Introduction |
|
xvii | |
Assessment Test |
|
xxvii | |
|
Chapter 1 Developing a Privacy Program |
|
|
1 | (42) |
|
|
3 | (1) |
|
|
4 | (1) |
|
What Is Personal Information? |
|
|
5 | (1) |
|
What Isn't Personal Information? |
|
|
5 | (3) |
|
Why Should We Care about Privacy? |
|
|
8 | (1) |
|
Generally Accepted Privacy Principles |
|
|
9 | (1) |
|
|
10 | (1) |
|
|
11 | (1) |
|
|
11 | (1) |
|
|
12 | (1) |
|
Use, Retention, and Disposal |
|
|
12 | (1) |
|
|
13 | (1) |
|
Disclosure to Third Parties |
|
|
14 | (1) |
|
|
14 | (1) |
|
|
15 | (1) |
|
Monitoring and Enforcement |
|
|
16 | (1) |
|
Developing a Privacy Program |
|
|
16 | (1) |
|
Crafting Vision, Strategy, Goals, and Objectives |
|
|
17 | (3) |
|
Structuring the Privacy Team |
|
|
20 | (2) |
|
Creating a Program Scope and Charter |
|
|
22 | (3) |
|
|
25 | (1) |
|
|
25 | (1) |
|
Conducting a Privacy Assessment |
|
|
26 | (1) |
|
Implementing Privacy Controls |
|
|
27 | (1) |
|
Ongoing Operation and Monitoring |
|
|
27 | (1) |
|
|
28 | (1) |
|
Data Governance Approaches |
|
|
28 | (1) |
|
|
29 | (1) |
|
|
29 | (2) |
|
Governing Information Processing |
|
|
31 | (1) |
|
Managing the Privacy Budget |
|
|
31 | (1) |
|
|
32 | (1) |
|
|
32 | (1) |
|
|
33 | (1) |
|
Communicating about Privacy |
|
|
34 | (1) |
|
|
34 | (1) |
|
Building a Communications Plan |
|
|
35 | (1) |
|
Privacy Program Operational Life Cycle |
|
|
36 | (1) |
|
|
36 | (1) |
|
|
37 | (1) |
|
|
38 | (5) |
|
Chapter 2 Privacy Program Framework |
|
|
43 | (48) |
|
Develop the Privacy Program Framework |
|
|
44 | (1) |
|
Examples of Privacy Frameworks |
|
|
44 | (7) |
|
Develop Privacy Policies, Procedures, Standards, and Guidelines |
|
|
51 | (1) |
|
Define Privacy Program Activities |
|
|
52 | (5) |
|
Implement the Privacy Program Framework |
|
|
57 | (1) |
|
Communicate the Framework |
|
|
57 | (1) |
|
Aligning with Applicable Laws and Regulations |
|
|
58 | (20) |
|
Develop Appropriate Metrics |
|
|
78 | (1) |
|
Identify Intended Audience for Metrics |
|
|
79 | (1) |
|
Define Privacy Metrics for Oversight and Governance per Audience |
|
|
80 | (3) |
|
|
83 | (1) |
|
|
84 | (2) |
|
|
86 | (5) |
|
Chapter 3 Privacy Operational Life Cycle: Assess |
|
|
91 | (24) |
|
Document Your Privacy Program Baseline |
|
|
93 | (1) |
|
|
94 | (1) |
|
Monitoring and Responding to the Regulatory Environment |
|
|
94 | (1) |
|
Assess Policy Compliance against Internal and External Requirements |
|
|
94 | (1) |
|
Data, Systems, and Process Assessment |
|
|
95 | (1) |
|
|
96 | (1) |
|
Incident Management, Response, and Remediation |
|
|
97 | (1) |
|
Perform Gap Analysis against an Accepted Standard or Law |
|
|
97 | (1) |
|
|
97 | (1) |
|
Processors and Third-Party Vendor Assessment |
|
|
98 | (1) |
|
Evaluate Processors and Third-Party Vendors |
|
|
99 | (1) |
|
Understand Sources of Information |
|
|
99 | (1) |
|
|
100 | (2) |
|
Contractual Requirements and Ongoing Monitoring |
|
|
102 | (1) |
|
|
102 | (1) |
|
Mergers, Acquisitions, and Divestitures |
|
|
103 | (2) |
|
Privacy Assessments and Documentation |
|
|
105 | (1) |
|
Privacy Threshold Analyses (PTAs) |
|
|
105 | (1) |
|
Define a Process for Conducting Privacy Assessments |
|
|
105 | (3) |
|
|
108 | (1) |
|
|
108 | (2) |
|
|
110 | (5) |
|
Chapter 4 Privacy Operational Life Cycle: Protect |
|
|
115 | (42) |
|
Privacy and Cybersecurity |
|
|
117 | (1) |
|
|
117 | (1) |
|
Relationship between Privacy and Cybersecurity |
|
|
118 | (1) |
|
|
119 | (1) |
|
Security Control Categories |
|
|
120 | (1) |
|
|
120 | (1) |
|
|
121 | (1) |
|
|
121 | (1) |
|
|
122 | (1) |
|
|
123 | (1) |
|
|
124 | (1) |
|
|
125 | (1) |
|
|
126 | (2) |
|
|
128 | (1) |
|
|
129 | (1) |
|
|
130 | (1) |
|
Exceptions and Compensating Controls |
|
|
131 | (2) |
|
|
133 | (1) |
|
Identity and Access Management |
|
|
133 | (1) |
|
|
134 | (1) |
|
Identification, Authentication, and Authorization |
|
|
134 | (1) |
|
Authentication Techniques |
|
|
135 | (2) |
|
Provisioning and Deprovisioning |
|
|
137 | (1) |
|
Account and Privilege Management |
|
|
138 | (1) |
|
|
139 | (1) |
|
|
140 | (1) |
|
System Development Phases |
|
|
141 | (1) |
|
System Development Models |
|
|
142 | (4) |
|
Integrating Privacy with Business Processes |
|
|
146 | (1) |
|
|
146 | (1) |
|
|
147 | (1) |
|
Vulnerability Remediation |
|
|
147 | (2) |
|
|
149 | (1) |
|
|
149 | (1) |
|
|
149 | (1) |
|
|
150 | (1) |
|
|
151 | (1) |
|
|
151 | (2) |
|
|
153 | (4) |
|
Chapter 5 Privacy Operational Life Cycle: Sustain |
|
|
157 | (18) |
|
|
158 | (1) |
|
Monitoring the Environment |
|
|
159 | (1) |
|
Monitor Compliance with Privacy Policies |
|
|
160 | (1) |
|
Monitor Regulatory Changes |
|
|
160 | (1) |
|
|
161 | (1) |
|
|
162 | (1) |
|
|
163 | (1) |
|
|
164 | (3) |
|
|
167 | (1) |
|
|
168 | (2) |
|
|
170 | (5) |
|
Chapter 6 Privacy Operational Life Cycle: Respond |
|
|
175 | (50) |
|
|
176 | (1) |
|
|
177 | (1) |
|
|
178 | (1) |
|
|
178 | (2) |
|
|
180 | (1) |
|
|
180 | (1) |
|
|
181 | (1) |
|
Handling Information Requests |
|
|
181 | (1) |
|
Incident Response Planning |
|
|
182 | (1) |
|
Stakeholder Identification |
|
|
182 | (1) |
|
Building an Incident Oversight Team |
|
|
183 | (1) |
|
Building the Incident Response Plan |
|
|
184 | (3) |
|
Integrating the Plan with Other Functions |
|
|
187 | (1) |
|
|
187 | (1) |
|
Security and Privacy Incidents |
|
|
187 | (1) |
|
Security Events and Incidents |
|
|
188 | (1) |
|
|
188 | (1) |
|
Reporting Privacy Incidents |
|
|
189 | (1) |
|
Coordination and Information Sharing |
|
|
190 | (1) |
|
|
191 | (1) |
|
|
191 | (1) |
|
|
192 | (1) |
|
|
192 | (1) |
|
|
193 | (1) |
|
|
193 | (1) |
|
|
194 | (1) |
|
|
195 | (1) |
|
|
196 | (2) |
|
Planning for Business Continuity |
|
|
198 | (2) |
|
Project Scope and Planning |
|
|
200 | (4) |
|
|
204 | (7) |
|
|
211 | (2) |
|
Plan Approval and Implementation |
|
|
213 | (5) |
|
|
218 | (1) |
|
|
219 | (2) |
|
|
221 | (4) |
|
Appendix Answers to Review Questions |
|
|
225 | (14) |
|
Chapter 1 Developing a Privacy Program |
|
|
226 | (2) |
|
Chapter 2 Privacy Program Framework |
|
|
228 | (1) |
|
Chapter 3 Privacy Operational Life Cycle: Assess |
|
|
229 | (2) |
|
Chapter 4 Privacy Operational Life Cycle: Protect |
|
|
231 | (2) |
|
Chapter 5 Privacy Operational Life Cycle: Sustain |
|
|
233 | (2) |
|
Chapter 6 Privacy Operational Life Cycle: Respond |
|
|
235 | (4) |
Index |
|
239 | |