PDF Privacy, regulations, and cybersecurity: the essential business guide 1st edition edition chris

Page 1


Visit to download the full and correct content document: https://ebookmass.com/product/privacy-regulations-and-cybersecurity-the-essential-b usiness-guide-1st-edition-edition-chris-moschovitis/

More products digital (pdf, epub, mobi) instant download maybe you interests ...

Smart

Cities Cybersecurity and Privacy Danda B. Rawat

https://ebookmass.com/product/smart-cities-cybersecurity-andprivacy-danda-b-rawat/

Medical Device Regulations: A Complete Guide Aakash

Deep

https://ebookmass.com/product/medical-device-regulations-acomplete-guide-aakash-deep/

The Essential Entrepreneur: What It Takes To Start, Scale And Sell A Successful Business 1st Edition

Richard Turner

https://ebookmass.com/product/the-essential-entrepreneur-what-ittakes-to-start-scale-and-sell-a-successful-business-1st-editionrichard-turner/

CIPM Certified Information Privacy Manager All-in-One Exam Guide 1st Edition Gregory

https://ebookmass.com/product/cipm-certified-information-privacymanager-all-in-one-exam-guide-1st-edition-gregory/

The Essential Pocket Guide for Clinical Nutrition

Second Edition

https://ebookmass.com/product/the-essential-pocket-guide-forclinical-nutrition-second-edition/

Data Privacy And GDPR Handbook 1st Edition Edition

Sanjay Sharma

https://ebookmass.com/product/data-privacy-and-gdpr-handbook-1stedition-edition-sanjay-sharma/

Cybersecurity and Cognitive Science 1st Edition Ahmed Moustafa

https://ebookmass.com/product/cybersecurity-and-cognitivescience-1st-edition-ahmed-moustafa/

The Essential Neurosurgery Companion 1st Edition

https://ebookmass.com/product/the-essential-neurosurgerycompanion-1st-edition/

Why Privacy Matters 1st Edition Neil Richards

https://ebookmass.com/product/why-privacy-matters-1st-editionneil-richards/

PRIVACY, REGULATIONS, AND CYBERSECURITY

REGULATIONS, AND CYBERSECURITY

THEESSENTIALBUSINESSGUIDE

ChrisMoschovitis

Copyright©2021byChrisMoschovitis.Allrightsreserved.

PublishedbyJohnWiley&Sons,Inc.,Hoboken,NewJersey.

PublishedsimultaneouslyinCanada.

Nopartofthispublicationmaybereproduced,storedinaretrievalsystem,ortransmittedin anyformorbyanymeans,electronic,mechanical,photocopying,recording,scanning,or otherwise,exceptaspermittedunderSection107or108ofthe1976UnitedStatesCopyright Act,withouteitherthepriorwrittenpermissionofthePublisher,orauthorizationthrough paymentoftheappropriateper-copyfeetotheCopyrightClearanceCenter,Inc.,222 RosewoodDrive,Danvers,MA01923,(978)750-8400,fax(978)646-8600,orontheWebat www.copyright.com.RequeststothePublisherforpermissionshouldbeaddressedtothe PermissionsDepartment,JohnWiley&Sons,Inc.,111RiverStreet,Hoboken,NJ07030,(201) 748-6011,fax(201)748-6008,oronlineatwww.wiley.com/go/permissions.

LimitofLiability/DisclaimerofWarranty:Whilethepublisherandauthorhaveusedtheirbest effortsinpreparingthisbook,theymakenorepresentationsorwarrantieswithrespecttothe accuracyorcompletenessofthecontentsofthisbookandspecificallydisclaimanyimplied warrantiesofmerchantabilityorfitnessforaparticularpurpose.Nowarrantymaybecreatedor extendedbysalesrepresentativesorwrittensalesmaterials.Theadviceandstrategiescontained hereinmaynotbesuitableforyoursituation.Youshouldconsultwithaprofessionalwhere appropriate.Neitherthepublishernorauthorshallbeliableforanylossofprofitoranyother commercialdamages,includingbutnotlimitedtospecial,incidental,consequential,orother damages.

Forgeneralinformationonourotherproductsandservicesorfortechnicalsupport,please contactourCustomerCareDepartmentwithintheUnitedStatesat(800)762-2974,outsidethe UnitedStatesat(317)572-3993,orfax(317)572-4002.

Wileypublishesinavarietyofprintandelectronicformatsandbyprint-on-demand.Some materialincludedwithstandardprintversionsofthisbookmaynotbeincludedine-booksorin print-on-demand.IfthisbookreferstomediasuchasaCDorDVDthatisnotincludedinthe versionyoupurchased,youmaydownloadthismaterialathttp://booksupport.wiley.com.For moreinformationaboutWileyproducts,visitwww.wiley.com.

LibraryofCongressCataloging-in-PublicationDataisAvailable:

ISBN9781119658740(hardback)

ISBN9781119660118(ePub) ISBN9781119660149(ePDF)

Coverimage:©YuichiroChino/GettyImages,©dem10/GettyImages

Coverdesign:Wiley 10987654321

FOREWORDvii

PREFACEix

ABOUTTHEAUTHORxiii

ACKNOWLEDGMENTSxv

PARTONE— Privacy1

CHAPTER 1 UnderstandingPrivacy3

CHAPTER 2 A(Very)BriefHistoryofPrivacy9

CHAPTER 3 TheLegalCaseforPrivacy(theFinerPrint)21

PARTTWO— Regulations45

CHAPTER 4 IntroductiontoRegulations47

CHAPTER 5 NorthAmericanRegulations57

CHAPTER 6 EuropeanRegulations89

CHAPTER 7 Asia-PacificRegulations119

CHAPTER 8 AfricanRegulations145

CHAPTER 9 SouthAmericanRegulations161

PARTTHREE— PrivacyandCybersecurity171

CHAPTER 10 IntroductiontoCybersecurity173

CHAPTER 11 ACybersecurityPrimer181

CHAPTER 12 Privacy-CentricCybersecurityProgramOverview205

CHAPTER 13 PrivacybyDesignOverview221

CHAPTER 14 CoverYourAssets!235

CHAPTER 15 ThreatAssessment261

CHAPTER 16 Vulnerabilities275

CHAPTER 17 Environments287

CHAPTER 18 Controls301

CHAPTER 19 IncidentResponse321

CHAPTER 20 WelcometotheFuture!Now,GoHome!341

BIBLIOGRAPHY359

INDEX377

FOREWORD

Youwillneverdoanythinginthisworldwithoutcourage. Itisthegreatestqualityofthemind,nexttohonor. —Aristotle

Businessestodayarefacedwithincreasingdemandsforprivacyprotections,ever-morecomplexregulations,andongoingcybersecuritychallenges thatplaceheavydemandsonscarceresources.Duringthesedifficulttimesitis importantthatwehavethecouragetoproactivelydealwiththeseimperatives. Thisbookisanessentialtoolforanybusinessexecutivewhoneedstoorchestratethe“handshake”betweenprivacy,security,andongoingregulations.Oh yes,andcourage.

Afewyearsago,Ireturnedtooneofmypassions—security—whenItook overastheleaderofabusinessintheeasternUS.Theselastthreeyearshave beenchallengingbutexciting,andIhaveseenanunprecedentedlevelofinterestbybusinessexecutivesinprivacyandsecurity.Ihavemademoreboard presentationsandbeeninmoremeetingswiththeC-suiteonthesetopics inthelastthreeyearsthanthetenyearsbeforethatcombined.WhenIwas appointedtotheboardoftheISACA(InformationSystemsAuditandControlsAssociation),Iwasthrilledattheopportunitytomakesignificantchange inthesecurityprofession.ButIexpectedtoomuchtoosoon,andtheboard’s messageaftermyfirstpresentationwasclear:“Weneedmoreresearchonthe conceptofinformationsecuritymanagementandhowsecurityisviewedby executivesbeforewemakeanyinvestments.”

Itwasearlyinthenewmillennium,andsecuritywasbecomingatopic ofconversationintheexecutivesuite.EventhoughthefirstCISOhadbeen appointedatCitiin1995,thebodyofknowledgeforsecuritywasdefinedby technicalandproduct-specificcertificationswithnoframeworkstosupport organizations,andprivacyregulationssuchasGDPRwerestilljustadistant thought.

Atthattime,IhadmademyrecommendationtotheboardoftheISACA todrivethesettingof“commonbodyofknowledge”ofthefutureCISO.Ihad astrongbeliefthattherewaswideracceptanceoftheroleanditsimportance inprotectingtheorganization.

Maybeitwasaturningpoint,butseveraleventscametogetherearly inthenewmillenniumtoreinforcethisbelief.“ILOVEYOU”infected millionsofcomputers,followedbythefirstcriminalconvictionofahacker, thewidespreaddisruptioncausedbydenial-of-serviceattacksonMicrosoft systems(andBillGates’sdecreethatMicrosoftproductswouldembed securityaspartoftheproduct),andaseriesofotherhigh-profilehacks.This wasexacerbatedbythefinancialcollapseofEnronanditsimpactonthetrust intheUSeconomicsystem.RegulationfollowedwiththeSarbanes-Oxley Actandmanyothersaroundtheglobe.Itwasanewworld,andthecontinued regulationaroundsecurityandprivacygainedmomentum.

ThatyearIbecamechairmanoftheboardofISACA,andthenewbody ofknowledgeaccompaniedbyacertification(CISM)waslaunched.The foundinggroupwasmadeupoffourdedicatedCISOs,andthecertification isstillthestandardforsecuritymanagementprofessionals.

WhichbringsmebacktomygoodfriendChris,withwhomIhaveformed aterrificbondovermutualinterests.Finefoodandwineandaconnection asfirst-generationGreekscementedourfriendship.Recently,wediscussed anddebatedmanytopics,includingtheneedforthoseexecutiveswhounderstandsecurityriskstotransformthatknowledgeintoactionaroundprivacy andsecurityaroundregulation.

IhavefoundChris’sintellectualcuriosityandsenseofhumortobeboth compellingandengaging.Thesetraitsareaperfectvehicletotakethereader onthisjourney,fromthefundamentalsofprivacytotheongoingregulatory pressuresandhowcompaniescanbebetterpreparedattheexecutivelevelto tacklethesechanges.

Chrisisabletointerpretcomplexprinciplesanddistillthemintoanatural flow,wherethereaderistakenonajourney.InHomer’s Odyssey,Circewarned Odysseusoftheimpendingperilssothathewouldbeprepared.Likewise, Chris’sbookpreparestheexecutivetobeawareoftheperilsandopportunities aheadandprovidesaroadmaponhowtoactwithcourageassecurityand privacyregulationscontinuetoproliferate.

Bepreparedanddotherightthingandnotjustbecauseofregulation—do itforyourcustomers,employees,shareholders,andeveryonewhoplacestrust inyouandyourcompany.Usethestep-by-stepapproachfromthisbook, soyouandyourcompanycanbereadyforwhateverchallengesthefuture mighthold.

Itistimetoact,andwiththisguideinhand,youarewellonyourjourney.

MariosDamianides

CyberSecurityLeader,Ernst&YoungLLP ChairoftheBoard,ISACA(2003–2005)

PREFACE

“What?I’vebeenworkinglikethisallmylife!Now,you’retellingmethat IhavetobeGDP … umm … GD-whatevercompliant?”

Myfriendandclient,animmigrationattorneyfromwaybackwhen “immigration”wasnotadirtyword,wasangry.Herpracticehadbeenvery successfulovertheyears,dealingwithallsortsofimmigrationissuesacross continents.Theproblemisthatsheisdoingbusinesswithcitizensofthe EuropeanUnion(EU).Worse,shehasapartnerinAthens,Greece,an EU-membercountry.

Fabulous!ShemustcomplywiththeGeneralDataProtectionRegulation oftheEU,betterknownbyitsacronym,GDPR.Forthoseofyoublissfully unawareofGDPR,itisalawpassedbytheEuropeanUnionin2016.Ithas far-reachingconsequencestobusinessesworldwide,includingyours!

Ifyouareabusinesspersonwho,likemyfriend,hasnoideawhereto beginwithGDPR,thenthisbookisforyou!Itisthesequelto Cybersecurity ProgramDevelopmentforBusiness:TheEssentialPlanningGuide (Wiley,2018), andjustlikethatbook,thisoneisdesignedwithyou,abusinessperson,in mind.In Cybersecurity,mygoalwastogiveyouenoughinformationsothat youwouldn’tbeatthemercyofexpertstalkingoveryourheadandaround yourbusinesswhenitcametocybersecurity.Initsintroduction,Iwrote:

Whatiftherewasabookthatputthewholecybersecuritythinginto perspective,usingsimple,directlanguage?Whatifthereweresections andchaptersexplainingwhatisgoingon,whattherisksare,andwhatall thetechnobabblereallymeans?And,whatifthebookhadastep-by-step, actionableapproachonwhatyoucandoaboutallthis?Abookthat aggregatedthecurrentbestpractices,puttheminperspective,injectedmy experienceandmyownpointofview,andhowIappliedallthisacrossall ourclients?

Allthewhilepokingalittlefunatourselves,too?

Thegoal,approach,andstyleremainthesame—onlythistime,the aimistotransformyourhard-earnedcybersecurityawarenessintoone thatisprivacy-centricandregulation-aware.Ifyou’reoneofthemany

businesspeopleouttherewhoarenewtoallthis,juststartingtoconfrontthe newcyberwarrealities,concernedaboutyoursandyourbusiness’privacy, andworriedthatsomeregulationwilldescendtolevyGodknowswhatkind offine,thenyou’reinluck!

Thisbookwillguideyouthroughallthisstep-by-step,section-by-section: privacy,regulations,andcybersecurity.We’llworkthroughthebasics together,aswellasreviewingcasestudiesandexamplesofbestpractices acrossdifferentindustriesanddifferentsizecompanies.

Justlikeinthefirstbook,whichIwillbereferencingfrequently,especially inPartThree,weneedacase-studydisclaimer:Thecasestudiesandexamples presentedthroughoutbothbooksareaggregatedfrommyownworkandfrom theworkofmanycolleagueswhoweregraciousenoughtosharetheirexperiences.Asyouwouldexpect,allnames,industries,andgeographieshavebeen changedtoprotecttheanonymityoftheseclients.Insomeofthecases,multipleproblemswerecombinedintoone.Inothers,manyassignmentswere brokenoutintoasingleone.Thegoalhasbeentodistilltheessentiallesson fromeachcasewhileprotectingtheidentityandrespectingtheprivacyand confidentialityofeveryclient.

Thereisafundamentaldifference,though,betweenthefirstbookandthis one.Thefirstbookdealtstrictlywiththepracticalandpragmaticdesignofa cybersecurityprogramwiththegoalofprotectingyourbusiness.Thisbook synthesizestwodistinct,diverse,andcomplexsegmentsintoaprivacy-firstand regulation-focusedcybersecurityprogram.Ifyoualreadyhaveacybersecurity programinplace,thenthisbookwillhelpyouhonewhat’salreadythereinto aprivacy-centricandregulation-compliantcybersecurityprogram.

Ifyoudon’thaveacybersecurityprograminplace,then wherehave youbeen?

Nevertheless,Iamgladyou’rewithusnow!Thisisyouropportunityto startbuildingacybersecurityprogramfromthebottomupthat,frominception,willbeprivacy-andregulation-compliant-focused.

Onemorethingbeforewediverightin:Justasitisimportantto understandwhatthisbookis,andwhoitisfor,itisequallyimportantto knowwhatitisnot.Thisisespeciallytruesincewewillbedealingwith topicsthatareatoncescholarly,legal,andtechnicalinnature.Thisbookis notintendedtobeanacademicanalysis,alegalbrief,oratechnicalhow-to manual,althoughitwillborrowandreflectworkfromallthesedisciplines.

Ifyou’relookingforthelatestscholarlybookonprivacy,anin-depthlegal treatmentoftheCaliforniaConsumerPrivacyAct,orhowtoconfigureyour firewall,thisbookisnotforyou!

Thisbookisintendedasapractical,pragmatic,andactionablebusiness guideforpeopleacrossindustriesandbusinesssizeswhoneedtounderstand whatallthistalkaboutprivacyreallymeans,whattheeffectofalltheselaws andregulationsare,andhowtoputitalltogetherinacybersecurityprogram toprotectwhat’sofvaluetothem.

Itreliesheavilyontheoutstandingworkofnumerousscholars,lawyers, andinformationtechnologyandcybersecurityprofessionals,withoutwhomit wouldnothavebeenpossibletowriteit.Youwillfindadetailedbibliography ofsourcesattheendofthebook,andIurgeyoutouseitanddigdeeperas youseefit.

Forme,eachoneofthesetopics,andespeciallyprivacy,representfascinatingareasofstudy.Privacyandcybersecurityforceustoconfrontquestions ofhowweaspeoplemanagedifficult,complexconceptsandhowwetranslate thoseconceptsintoactionablelawsandwaysofdoingbusiness.

ABOUTTHEAUTHOR

IwasborninAthens,Greece.Afterhighschool,IchosetocometotheUnited Statestostudyphysicsandcomputerscience.IdidthatattheStateUniversity ofNewYork,theCollegeatBrockport,inupstateNewYork.Myyearsat Brockportwereformativetomeasaperson,ascientist,andasaprofessional. WordsforthegratitudeandrespectIhaveforthededicatedfacultythatshaped mylifecaneasilyfillacoupleofbooks,butthatisforanothertime.

Aftergraduatingwithmybachelor’sdegreeinscience,Ibecamean instructorofcomputerscienceandacomputersystemsmanagerattheStratfordSchoolinRochester,NewYork.Followingbriefgraduateworkstints attheRochesterInstituteofTechnologyandtheUniversityofRochester, ImovedtoNewYorkCitytoserveasthedirectorofacademiccomputing atPrattInstitute.There,underthedirectionofthevicepresidentofinformationtechnology(therewereno“chiefinformationofficers”backthen), Iwasresponsibleforthebuildingandmanagementoffourcomputing centersofexcellence,eachfocusingonaspecificdiscipline(art,architecture, engineering,andinformationscience).Fromthere,Iwasrecruitedtobe thevicepresidentofinformationtechnologyattheO’ConnorGroup,areal estatemanageranddeveloperinNewYorkCity.Then,inthemiddleofthe ReaganRecession,Idecidedthattherewasnobettertimethanthepresent tostartmyowncompany,whichIdidin1989.

Ihavebeenrunningmyownfirmeversince,surroundedbypartnersand colleagueswhoteachmemoreandmoreeverysingleday,andtogetherwe deliverabroadspectrumofITconsultingservices.Ihavebeenprivileged topartnerwithgreatclients,toengageinfantasticprojectsofbusiness andtechnologytransformation,andtocollaboratewithteamsthatpush boundariesanddevelopincrediblebusinesssolutions.Ilivedthroughthe amazingadvancesincomputersciencethatarenowthestuffoflore:Iwas thereduringBitNet,sendingemailmessagesandwatchingthemessagehop fromnodetonode.Iwasamazedatformattingthefirst10MBharddisks ofIBM’snewpersonalcomputer.I’vefedendlessfloppiesinandoutofthe firstMacs.I’vebuiltmusclescarryingtheCompaq“Portable,”whichwas nicknamed“luggable”forgoodreason.I’vecarriedpagersandcellphones

thesizeofsuitcases.IsubscribedtoCompuServeandAOLandstillhavea workingHayes14.4modem.

Throughoutitall,Ihavealwaysbeenfascinatedbysecurity,privacy,and theprotectionofdata.Evenbefore“cybersecurity”wasaword,Iinsistedthat thesiteswedesignedandmanagedimplementedbusiness-appropriatecomputersecurityanddisasterrecovery.MaybeitwasbecauseGeorgeWhelan, apartnerofmineatthetime,wasacomputerviruscollector(hestillhas them).Maybe,becauseIremainculturallyGreek,naturallycautiousandprivate.Whateverthereason,Ialwaysasked,“Whathappensif‘this’getsout?” or“Howfastcanwebebackupandrunning?”Anyofmyconsultantswilltell youthatevennow,thefirstthingtheyaretaughtwhentheystartworkingfor meisthat“notcheckingthebackupisacareer-endingmistake.”

FollowingdecadesasapractitionerofbothITgovernanceandcybersecuritymanagement,IdecidedtomakeitofficialandjoinedInformation SystemsAuditandControlAssociation(ISACA),anindependent,nonprofit, globalassociationthatwasfoundedin1969,engagingin“Thedevelopment, adoptionanduseofgloballyaccepted,industry-leadingknowledgeandpracticesforinformationsystems.”JoiningISACAwasoneofthesmartestthings Ieverdid.ThroughIASCA,Igotcertifiedinthreeareas:Firstincybersecurity,becomingaCertifiedInformationSecurityManager(CISM),theninIT governance,becomingCertifiedinGovernanceofEnterpriseIT(CGEIT), andfinallyasaCertifiedDataPrivacySolutionsEngineer(CDPSE).

Notonetostandstill,andalwaysfascinatedbythebeautyincomplexity, Idecidedin2018tostudyprivacyanditsimplicationsonoursociety,business, andsystems.IsubsequentlyjoinedtheInternationalAssociationofPrivacy Professionals(IAPP).JustlikeISACA,theIAPPisanincrediblecommunity ofprivacyexpertsthathavededicatedtheirlifetothestudyandimplementationofsoundprivacyprinciples.Ifoundawelcomehomethereandendless resourcestohelpmeinmyjourneythathasledmehere,tothisbook,that Iamhumbledtosharewithyou.

Iamprivilegedtobeabletocontinuemyjourney,runningmyfirmtmgemedia,inc.,andtobesurroundedbyincredibleprofessionals,clients,and friendsthatteachmethevalueofhardwork,dedication,andloveeveryday.

ACKNOWLEDGMENTS

Everybookisalaboroflove.Thisoneisnodifferent.AfterIfinishedmy firstbaby, CybersecurityProgramDevelopmentforBusiness:TheEssentialPlanning Guide, IknewIwantedtowriteasecond,onespecificallyfocusedonPrivacy. Theinitialideawasunformedbutpersistent.Privacyintriguedme.The“P” wordwasusedpracticallydaily;legislatorswerepassinglawspretendingto preserveitwhilebusinesspeoplewereatalossaboutwhattodowithit.

IwasclearfromthebeginningthatIdidnotwanttowriteascholarly treatmentonprivacy.Better-equippedscholarsofmanystripeshaveproduced, andcontinuetoproduce,greatworksonthesubject.Myapproachwastobe similartothefirstbook:Whatdoweneedtoknowonprivacysothatwe canbeinformedascitizensandenabledasprofessionals?Moretoapragmatic point,howdoesallthisprivacylegislationaffectourcapacitytodesignand deliveraneffectivecybersecurityprogram?

Toanswerallthesequestions,Icameupwiththeformatforthisbook.It wouldhavethreedistinctparts:oneonprivacy;oneonregulations,worldwide; andoneonprivacy-centriccybersecurityprogramdevelopment.Thelatter wouldbebasedonthepreviousbookbutenhancedbyourunderstandingof privacy,notjustasaconceptbutasasetofconcreteregulatoryrequirements. Theresultisinyourhands!

Booksareneversolitaryefforts.Yes,theimageofthewritertoilingaway atherdeskday-in,day-outistrue,buttheauthorbringsauniverseofpeopleto paper.Samewithme.Overthecourseof31-plusyearsintheinformationtechnologyindustry,Ihavehadtheprivilegetomeethundredsofprofessionals, experts,partners,clients,andvendorswhohaveshapedmythinking,formed myexperiences,andhonedmyexpertise.Theirinfluenceisreflectedinthe pagesthatfollow.Theywrotethebookwithme.

Frommyoriginalpartnerinthebusiness,GeorgeWhelan,whoreligiouslycollectedandkeptlivecomputervirusesonfloppydisks,toinstructors suchasJayRanade,whohasforgottenmorethanI’lleverknow,toclientswho partneredwithmeandstaffwhotirelesslyworkedtosolveproblems,Iowe eachoneadebtofgratitudethatnoacknowledgmentcandojustice.

Still,Imuststartsomewhere,andtherightplacetostartiswithanapology formyomissions.Theyareentirelymyown.

Next,Iwanttoacknowledgeadebtofgratitudetomyclients,mytrue partnerstosuccess.Everyday,Iamhonoredandprivilegedtobeyourally andtocontributetoyourgoals.Iamconstantlyhumbledbyallthethings thatyouteachmeeveryday.IwouldberemissifIdidn’tsingleoutthe Hoffmanfamily,Andrew,Mark,andSteve,whohavebeenloyalsupporters andmentorssinceIstartedthefirm31yearsago;thefoundingpartnersat AllegaertBergerandVogel,Chris,David,andMichael,fortheirtrustinme, theirloyalty,andwisecounselthroughthickandthin;theamazingteamat Kapitusforteachingmeandmyteamhowtojumpontoarushingfreight train;andtoVigdisEriksenatEriksenTranslationsforhertrustinusandfor herfeedbackthatmakesusbettereveryday!

Inthesamebreath,Iwanttothankmyownpartnersandassociates,whose incredibleexpertise,loyalty,dedication,skills,empathy,andpersonalengagementmakemyandourclients’successpossible.Theyare,alphabetically: AnnaMurray,AtsushiTatsuoka,DanielleChianese,DoelRodriguez,Frank Murray,GregAndrews,JamesRich,JustinSchroeder,LeonTchekmedyian, PedroGarrett,ThomasHussey,TylerRaineri,andYeimyMorel.Thankyou fortheprivilegeofworkingwithyou,forallyoudo,dayandnight,andfor allowingmetoshutmydoorandwrite,write,write!Youmadethispossible! Wheneverthereisabook,thereisaneditorandapublisher.Ihavebeen theluckiestofauthorstohavethebestinboth.First,myeternalgratitude totheone-and-only,walk-on-water-on-her-bad-days,amazingHilaryPoole, myeditor,coauthor,andfriendofcountlessyearsandjustasmanybooks. Hilary,youareamazing!Iabsolutelyrefusetogonexttoakeyboardunless Iamreassuredthatyou’lledittheoutcome.Thankyou!

DeepestthankstoeveryoneatJohnWiley&Sons,oneofthemostprofessionalandexceptionalpublishersintheworld,andespeciallytomyexecutive editor,SheckCho,captainandcommanderextraordinaireandSusanCerra, theproject’smanagingeditor!Thisbookisasmuchyoursasitismine,and Iamgratefulforallyourhelp,guidance,andsupport.

Toalltheprivacy,cybersecurity,andgovernanceprofessionalsaround theworld,workingtirelesslyinthefield,inacademia,inresearchinstitutions,ingovernmentagencies,andmilitaries,thisbookpalesincomparisonto yourachievementseveryday.Icannotemphasizethisenough:Withoutyour

endlesseffortsinbreakingnewground,expandingandenhancingourscientificunderstanding,andguidingusthroughthemaze,wewouldbelost.All yourworksrepresentthelighthousesthathelpsusnavigate,andifIaspireto anything,itisforthisbooktoaidinreflectingyourlight,interpretingyour guidance,andaddingwindtothesails.

Tothemanyinternationalorganizationsthathelpallpractitionerslearn, hone,andapplytheircraft,aswellasdeveloptheframeworkswedependon, mygratitudeforyourongoingcontributions,tirelesscuration,andunending support.ImustparticularlysingleoutCERT,ENISA,IAPP,ISACA,(ISC)2 , ISECOM,ISO,ISSA,NIST,NSA,OECD,OWASP,andSANS,withmy apologiesforomittingthemanyotherdeservingorganizationsworldwide.My specificthankstoIAPPandISACAfortheircontinuoussupportandendless resources.TheISACANewYorkchapterremainsahomeawayfromhome formeandcountlessprofessionalsintheNewYorkmetroarea.

Tothemanyfriendswhosupportedmeinsomanyways,through encouragement,advice,andlove:JeanneFrank,Iknowyou’rewatchingfrom Heaven!Youwererightaboutthebook!AlexandMari,RichieandCharlene, Sherryl,Sotos,DimitrisandKoralia,andlastbutnotleast,Madina,my princessIndira,andmyprinceKamron:Idon’tknowwhatIdidtodeserve anyofyou,butIcan’timaginelifewithoutyou!Thankyou!

Finally,toAnnaMurray,anamethatkeepsonrepeatingintheseacknowledgmentsbutfromwhereIsit,notenough!Youarethemostbrilliant,expert, capable,tenacious,fierce,loving,accepting,andgivingperson,amazingprofessional,andtalentedwriterIknow!EverydayIthankmyluckystarsthat broughtyoutomylifeasmypartnerinthebusinessandmypartnerinlife. Youare,andalwayswillbe,thebrighteststarinthedarkofnight,guidingme home.Thankyou!

CHAPTER 1 Understanding Privacy

Benevixit,benequilatuit.

IncaseyourLatinisrusty,Ovid’squoteabovetranslatesto:“Tolivewell istoliveconcealed.”Myinterpretationisdifferent:“Tolivewellistolivein privacy.”

Butlet’snotgetaheadofourselveshere.What,exactly,is privacy?What doesitmean?Whatdoweunderstandwhenwedescribesomethingas “private”?

Dowemean secret? Issomethingprivatealsosecret?Certainly,thereverse isnottrue:wecanhavemanysecretsthatarenotprivate!Theymaybesecrets ofothers,secretnegotiations,secretdeals,andsoon.

Dowemean personal? Isitdatacoupledwithourpersonhood?Ifso,isall personaldataprivate?Whataboutourname?Aretheredegreesofprivacy?

Definingprivacyhaspuzzledmindsfargreaterthanmine,andthedefinitionsforprivacyhavebeenjustasgrandanddiverse.Let’sstartwithour perennialfriendsatMerriam-Webster.Theydefineprivacyas:

—Ovid,Tristia

4PRIVACY,REGULATIONS,ANDCYBERSECURITY

1.a:thequalityorstateofbeingapartfromcompanyorobservation: SECLUSION

b:freedomfromunauthorizedintrusion

2.a:SECRECY

b:aprivatematter:SECRET

3.archaic:aplaceofseclusion

The OxfordEnglishDictionary,ontheotherhand,definesprivacyas:

1.Astateinwhichoneisnotobservedordisturbedbyotherpeople. 1.1Thestateofbeingfreefrompublicattention.

And,oneofmyfavorites,Wiktionary’sdefinition,coversallthebases, albeitsometimescyclically:

1.Thestateofbeingsecludedfromthepresence,sight,orknowledge ofothers.

2.Freedomfromunwantedorunduedisturbanceofone’sprivatelife.

3.Freedomfromdamagingpublicity,publicscrutiny,surveillance, anddisclosureofpersonalinformation,usuallybyagovernment oraprivateorganization.

4.(obsolete)Aplaceofseclusion.

5.(obsolete,law)Arelationshipbetweenpartiesseenasbeingaresult oftheirmutualinterestorparticipationinagiventransaction,contract,etc.;Privity.

6.(obsolete)Secrecy.

7.(obsolete)Aprivatematter;asecret.

Nottobeleftout,ofcourse,isthelegaldefinitionofprivacy. Black’sLaw Dictionary definesprivacyas:

Therightthatdeterminesthenoninterventionofsecretsurveillance andtheprotectionofanindividual’sinformation.Itissplitinto 4categories:

1.Physical:Animpositionwherebyanotherindividualisrestricted fromexperiencinganindividualorasituation;

2.Decisional:Theimpositionofarestrictionthatisexclusivetoan entity;

3.Informational:Thepreventionofsearchingforunknowninformation;and

4.Dispositional:Thepreventionofattemptsmadetogettoknowthe stateofmindofanindividual.

It’sworthwhiletopayattentiontothosefourcategories:physical,decisional,informational,anddispositional.We’llbereturningtothoseinmore detailwhenwetakeonthemeaningsofprivacyforyourbusiness.

It’snotthatIhavesomethingtohide, IhavenothingIwantyoutosee.

Definitionsofprivacyhaveevolvedovertime,andourunderstandingof theconceptisconstantlychanging.Therefore,itwouldbenaivetoassume thatPrivacywithacapitalPcanberenderedviaalegaldefinition,complexor not,oradictionaryentry.

Privacyhasbeen,andremains,thesubjectofrigorousacademicstudy. Anthropology,sociology,psychology,history,andotherdisciplineshavebeen lookingintotheconceptanddevelopingtheirowndefinitionsandmodelsto describePrivacy.

Itisclearlyoutofscopeforthisbooktogetintodetailsontheacademic researchonprivacyordoaliteraturereview.Forourpurposesafewdrops fromtheoceanwillsuffice.

6PRIVACY,REGULATIONS,ANDCYBERSECURITY

ThetwogiantsinprivacyresearchareconsideredtobeAlanWestin (1929–2013),professorofpubliclawandgovernmentatColumbiaUniversity,andIrwinAltman(1930),professorandchairmanofthePsychology DepartmentoftheUniversityofUtah,nowemeritus.

Westin’sbook PrivacyandFreedom (1968)isconsideredtobethefoundationaltextonthesubject.Westindefinesprivacyasfollows:

Privacyistheclaimofindividuals,groups,orinstitutionstodetermine forthemselveswhen,how,andtowhatextentinformationaboutthem iscommunicatedtoothers.

Westingoesontodescribefourstatesofprivacy,andfourfunctions orpurposesofprivacy.Hedefinestheprivacystatesassolitude,intimacy, anonymity,andreserve,andthepurposesaspersonalautonomy,emotional release,self-evaluation,andlimitedandprotectedcommunication.

Westin’spositionisthatprivacyoperatesatthreelevels:Theindividual,thegroup,andtheorganizationallevel.Healsoconstrainshistheory ofprivacyasapplicabletowesternsocietiesonly.In2002,Westinproposed what’sknownastheWestinsegmentation,classifyingthepublicintothree groups:theprivacyfundamentalists,whoplaceapremiumonprivacyand makeupabout25percentofthepopulation;theprivacyunconcerned,who couldn’tcarelessaboutprivacyandmakeupabout20percentofthepopulation;andtheprivacypragmatists,theremaining55percent,whoareawareof thetrade-offbetweenprivacyandexternalofferings.

Forhispart,Altmanoutlinedhisprivacyregulationtheoryin TheEnvironmentandSocialBehavior (1975).Putverysimply,privacyregulationtheory hastodowiththefactthatpeoplehavedifferentprivacystandardsatdifferent timesandindifferentcontexts.Forexample,yourdefinitionofwhatconstitutes“privateinformation”inyourrelationshipwithyourspouseisclearly differentthaninyourrelationshipwithyourchildren,andit’salsodifferent withyourbossandyetagainwithyourcoworkers.

AccordingtoAltman,thisphenomenonisdueto“theselectivecontrolof accesstotheself,”whichhasfiveproperties:

■ Temporaldynamicprocessofinterpersonalboundaries(feelings aboutprivacychangebasedoncontext);

■ Desiredandactuallevelsofprivacy(whatwehopeforandwhatwe getcandiffer);

■ Non-monotonicfunctionofprivacy(whatconstitutesthe“optimal” amountcanincreaseordecrease);

■ Bi-directionalnatureofprivacy(privacyinvolvesboth“inputs”and “outputs”);and

■ Bi-levelnatureofprivacy(individualprivacyisdifferentfromgroup).

Altmanwentontodescribeadditionalfeaturesofprivacy,includingunits ofprivacy,itsdialecticnature,anddesiredversusachievedprivacy.

AltmanandWestinshareaviewofprivacyasaverydynamicstatewith multipleinputsandoutputs—essentiallyasysteminconstantstateofrebalancing,dependingontheenvironment.Theirworkhasspurredbothvigorous academicdebatesandhundredsofresearchersmovingthefieldforwardby expandingonthesetheories,addingandelaboratingontheprivacyfeatures, aswellasdrivingalotofexperimentalworkallovertheworld.Themajority resultsofthisresearchtodateseemtovalidateWestinandAltman,building ontheirsolidfoundationalwork.

AlsoofnoteisNancyMarshall’swork,forinstanceherarticle“Privacy andEnvironment”(1972).MarshalldevelopedthePrivacyPreferenceScale, thefirstofitskind,basedonheridentificationofsixprivacystates:intimacy, solitude,anonymity,reserve,seclusion,andnotneighboring.Communication studiesscholarVirginiaKupritzhelpedintroduceobjectiveenvironmental measurementsofprivacy,furtherexpandingAltman’sworkbyreorganizing itandintroducingadditionalpsychologicalandcognitivevariables.Kuptritz alsodidsignificantresearchonthearchitecturaleffectonprivacy.

Mostrecently,TobiasDienlin,ascholarincommunicationsscienceand mediapsychologyattheUniversityofHohenheim,hasproposedaPrivacy ProcessModelthatattemptstointegrateallmajorworkonprivacyintoone cohesivemodel.ItintegratestheworkofWestin,Altman,andnumerous others,anddifferentiatesbetween“factualprivacycontextandsubjective

privacyperceptions,”adistinctionthatDienlinpositsasimportantbothonline andoffline.Hismodelhasfourprivacydimensions—informational,social, psychological,andphysical—thathearguesareequallyapplicabletoboth physicalanddigitalworlds.

Asyouwouldexpect,thesedebatesandworkonprivacyarefarfromover. Forthatmatter,theymayneverbeover.Notonlydoestechnologycontinue toevolve,butsodowe,acrossculturesandgeographies.Theendresultis aconstantlychanginglandscapeinwhichwemustnavigatecarefully,constantlychallengingourvaluesandprotectingwhatwethink,atthetime,isnear anddeartoouridentityaspeople,communitymembers,andvalue-creating citizens.

CHAPTER 2

A(Very)BriefHistory ofPrivacy

Therighttobeletaloneisindeedthebeginningofall freedom.

(Dissentingopinion, PublicUtilitiesCommissionv.Pollak [1952])

Havingagraspontheconceptofprivacyisuseful,butit’snotenoughfor ourpurposes.Wewillsoonhavetoconfrontregulationsgoverningprivacy thatdirectlyimpactthewaywedobusiness.Itisparamountthatweunderstandnotonlyprivacyasaconceptbutprivacy incontext. Inotherwords,howdidwegethere?

Sincetimeimmemorial,allcultures,allovertheworld,havehadsome understandingofprivacyasaconcept.Somecodifieditintolaws,whileothersintegrateditwithreligiousbeliefs.Thereissubstantialscholarshiponthe subject,andyou’llfindselectedentriesinthebibliographytokickoffyour in-depthreview.Forourpurposeshere,afewsnippetswillsufficetogiveasa senseofhistoryandscope.

TheancientGreeks,borrowingfromtheEgyptians,veneratedtheGod ofSilenceandSecrets,Harpokrates.Heisusuallypicturedasamischievous littleboywithhisfingertohislipsasifheissaying“Shhh!”(You’vegottostart somewhere,Iguess!)ButtheGreeks,beinggeometrysavvy,didn’tjustinclude asecretivegodintheirpantheon.Theyalsodesignedtheirlivingspacesby placingwhatwewouldconsiderwindowopeningsinsuchawaythatitwould limittheviewofanoutsideobserverpeeringin.

TheancientChinese,meanwhile,had—andstillhave—averydifferent andcomplexunderstandingofprivacy.Inbroadterms,thewordforprivacy, yin-si,isacompositeoftwomeanings:yinfor“hidden”andsifor“notfor publicdisclosure.”Assuch,yin-siwasmeanttodescribetheconceptofprivacy, butinanegativelight—thetermcarriesthesenseofashamefulsecret.

AccordingtoscholarsofancientChineseculture,theChineseweremore focusedinthegovernanceofthestate,andinprotectingthegovernancestructure,thanprotectingtheindividual.Thiswasultimatelycodifiedinacollectionofmorality-drivenlawsgoverningbehavioracrossmanylevels,eventually compiledbynoneotherthanConfucius.Inhis Analects,hewrote,“Donot watchwhatisimproper.Donotlistentowhatisimproper.Donotspeaknor actimproperly.”Healsowrotethatthatgossipandhearsaywereimproper andurgedeveryonetodouble-checktheirInternetsourcesbeforeforwarding theirmother-in-law’sconspiracytheoryemails.(Yes,Gladys!Wedidlandon themoon,theearthisnotflat,andvaccinesdosavelives!Moveon!Letitgo!)

Astemptingasitistogothrougheachancientempireonebyone(Egyptians,Babylonians,Greek,Assyrian,Persian … ),I’llspareyoutheindividual detailsandfocusontheonethingtheyhadincommonwithregardstoprivacy:theydidn’thaveany!Certainlynotasweunderstand—orstruggleto understand—privacytoday.

UntiltheMiddleAges,privacywasnotparticularlypossible.Mosthouses hadoneroom.Mostcommonspaceswereopen.Tobesure,somecultures morethanotherstooksomestepstopreservewhatwetodaywouldidentify asprivacy,butingeneral,itwasatimeofcommunallivingwithlittleconsiderationofindividualprivacy.

Iamnotsuggestingthatthiswasnecessarilybychoice.Butitwasthe realityforthevastmassesofpeople,allovertheworld.Tobesure,onewould expectthattheywouldratherhavetheirownindividualrooms,andsoforth, butthatwasnotpossible,mostlyforsocioeconomicreasons.Forthatmatter,ClellanFordandFrankBeachintheir PatternsofSexualBehavior (1951) demonstratedthatprettymuchuniversallyandirrespectiveofculture,humans wouldprefertheirintimatemomentstobeprivate—evenifthatmeanstaking themoutside.(Isupposethisisthereverseof“getaroom,”backwhenrooms werenotanoption!)

Theoneswhodid“havearoom,”aswegotcloserandclosertothe Renaissance,weretherich,livingintheircastlesandpalaces.It’saroundthis

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.