it was collected. This means that an organization does not necessarily have to conduct business in New York in order to come under the purview of the NY SHIELD Act. • At a minimum, the NY SHIELD Act requires ongoing monitoring of the implemented policies and procedures, regular risk assessment of the business’s technical infrastructure and physical premises, training personnel, reasonable vendor due diligence, as well as designating an individual responsible for the required policies, practices, assessment and maintenance. CCPA is similar in these requirements and ISO/IEC 27001 would have similar requirements as well.
  • 23. Differences • Whereas CCPA and the NY SHIELD Act require compliance from the entities to which they apply, ISO/IEC 27001 is not a mandatory standard. • CCPA and NY SHIELD Act focus on protecting the data of the person while ISO/IEC 27001 focuses on protecting all types of critical data, infrastructure, applications and the organization itself.
  • 24. Takeaways • One standard/legislation can be used to support compliance with another • When implementing compliance with a standard or legislation, it is important to maintain evidence of your compliance and to self-audit as well • No one security standard or legislation should ever be relied upon as your only elements in your security program • Designate a Privacy Officer or security team to manage your privacy/data protection (note that a Privacy Officer is required in many cases!) • Complete an organizational risk assessment and ensure you have also classified your data as part of this exercise prior to implementing any security or privacy controls
  • 25. ISO/IEC 27001 Training Courses • ISO/IEC 27001 Introduction 1 Day Course • ISO/IEC 27001 Foundation 2 Days Course • ISO/IEC 27001 Lead Implementer 5 Days Course • ISO/IEC 27001 Lead Auditor 5 Days Course Exam and certification fees are included in the training price. https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27001 www.pecb.com/events

Editor's Notes

  1. a
  2. A “business” makes over 25 million in annual revenue, OR processes data for over 50,000 consumers/devices, OR derives 50% of revenue from the sale of customer data.
  3. Data requests must be fulfilled in 45 days. Discriminated against: ex. charged more or refused services, providing poorer quality of goods