Session ID: Session Classification: Dr. Michael Willett OASIS and WillettWorks DSP-R35A General Interest OASIS Privacy Management Reference Model (PMRM)

Slides:



Advertisements
Similar presentations
Privacy By Design Sample Use Case
Advertisements

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL DATA PROTECTION AND PRIVACY COMMISSIONERS.
Privacy By Design Draft Privacy Use Case Template
What is GARP®? GARP® is an Acronym for Generally Accepted Recordkeeping Principles ARMA understands that records must be.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
The Islamic University of Gaza
Contractor Management and ISO 14001:2004
OASIS Reference Model for Service Oriented Architecture 1.0
Security Controls – What Works
On Privacy-aware Information Lifecycle Management (ILM) in Enterprises: Setting the Context Marco Casassa Mont Hewlett-Packard.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Information Systems Controls for System Reliability -Information Security-
Property of Common Sense Privacy - all rights reserved THE DATA PROTECTION ACT 1998 A QUESTION OF PRINCIPLES Sheelagh F M.
Database Auditing Models Dr. Gabriel. 2 Auditing Overview Audit examines: documentation that reflects (from business or individuals); actions, practices,
Chapter 7 Database Auditing Models
Privacy By Design Sample Use Case Privacy Controls Insurance Application- Vehicle Data.
Protecting information rights –­ advancing information policy Privacy law reform for APP entities (organisations)
Elements of Internal Controls Preventing Fraud, Waste, and Abuse in Urban and Rural Transit Systems.
Internal Auditing and Outsourcing
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
OASIS PRIVACY MANAGEMENT REFERENCE MODEL EEMA European e-identity Management Conference Paris, June 2012 John Sabo, CA Technologies Co-Chair, OASIS.
Functional Model Workstream 1: Functional Element Development.
Service Organization Control (SOC) Reporting Options and Information
Ship Recycling Facility Management System IMO Guideline A.962
Continual Service Improvement Process
Occupational Health and Safety
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Information Systems Security Computer System Life Cycle Security.
Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition Chapter 7 Software Supporting Processes and Software Reuse.
Confidential1 ISTPA Framework Project Combining Security and Privacy Throughout the Life Cycle of Personal Information MICHAEL WILLETT Wave Systems Chair:
WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ Identity and Privacy: the.
Demystifying the Business Analysis Body of Knowledge Central Iowa IIBA Chapter December 7, 2005.
TFTM Interim Trust Mark/Listing Approach Paper Analysis of Current Industry Trustmark Programs and GTRI PILOT Approach Discussion Deck TFTM Committee.
HIT Standards Committee Privacy and Security Workgroup: Initial Reactions Dixie Baker, SAIC Steven Findlay, Consumers Union June 23, 2009.
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
PMRM TC Emergency Responder Use Case Draft: 2 Aug 2011.
UNCLASSIFIED DITSCAP Primer. UNCLASSIFIED 1/18/01DITSCAP Primer.PPT 2 DITSCAP* Authority ASD/C3I Memo, 19 Aug 92 –Develop Standardized C&A Process DODI.
Gershon Janssen 11 th October 2011 London Privacy Management Reference Model International Cloud Symposium 2011.
Presentation annotated by Gail Magnuson LLC with permission from Using Information Technologies to Empower and Transform.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
Overview Privacy Management Reference Model and Methodology (PMRM) John Sabo Co-Chair, PMRM TC.
Environmental Management System Definitions
Data Warehousing Data Mining Privacy. Reading Bhavani Thuraisingham, Murat Kantarcioglu, and Srinivasan Iyer Extended RBAC-design and implementation.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
Confidential1 ISTPA Framework Project Combining Security and Privacy Throughout the Life Cycle of Personal Information MICHAEL WILLETT Wave Systems Chair:
International Atomic Energy Agency Roles and responsibilities for development of disposal facilities Phil Metcalf Workshop on Strategy and Methodologies.
1 Designing a Privacy Management System International Security Trust & Privacy Alliance.
ICASA and USSASA Predetermined Objectives – 2013/14 March 2013 Portfolio committee.
1 Copyright © International Security, Trust & Privacy Alliance -All Rights Reserved Making Privacy Operational International Security, Trust.
© Drexel University Software Engineering Research Group (SERG) 1 The OASIS SOA Reference Model Brian Mitchell.
HIT Policy Committee Meeting Nationwide Health Information Network Governance June 25, 2010 Mary Jo Deering, PhD ONC, Office of Policy and Planning NHIN.
 CMMI  REQUIREMENT DEVELOPMENT  SPECIFIC AND GENERIC GOALS  SG1: Develop CUSTOMER Requirement  SG2: Develop Product Requirement  SG3: Analyze.
Security API discussion Group Name: SEC Source: Shingo Fujimoto, FUJITSU Meeting Date: Agenda Item: Security API.
PMRM Revision Discussion Slides Illustrations/Figures 1-3 o Model, Methodology, “Scope” options Functions, Mechanisms and “Solutions” Accountability and.
Castlebridge associates | | Castlebridge changing how people think about information How to Implement the.
Alex Ezrakhovich Process Approach for an Integrated Management System Change driven.
Organization and Implementation of a National Regulatory Program for the Control of Radiation Sources Program Performance Criteria.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
1. Scope of Application 2. Use Case Actors Data Flows Touch Points Initial PI 3. PI - at Touch Points In Internal Out 4. PI - Operational Privacy Policies.
Department of Computer Science Introduction to Information Security Chapter 8 ISO/IEC Semester 1.
1 The XMSF Profile Overlay to the FEDEP Dr. Katherine L. Morse, SAIC Mr. Robert Lutz, JHU APL
Accountability & Structured Privacy Management
Service Organization Control (SOC)
Description of Revision
Privacy and Transparency Interoperability, Standards and Vocabularies
Analysis of Privacy and Data Protection Laws and Directives
The General Data Protection Regulation: Are You Ready?
Presentation transcript:

Session ID: Session Classification: Dr. Michael Willett OASIS and WillettWorks DSP-R35A General Interest OASIS Privacy Management Reference Model (PMRM) ►OASIS = Organization for the Advancement of Structured Information Standards

► The Privacy Management Reference Model and Methodology (PMRM) supports: understanding and analyzing privacy policies and their privacy management requirements in defined use cases; and selecting the technical services which must be implemented to support privacy controls. Keenly relevant when personal information (PI) flows across regulatory, policy, jurisdictional and system boundaries. ABSTRACT ► Published Specification from the OASIS PMRM Technical Committee

► The Privacy Management Reference Model and Methodology (PMRM) supports: understanding and analyzing privacy policies and their privacy management requirements in defined use cases; and selecting the technical services which must be implemented to support privacy controls. Keenly relevant when personal information (PI) flows across regulatory, policy, jurisdictional and system boundaries. ABSTRACT ► Published Specification from the OASIS PMRM Technical Committee Conceptual model of privacy management Methodology for analyzing privacy Use Cases Set of operational Services : map privacy requirements to Services

► From an operational perspective: privacy management is the assured, proper, and consistent collection, processing, communication, use and disposition of personal information (PI) throughout its life cycle ► consistent with data protection principles, policy requirements, and the preferences of the individual ► Proper and consistent must apply throughout the PI life cycle ► apply to all actors who have a connection with the information ► apply to all systems/networks and jurisdictions where PI information is exposed Operational Privacy Management Personal Information Privacy Domains

From Privacy Requirements to Privacy Management Privacy Requirements Methodology/Analysis Services Privacy Architecture Use Case

PMRM - Conceptual Model PI = Personal Information PII = Personally Identifiable Information ► The model provides a common conceptual framework and vocabulary to help people cooperate across disciplines and organizational boundaries… Service-Oriented Architecture (SOA)

PMRM - Methodology Iterate the Process for Refinement ► …and the methodology provides a common set of tasks to achieve a privacy architecture and privacy management analysis

1.Use Case Description 2.Use Case Inventory 3.Privacy Policy Conformance Criteria 4.Assessment Preparation 5.Identify Actors 6.Identify Systems 7.Identify Privacy Domains and Owners 8.Identify roles and responsibilities within a domain 9.Identify Touch Points 10.Identify Data Flows 11.Identify Incoming/Internally Generated/Outgoing PI 12.Specify Inherited Privacy Controls 13.Specify Internal Privacy Controls 14.Specify Exported Privacy Controls 15.Identify Services that conform to identified privacy controls 16.Identify Functions that satisfy selected Services 17.Conduct Risk Assessment 18.Iterate the analysis and refine Methodology: 18 Tasks ANALYSIS Implementation Design

Accountability Notice Consent Collection Limitation and Information Minimization Use Limitation Disclosure Access and Correction Security/Safeguards Information Quality Enforcement Openness ………………………………. Anonymity Information Flow Sensitivity Fair Information Practices/Principles (FIP/Ps) “BRICKS” FIP/Ps Comprehensive privacy requirements Legislation Regulations Privacy policy Ad hoc “solutions” …

PMRM Services (8)

PMRM Services SERVICE INFORMAL DEFINITION FUNCTIONALITY AGREEMENTManage and negotiate permissions and rules Define and document permissions and rules for the handling of PI based on applicable policies, individual preferences, and other relevant factors; provide relevant Actors with a mechanism to negotiate or establish new permissions and rules; express the agreements for use by other Services USAGE Control PI use Ensure that the use of PI complies with the terms of any applicable permission, policy, law or regulation, including PI subjected to information minimization, linking, integration, inference, transfer, derivation, aggregation, and anonymization over the lifecycle of the use case VALIDATION Check PI Evaluate and ensure the information quality of PI in terms of Accuracy, Completeness, Relevance, Timeliness and other relevant qualitative factors CERTIFICATION Check credentials Validate the credentials of any Actor, Domain, System or Subsystem, or system component involved in processing PI; verify compliance and trustworthiness of that Actor, Domain, System or Subsystem, or system component against defined policies ENFORCEMENT Monitor and respond to audited exception conditions Initiate response actions, policy execution, and recourse when audit controls and monitoring indicate that an Actor or System does not conform to defined policies or the terms of a permission (agreement) SECURITYSafeguard privacy information and operations Provide the procedural and technical mechanisms necessary to ensure the confidentiality, integrity, and availability of personal information; make possible the trustworthy processing, communication, storage and disposition of privacy operations INTERACTIONinformation presentation and communication Provide generalized interfaces necessary for presentation, communication, and interaction of PI and relevant information associated with PI; encompasses functionality such as user interfaces, system-to- system information exchanges, and agents ACCESSView and propose changes to stored PI Enable data-subject Actors, as required and/or allowed by permission, policy, or regulation, to review their PI that is held within a Domain and propose changes and/or corrections to their PI

NIST Smart Grid Conceptual Model Source: NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 1.0

Networked Health I.T. Business Intelligence

DO NOT TRACK (DNT) Use Case

► Do Not Track (DNT) broken down into two distinct (T) phases: ► Tracking (often called Collecting): For purposes of market research, recording the associated data (site, request, etc) when a consumer visits web sites, using tracking cookies and other techniques. ► Targeting: Creating behavioral advertising from the tracking data and presenting such to the consumer. Visited web sites are called 1 st parties and the creator of targeted advertising is called a 3 rd party. DNT Use Case (abbreviated) Basic inventory for the DNT Use Case: Consumer (C) Consumer browser (B) Target web site (1st) Third-Party “tracking” web site (3rd) Legislation (L) Enforcement authority (E) Technical Standards (eg, HTTP header for Do Not Track) (T)

DNT Use Case: … Task 15 (Services) Initialize browser INTERACTION (agent): Display DNT preference-setting page with clear definitions to the Consumer Set DNT preference INTERACTION: Confirm DNT preference with Consumer; send DNT preference to USAGE. USAGE: store DNT preference in secure storage C – B: Set Consumer DNT preference Consumer Browser B – 3 rd : Consumer DNT preference; if DNT = OFF: NO: tracking/collecting information Browser 3 rd party tracking site INTERACTION: Browser retrieves DNT preference from USAGE Consumer request to 1 st party site, carrying the DNT preference in the HTTP header INTERACTION: 1 st and 3 rd party liaison: Consumer request shared with 3 rd party, including DNT preference INTERACTION (agent): extract DNT preference from request If DNT = ON: USAGE: Store the DNT = ON agreement If DNT = OFF: INTERACTION: send a tracking cookie to the consumer browser (INTERACTION agent) for installation USAGE: Store the DNT = OFF agreement B – E: notice of any regulatory violations (Enforcement can have a local browser component) INTERACTION: monitor for tracking cookies. If tracking cookies appear and DNT = ON, send alert notice to ENFORCEMENT: send violation notice to the Enforcement authority with 3 rd party Identifying PI Note: Techniques other than tracking cookies could be used to track/collect the consumer 3 rd – E : log/audit compliance with consumer DNT preference

► Privacy management “state of the art”: Requirements expressed in FIP/Ps, legislation, regulation, or policy, but without a supporting “system design” ► PMRM Specification available from OASIS ► Model and Methodology applicable to real Use Cases ► Purpose: Analyze privacy requirements and transform to operational Services; ie, “solve” privacy management ► Next steps: Field test the PMRM/Methodology with Use Cases through Workshops ► Join us! Summary