SlideShare a Scribd company logo
1 of 27
DATA PRIVACY IN BANKING SECTOR
ENG. ALA’ ZAYADEEN
INFORMATION SECURITY MANAGER / JORDAN AHLI BANK
AGENDA
• INTRODUCTION
• EMERGING DATA PRIVACY TRENDS IN
FACING VOLVING THREATS.
• DESIGNING DATA PRIVACY (BEST
PRACTICES)
PART 1
Introduction
INTRODUCTION
•THINK ABOUT ALL THE DATA USERS GIVE TO GOOGLE, FACEBOOK, APPLE,
TWITTER, AMAZON AND MICROSOFT. GIVEN THAT SO MUCH DATA ARE
ALREADY BEING COLLECTED ABOUT CONSUMERS DAILY LIVES—FROM DATA
USERS VOLUNTARILY PROVIDE VIA APPS AND ORGANIZATIONS TO DATA
OBTAINED THROUGH SURVEILLANCE, ALL TOO OFTEN WITHOUT EVEN
KNOWING IT—SHOULD USERS BE LOOKING FOR DIFFERENT WAYS OF
THINKING ABOUT PRIVACY?
https://myaccount.google.com/dashboard?pli=1
INTRODUCTION
1. What is Data Privacy ?
2. What is Data Security ?
3. Data Privacy Vs. Security
Rights of an individual to trust that others will appropriately and respectfully collect, use, store, share and
dispose of his/her associated personal and sensitive information within the context, and according to the
purposes, for which it was collected or derived. What is appropriate depends on the associated
circumstances, laws and the individual’s reasonable expectations. An individual also has the right to
reasonably control and be aware of the collection, use and disclosure of his/her associated personal and
sensitive information
WHAT IS THE DIFFERENCE ?
DATA PRIVACY
 IS CONCERNED WITH THE PROPER HANDLING OF
DATA AND QUESTIONS RELATED TO THE COLLECTION,
STORAGE, AND SHARE OF DATA
 WHO’S ALLOWED ACCESS TO CONSUMER INFORMATION
Data Security
protecting data from any unauthorized third-party
access or malicious attacks and exploitation of data
Privacy, in general, is an individual’s right to freedom
from intrusion and prying eyes or the right of the person to
be left alone
Data breaches can be caused by a lack of security measures. To properly protect data and
comply with data protection laws you need to implement both Data Privacy and Data Security
strategies
In this (oversimplified) example the window is
a security control, while the curtain is privacy
control
Data security and data privacy often go
hand-in-hand
Excercise
So, if you are using Google Gmail account, your
password would be a method of data ………..,
while the way Google uses your data to
administer your account, would be data
……………..
Data protection is essentially amalgamated security and privacy.
Enhanced personal data protection involves greater data security and a higher level of data privacy.
https://dataprivacymanager.net/top-data-breach/?hsCtaTracking=44413ff6-67d0-4637-83c7-
82a02ca92d63%7C8ee5da92-9b21-4f8e-87c5-becf7cd51b9b
TOP 5 2019 DATA
BREACHES
1. Facebook Data Breach (half a
billion)
2. Fortnite Data Breach (80 million)
3. Microsoft Data Breach
4. Canva Data Breach
5. Coinmama Data Breach
PRIVACY VIOLATION EXAMPLES
1
0
Mother Horrified to Learn Hackers Put
Live Feed of Daughters' Bedroom Online
GDPR FINES
https://www.privacyaffairs.com/gdpr-fines/
PART 2
Emerging Global Data
Privacy Trends
CHALLENGE
The banking industry is one of the primary data
breach targets due to the perceived value of the
underlying data
Emerging growth opportunities and the rapid
adoption of digital technology. Increasingly :
Banks need to be flexible in sharing customer data,
and it is therefore critical that they achieve a
balance between how flexible data sharing can be
while also maintaining its privacy…
credit card and financial information’ are the most
private types of data, globally.
IMPORTANT TERMINOLOGY
DATASUBJECT
An individual who is the subject of the information or
data.
DATACONTROLLER
A person, company or organisation who determines
the purposes and means of processing personal data
DATAPROCESSOR
A person, company or organisation who processes
personal data on behalf of the controller
1
4
DATA PRIVACY TRENDS
1
5
DATA BREACH EVOLUTION
 GROWING DATA BREACH
RISKS, MALICIOUS INSIDERS
AND CYBER ATTACKS.
 GROWING THREAT OF
FINANCIAL MALWARES.
 BREACHES DUE TO
UNINTENTIONAL USER
MISTAKES
REGULATORY EVOLUTION
 INCREASED REGULATORY
FOCUS.
 HARMONIZATION OF DATA
PROTECTION STANDARDS
ACROSS REGIONS.
TECHNOLOGY ADOPTION
 SIMPLIFYING DATA PROTECTION
AND CONTROLLING COSTS.
 INCREASING USE OF IDENTITY
AND ACCESS MANAGEMENT
SOLUTION.
 USING SMARTPHONES FOR
SECURITY ( ALERTS, OTP , ETC.)
DATA PRIVACY TRENDS
1- PRIVACY WILL BECOME A BIGGER FOCUS IN EXECUTIVE-LEVEL AND BOARDROOM DISCUSSIONS
2- MORE COMPANIES WILL MOVE TO A SINGLE ENTERPRISE-WIDE PRIVACY STRATEGY
3- PRIVACY AND CYBERSECURITY FUNCTIONS WILL BECOME MORE INTEGRATED
4- THIRD-PARTY RISK MANAGEMENT WILL CONTINUE TO BE A MAJOR FOCUS NEW ROLES AND SHIFT
IN RESPONSIBILITY
5- PRIVACY WILL BECOME A BUSINESS DIFFERENTIATOR
PART 3
esigning Data Privacy
DATA PRIVACY FRAMEWORK
DATA
PRIVACY
ACTIVITIES
• DEFINE AND IMPLEMENT A DATA PRIVACY PROGRAM.
• RE-DEFINE DATA GOVERNANCE POLICY FRAMEWORK, DATA
PRINCIPLES AND INTEGRATE THEM WITHIN EXISTING FUNCTIONS.
• RE-DEFINE REPORTING NEEDS FOR REQUISITE SENIOR
MANAGEMENT FOCUS.
• APPOINT DATA PROTECTION OFFICERS
• DESIGN AND DEVELOP PRIVACY IMPACT ASSESSMENTS.
• REVIEW AND UPDATE PARTNER AGREEMENTS FOR DATA PRIVACY
CLAUSES.
• DEFINE AND REVIEW SUPPLIER RELATIONSHIPS.
• CREATE AWARENESS ACROSS FUNCTIONS WITHIN THE
ENTERPRISE.
• DEVELOP AND ROLL OUT A ROLE-BASED INDUCTION PROGRAM.
• CONDUCT PRIVACY ASSESSMENTS REGULARLY AND AS AND
WHEN NEW PRODUCTS /PROCESSES ARE LAUNCHED.
Governance
DATA
PRIVACY
ACTIVITIES
• DEFINE TEMPLATES FOR DATA PRIVACY NOTICES.
• DEFINE PROCESSES FOR RECORDING CONSENT,
WITHDRAWAL OF CONSENT, CORRECTION OF STORED
DATA, DATA ERASURE AND PORTABILITY.
• DEFINE A POLICY FOR RETENTION AND DISPOSAL OF
DATA.
• INTEGRATE SECURITY SOLUTIONS WITH REGULAR
OPERATIONS.
• ESTABLISH DATA AUDIT TRAILS.
• MAINTAIN SYSTEM ACTIVITY REPORT LOGS, TEMPLATES,
RESPONSE RECORDS OF DATA SUBJECTS. • MAINTAIN
DATA SHARING LOGS, POLICIES, PROTOCOLS AND
DISCLOSURES.
Operations
DATA
PRIVACY
ACTIVITIES
• ASSESS IT SYSTEMS’ DATA PRIVACY ARCHITECTURES FOR
NEW REQUIREMENTS SUCH AS CONSENT MANAGEMENT,
DATA PRIVACY NOTICES, DATA ERASURE, PORTABILITY
AND BREACH NOTIFICATIONS.
• REMEDIATE AND RE-DESIGN APPLICATIONS TO ENABLE
PREVENTION CONTROLLED ACCESS AND DATA
MINIMIZATION.
• DEFINE ACCESS CONTROL POINTS.
• IMPLEMENT AUTOMATED COMPLIANCE CONTROLS.
• MAINTAIN INCIDENT LOGS.
• CONDUCT REGULAR COMPLIANCE, AUDIT AND
VULNERABILITY TESTS.
Information Systems
PRIVACY BY DESIGN
•PRIVACY BY DESIGN PRIVACY BY DESIGN REQUIRES THAT THE
ACTIONS AN ENTERPRISE PERFORMS WITH RESPECT TO PERSONAL
DATA BE CONDUCTED IN THE CONTEXT OF DATA PROTECTION AND
PRIVACY RIGHTS FROM THE OUTSET OF AN INITIATIVE, OR SIMPLY PUT,
THAT PRIVACY IS INTEGRATED INTO THE ENTIRE ENGINEERING
PROCESS.
•PRIVACY BY DEFAULT REQUIRES THAT ENTERPRISE LEADERSHIP SET A
STANDARD FOR PROTECTING DATA THAT GOES BEYOND MERE
COMPLIANCE REQUIREMENTS. ENTERPRISES THAT STRIVE FOR
PERSONAL DATA SECURITY BY DESIGN, AND ENABLE PRIVACY BY
DEFAULT, CREATE A SOLID BASIS FOR THEIR CUSTOMERS/CLIENTS AND
STAKEHOLDERS TO TRUST THAT THEIR PERSONAL DATA ARE IN GOOD
HANDS AND PROTECTED, A REWARDING OUTCOME FOR THE
ORGANIZATION
Third-Party Risk Management
WHAT
SHOULD
PRIVACY
POLICY
INCLUDE?
23
HOW TO PROTECT YOUR PRIVACY ON SOCIAL MEDIA
https://dataprivacymanager.net/how-to-protect-your-privacy-on-social-media/
26
‫الشخصية‬ ‫البيانات‬ ‫حماية‬ ‫قانون‬
2
7
‫الشخصية‬ ‫البيانات‬ ‫حماية‬ ‫مجلس‬
‫الشخصية‬ ‫البيانات‬ ‫حماية‬ ‫وحدة‬
‫الشخصية‬ ‫البيانات‬ ‫حماية‬ ‫مراقب‬
‫المعالجة‬ ‫وأمان‬ ‫سرية‬
‫المملكة‬ ‫داخل‬ ‫للبيانات‬ ‫اإللكتروني‬ ‫والتبادل‬ ‫النقل‬ ‫أحكام‬
‫المملكة‬ ‫خارج‬ ‫الى‬ ‫الشخصية‬ ‫البيانات‬ ‫نقل‬
‫العقوبات‬

More Related Content

Similar to Privacy (1).pptx

Five_Big_Data_Security_Pitfalls
Five_Big_Data_Security_PitfallsFive_Big_Data_Security_Pitfalls
Five_Big_Data_Security_Pitfalls
Laris Orman
 

Similar to Privacy (1).pptx (20)

Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 
Privacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMSPrivacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMS
 
Microsoft 365 Compliance
Microsoft 365 ComplianceMicrosoft 365 Compliance
Microsoft 365 Compliance
 
Unit 5 v2
Unit 5 v2Unit 5 v2
Unit 5 v2
 
Asset Security
Asset Security Asset Security
Asset Security
 
Big data security
Big data securityBig data security
Big data security
 
Big data security
Big data securityBig data security
Big data security
 
Hidden security and privacy consequences around mobility (Infosec 2013)
Hidden security and privacy consequences around mobility (Infosec 2013)Hidden security and privacy consequences around mobility (Infosec 2013)
Hidden security and privacy consequences around mobility (Infosec 2013)
 
3 guiding priciples to improve data security
3 guiding priciples to improve data security3 guiding priciples to improve data security
3 guiding priciples to improve data security
 
Five_Big_Data_Security_Pitfalls
Five_Big_Data_Security_PitfallsFive_Big_Data_Security_Pitfalls
Five_Big_Data_Security_Pitfalls
 
Privacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or PerishPrivacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or Perish
 
Big Data Expo 2015 - Data Science Innovation Privacy Considerations
Big Data Expo 2015 - Data Science Innovation Privacy ConsiderationsBig Data Expo 2015 - Data Science Innovation Privacy Considerations
Big Data Expo 2015 - Data Science Innovation Privacy Considerations
 
Big Data and Information Security
Big Data and Information SecurityBig Data and Information Security
Big Data and Information Security
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
 
Data set module 4
Data set   module 4Data set   module 4
Data set module 4
 
The Year Ahead in Cyber Security: 2014 edition
The Year Ahead in Cyber Security: 2014 editionThe Year Ahead in Cyber Security: 2014 edition
The Year Ahead in Cyber Security: 2014 edition
 
Data security in a big data environment sweden
Data security in a big data environment   swedenData security in a big data environment   sweden
Data security in a big data environment sweden
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act Brings
 
Presentation2 [Autosaved].pdf
Presentation2 [Autosaved].pdfPresentation2 [Autosaved].pdf
Presentation2 [Autosaved].pdf
 

More from Eng. Ala' Zayadeen- MBA,CEH,ISO Lead Implementer, MCP (10)

Business Strategies and Frameworks by Slidesgo.pptx
Business Strategies and Frameworks by Slidesgo.pptxBusiness Strategies and Frameworks by Slidesgo.pptx
Business Strategies and Frameworks by Slidesgo.pptx
 
2022-security-plan-template.pptx
2022-security-plan-template.pptx2022-security-plan-template.pptx
2022-security-plan-template.pptx
 
slide-webninar-kik-r2-2 (1).pdf
slide-webninar-kik-r2-2 (1).pdfslide-webninar-kik-r2-2 (1).pdf
slide-webninar-kik-r2-2 (1).pdf
 
7-Cloudy with a chance of digitalization.pdf
7-Cloudy with a chance of digitalization.pdf7-Cloudy with a chance of digitalization.pdf
7-Cloudy with a chance of digitalization.pdf
 
Privacy Risk Study 2023 – Executive Summary.pdf
Privacy Risk Study 2023 – Executive Summary.pdfPrivacy Risk Study 2023 – Executive Summary.pdf
Privacy Risk Study 2023 – Executive Summary.pdf
 
لعرض تقديمي متميز.pdf
لعرض تقديمي متميز.pdfلعرض تقديمي متميز.pdf
لعرض تقديمي متميز.pdf
 
Endpoint Protection Comparison.pdf
Endpoint Protection Comparison.pdfEndpoint Protection Comparison.pdf
Endpoint Protection Comparison.pdf
 
Ali Ababneh-CV.pdf
Ali Ababneh-CV.pdfAli Ababneh-CV.pdf
Ali Ababneh-CV.pdf
 
اداره 3.ppt
اداره 3.pptاداره 3.ppt
اداره 3.ppt
 
Cv for ala' zayadeen
Cv for  ala' zayadeen Cv for  ala' zayadeen
Cv for ala' zayadeen
 

Recently uploaded

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
Wonjun Hwang
 

Recently uploaded (20)

Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 

Privacy (1).pptx

  • 1. DATA PRIVACY IN BANKING SECTOR ENG. ALA’ ZAYADEEN INFORMATION SECURITY MANAGER / JORDAN AHLI BANK
  • 2. AGENDA • INTRODUCTION • EMERGING DATA PRIVACY TRENDS IN FACING VOLVING THREATS. • DESIGNING DATA PRIVACY (BEST PRACTICES)
  • 4. INTRODUCTION •THINK ABOUT ALL THE DATA USERS GIVE TO GOOGLE, FACEBOOK, APPLE, TWITTER, AMAZON AND MICROSOFT. GIVEN THAT SO MUCH DATA ARE ALREADY BEING COLLECTED ABOUT CONSUMERS DAILY LIVES—FROM DATA USERS VOLUNTARILY PROVIDE VIA APPS AND ORGANIZATIONS TO DATA OBTAINED THROUGH SURVEILLANCE, ALL TOO OFTEN WITHOUT EVEN KNOWING IT—SHOULD USERS BE LOOKING FOR DIFFERENT WAYS OF THINKING ABOUT PRIVACY? https://myaccount.google.com/dashboard?pli=1
  • 5. INTRODUCTION 1. What is Data Privacy ? 2. What is Data Security ? 3. Data Privacy Vs. Security Rights of an individual to trust that others will appropriately and respectfully collect, use, store, share and dispose of his/her associated personal and sensitive information within the context, and according to the purposes, for which it was collected or derived. What is appropriate depends on the associated circumstances, laws and the individual’s reasonable expectations. An individual also has the right to reasonably control and be aware of the collection, use and disclosure of his/her associated personal and sensitive information
  • 6. WHAT IS THE DIFFERENCE ? DATA PRIVACY  IS CONCERNED WITH THE PROPER HANDLING OF DATA AND QUESTIONS RELATED TO THE COLLECTION, STORAGE, AND SHARE OF DATA  WHO’S ALLOWED ACCESS TO CONSUMER INFORMATION Data Security protecting data from any unauthorized third-party access or malicious attacks and exploitation of data Privacy, in general, is an individual’s right to freedom from intrusion and prying eyes or the right of the person to be left alone
  • 7. Data breaches can be caused by a lack of security measures. To properly protect data and comply with data protection laws you need to implement both Data Privacy and Data Security strategies In this (oversimplified) example the window is a security control, while the curtain is privacy control Data security and data privacy often go hand-in-hand Excercise So, if you are using Google Gmail account, your password would be a method of data ……….., while the way Google uses your data to administer your account, would be data ……………..
  • 8. Data protection is essentially amalgamated security and privacy. Enhanced personal data protection involves greater data security and a higher level of data privacy.
  • 9. https://dataprivacymanager.net/top-data-breach/?hsCtaTracking=44413ff6-67d0-4637-83c7- 82a02ca92d63%7C8ee5da92-9b21-4f8e-87c5-becf7cd51b9b TOP 5 2019 DATA BREACHES 1. Facebook Data Breach (half a billion) 2. Fortnite Data Breach (80 million) 3. Microsoft Data Breach 4. Canva Data Breach 5. Coinmama Data Breach
  • 10. PRIVACY VIOLATION EXAMPLES 1 0 Mother Horrified to Learn Hackers Put Live Feed of Daughters' Bedroom Online
  • 12. PART 2 Emerging Global Data Privacy Trends
  • 13. CHALLENGE The banking industry is one of the primary data breach targets due to the perceived value of the underlying data Emerging growth opportunities and the rapid adoption of digital technology. Increasingly : Banks need to be flexible in sharing customer data, and it is therefore critical that they achieve a balance between how flexible data sharing can be while also maintaining its privacy… credit card and financial information’ are the most private types of data, globally.
  • 14. IMPORTANT TERMINOLOGY DATASUBJECT An individual who is the subject of the information or data. DATACONTROLLER A person, company or organisation who determines the purposes and means of processing personal data DATAPROCESSOR A person, company or organisation who processes personal data on behalf of the controller 1 4
  • 15. DATA PRIVACY TRENDS 1 5 DATA BREACH EVOLUTION  GROWING DATA BREACH RISKS, MALICIOUS INSIDERS AND CYBER ATTACKS.  GROWING THREAT OF FINANCIAL MALWARES.  BREACHES DUE TO UNINTENTIONAL USER MISTAKES REGULATORY EVOLUTION  INCREASED REGULATORY FOCUS.  HARMONIZATION OF DATA PROTECTION STANDARDS ACROSS REGIONS. TECHNOLOGY ADOPTION  SIMPLIFYING DATA PROTECTION AND CONTROLLING COSTS.  INCREASING USE OF IDENTITY AND ACCESS MANAGEMENT SOLUTION.  USING SMARTPHONES FOR SECURITY ( ALERTS, OTP , ETC.)
  • 16. DATA PRIVACY TRENDS 1- PRIVACY WILL BECOME A BIGGER FOCUS IN EXECUTIVE-LEVEL AND BOARDROOM DISCUSSIONS 2- MORE COMPANIES WILL MOVE TO A SINGLE ENTERPRISE-WIDE PRIVACY STRATEGY 3- PRIVACY AND CYBERSECURITY FUNCTIONS WILL BECOME MORE INTEGRATED 4- THIRD-PARTY RISK MANAGEMENT WILL CONTINUE TO BE A MAJOR FOCUS NEW ROLES AND SHIFT IN RESPONSIBILITY 5- PRIVACY WILL BECOME A BUSINESS DIFFERENTIATOR
  • 19. DATA PRIVACY ACTIVITIES • DEFINE AND IMPLEMENT A DATA PRIVACY PROGRAM. • RE-DEFINE DATA GOVERNANCE POLICY FRAMEWORK, DATA PRINCIPLES AND INTEGRATE THEM WITHIN EXISTING FUNCTIONS. • RE-DEFINE REPORTING NEEDS FOR REQUISITE SENIOR MANAGEMENT FOCUS. • APPOINT DATA PROTECTION OFFICERS • DESIGN AND DEVELOP PRIVACY IMPACT ASSESSMENTS. • REVIEW AND UPDATE PARTNER AGREEMENTS FOR DATA PRIVACY CLAUSES. • DEFINE AND REVIEW SUPPLIER RELATIONSHIPS. • CREATE AWARENESS ACROSS FUNCTIONS WITHIN THE ENTERPRISE. • DEVELOP AND ROLL OUT A ROLE-BASED INDUCTION PROGRAM. • CONDUCT PRIVACY ASSESSMENTS REGULARLY AND AS AND WHEN NEW PRODUCTS /PROCESSES ARE LAUNCHED. Governance
  • 20. DATA PRIVACY ACTIVITIES • DEFINE TEMPLATES FOR DATA PRIVACY NOTICES. • DEFINE PROCESSES FOR RECORDING CONSENT, WITHDRAWAL OF CONSENT, CORRECTION OF STORED DATA, DATA ERASURE AND PORTABILITY. • DEFINE A POLICY FOR RETENTION AND DISPOSAL OF DATA. • INTEGRATE SECURITY SOLUTIONS WITH REGULAR OPERATIONS. • ESTABLISH DATA AUDIT TRAILS. • MAINTAIN SYSTEM ACTIVITY REPORT LOGS, TEMPLATES, RESPONSE RECORDS OF DATA SUBJECTS. • MAINTAIN DATA SHARING LOGS, POLICIES, PROTOCOLS AND DISCLOSURES. Operations
  • 21. DATA PRIVACY ACTIVITIES • ASSESS IT SYSTEMS’ DATA PRIVACY ARCHITECTURES FOR NEW REQUIREMENTS SUCH AS CONSENT MANAGEMENT, DATA PRIVACY NOTICES, DATA ERASURE, PORTABILITY AND BREACH NOTIFICATIONS. • REMEDIATE AND RE-DESIGN APPLICATIONS TO ENABLE PREVENTION CONTROLLED ACCESS AND DATA MINIMIZATION. • DEFINE ACCESS CONTROL POINTS. • IMPLEMENT AUTOMATED COMPLIANCE CONTROLS. • MAINTAIN INCIDENT LOGS. • CONDUCT REGULAR COMPLIANCE, AUDIT AND VULNERABILITY TESTS. Information Systems
  • 22. PRIVACY BY DESIGN •PRIVACY BY DESIGN PRIVACY BY DESIGN REQUIRES THAT THE ACTIONS AN ENTERPRISE PERFORMS WITH RESPECT TO PERSONAL DATA BE CONDUCTED IN THE CONTEXT OF DATA PROTECTION AND PRIVACY RIGHTS FROM THE OUTSET OF AN INITIATIVE, OR SIMPLY PUT, THAT PRIVACY IS INTEGRATED INTO THE ENTIRE ENGINEERING PROCESS. •PRIVACY BY DEFAULT REQUIRES THAT ENTERPRISE LEADERSHIP SET A STANDARD FOR PROTECTING DATA THAT GOES BEYOND MERE COMPLIANCE REQUIREMENTS. ENTERPRISES THAT STRIVE FOR PERSONAL DATA SECURITY BY DESIGN, AND ENABLE PRIVACY BY DEFAULT, CREATE A SOLID BASIS FOR THEIR CUSTOMERS/CLIENTS AND STAKEHOLDERS TO TRUST THAT THEIR PERSONAL DATA ARE IN GOOD HANDS AND PROTECTED, A REWARDING OUTCOME FOR THE ORGANIZATION Third-Party Risk Management
  • 24. HOW TO PROTECT YOUR PRIVACY ON SOCIAL MEDIA https://dataprivacymanager.net/how-to-protect-your-privacy-on-social-media/
  • 25.
  • 26. 26
  • 27. ‫الشخصية‬ ‫البيانات‬ ‫حماية‬ ‫قانون‬ 2 7 ‫الشخصية‬ ‫البيانات‬ ‫حماية‬ ‫مجلس‬ ‫الشخصية‬ ‫البيانات‬ ‫حماية‬ ‫وحدة‬ ‫الشخصية‬ ‫البيانات‬ ‫حماية‬ ‫مراقب‬ ‫المعالجة‬ ‫وأمان‬ ‫سرية‬ ‫المملكة‬ ‫داخل‬ ‫للبيانات‬ ‫اإللكتروني‬ ‫والتبادل‬ ‫النقل‬ ‫أحكام‬ ‫المملكة‬ ‫خارج‬ ‫الى‬ ‫الشخصية‬ ‫البيانات‬ ‫نقل‬ ‫العقوبات‬