Strategic Personal Information Privacy Plan example essay topic

1,027 words
Database privacy and legal issues Data privacy law regulates data management, and information systems manage data. Therefore, data privacy assurance must consider system assurance. An IT department should streamline its functions with the industry standards and privacy regulations in order to avoid any disruption. In order to achieve those objectives, the IT department should assess the risks, design a strategic plan to achieve privacy compliance, implement required policies and procedures, and monitor and audit the procedures to ensure privacy compliance.

Gavi son, in his article 'Privacy and the Limits of the Law', describes privacy in terms of controlling access to our physical person, and to our information. In one phrase, it is the 'protection from being brought to the attention of others's truck us as particularly relevant to the census problem (1995). In his article 'creating the Privacy Compliant Organization', Parker mentions that there are other forms of privacy to consider, includes: privacy of persons, privacy of personal behavior, privacy of personal communications, privacy of personal information, and privacy of territory (2001). Risk Assessment An IT department should identify and document the information systems that are subject to privacy requirements includes computer files, databases, archives, microfilm, personal records and copies wherever located. Moreover, it should perform a risk assessment and gap analysis of controls and procedures that are in place. The gap analysis will reveal the deficiencies between the current status and the legislative requirements and regulations under which the organization must operate.

Additionally, the risk assessment must be applied to the likely risks that an organization may experience from a breach in privacy which include damage to the corporate reputation, damage to business credibility, financial loss, negative publicity, and fines and criminal records for employees. The result of this phase will be the basis for developing a strategic personal information privacy plan (Parker, 2001). Design a Strategic Plan Designing a privacy plan involves planning, and implementing a set of direction, methodology, and tools to address number of issues in order to achieve privacy compliant, which includes: o Establishing the required infrastructure, including the required positions and appointing key privacy personnel. o Establish the methodologies, which include team members, deliverable's, activities, critical path, resources, skills, timelines and approaches to addressing the privacy gaps o Introduce the privacy policies, standards, guidelines and procedures required to meet compliance requirements. o Identify the changes required in the systems, procedures, forms, etc. o Formulate the changes required to address the gaps, and Train the individuals to ensure that they fully understand the requirements of the legislation and the organization's objectives and deliverable's to be created (Parker, 2001). Implementing Policies and Procedures At the end of the designing phase, the department should have clear ideas of the procedures and policies that should be in place, the personal should complete the training and are ready to implement the required procedures. At this stage, information systems should be developed or changed to address the privacy requirements. A schedule should specify the deadline for implementing the new or upgraded systems, procedures and policies (Parker, 2001).

As for the database, policies and procedures should ensure that data is protected from intruders, by ensuring that the following steps are in action: o Ensure that audit logs can not be altered by individuals with data access privileges, to guarantee that all changes are logged; o Prevent unauthorized viewing, altering or copying of configuration files; and Prevent IT personal form viewing data file content. It is critical for the corporation to ensure that the entire database environment be sealed off from all unauthorized accesses. This can be achieved by implementing the required procedures for protecting sensitive information stored in a database environment and by preventing exploitation of vulnerabilities outside the influence of the DBMS. Features that may access the data by bypassing the control mechanism should be prohibited in order to prevent tampering with database audit and configuration files stored in OS file directories. Encrypting database creates another layer of security to the data to ensure an extremely high level of protection and enables the organization to meet legislative, regulatory and industry standards for data privacy, prevent theft of sensitive information and pass stringent audit security requirements.

Monitor and Audit the Procedures After implementing the required information systems, policies and procedures to ensure privacy compliant, it is important to ensure the continuity and adherent to the established policies and procedures, by establishing the reporting procedures, and the appropriate level of reviews and audits. It is crucial to assess and recommend the reporting criteria for monitoring requests for information, the sources used to compile the information and the information actually disclosed. Moreover, it is essential to determine the valid procedures to ensure that the parties to whom the information was disclosed are entitled to receive that information. Additionally, the completeness and accuracy of the information obtained from the information systems should be confirmed. Besides, it is important to escalate the problems which arise from senior management or corporate legal counsel (Parker, 2001). An article published by Seiner mentions seven facets that comprise the gold standard for data access auditing: 1.

'Who accessed the data? 2. When? 3.

Using what computer program or client software? 4. From what location on the network? 5. What was the SQL query that accessed the data? 6.

Was it successful; and if so, how many rows of data were retrieved? 7. Management by exception: functionality to interpret the audit trail and bring only the 'unusual' accesses to our attention' (Richardson, 2004). Conclusion An adequate privacy compliance system should be implemented and monitored as it will create and improve customer trust and consequently impact revenue.

Being late in implementing such a system will put the whole corporation at risk, and our reputation will be debatable. In addition, 'such a program can assist in mitigating law suits, surviving the court of public opinion, enhancing corporate branding and improving the quality of corporate information' (Parker, 2001).