Many companies are currently unsure whether their IT security measures and any existing ISMS already meet data protection requirements. Depending on the environment, companies must comply with the Swiss DPA, the GDPR and other industry-specific requirements. In our series of articles on privacy, we answer the following questions:
The aim of privacy, as formulated in the Swiss Data Protection Act, is to"protect the personality and fundamental rights of persons about whom data is processed". The aim of information security is to protect information. The two topics are not identical, but they fit together perfectly: Information security learns through the conceptual work in privacy to better understand what protection needs it has to fulfill.
Privacy also raises the question of what data is collected and for what purpose. Privacy therefore has an influence on the definition of the business process and the service to be provided (what is collected, why and for what purpose). Ultimately, the specialist areas work hand in hand: the process must meet the requirements of privacy; information security must protect both the process and the data. One is not possible without the other.
ISO defines a"Privacy Framework" in standard 29100:2011. It provides a basic framework and terminology for dealing with PII. The latter - Personally Identifiable Information - refers to all forms of data that make a person identifiable, but also allow conclusions to be drawn about their behavior or personal situation. The wording is deliberately left open at this point. The standard itself contains longer explanations on how planners can identify the relevant data in their project.
For example, PII can be a credit card, telephone or customer number and associated transaction data that can be assigned to a person. It is irrelevant whether this person is your own customer. The data you have about your customers' employees or customers' customers can also be relevant. For an IT service provider, its ticketing system can therefore become relevant as soon as such data is copied into a ticket without being asked.
The standard divides data processing into four entities, as shown in the following diagram. The PII Principal is the natural person who becomes identifiable. The PII Controller decides why the data must be collected and processed and also how. From a legal perspective, he is responsible for compliance with the regulations.
A PII Controller may also designate a PII Processor as a deputy to carry out the data processing in its place or in support of its instructions. The three entities mentioned above are fully interconnected, i.e. PII can flow freely back and forth.
It is irrelevant whether the PII Principal has a contractual relationship with the PII Controller or PII Processor, because ultimately they are both responsible for all PII they have, regardless of the incoming channel, and both must ensure that they act in accordance with the agreed guidelines. It must therefore also be clarified what happens if unsolicited data is sent to you via third parties.
All3rd parties are also relevant, as they receive PII and may process it, but do not act in accordance with the instructions of the PII controller. They set up their own privacy framework and thus become PII controllers themselves - albeit without the insight of the first, original PII controller.
This means that the PII can run through a chain of privacy frameworks until it finally ends up somewhere where neither the original PII controller nor the PII principal knows exactly how it is processed. Anyone who promises their customers strong privacy protection should therefore consider from the outset which third parties should be involved and, above all, why.
The PII Controller is responsible for deciding why and how PII is processed. As part of the decision to handle the processing, it is also responsible for applying the"privacy principles " from the ISO 29100:2011 standard:
The PII Controller must ensure that the relevant specialists and business managers are familiar with these principles. He is also responsible for ensuring that the guidelines and decisions are documented and that the assigned PII Processors implement them.
These eleven privacy principles have no direct equivalent in IS. Decisions on confidentiality, integrity and availability do not per se mean a decision on the desired protection of PII principals.
Rather, the privacy principles are something that must be applied in parallel to information security. They must be determined and assessed separately. In a project, both the requirements of IS and privacy must be taken into account and coordinated with each other.
The next article in our blog series will show how aPrivacy Impact Assessment (PIA)can be used to identify and assess these requirements in a structured manner.