This section will assist the privacy professional with general best practices for identifying, defining, selecting, collecting and analyzing metrics specific to privacy.
With advances in technology and the corresponding legal obligations, organizations must ensure proper protections are in place and functioning optimally.
Tracking and benchmarking through performance measurement is critical to ensure both currency and value.
Why Performance Measurements?
Inform different audiences about operations
Help answer specific questions with a targeted metric
Goal - tied to an objective - deliver 100% of privacy notices
Help make informed decisions.
Don’t overdo metrics
There are different audiences for different metrics. Relevant stakeholders are generally those who will use the data to view, discuss and make strategic decisions —or some combination of all three.
Typical Audience
CISO
CIO
DPO
HR
CFO
Since metrics continue to change as the business objectives and goals evolve, an individual should be assigned to both champion and own the metric.
A metric owner must be able to evangelize the purpose and intent of that metric to the organization.
As a best practice, it is highly recommended that a person with privacy knowledge, training and experience perform this role to limit possible errors in interpretation of privacy-related laws, regulations and practices
Once metrics have been collected, data analysis is conducted. Statistical methods ensure data is interpreted correctly.
Analysis:
Trend analysis, is one of the easiest statistical methods to use for reporting data. This approach attempts to spot a pattern in the information as viewed over a period of time. There are many different statistical trending methods, including simple data patterns, fitting a trend (i.e., least-squares), trends in random data (i.e., data as a trend plus noise, or a noisy time series), and the goodness of fit
Cyclical component, shows data over a time period focused on regular fluctuations.
Irregular component, or noise. This analysis focuses on what is left over when the other components of the series (time and cyclical) have been accounted for.
Focusing solely on disasters will lead an organization to be defensive, but using a proactive approach enables the organization to “respond to an unexpected event more quickly and more cost effectively.
Reporting to the Board A number of factors have contributed to the elevation of the privacy professional in organizations around the world, but perhaps none have been as influential as the GDPR and its “mandatory DPO.
the IAPP undertook, in late 2018, the exercise of creating a template for a DPO report. To do this, it identified all the activities the GDPR mandates for the DPO and created metrics for demonstrating compliance.
This section refers to ongoing activities organizations undertake to control, manage and report risk associated with privacy management practices.
Monitoring should be done to ensure that the organization is actually doing what they say they are doing—and what they are supposed to be doing.
Monitoring should be continual, based on the organization’s risk goals, and executed through defined roles and responsibilities that may include privacy, audit, risk and security personnel.
There are different types of monitoring for different business purposes.
10.2.1.1 Compliance
Compliance monitoring is focused on the collection, use and retention of personal information to ensure necessary policies and controls are in place for compliance.
10.2.1.2 Regulation Laws,
Regulations and requirements are constantly changing, so there is a need to monitor the changes and update policies accordingly.
10.2.1.3 Environment
Internal and external environmental monitoring focus on vulnerabilities, which may include physical concerns, such as building access or visitor activities.
10.2.2.1 Tools
Active scanning tools for network and storage can be used to identify risks to personal information and to monitor for compliance with internal policies and procedures.
10.2.2.2 Audit
Audits include internal and external reviews of people, processes, technology, finances and many other aspects of business functions.
10.2.2.3 Breaches
Breach management practices are more important than ever before, driven by the laws and regulations of countries, states or provinces.
Tracking (particularly over time) the type of breach, severity and time to remediation is an important type of monitoring to determine if both training activities and program processes are sufficient.
10.2.2.4 Complaints
Complaint-monitoring processes track, report, document and provide resolutions of customer, consumer, patient, employee, supplier and other complaints.
10.2.2.5 Data Retention Records
management and data retention should meet legal and business needs for privacy, security and data archiving. In monitoring, looking for potential areas for risk present in retention schedules or practices, such as excessive collection, inadequate controls (access and use), or undue disclosure practices.6
Relying on an established set of privacy controls at the operational and program level, this type of monitoring is about assessing the design and efficacy of a given control set. Some governance, risk and compliance (GRC) tools may provide automated means to undertake some or all of these checks, right through to tracking remediation activity.
Human resources (HR) is responsible for ensuring privacy protections are in place for employee personal information across HR processes. Multinational organizations are required to meet local regulations and the privacy expectations of their employees in all countries in which they operate.
10.2.2.8 Suppliers
Outsourcing of operations to suppliers (e.g., subcontractors, third parties) and the use of technology providers (e.g., cloud services) are guided by agreements, which should contain monitoring protection procedures.
Audits are an ongoing process of evaluating the effectiveness of controls throughout the organization’s operations, systems and processes.
The purpose of a privacy audit is to determine the degree to which technology, processes and people comply with privacy policies and practices.
Audits may be conducted either regularly, ad hoc, or on demand, depending on the purpose.
Privacy audits provide evidence regarding whether privacy operations are doing what they were designed to do and whether privacy controls are correctly managed.
The auditor must have full authority to perform duties; otherwise, the tasks and actions may be challenged and delay the work.
Scoping Audit
Audit Planning Phase - build a checklist, risk assessment, etc.
Audit - meet with stakeholders
Reporting - reporting on compliance and noncompliance
There are three types of audits:
first-party (internal)
second-party (supplier)
third-party (independent).
The frequency and type will vary based on resources, organizational culture, risk tolerance and demand.
The activities described in this section are not useful without time to analyze results. The audit process should have a trigger to signal the privacy officer to step back and evaluate the program, or (ideally), specific pieces of it.