OneTrust_Square Banner_300x250_DD_ROS_01_19

In February of this year, President Obama issued an Executive Order on Improving Critical Infrastructure Cybersecurity. The Executive Order directed the National Institute of Standards and Technology (NIST) to develop a Cybersecurity Framework to assist owners and operators of critical infrastructure in addressing cybersecurity risks. On October 29, NIST published a preliminary version of the Framework (the “Preliminary Framework”), which is open for public comment through December 13. NIST intends to issue a final version in February 2014. The creation of the framework has, of course, been a major development in the information security community – according to NIST Director Patrick Gallagher, approximately three thousand individuals have been involved to date in the development of the Preliminary Framework. But privacy professionals should be paying attention to the framework as well.

The Executive Order directs NIST to include “methodologies . . . to protect individual privacy and civil liberties.” To that end, Appendix B of the Preliminary Framework sets forth a draft Methodology to Protect Privacy and Civil Liberties for a Cybersecurity Program (“Privacy Methodology”) based on the Fair Information Practice Principles and organized to track the content of the Framework Core (the part of the framework that describes the elements expected to be present in a cybersecurity program). Notably, for almost every category of cybersecurity outcome identified in the Framework Core, the draft Privacy Methodology describes a corresponding set of privacy practices. The following are examples of how the draft proposes to tie privacy practices to cybersecurity activities:

Data Security: “Implement safeguards at all states of PII’s [personally identifiable information’s] lifecycle within the organization and proportionate to the sensitivity of the PII to protect against loss, theft, unauthorized access or acquisition, disclosure, copying, use or modification.”

Information Protection Processes and Procedures: “Securely dispose of, de-identify, or anonymize PII that is no longer needed. Regularly audit stored PII and the need for its retention.”

Protective Technology: “Audit access to databases containing PII. Consider whether PII is being logged as part of an independent audit function, and how such PII could be minimized while still implementing the cybersecurity activity effectively.”

And the Preliminary Framework’s definition of PII is fairly broad:

Information which can be used to distinguish or trace an individual’s identity such as the individual’s name, social security number, biometric records, etc., alone, or when combined with other personal or identifying information which is linked or linkable to a specific individual, such as date and place of birth, mother’s maiden name, etc.

As these examples indicate, the draft Privacy Methodology has taken a very expansive view of how organizations should approach and address the privacy implications of cybersecurity operations. Whether or not the proposal changes between now and Feburary 2014, what does the inclusion of privacy and civil liberties ultimately mean for organizations that adopt the final Cybersecurity Framework and for the privacy professionals that work for those organizations? There are at least two significant implications:

  • A significant role for the privacy function. Because the Executive Order requires the framework to include methodologies to protect privacy, privacy professionals will be called upon to guide and support implementation of the framework through the Privacy Methodology.
  • A potentially very significant challenge for organizations using the framework: Organizations that adopt the Framework will have to take steps to align their privacy policies, procedures and practices with the Privacy Methodology. Depending on the scope and approach of the final Privacy Methodology, that may be a substantial undertaking.

Once the framework is finalized in February, the federal government will offer incentives for organizations to adopt it, and the framework is likely to be influential beyond the industries deemed critical infrastructure. Government agencies may work with the insurance industry to develop underwriting practices that encourage adoption of cybersecurity measures. Procurement programs will likely favor those organizations that adopt the framework. Adoptees may be afforded liability limitations. And as organizations adopt the framework, they will likely favor doing business with those organizations that have also adopted the framework, which means that organizations outside critical infrastructure will be incentivized to adopt it. 

Even without voluntary adoption, the framework may end up becoming part of the regulatory structure. In August, the Administration’s Cybersecurity Coordinator wrote that “agencies will recommend [ways to] make compliance easier, for example: eliminating overlaps among existing laws and regulation, enabling equivalent adoption across regulatory structures.” As agencies take steps to embed the framework into their programs, the framework could end up establishing a comprehensive privacy framework for cybersecurity operations. Because organizations may find it difficult to implement the framework’s privacy methodologies only for cybersecurity operations, the Privacy Framework could become a de facto set of standards for handling PII.

As mentioned above, the Framework is now open for public comment. NIST has announced that there will be a Cybersecurity Framework workshop November 14-15, and privacy is on the agenda. Organizations have until December 13 to assess the Framework and direct their comments to NIST, which has indicated that it welcomes input on the Privacy Methodology. The comment period provides organizations with an opportunity to voice their suggestions on practical ways to address the role of privacy considerations in the Framework.

Written By

Harriet Pearson, CIPP/US

Written By

Hogan Lovells


If you want to comment on this post, you need to login.


Board of Directors

See the esteemed group of leaders shaping the future of the IAPP.

Contact Us

Need someone to talk to? We’re here for you.

IAPP Staff

Looking for someone specific? Visit the staff directory.

Learn more about the IAPP»

Daily Dashboard

The day’s top stories from around the world

Privacy Perspectives

Where the real conversations in privacy happen

The Privacy Advisor

Original reporting and feature articles on the latest privacy developments

Privacy Tracker

Alerts and legal analysis of legislative trends

Privacy Tech

Exploring the technology of privacy

Canada Dashboard Digest

A roundup of the top Canadian privacy news

Europe Data Protection Digest

A roundup of the top European data protection news

Asia-Pacific Dashboard Digest

A roundup of the top privacy news from the Asia-Pacific region

Latin America Dashboard Digest

A roundup of the top privacy news from Latin America

IAPP Westin Research Center

Original works. Groundbreaking research. Emerging scholars.

Get more News »

IAPP Communities

Meet locally with privacy pros, dive deep into specialized topics or connect over common interests. Find your Community in KnowledgeNet Chapters, Sections and Affinity Groups.

IAPP Job Board

Looking for a new challenge, or need to hire your next privacy pro? The IAPP Job Board is the answer.

Join the Privacy List

Have ideas? Need advice? Subscribe to the Privacy List. It’s crowdsourcing, with an exceptional crowd.

Find a KnowledgeNet Chapter Near You

Talk privacy and network with local members at IAPP KnowledgeNet Chapter meetings, taking place worldwide.

Find more ways to Connect »

Find a Privacy Training Class

Two-day privacy training classes are held around the world. See the complete schedule now.

The Privacy Core™ Library Has Evolved

Privacy Core™ e-learning essentials just expanded to include seven new units for marketers. Keep your data safe and your staff in the know!

Online Privacy Training

Build your knowledge. The privacy know-how you need is just a click away.

Upcoming Web Conferences

See our list of upcoming web conferences. Just log on, listen in and learn!

Train Your Team

Get your team up to speed on privacy by bringing IAPP training to your organization.

Let’s Get You DPO Ready

There’s no better time to train than right now! We have all the resources you need to meet the challenges of the GDPR.

Learn more »

CIPP Certification

The global standard for the go-to person for privacy laws, regulations and frameworks

CIPM Certification

The first and only privacy certification for professionals who manage day-to-day operations

CIPT Certification

The industry benchmark for IT professionals worldwide to validate their knowledge of privacy requirements

FIP Designation

Recognizing the advanced knowledge and issue-spotting skills a privacy pro must attain in today’s complex world of data privacy.

Certify Your Staff

Find out how you can bring the world’s only globally recognized privacy certification to a group in your organization.


The IAPP’S CIPP/E and CIPM are the ANSI/ISO-accredited, industry-recognized combination for DPO readiness. Learn more today.

Learn more about IAPP certification »

Are You Ready for the GDPR?

Check out the IAPP's EU Data Protection Reform page for all the tools and resources you need.

IAPP-OneTrust PIA Platform

New U.S. Government Agency privacy impact assessments - free to IAPP members!

IAPP Communities

Meet locally with privacy pros, dive deep into specialized topics or connect over common interests. Find your Community in KnowledgeNet Chapters, Sections and Affinity Groups.

Privacy Vendor List

Find a privacy vendor to meet your needs with our filterable list of global service providers.

More Resources »

Europe Data Protection Intensive 2017

The Intensive is sold out! But cancellations do happen—so hurry and get on the wait list in case more seats become available.

Global Privacy Summit 2017

The world’s premier privacy conference returns with the sharpest minds, unparalleled programs and preeminent networking opportunities.

Canada Privacy Symposium 2017

The Symposium returns to Toronto this spring and registration has opened! Take advantage of Early Bird rates and join your fellow privacy pros for another stellar program.

The Privacy Bar Section Forum 2017

The Privacy Bar Section Forum is sold out! But you can still add your name to the wait list, and we'll keep in touch about your status. Good luck!

Asia Privacy Forum 2017

Call for Speakers open! Join the Forum in Singapore for exclusive networking and intensive education on data protection trends and challenges in the Asia Pacific region.

Privacy. Security. Risk. 2017

Call for Speakers open! This year, we're bringing P.S.R. to San Diego. Submit today and be a part of something big! Submission deadline: February 26.

Europe Data Protection Congress 2017

Call for Speakers open! The Congress is your source for European policy debate, multi-level strategic thinking and thought-provoking discussion. Submit a proposal by March 19.

Sponsor an Event

Increase visibility for your organization—check out sponsorship opportunities today.

More Conferences »

Become a Member

Start taking advantage of the many IAPP member benefits today

Corporate Members

See our list of high-profile corporate members—and find out why you should become one, too

Renew Your Membership

Don’t miss out for a minute—continue accessing your benefits

Join the IAPP»