Privacy, regulations, and cybersecurity: the essential business guide 1st edition edition chris mosc

Page 1


Instant digital products (PDF, ePub, MOBI) ready for you

Download now and discover formats that fit your needs...

Smart Cities Cybersecurity and Privacy Danda B. Rawat

https://ebookmass.com/product/smart-cities-cybersecurity-and-privacydanda-b-rawat/

ebookmass.com

Medical Device Regulations: A Complete Guide Aakash Deep

https://ebookmass.com/product/medical-device-regulations-a-completeguide-aakash-deep/

ebookmass.com

The Essential Entrepreneur: What It Takes To Start, Scale And Sell A Successful Business 1st Edition Richard Turner

https://ebookmass.com/product/the-essential-entrepreneur-what-ittakes-to-start-scale-and-sell-a-successful-business-1st-editionrichard-turner/

ebookmass.com

Silver Moon Rising Ethan J. Wolfe

https://ebookmass.com/product/silver-moon-rising-ethan-j-wolfe/

ebookmass.com

The Palgrave Handbook of Applied Linguistics Research

Methodology 1st ed. Edition Aek Phakiti

https://ebookmass.com/product/the-palgrave-handbook-of-appliedlinguistics-research-methodology-1st-ed-edition-aek-phakiti/

ebookmass.com

Financial Accounting: As per CBCS Syllabus 2014-15 as Revised in March 2017 for B.Com Semester-I (Bangalore University) Ruqsana Anjum

https://ebookmass.com/product/financial-accounting-as-per-cbcssyllabus-2014-15-as-revised-in-march-2017-for-b-com-semester-ibangalore-university-ruqsana-anjum/ ebookmass.com

The Art of Computer Programming, Volume 4B: Combinatorial Algorithms, Part 2 Donald E. Knuth

https://ebookmass.com/product/the-art-of-computer-programmingvolume-4b-combinatorial-algorithms-part-2-donald-e-knuth/

ebookmass.com

Amputation in Literature and Film: Artificial Limbs, Prosthetic Relations, and the Semiotics of "Loss" (Literary Disability Studies) 1st ed. 2021 Edition Erik Grayson (Editor)

https://ebookmass.com/product/amputation-in-literature-and-filmartificial-limbs-prosthetic-relations-and-the-semiotics-of-lossliterary-disability-studies-1st-ed-2021-edition-erik-grayson-editor/ ebookmass.com

Design Computing and Cognition’22 John S. Gero

https://ebookmass.com/product/design-computing-and-cognition22-john-sgero/

ebookmass.com

Mathematical Modeling and Applied Calculus Joel Kilty

https://ebookmass.com/product/mathematical-modeling-and-appliedcalculus-joel-kilty/

ebookmass.com

PRIVACY, REGULATIONS, AND CYBERSECURITY

REGULATIONS, AND CYBERSECURITY

THEESSENTIALBUSINESSGUIDE

ChrisMoschovitis

Copyright©2021byChrisMoschovitis.Allrightsreserved.

PublishedbyJohnWiley&Sons,Inc.,Hoboken,NewJersey.

PublishedsimultaneouslyinCanada.

Nopartofthispublicationmaybereproduced,storedinaretrievalsystem,ortransmittedin anyformorbyanymeans,electronic,mechanical,photocopying,recording,scanning,or otherwise,exceptaspermittedunderSection107or108ofthe1976UnitedStatesCopyright Act,withouteitherthepriorwrittenpermissionofthePublisher,orauthorizationthrough paymentoftheappropriateper-copyfeetotheCopyrightClearanceCenter,Inc.,222 RosewoodDrive,Danvers,MA01923,(978)750-8400,fax(978)646-8600,orontheWebat www.copyright.com.RequeststothePublisherforpermissionshouldbeaddressedtothe PermissionsDepartment,JohnWiley&Sons,Inc.,111RiverStreet,Hoboken,NJ07030,(201) 748-6011,fax(201)748-6008,oronlineatwww.wiley.com/go/permissions.

LimitofLiability/DisclaimerofWarranty:Whilethepublisherandauthorhaveusedtheirbest effortsinpreparingthisbook,theymakenorepresentationsorwarrantieswithrespecttothe accuracyorcompletenessofthecontentsofthisbookandspecificallydisclaimanyimplied warrantiesofmerchantabilityorfitnessforaparticularpurpose.Nowarrantymaybecreatedor extendedbysalesrepresentativesorwrittensalesmaterials.Theadviceandstrategiescontained hereinmaynotbesuitableforyoursituation.Youshouldconsultwithaprofessionalwhere appropriate.Neitherthepublishernorauthorshallbeliableforanylossofprofitoranyother commercialdamages,includingbutnotlimitedtospecial,incidental,consequential,orother damages.

Forgeneralinformationonourotherproductsandservicesorfortechnicalsupport,please contactourCustomerCareDepartmentwithintheUnitedStatesat(800)762-2974,outsidethe UnitedStatesat(317)572-3993,orfax(317)572-4002.

Wileypublishesinavarietyofprintandelectronicformatsandbyprint-on-demand.Some materialincludedwithstandardprintversionsofthisbookmaynotbeincludedine-booksorin print-on-demand.IfthisbookreferstomediasuchasaCDorDVDthatisnotincludedinthe versionyoupurchased,youmaydownloadthismaterialathttp://booksupport.wiley.com.For moreinformationaboutWileyproducts,visitwww.wiley.com.

LibraryofCongressCataloging-in-PublicationDataisAvailable:

ISBN9781119658740(hardback)

ISBN9781119660118(ePub) ISBN9781119660149(ePDF)

Coverimage:©YuichiroChino/GettyImages,©dem10/GettyImages

Coverdesign:Wiley 10987654321

FOREWORDvii

PREFACEix

ABOUTTHEAUTHORxiii

ACKNOWLEDGMENTSxv

PARTONE— Privacy1

CHAPTER 1 UnderstandingPrivacy3

CHAPTER 2 A(Very)BriefHistoryofPrivacy9

CHAPTER 3 TheLegalCaseforPrivacy(theFinerPrint)21

PARTTWO— Regulations45

CHAPTER 4 IntroductiontoRegulations47

CHAPTER 5 NorthAmericanRegulations57

CHAPTER 6 EuropeanRegulations89

CHAPTER 7 Asia-PacificRegulations119

CHAPTER 8 AfricanRegulations145

CHAPTER 9 SouthAmericanRegulations161

PARTTHREE— PrivacyandCybersecurity171

CHAPTER 10 IntroductiontoCybersecurity173

CHAPTER 11 ACybersecurityPrimer181

CHAPTER 12 Privacy-CentricCybersecurityProgramOverview205

CHAPTER 13 PrivacybyDesignOverview221

CHAPTER 14 CoverYourAssets!235

CHAPTER 15 ThreatAssessment261

CHAPTER 16 Vulnerabilities275

CHAPTER 17 Environments287

CHAPTER 18 Controls301

CHAPTER 19 IncidentResponse321

CHAPTER 20 WelcometotheFuture!Now,GoHome!341

BIBLIOGRAPHY359

INDEX377

FOREWORD

Youwillneverdoanythinginthisworldwithoutcourage. Itisthegreatestqualityofthemind,nexttohonor. —Aristotle

Businessestodayarefacedwithincreasingdemandsforprivacyprotections,ever-morecomplexregulations,andongoingcybersecuritychallenges thatplaceheavydemandsonscarceresources.Duringthesedifficulttimesitis importantthatwehavethecouragetoproactivelydealwiththeseimperatives. Thisbookisanessentialtoolforanybusinessexecutivewhoneedstoorchestratethe“handshake”betweenprivacy,security,andongoingregulations.Oh yes,andcourage.

Afewyearsago,Ireturnedtooneofmypassions—security—whenItook overastheleaderofabusinessintheeasternUS.Theselastthreeyearshave beenchallengingbutexciting,andIhaveseenanunprecedentedlevelofinterestbybusinessexecutivesinprivacyandsecurity.Ihavemademoreboard presentationsandbeeninmoremeetingswiththeC-suiteonthesetopics inthelastthreeyearsthanthetenyearsbeforethatcombined.WhenIwas appointedtotheboardoftheISACA(InformationSystemsAuditandControlsAssociation),Iwasthrilledattheopportunitytomakesignificantchange inthesecurityprofession.ButIexpectedtoomuchtoosoon,andtheboard’s messageaftermyfirstpresentationwasclear:“Weneedmoreresearchonthe conceptofinformationsecuritymanagementandhowsecurityisviewedby executivesbeforewemakeanyinvestments.”

Itwasearlyinthenewmillennium,andsecuritywasbecomingatopic ofconversationintheexecutivesuite.EventhoughthefirstCISOhadbeen appointedatCitiin1995,thebodyofknowledgeforsecuritywasdefinedby technicalandproduct-specificcertificationswithnoframeworkstosupport organizations,andprivacyregulationssuchasGDPRwerestilljustadistant thought.

Atthattime,IhadmademyrecommendationtotheboardoftheISACA todrivethesettingof“commonbodyofknowledge”ofthefutureCISO.Ihad astrongbeliefthattherewaswideracceptanceoftheroleanditsimportance inprotectingtheorganization.

Maybeitwasaturningpoint,butseveraleventscametogetherearly inthenewmillenniumtoreinforcethisbelief.“ILOVEYOU”infected millionsofcomputers,followedbythefirstcriminalconvictionofahacker, thewidespreaddisruptioncausedbydenial-of-serviceattacksonMicrosoft systems(andBillGates’sdecreethatMicrosoftproductswouldembed securityaspartoftheproduct),andaseriesofotherhigh-profilehacks.This wasexacerbatedbythefinancialcollapseofEnronanditsimpactonthetrust intheUSeconomicsystem.RegulationfollowedwiththeSarbanes-Oxley Actandmanyothersaroundtheglobe.Itwasanewworld,andthecontinued regulationaroundsecurityandprivacygainedmomentum.

ThatyearIbecamechairmanoftheboardofISACA,andthenewbody ofknowledgeaccompaniedbyacertification(CISM)waslaunched.The foundinggroupwasmadeupoffourdedicatedCISOs,andthecertification isstillthestandardforsecuritymanagementprofessionals.

WhichbringsmebacktomygoodfriendChris,withwhomIhaveformed aterrificbondovermutualinterests.Finefoodandwineandaconnection asfirst-generationGreekscementedourfriendship.Recently,wediscussed anddebatedmanytopics,includingtheneedforthoseexecutiveswhounderstandsecurityriskstotransformthatknowledgeintoactionaroundprivacy andsecurityaroundregulation.

IhavefoundChris’sintellectualcuriosityandsenseofhumortobeboth compellingandengaging.Thesetraitsareaperfectvehicletotakethereader onthisjourney,fromthefundamentalsofprivacytotheongoingregulatory pressuresandhowcompaniescanbebetterpreparedattheexecutivelevelto tacklethesechanges.

Chrisisabletointerpretcomplexprinciplesanddistillthemintoanatural flow,wherethereaderistakenonajourney.InHomer’s Odyssey,Circewarned Odysseusoftheimpendingperilssothathewouldbeprepared.Likewise, Chris’sbookpreparestheexecutivetobeawareoftheperilsandopportunities aheadandprovidesaroadmaponhowtoactwithcourageassecurityand privacyregulationscontinuetoproliferate.

Bepreparedanddotherightthingandnotjustbecauseofregulation—do itforyourcustomers,employees,shareholders,andeveryonewhoplacestrust inyouandyourcompany.Usethestep-by-stepapproachfromthisbook, soyouandyourcompanycanbereadyforwhateverchallengesthefuture mighthold.

Itistimetoact,andwiththisguideinhand,youarewellonyourjourney.

MariosDamianides

CyberSecurityLeader,Ernst&YoungLLP ChairoftheBoard,ISACA(2003–2005)

PREFACE

“What?I’vebeenworkinglikethisallmylife!Now,you’retellingmethat IhavetobeGDP … umm … GD-whatevercompliant?”

Myfriendandclient,animmigrationattorneyfromwaybackwhen “immigration”wasnotadirtyword,wasangry.Herpracticehadbeenvery successfulovertheyears,dealingwithallsortsofimmigrationissuesacross continents.Theproblemisthatsheisdoingbusinesswithcitizensofthe EuropeanUnion(EU).Worse,shehasapartnerinAthens,Greece,an EU-membercountry.

Fabulous!ShemustcomplywiththeGeneralDataProtectionRegulation oftheEU,betterknownbyitsacronym,GDPR.Forthoseofyoublissfully unawareofGDPR,itisalawpassedbytheEuropeanUnionin2016.Ithas far-reachingconsequencestobusinessesworldwide,includingyours!

Ifyouareabusinesspersonwho,likemyfriend,hasnoideawhereto beginwithGDPR,thenthisbookisforyou!Itisthesequelto Cybersecurity ProgramDevelopmentforBusiness:TheEssentialPlanningGuide (Wiley,2018), andjustlikethatbook,thisoneisdesignedwithyou,abusinessperson,in mind.In Cybersecurity,mygoalwastogiveyouenoughinformationsothat youwouldn’tbeatthemercyofexpertstalkingoveryourheadandaround yourbusinesswhenitcametocybersecurity.Initsintroduction,Iwrote:

Whatiftherewasabookthatputthewholecybersecuritythinginto perspective,usingsimple,directlanguage?Whatifthereweresections andchaptersexplainingwhatisgoingon,whattherisksare,andwhatall thetechnobabblereallymeans?And,whatifthebookhadastep-by-step, actionableapproachonwhatyoucandoaboutallthis?Abookthat aggregatedthecurrentbestpractices,puttheminperspective,injectedmy experienceandmyownpointofview,andhowIappliedallthisacrossall ourclients?

Allthewhilepokingalittlefunatourselves,too?

Thegoal,approach,andstyleremainthesame—onlythistime,the aimistotransformyourhard-earnedcybersecurityawarenessintoone thatisprivacy-centricandregulation-aware.Ifyou’reoneofthemany

businesspeopleouttherewhoarenewtoallthis,juststartingtoconfrontthe newcyberwarrealities,concernedaboutyoursandyourbusiness’privacy, andworriedthatsomeregulationwilldescendtolevyGodknowswhatkind offine,thenyou’reinluck!

Thisbookwillguideyouthroughallthisstep-by-step,section-by-section: privacy,regulations,andcybersecurity.We’llworkthroughthebasics together,aswellasreviewingcasestudiesandexamplesofbestpractices acrossdifferentindustriesanddifferentsizecompanies.

Justlikeinthefirstbook,whichIwillbereferencingfrequently,especially inPartThree,weneedacase-studydisclaimer:Thecasestudiesandexamples presentedthroughoutbothbooksareaggregatedfrommyownworkandfrom theworkofmanycolleagueswhoweregraciousenoughtosharetheirexperiences.Asyouwouldexpect,allnames,industries,andgeographieshavebeen changedtoprotecttheanonymityoftheseclients.Insomeofthecases,multipleproblemswerecombinedintoone.Inothers,manyassignmentswere brokenoutintoasingleone.Thegoalhasbeentodistilltheessentiallesson fromeachcasewhileprotectingtheidentityandrespectingtheprivacyand confidentialityofeveryclient.

Thereisafundamentaldifference,though,betweenthefirstbookandthis one.Thefirstbookdealtstrictlywiththepracticalandpragmaticdesignofa cybersecurityprogramwiththegoalofprotectingyourbusiness.Thisbook synthesizestwodistinct,diverse,andcomplexsegmentsintoaprivacy-firstand regulation-focusedcybersecurityprogram.Ifyoualreadyhaveacybersecurity programinplace,thenthisbookwillhelpyouhonewhat’salreadythereinto aprivacy-centricandregulation-compliantcybersecurityprogram.

Ifyoudon’thaveacybersecurityprograminplace,then wherehave youbeen?

Nevertheless,Iamgladyou’rewithusnow!Thisisyouropportunityto startbuildingacybersecurityprogramfromthebottomupthat,frominception,willbeprivacy-andregulation-compliant-focused.

Onemorethingbeforewediverightin:Justasitisimportantto understandwhatthisbookis,andwhoitisfor,itisequallyimportantto knowwhatitisnot.Thisisespeciallytruesincewewillbedealingwith topicsthatareatoncescholarly,legal,andtechnicalinnature.Thisbookis notintendedtobeanacademicanalysis,alegalbrief,oratechnicalhow-to manual,althoughitwillborrowandreflectworkfromallthesedisciplines.

Ifyou’relookingforthelatestscholarlybookonprivacy,anin-depthlegal treatmentoftheCaliforniaConsumerPrivacyAct,orhowtoconfigureyour firewall,thisbookisnotforyou!

Thisbookisintendedasapractical,pragmatic,andactionablebusiness guideforpeopleacrossindustriesandbusinesssizeswhoneedtounderstand whatallthistalkaboutprivacyreallymeans,whattheeffectofalltheselaws andregulationsare,andhowtoputitalltogetherinacybersecurityprogram toprotectwhat’sofvaluetothem.

Itreliesheavilyontheoutstandingworkofnumerousscholars,lawyers, andinformationtechnologyandcybersecurityprofessionals,withoutwhomit wouldnothavebeenpossibletowriteit.Youwillfindadetailedbibliography ofsourcesattheendofthebook,andIurgeyoutouseitanddigdeeperas youseefit.

Forme,eachoneofthesetopics,andespeciallyprivacy,representfascinatingareasofstudy.Privacyandcybersecurityforceustoconfrontquestions ofhowweaspeoplemanagedifficult,complexconceptsandhowwetranslate thoseconceptsintoactionablelawsandwaysofdoingbusiness.

ABOUTTHEAUTHOR

IwasborninAthens,Greece.Afterhighschool,IchosetocometotheUnited Statestostudyphysicsandcomputerscience.IdidthatattheStateUniversity ofNewYork,theCollegeatBrockport,inupstateNewYork.Myyearsat Brockportwereformativetomeasaperson,ascientist,andasaprofessional. WordsforthegratitudeandrespectIhaveforthededicatedfacultythatshaped mylifecaneasilyfillacoupleofbooks,butthatisforanothertime.

Aftergraduatingwithmybachelor’sdegreeinscience,Ibecamean instructorofcomputerscienceandacomputersystemsmanagerattheStratfordSchoolinRochester,NewYork.Followingbriefgraduateworkstints attheRochesterInstituteofTechnologyandtheUniversityofRochester, ImovedtoNewYorkCitytoserveasthedirectorofacademiccomputing atPrattInstitute.There,underthedirectionofthevicepresidentofinformationtechnology(therewereno“chiefinformationofficers”backthen), Iwasresponsibleforthebuildingandmanagementoffourcomputing centersofexcellence,eachfocusingonaspecificdiscipline(art,architecture, engineering,andinformationscience).Fromthere,Iwasrecruitedtobe thevicepresidentofinformationtechnologyattheO’ConnorGroup,areal estatemanageranddeveloperinNewYorkCity.Then,inthemiddleofthe ReaganRecession,Idecidedthattherewasnobettertimethanthepresent tostartmyowncompany,whichIdidin1989.

Ihavebeenrunningmyownfirmeversince,surroundedbypartnersand colleagueswhoteachmemoreandmoreeverysingleday,andtogetherwe deliverabroadspectrumofITconsultingservices.Ihavebeenprivileged topartnerwithgreatclients,toengageinfantasticprojectsofbusiness andtechnologytransformation,andtocollaboratewithteamsthatpush boundariesanddevelopincrediblebusinesssolutions.Ilivedthroughthe amazingadvancesincomputersciencethatarenowthestuffoflore:Iwas thereduringBitNet,sendingemailmessagesandwatchingthemessagehop fromnodetonode.Iwasamazedatformattingthefirst10MBharddisks ofIBM’snewpersonalcomputer.I’vefedendlessfloppiesinandoutofthe firstMacs.I’vebuiltmusclescarryingtheCompaq“Portable,”whichwas nicknamed“luggable”forgoodreason.I’vecarriedpagersandcellphones

thesizeofsuitcases.IsubscribedtoCompuServeandAOLandstillhavea workingHayes14.4modem.

Throughoutitall,Ihavealwaysbeenfascinatedbysecurity,privacy,and theprotectionofdata.Evenbefore“cybersecurity”wasaword,Iinsistedthat thesiteswedesignedandmanagedimplementedbusiness-appropriatecomputersecurityanddisasterrecovery.MaybeitwasbecauseGeorgeWhelan, apartnerofmineatthetime,wasacomputerviruscollector(hestillhas them).Maybe,becauseIremainculturallyGreek,naturallycautiousandprivate.Whateverthereason,Ialwaysasked,“Whathappensif‘this’getsout?” or“Howfastcanwebebackupandrunning?”Anyofmyconsultantswilltell youthatevennow,thefirstthingtheyaretaughtwhentheystartworkingfor meisthat“notcheckingthebackupisacareer-endingmistake.”

FollowingdecadesasapractitionerofbothITgovernanceandcybersecuritymanagement,IdecidedtomakeitofficialandjoinedInformation SystemsAuditandControlAssociation(ISACA),anindependent,nonprofit, globalassociationthatwasfoundedin1969,engagingin“Thedevelopment, adoptionanduseofgloballyaccepted,industry-leadingknowledgeandpracticesforinformationsystems.”JoiningISACAwasoneofthesmartestthings Ieverdid.ThroughIASCA,Igotcertifiedinthreeareas:Firstincybersecurity,becomingaCertifiedInformationSecurityManager(CISM),theninIT governance,becomingCertifiedinGovernanceofEnterpriseIT(CGEIT), andfinallyasaCertifiedDataPrivacySolutionsEngineer(CDPSE).

Notonetostandstill,andalwaysfascinatedbythebeautyincomplexity, Idecidedin2018tostudyprivacyanditsimplicationsonoursociety,business, andsystems.IsubsequentlyjoinedtheInternationalAssociationofPrivacy Professionals(IAPP).JustlikeISACA,theIAPPisanincrediblecommunity ofprivacyexpertsthathavededicatedtheirlifetothestudyandimplementationofsoundprivacyprinciples.Ifoundawelcomehomethereandendless resourcestohelpmeinmyjourneythathasledmehere,tothisbook,that Iamhumbledtosharewithyou.

Iamprivilegedtobeabletocontinuemyjourney,runningmyfirmtmgemedia,inc.,andtobesurroundedbyincredibleprofessionals,clients,and friendsthatteachmethevalueofhardwork,dedication,andloveeveryday.

ACKNOWLEDGMENTS

Everybookisalaboroflove.Thisoneisnodifferent.AfterIfinishedmy firstbaby, CybersecurityProgramDevelopmentforBusiness:TheEssentialPlanning Guide, IknewIwantedtowriteasecond,onespecificallyfocusedonPrivacy. Theinitialideawasunformedbutpersistent.Privacyintriguedme.The“P” wordwasusedpracticallydaily;legislatorswerepassinglawspretendingto preserveitwhilebusinesspeoplewereatalossaboutwhattodowithit.

IwasclearfromthebeginningthatIdidnotwanttowriteascholarly treatmentonprivacy.Better-equippedscholarsofmanystripeshaveproduced, andcontinuetoproduce,greatworksonthesubject.Myapproachwastobe similartothefirstbook:Whatdoweneedtoknowonprivacysothatwe canbeinformedascitizensandenabledasprofessionals?Moretoapragmatic point,howdoesallthisprivacylegislationaffectourcapacitytodesignand deliveraneffectivecybersecurityprogram?

Toanswerallthesequestions,Icameupwiththeformatforthisbook.It wouldhavethreedistinctparts:oneonprivacy;oneonregulations,worldwide; andoneonprivacy-centriccybersecurityprogramdevelopment.Thelatter wouldbebasedonthepreviousbookbutenhancedbyourunderstandingof privacy,notjustasaconceptbutasasetofconcreteregulatoryrequirements. Theresultisinyourhands!

Booksareneversolitaryefforts.Yes,theimageofthewritertoilingaway atherdeskday-in,day-outistrue,buttheauthorbringsauniverseofpeopleto paper.Samewithme.Overthecourseof31-plusyearsintheinformationtechnologyindustry,Ihavehadtheprivilegetomeethundredsofprofessionals, experts,partners,clients,andvendorswhohaveshapedmythinking,formed myexperiences,andhonedmyexpertise.Theirinfluenceisreflectedinthe pagesthatfollow.Theywrotethebookwithme.

Frommyoriginalpartnerinthebusiness,GeorgeWhelan,whoreligiouslycollectedandkeptlivecomputervirusesonfloppydisks,toinstructors suchasJayRanade,whohasforgottenmorethanI’lleverknow,toclientswho partneredwithmeandstaffwhotirelesslyworkedtosolveproblems,Iowe eachoneadebtofgratitudethatnoacknowledgmentcandojustice.

Still,Imuststartsomewhere,andtherightplacetostartiswithanapology formyomissions.Theyareentirelymyown.

Next,Iwanttoacknowledgeadebtofgratitudetomyclients,mytrue partnerstosuccess.Everyday,Iamhonoredandprivilegedtobeyourally andtocontributetoyourgoals.Iamconstantlyhumbledbyallthethings thatyouteachmeeveryday.IwouldberemissifIdidn’tsingleoutthe Hoffmanfamily,Andrew,Mark,andSteve,whohavebeenloyalsupporters andmentorssinceIstartedthefirm31yearsago;thefoundingpartnersat AllegaertBergerandVogel,Chris,David,andMichael,fortheirtrustinme, theirloyalty,andwisecounselthroughthickandthin;theamazingteamat Kapitusforteachingmeandmyteamhowtojumpontoarushingfreight train;andtoVigdisEriksenatEriksenTranslationsforhertrustinusandfor herfeedbackthatmakesusbettereveryday!

Inthesamebreath,Iwanttothankmyownpartnersandassociates,whose incredibleexpertise,loyalty,dedication,skills,empathy,andpersonalengagementmakemyandourclients’successpossible.Theyare,alphabetically: AnnaMurray,AtsushiTatsuoka,DanielleChianese,DoelRodriguez,Frank Murray,GregAndrews,JamesRich,JustinSchroeder,LeonTchekmedyian, PedroGarrett,ThomasHussey,TylerRaineri,andYeimyMorel.Thankyou fortheprivilegeofworkingwithyou,forallyoudo,dayandnight,andfor allowingmetoshutmydoorandwrite,write,write!Youmadethispossible! Wheneverthereisabook,thereisaneditorandapublisher.Ihavebeen theluckiestofauthorstohavethebestinboth.First,myeternalgratitude totheone-and-only,walk-on-water-on-her-bad-days,amazingHilaryPoole, myeditor,coauthor,andfriendofcountlessyearsandjustasmanybooks. Hilary,youareamazing!Iabsolutelyrefusetogonexttoakeyboardunless Iamreassuredthatyou’lledittheoutcome.Thankyou!

DeepestthankstoeveryoneatJohnWiley&Sons,oneofthemostprofessionalandexceptionalpublishersintheworld,andespeciallytomyexecutive editor,SheckCho,captainandcommanderextraordinaireandSusanCerra, theproject’smanagingeditor!Thisbookisasmuchyoursasitismine,and Iamgratefulforallyourhelp,guidance,andsupport.

Toalltheprivacy,cybersecurity,andgovernanceprofessionalsaround theworld,workingtirelesslyinthefield,inacademia,inresearchinstitutions,ingovernmentagencies,andmilitaries,thisbookpalesincomparisonto yourachievementseveryday.Icannotemphasizethisenough:Withoutyour

endlesseffortsinbreakingnewground,expandingandenhancingourscientificunderstanding,andguidingusthroughthemaze,wewouldbelost.All yourworksrepresentthelighthousesthathelpsusnavigate,andifIaspireto anything,itisforthisbooktoaidinreflectingyourlight,interpretingyour guidance,andaddingwindtothesails.

Tothemanyinternationalorganizationsthathelpallpractitionerslearn, hone,andapplytheircraft,aswellasdeveloptheframeworkswedependon, mygratitudeforyourongoingcontributions,tirelesscuration,andunending support.ImustparticularlysingleoutCERT,ENISA,IAPP,ISACA,(ISC)2 , ISECOM,ISO,ISSA,NIST,NSA,OECD,OWASP,andSANS,withmy apologiesforomittingthemanyotherdeservingorganizationsworldwide.My specificthankstoIAPPandISACAfortheircontinuoussupportandendless resources.TheISACANewYorkchapterremainsahomeawayfromhome formeandcountlessprofessionalsintheNewYorkmetroarea.

Tothemanyfriendswhosupportedmeinsomanyways,through encouragement,advice,andlove:JeanneFrank,Iknowyou’rewatchingfrom Heaven!Youwererightaboutthebook!AlexandMari,RichieandCharlene, Sherryl,Sotos,DimitrisandKoralia,andlastbutnotleast,Madina,my princessIndira,andmyprinceKamron:Idon’tknowwhatIdidtodeserve anyofyou,butIcan’timaginelifewithoutyou!Thankyou!

Finally,toAnnaMurray,anamethatkeepsonrepeatingintheseacknowledgmentsbutfromwhereIsit,notenough!Youarethemostbrilliant,expert, capable,tenacious,fierce,loving,accepting,andgivingperson,amazingprofessional,andtalentedwriterIknow!EverydayIthankmyluckystarsthat broughtyoutomylifeasmypartnerinthebusinessandmypartnerinlife. Youare,andalwayswillbe,thebrighteststarinthedarkofnight,guidingme home.Thankyou!

CHAPTER 1 Understanding Privacy

Benevixit,benequilatuit.

IncaseyourLatinisrusty,Ovid’squoteabovetranslatesto:“Tolivewell istoliveconcealed.”Myinterpretationisdifferent:“Tolivewellistolivein privacy.”

Butlet’snotgetaheadofourselveshere.What,exactly,is privacy?What doesitmean?Whatdoweunderstandwhenwedescribesomethingas “private”?

Dowemean secret? Issomethingprivatealsosecret?Certainly,thereverse isnottrue:wecanhavemanysecretsthatarenotprivate!Theymaybesecrets ofothers,secretnegotiations,secretdeals,andsoon.

Dowemean personal? Isitdatacoupledwithourpersonhood?Ifso,isall personaldataprivate?Whataboutourname?Aretheredegreesofprivacy?

Definingprivacyhaspuzzledmindsfargreaterthanmine,andthedefinitionsforprivacyhavebeenjustasgrandanddiverse.Let’sstartwithour perennialfriendsatMerriam-Webster.Theydefineprivacyas:

—Ovid,Tristia

4PRIVACY,REGULATIONS,ANDCYBERSECURITY

1.a:thequalityorstateofbeingapartfromcompanyorobservation: SECLUSION

b:freedomfromunauthorizedintrusion

2.a:SECRECY

b:aprivatematter:SECRET

3.archaic:aplaceofseclusion

The OxfordEnglishDictionary,ontheotherhand,definesprivacyas:

1.Astateinwhichoneisnotobservedordisturbedbyotherpeople. 1.1Thestateofbeingfreefrompublicattention.

And,oneofmyfavorites,Wiktionary’sdefinition,coversallthebases, albeitsometimescyclically:

1.Thestateofbeingsecludedfromthepresence,sight,orknowledge ofothers.

2.Freedomfromunwantedorunduedisturbanceofone’sprivatelife.

3.Freedomfromdamagingpublicity,publicscrutiny,surveillance, anddisclosureofpersonalinformation,usuallybyagovernment oraprivateorganization.

4.(obsolete)Aplaceofseclusion.

5.(obsolete,law)Arelationshipbetweenpartiesseenasbeingaresult oftheirmutualinterestorparticipationinagiventransaction,contract,etc.;Privity.

6.(obsolete)Secrecy.

7.(obsolete)Aprivatematter;asecret.

Nottobeleftout,ofcourse,isthelegaldefinitionofprivacy. Black’sLaw Dictionary definesprivacyas:

Therightthatdeterminesthenoninterventionofsecretsurveillance andtheprotectionofanindividual’sinformation.Itissplitinto 4categories:

1.Physical:Animpositionwherebyanotherindividualisrestricted fromexperiencinganindividualorasituation;

2.Decisional:Theimpositionofarestrictionthatisexclusivetoan entity;

3.Informational:Thepreventionofsearchingforunknowninformation;and

4.Dispositional:Thepreventionofattemptsmadetogettoknowthe stateofmindofanindividual.

It’sworthwhiletopayattentiontothosefourcategories:physical,decisional,informational,anddispositional.We’llbereturningtothoseinmore detailwhenwetakeonthemeaningsofprivacyforyourbusiness.

It’snotthatIhavesomethingtohide, IhavenothingIwantyoutosee.

Definitionsofprivacyhaveevolvedovertime,andourunderstandingof theconceptisconstantlychanging.Therefore,itwouldbenaivetoassume thatPrivacywithacapitalPcanberenderedviaalegaldefinition,complexor not,oradictionaryentry.

Privacyhasbeen,andremains,thesubjectofrigorousacademicstudy. Anthropology,sociology,psychology,history,andotherdisciplineshavebeen lookingintotheconceptanddevelopingtheirowndefinitionsandmodelsto describePrivacy.

Itisclearlyoutofscopeforthisbooktogetintodetailsontheacademic researchonprivacyordoaliteraturereview.Forourpurposesafewdrops fromtheoceanwillsuffice.

6PRIVACY,REGULATIONS,ANDCYBERSECURITY

ThetwogiantsinprivacyresearchareconsideredtobeAlanWestin (1929–2013),professorofpubliclawandgovernmentatColumbiaUniversity,andIrwinAltman(1930),professorandchairmanofthePsychology DepartmentoftheUniversityofUtah,nowemeritus.

Westin’sbook PrivacyandFreedom (1968)isconsideredtobethefoundationaltextonthesubject.Westindefinesprivacyasfollows:

Privacyistheclaimofindividuals,groups,orinstitutionstodetermine forthemselveswhen,how,andtowhatextentinformationaboutthem iscommunicatedtoothers.

Westingoesontodescribefourstatesofprivacy,andfourfunctions orpurposesofprivacy.Hedefinestheprivacystatesassolitude,intimacy, anonymity,andreserve,andthepurposesaspersonalautonomy,emotional release,self-evaluation,andlimitedandprotectedcommunication.

Westin’spositionisthatprivacyoperatesatthreelevels:Theindividual,thegroup,andtheorganizationallevel.Healsoconstrainshistheory ofprivacyasapplicabletowesternsocietiesonly.In2002,Westinproposed what’sknownastheWestinsegmentation,classifyingthepublicintothree groups:theprivacyfundamentalists,whoplaceapremiumonprivacyand makeupabout25percentofthepopulation;theprivacyunconcerned,who couldn’tcarelessaboutprivacyandmakeupabout20percentofthepopulation;andtheprivacypragmatists,theremaining55percent,whoareawareof thetrade-offbetweenprivacyandexternalofferings.

Forhispart,Altmanoutlinedhisprivacyregulationtheoryin TheEnvironmentandSocialBehavior (1975).Putverysimply,privacyregulationtheory hastodowiththefactthatpeoplehavedifferentprivacystandardsatdifferent timesandindifferentcontexts.Forexample,yourdefinitionofwhatconstitutes“privateinformation”inyourrelationshipwithyourspouseisclearly differentthaninyourrelationshipwithyourchildren,andit’salsodifferent withyourbossandyetagainwithyourcoworkers.

AccordingtoAltman,thisphenomenonisdueto“theselectivecontrolof accesstotheself,”whichhasfiveproperties:

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.