Gartner has identified the top five issues that privacy officers must pay particular attention to in 2011 and 2012:
1. Data Breaches Continue to Be a Top Concern
Data breaches rank high on the priority list because of their visibility, but preparing for and following up on breaches is actually straightforward. Most controls exist anyway if security management is working properly. This topic should not consume more than 10 percent of a privacy officer's time.
Organizations should compartmentalize personal information, restrict access, encrypt data when transmitting it across public networks, encrypt data on portable devices, and encrypt data in storage to protect it from users who have been given too much privilege, from rogue administrators and from hackers. Consider data loss prevention tools, tokenization, data masking and privacy management tools.
2. Location-Based Services Exploit Personal Information in Unprecedented Ways
Location information can be GPS information, the nearest cell tower, information about wireless access points, indoor positioning information, speed, altitude, smart meter identifiers and IP addresses. Not every organization processes geolocation data, but the area is evolving rapidly, and a specific way of processing may suddenly surface as a privacy scandal (e.g. smartphones storing more location information than expected).
Many providers are still in the "collect" stage rather than the "use" stage. They compile vast amounts of information, often without a clear plan of what to do with it. This violates a fundamental privacy principle: Collect information only for the purpose for which you need it. Depending on the nature of the business, privacy officers will focus 5-25 percent of their time on location-based services.
3. Cloud Computing Challenges Traditional Legal and Technical Privacy Protection
Cloud computing and privacy are innately at odds. Privacy laws apply to one country; the public cloud, in its ideal form, is not related to any country. Privacy officers should not accept "no" for an answer when asking whether the processing of personal information in the cloud or abroad is allowed. Most privacy laws have some flexibility, guidance is evolving slowly and, in many cases, there are legally acceptable solutions.
Organizations should focus on the location of the legal entity of the provider, not on the physical locations of its operation centers. Privacy officers — and enterprise decision makers — should support IT's cloud and offshore initiatives where possible while achieving maximum privacy protection for the individual customer or employee. This will consume 20- 30 percent of the privacy officer's time.
4. The Value of Privacy Determines Necessary Protection, but It Is Difficult to Quantify
The value of privacy and the sensitivity of personal information are impossible to determine without context. Personal information has hardly any value or sensitivity. Rather, it depends on how data is being processed. There is no right or wrong. Finding the balance between "not enough" protection and "too much" protection is an ongoing process. Legal requirements are a bad guideline as they trail technical innovation and cultural change by several years.
Privacy officers should set up a process to identify stakeholders for personal information, gather requirements from them, influence the design of the business process and applications, and plan for adjustments. Once this process has been created, its execution should take the privacy officer no more than 10 percent of his or her time.
5. Regulatory Changes Are Imminent and Ongoing
Regulatory changes should not distract privacy officers from pursuing their strategies, because most regulatory changes will only have a mid- to long-term effect. Absent of any specific laws or regulatory guidance, organizations must interpret existing, generic privacy legislation for emerging technologies like smart meters, indoor positioning, facial recognition on smartphones correlated to photo databases, vehicle and device locators, presence detection, body scanners, and others.
Monitoring of regulatory changes and, consequently, adjusting the organization’s privacy strategy are important tasks, but they should consume more than 5-10 percent of the privacy officer’s time.
More information can be found at www.CRMindustry.com