Schweitzer Fachinformationen
Wenn es um professionelles Wissen geht, ist Schweitzer Fachinformationen wegweisend. Kunden aus Recht und Beratung sowie Unternehmen, öffentliche Verwaltungen und Bibliotheken erhalten komplette Lösungen zum Beschaffen, Verwalten und Nutzen von digitalen und gedruckten Medien.
Presents a structured approach to privacy management, an indispensable resource for safeguarding data in an ever-evolving digital landscape
In today's data-driven world, protecting personal information has become a critical priority for organizations of all sizes. Building Effective Privacy Programs: Cybersecurity from Principles to Practice equips professionals with the tools and knowledge to design, implement, and sustain robust privacy programs. Seamlessly integrating foundational principles, advanced privacy concepts, and actionable strategies, this practical guide serves as a detailed roadmap for navigating the complex landscape of data privacy.
Bridging the gap between theoretical concepts and practical implementation, Building Effective Privacy Programs combines in-depth analysis with practical insights, offering step-by-step instructions on building privacy-by-design frameworks, conducting privacy impact assessments, and managing compliance with global regulations. In-depth chapters feature real-world case studies and examples that illustrate the application of privacy practices in a variety of scenarios, complemented by discussions of emerging trends such as artificial intelligence, blockchain, IoT, and more.
Providing timely and comprehensive coverage of privacy principles, regulatory compliance, and actionable strategies, Building Effective Privacy Programs:
Written by seasoned professionals with deep expertise in privacy law, cybersecurity, and data protection, Building Effective Privacy Programs: Cybersecurity from Principles to Practice is a vital reference for privacy officers, legal advisors, IT professionals, and business executives responsible for data governance and regulatory compliance. It is also an excellent textbook for advanced courses in cybersecurity, information systems, business law, and business management.
Jason Edwards, DM, CISSP, is an accomplished cybersecurity leader with extensive experience in the technology, finance, insurance, and energy sectors. Holding a Doctorate in Management, Information Systems, and Technology, Jason specializes in guiding large public and private companies through complex cybersecurity challenges. His career includes leadership roles across the military, insurance, finance, energy, and technology industries. He is a husband, father, former military cyber officer, adjunct professor, avid reader, dog dad, and popular on LinkedIn.
Griffin Weaver is the Managing Legal Director (Privacy, Cybersecurity, and Technology) at Dell Technologies. He holds a Juris Doctorate and is a Fellow of Information Privacy (FIP). Weaver specializes in digital law, privacy governance, and cybersecurity policy. He is a sought-after speaker and educator who has taught privacy and cybersecurity law at leading institutions, regularly contributes to industry publications, and presents at global conferences on privacy, data protection, and digital rights.
Table of contents
Preface
Chapter 1 - Introduction to Privacy
Definition and Importance of Privacy
Historical Perspective on Privacy
Modern Privacy Challenges
Recommendations
Chapter Conclusion
Questions
Chapter 2 - Understanding Personal Data
Definition and Types of Personal Data
Sensitive Personal Data
Data Combinations and Anonymization
Chapter 3 - Data Processing
Definition and Types of Processing
Legal Bases for Processing
Data Processing Principles
Chapter 4 - Roles and Relationships
Data Controller vs. Data Processor
Sub-Processors
Data Subjects and Their Rights
Chapter 5 - Privacy Impact Assessments (PIA)
Purpose and Benefits of PIA
Conducting a Privacy Impact Assessment (PIA)
Importance of Stakeholder Involvement
PIA Templates and Examples
Chapter 6 - Roles in Privacy Leadership
Chief Privacy Officer (CPO)
Chief Information Security Officer (CISO)
Data Protection Officer (DPO)
Privacy Champions
Privacy Engineers
Chapter 7 - Data Subject Rights (DSR)
Data Subject Rights (DSR)
Handling Data Subject Requests
DSR Tools and Techniques
Chapter 8 - Privacy Frameworks and Standards
NIST Privacy Framework: Mapping Organizational Practices to the Framework
ISO/IEC 27701
Other Notable Frameworks: GDPR, CCPA, PIPL, and LGPD
Chapter 9 - Major Privacy Laws and Regulations
Major Privacy Laws and Regulations
California Consumer Privacy Act (CCPA)
Health Insurance Portability and Accountability Act (HIPAA)
Comparative Analysis of Global Regulations
Chapter 10 - International Privacy Concerns
Cross-Border Data Transfers
Adequacy Decisions
Binding Corporate Rules and Standard Contractual Clauses
Chapter 11 - Regulatory Enforcement
Role of Data Protection Authorities
International Cooperation Between Authorities
Guidance on Emerging Issues
Enforcement Actions and Penalties
High-Profile Cases and Their Implications
Appeals and Legal Remedies
Case Studies of Regulatory Actions
Chapter 12 - Privacy by Design and Default
Principles of Privacy by Design
Embedding Privacy in Organizational Culture
Lifecycle Management of Personal Data
User-Centric Privacy Controls
Implementing Privacy by Default
Case Studies and Best Practices
Chapter 13 - Privacy Technology and Tools
Privacy Enhancing Technologies (PETs): Anonymization vs. Pseudonymization
Data Masking and Encryption
Privacy Management Software
Chapter 14 - Data Breach Management
Identifying and Responding to Data Breaches
Notification Requirements
Post-Breach Remediation
Chapter 15 - Emerging Privacy Trends
Artificial Intelligence and Privacy
Internet of Things (IoT) and Privacy
Blockchain and Privacy
Chapter 16 - Privacy Program Implementation
Establishing a Privacy Governance Structure
Developing Privacy Policies and Procedures
Implementing Privacy Controls and Measures
Monitoring and Reporting on Privacy Compliance
Continuous Improvement of the Privacy Program
Chapter 17 - Privacy Training and Awareness
Developing Effective Privacy Training Programs
Engaging Employees in Privacy Awareness
Training Tools and Resources
Sample Annual Privacy Training Plan
Chapter 18 - Privacy Audits & Assessments
Privacy Audits and Assessments
Using Assessment Tools
Integrating Assessments with Risk Management
Reporting and Follow-Up Actions
Answers
Index
Privacy is a deeply personal and universal concept that touches every aspect of human life. The boundary allows individuals to define their sense of self, maintain autonomy, and navigate relationships on their terms. Yet, privacy is also a societal construct shaped by cultural values, historical events, and technological advancements. In today's interconnected world, the meaning and scope of privacy are more complex than ever, influenced by the digital revolution, global regulations, and shifting societal expectations. Understanding privacy requires exploring its origins and evolution and examining its contemporary challenges and implications.
Privacy has taken many forms throughout history, from the architectural layouts of ancient homes to the legal protections of personal correspondence. Ancient civilizations recognized the importance of safeguarding personal space and family matters, linking privacy to honor, dignity, and societal roles. The invention of the printing press brought a seismic shift, enabling mass communication and the dissemination of personal information on an unprecedented scale. This marked the beginning of modern privacy concerns as individuals grappled with the public exposure of private lives. Each technological leap, from the printing press to the Internet, has redefined the boundaries of privacy, introducing both opportunities and risks.
The digital age represents the most profound transformation of privacy yet. Data is now a currency that corporations, governments, and individuals collect and trade. Social media platforms encourage users to share their lives openly, often without full awareness of how their information is used or stored. At the same time, governments employ sophisticated surveillance technologies for security, raising concerns about the erosion of civil liberties and the potential for abuse. The balance between individual rights and societal needs has never been more precarious as privacy becomes a central issue in policy, law, and ethics.
By exploring the roots and evolution of privacy, this chapter aims to provide a comprehensive perspective on why privacy matters and how it shapes our lives. It invites readers to consider privacy, not a static concept but a dynamic interplay of individual autonomy, societal values, and technological progress. As we navigate the complexities of the digital age, as shown in Figure 1.1, understanding the historical and cultural foundations of privacy is essential for creating a future that respects and protects this fundamental human right.
Figure 1.1 Historical evolution of privacy timeline.
Privacy controls access to personal information, thoughts, and actions, creating boundaries for safeguarding individual autonomy and dignity. It is a fundamental human right, underpinning the freedom to think, express, and live without undue interference or surveillance. Beyond its personal significance, privacy is essential for societal well-being, fostering trust, innovation, and democratic participation. In an era where data flows freely across borders and technologies monitor every interaction, understanding the definition and importance of privacy is critical. It serves as both a shield for individuals and a cornerstone for ethical and sustainable societal structures, ensuring a balance between personal freedoms and collective progress.
Understanding the legal definitions of privacy is a critical foundation for building effective privacy programs. These definitions vary widely across jurisdictions, influenced by cultural, historical, and governmental factors. Privacy often refers to the individual's right to control personal information, but the legal interpretation of this principle is anything but universal. For organizations, navigating these variations is not just a compliance requirement but a strategic necessity in a globalized world. A company operating across borders must be equipped to handle a patchwork of privacy regulations, each demanding unique considerations and tailored approaches.
In the European Union, privacy is a fundamental human right, codified in the EU Charter of Fundamental Rights. This perspective is operationalized through the General Data Protection Regulation (GDPR), one of the world's most stringent and comprehensive privacy laws. GDPR broadly defines personal data, encompassing any information that can identify an individual, such as names, email addresses, and IP addresses. The regulation's primary goal is to empower individuals with control over their data, emphasizing principles like data minimization and explicit consent.
The GDPR imposes strict compliance requirements on organizations, with penalties for violations reaching up to 4% of annual global turnover or ?20 million, whichever is higher. Its extraterritorial scope ensures that companies outside the EU handling data of EU residents must also comply, extending its influence beyond European borders. However, implementing GDPR principles in practice often proves to be challenging, as businesses must align their operations with rigorous standards without disrupting productivity. This has led to the GDPR becoming a global benchmark, inspiring similar legislation in other regions, though many struggle to achieve its level of enforcement and clarity.
The GDPR also emphasizes transparency, requiring organizations to inform individuals how their data is collected and used. This fosters trust between businesses and consumers, a critical factor in the digital economy. Yet, the administrative burden of maintaining compliance, such as appointing data protection officers and conducting regular impact assessments, often overwhelms smaller organizations. Despite these challenges, the GDPR represents a paradigm shift in privacy, setting a high bar for respecting individual autonomy in the digital age.
The United States takes a markedly different approach to privacy, adopting a fragmented system rather than a unified federal law like the GDPR. The US privacy regulations are largely sector-specific, addressing particular industries or data types. For example, the Health Insurance Portability and Accountability Act (HIPAA) governs the use and protection of health information, while the Gramm-Leach-Bliley Act (GLBA) applies to financial institutions. This piecemeal approach reflects that the United States prioritizes market innovation and economic freedom over comprehensive privacy regulation.
At the state level, laws like the California Consumer Privacy Act (CCPA) and its successor, the California Privacy Rights Act (CPRA), have emerged to fill gaps in federal oversight. These laws grant California residents rights similar to those under the GDPR, such as the ability to access, delete, and opt out of the sale of their data. However, the absence of a national standard creates a compliance headache for companies operating across multiple states. Each state's unique requirements can conflict, forcing businesses to adopt complex and often costly compliance strategies.
The fragmented approach in the United States often leaves significant gaps in data protection, particularly in emerging areas like artificial intelligence (AI) and biometric data. Critics argue that this patchwork of laws fails to provide consistent protections for individuals, leaving many vulnerable to misuse of their personal information. This system requires flexibility and a profound understanding of regulatory nuances for organizations. Successful privacy programs in the United States depend on navigating this maze effectively while maintaining operational efficiency.
China's approach to privacy reflects its broader governmental priorities, which emphasize state security and economic development over individual rights. The Personal Information Protection Law (PIPL), China's primary privacy legislation, outlines strict rules for data handling, emphasizing data localization and government access. Unlike the GDPR, which focuses on empowering individuals, the PIPL prioritizes national interests, requiring companies to store sensitive data within Chinese borders and conduct mandatory security assessments before transferring data abroad.
While the PIPL grants individuals certain rights, such as the ability to access and correct their data, these rights exist within a framework heavily influenced by state oversight. Organizations operating in China must be prepared for extensive compliance obligations, including establishing mechanisms for government data access and ensuring robust cybersecurity measures. The penalties for noncompliance are severe, ranging from hefty fines to suspension of business operations, making adherence to Chinese privacy laws a high-stakes endeavor.
China's privacy laws also highlight a cultural divergence in the global conversation about privacy. Where Western frameworks often center on individual autonomy, China's model underscores the collective good and the state's role in safeguarding societal stability. This creates a unique challenge for multinational corporations: respecting local laws without alienating global stakeholders with different expectations about privacy and transparency. Navigating these tensions requires legal expertise, cultural sensitivity, and strategic foresight.
Privacy is, at its core,...
Dateiformat: ePUBKopierschutz: Adobe-DRM (Digital Rights Management)
Systemvoraussetzungen:
Das Dateiformat ePUB ist sehr gut für Romane und Sachbücher geeignet – also für „fließenden” Text ohne komplexes Layout. Bei E-Readern oder Smartphones passt sich der Zeilen- und Seitenumbruch automatisch den kleinen Displays an. Mit Adobe-DRM wird hier ein „harter” Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.Bitte beachten Sie: Wir empfehlen Ihnen unbedingt nach Installation der Lese-Software diese mit Ihrer persönlichen Adobe-ID zu autorisieren!
Weitere Informationen finden Sie in unserer E-Book Hilfe.