CHAPTER 1: WHAT IS PRIVACY INFORMATION MANAGEMENT?
āPrivacyā is a term that is being increasingly used in life ā but its meaning is not well understood. Wikipedia1 describes it as āthe ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectivelyā.
This guide to ISO/IEC 27701 focuses on the āinformationā aspects of privacy. Hence, a privacy information management system (PIMS) deals with the processing of personal information ā typically by organisations that an individual deals with.
How you and the organisations that you deal with look after your personal information and allow others to use it without adversely affecting your privacy is a matter for concern. Some examples of this issue are discussed below.
Example one
You do not want other people to use your personal information without your permission. This means limiting access to your personal information, and thus keeping it confidential.
This makes good sense, and initially may seem to be the only thing that matters. However, if restricting access to your personal information is all that matters, you could have it stored in a totally sealed iron box. Not very useful when you want an organisation to use it for your benefit!
Example two
You want to be able to share your personal information with an organisation when it will be to your advantage. This means you value the availability of your personal information. Not only this but you also need it to be available in a usable format and timely manner, and not be used to your disadvantage.
This also makes good sense. We have identified that in controlling our personal information, we need to consider both restricting access to it (an appropriate degree of confidentiality) and ensuring this is balanced with a suitable degree of availability.
Example three
When providing your personal information, you do not ā at least when first dealing with a new organisation ā know how they will use it or with whom they will share it. Most people are content to rely on the organisationās reputation. Nonetheless, you do value the fact that you are confident in dealing with the chosen organisation, i.e. you value the trustworthiness of the services that you receive.
So, with personal information, there is value in knowing where it is stored and how it is being used, having it accessible when needed, knowing what is being retained and being confident that it will be in a format that can be used.
Thus, when referring to privacy information management, this is not only about the security aspects of the personal information (which deals with confidentiality, integrity and availability) but also about the who, where, how, what and why of the management of personal information.
Organisations wish to manage the personal information that they process in a way that ensures their clients and customers can be confident that their privacy is protected. This is often achieved by setting up management arrangements that introduce a set of policies, processes and working arrangements that help them exercise the degree of control required to provide the necessary assurances. Such arrangements are generically described as a PIMS ā this is the focus of ISO/IEC 27701.
Who does it matter to?
Privacy information management (defined as the protection of privacy) is affected by the processing of personal information. This processing is subdivided by the EU General Data Protection Regulation (GDPR) into six data protection principles:
1.Processing shall be fair and lawful, and for specific purposes.
2.Processing shall not be used for any other purpose.
3.Personal information shall be adequate and relevant for the specified purposes, and shall be limited to what is needed for the purposes.
4.Personal information shall be accurate and where necessary up to date.
5.Personal information shall not be retained for longer than is necessary.
6.Personal information shall be processed in a secure manner.
It is obvious that it is not just the personal information itself that we need to be concerned with, but its collection, storage, handling, sharing/transferring and processing. When considering all of these processes, it is easy to conclude that every organisation should be concerned with their privacy information management arrangements.
Individuals are referred to by legislation as ādata subjectsā; this can include members of the public, customers and staff. These individuals will want to know that their personal information is being managed and protected appropriately. Security breaches can result in the disclosure of large volumes of personal information to criminal hackers, which in turn can result in a loss of trust in the organisations that suffer the breaches.2
Organisations in the private sector will be driven by a number of factors, including client and customer requirements, the need to comply with legal and regulatory requirements, and the need to remain competitive. Public-sector organisations have similar drivers to maintain a strong privacy management stance and safeguard against privacy-related incidents.
Where matters!
It is worth noting that not all countries operate the same levels of privacy protection. While the European Union has the GDPR, there is scope within this regulation for countries to operate some of their own rules and regulations. As an example, the EU GDPR talks about charging āa reasonable feeā for a subject access request. The actual fee-charging regime is set by the local supervisory authority (in the UK, this is the Information Commissionerās Office (ICO)). In the UK, there is the Data Protection Act 2018, which in effect is the UKās interpretation of the EU GDPR.
What this means for individuals is that they need to know where their personal information is being processed. They may also need to be concerned about the location of any other organisations with which their personal information is shared.
How is processing managed?
In many cases, individuals will assume that the organisation that they are sharing their personal information with will be processing it on its own systems. However, with the increasing trend towards relying on business partners for key services and processes, organisations will need policies and agreements to be in place for any sub-contracted processing of personal information (especially Cloud-based service providers). Organisations may need to disclose to their stakeholders the location and contractual arrangements for any such sub-contracted processing.
Outsourcing and other contracts are now increasingly specifying compliance with some form of information governance regime as a mandatory requirement.3
What is āpersonal informationā?
The term āpersonal informationā needs some clarification. A number of terms that have the same or similar meanings are used in different jurisdictions. The EU GDPR uses the term āpersonal dataā, whereas some jurisdictions (typically in the US) use āpersonally identifiab...