TOTAL: {[ getCartTotalCost() | currencyFilter ]} Update cart for total shopping_basket Checkout

Privacy Tech | This new privacy methodology makes data protection more science than art Related reading: Demystifying Privacy Engineering

rss_feed

""

Editor's Note:

Michele Drgon, Michael Willet and Gail Magnuson all contributed to this blog post and the OASIS Privacy Management Reference Model and Methodology.

We have worked on data privacy policy and practices issues since the 1980s when virtually all personal information was created from manual paper collection processes and keys punched into mainframe systems. How times have changed!

Over the past four decades, we have seen global technological innovation and disruptive business models. But from a privacy perspective, this disruption has outstripped the ability of business owners, government agencies, and IT engineers and developers to confidently deliver the data protection obligations expected by regulators, consumers, and citizens in online and backend systems.

Obviously, some of this was inevitable given the speed of change and the frenetic adoption of disruptive technologies; initially networked computing, then the web, mobile devices, networked apps, the cloud, and then big data. But a huge factor suppressing the deployment of strong privacy compliant systems has also been the lack of standardization among inconsistent privacy practices and principles contained in scores of international laws, regulations, and codes of practice and the flows of personal information across applications, systems, and geo boundaries.

Of course, in the abstract, data protection seems so clear and universal: Collection limitation, data quality, purpose specification, use limitation, security safeguards, openness, individual participation, accountability were all clearly laid out by the OECD in 1980. But an examination of international privacy instruments carried out from 2007 until now  illustrates some of the challenges that flow from inconsistent policies and definitions.

Now the EU General Data Protection Regulation — with its enhanced focus on processing roles and expanded principles, including the right to be forgotten, erasure and accountability — establishes additional definitions and terminology, coupled with a strengthened data protection regulatory regime. However, the new GDPR operates on the existing global data environment rife with incredible technical and application complexity.

So how can we approach this problem of delivering privacy-compliant, accountable systems and applications in the global data sphere? Can data protection become less a practice of “art” and more a practice of “science,” truly enabling the GDPR and other regulatory and business policy mandates to have a genuine impact on operational data privacy delivery?

One piece of the solution is to have models, methodologies, and tools that enable the analysis of policy and privacy control expectations against the actual systems that carry the personal information and personally identifying information; that is, models, methodologies, and tools that are usable across the privacy stakeholder community, empowering regulators, privacy officers, business owners, system engineers, and data subjects to understand and manage privacy in defined systems and applications.

The OASIS Privacy Management Reference Model and Methodology is a specification that can make explicit the linkages between policy and privacy control requirements and the actual personal information, data flows, and implementing-functionality in defined system and application use cases or user stories. 

As noted in the PMRM abstract, it provides a model and a methodology to:

  • understand and analyze privacy policies and their privacy management requirements in defined Use Cases; and
  • select the technical Services, Functions and Mechanisms that must be implemented to support requisite Privacy Controls.

It is particularly valuable for use cases in which personal information flows across regulatory, policy, jurisdictional, and system boundaries.

The power and the value of the PMRM to each stakeholder, whether privacy officer, business owner, developer, regulator, or data subject, lies in executing a series of specific tasks that move from initially establishing high-level descriptions (and boundaries) of a particular use case, to exposing greater levels of specificity, including personal information, data flows, domains and domain owners, privacy controls and their supporting services, functionality, and mechanisms. The PMRM incorporates iterative risk analysis that focuses on the expected and actual operation of the functionality put in place to make privacy delivery a reality. The outcome of this final step is a Privacy Management Analysis that links together the policies, personal information, controls, and procedural and technical service delivery functionality.  

The product is an artifact that can make clear just what data protection controls are expected — and what is delivered – in any system or application. 

Notably, the PMRM can be a key enabler to achieve privacy and data protection by design and default. It can be used by privacy officers to certify the operational readiness of a system to meet their data protection mandates, by system and privacy engineers to understand their development requirements, and by regulatory authorities who require accountable privacy systems. And it can be used to ensure that individual users and data subjects have confidence that their privacy agreements and expectations are being honored. 

We encourage you to download the PMRM, read it through, and apply it to your use case or user story in which data protection is a requirement.

photo credit: 53Kevin 5373193566778866178 via photopin (license)

1 Comment

If you want to comment on this post, you need to login.

  • comment Jason Cronk • Dec 19, 2016
    Thanks for this John (and Gail and others). I'm using the PMRM process to establish a baseline model for Retail shopping use case. It's looking promising so far but there is much work to do. I encourage anyone interested in collaborating on this effort to reach out to me. Drop me a message at http://enterprivacy.com/contact/ 
    
    -Jason (@privacymaverick)