APAC CIO Outlook
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Agile

    Artificial Intelligence

    Aviation

    Bi and Analytics

    Big Data

    Blockchain

    Cloud

    Cyber Security

    Digital Infrastructure

    Digital Marketing

    Digital Transformation

    Digital Twin

    Drone

    Internet of Things

    Low Code No Code

    Networking

    Remote Work

    Singapore Startups

    Smart City

    Software Testing

    Startup

  • E-Commerce

    Education

    FinTech

    Healthcare

    Manufacturing

    Retail

    Travel and Hospitality

  • Dell

    Microsoft

    Salesforce

    SAP

  • Cognitive

    Compliance

    Contact Center

    Corporate Finance

    Data Center

    Data Integration

    Digital Asset Management

    Gamification

    HR Technology

    IT Service Management

    Managed Services

    Procurement

    RegTech

    Travel Retail

Menu
    • Compliance
    • Software Testing
    • Procurement
    • Managed Services
    • Cyber Security
    • Gamification
    • Blockchain
    • CRM
    • E-Commerce
    • MORE
    #

    Apac CIO Outlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIO Outlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    • Compliance
    Editor's Pick (1 - 4 of 8)
    left
    Welcoming Big Data Technology amidst Changes

    Darren Cockrel, CIO, Coyote Logistics

    Leveraging Compliance to Your Advantage

    Mark Bloom, Global CIO, Aegon

    Demystifying the Role of IT in Millennial Organizations

    Jeff Fithian, VP, Strategic Initiatives and CIO, Dynamic Materials Corporation

    Productivity and Security- Can you ever have both?

    Julie Cullivan, SVP, Business Operations & CIO, Fireeye

    Lessons Learned from a CIO

    John Miller, Vice President and CIO, American Textile Company

    The Hard Case For Investing In Compliance

    Alexander Maclean, Global Head Of Regulatory Compliance / Chief Compliance Officer, Aegon [Ams: Agn]

    Compliance , Regulatory Affairs, Contract Management

    Charles Hammersla, Head Of Facilities Management – Nab, Cushman & Wakefield [Nyse: Cwk]

    Andreas Uremovic, Managing Director, Global Head Investment Portfolio Compliance, Allianz Global Investors [Fra: Alv]

    Andreas Uremovic, Managing Director, Global Head Investment Portfolio Compliance, Allianz Global Investors [Fra: Alv]

    right

    The Intersection of Privacy and IT

    Dana Louise Simberkoff, JD, CIPP/US, Chief Compliance and Risk Officer, AvePoint

    Tweet
    content-image

    Dana Louise Simberkoff, JD, CIPP/US, Chief Compliance and Risk Officer, AvePoint

    I recently attended a speaking session on the importance of developing a classification schema for your data, presented by a privacy attorney and a Chief Privacy Officer. They described in detail how to build a classification schema that would properly identify Personally Identifiable Information (PII), secure sensitive information, regulated content, and other types of company specific sensitive data – such as financial information, contracts, and intellectual property. Toward the end of the session, an audience member raised his hand and asked, “How do you make sure that the documents are actually tagged with the schema?”

    Unfortunately–but not surprisingly–there was no real assurance that tagging would be correct or completed at all. Therein lies the problem! There are many factors that go into the determination of an organization’s privacy program and policies–including statutory and regulatory requirements, company or organizational best practices, and market demands. But regardless of the mandate source, all organizations should carefully consider whether the policies they are building are technically enforceable.

    “Privacy and security should not be seen as blockers to productivity but rather as enablers of the business”

    Creating a policy without any mechanism (automated, manual, or third-party) to measure and monitor compliance of the policy is somewhat like setting a curfew for a teenager and then going away for the weekend.

    How do we know as privacy professionals if people will live up to expectations? How do we know if those expectations are even reasonable?

    In order to build an effective privacy policy, we must not only have an understanding of the legal and statutory requirements that will shape the policy within our organizations, but also how these policies relate to the business practices , people, and technologies. The center or “pivot point” of that strategy should be around the data that you hold. Here are some simple best practices for ensuring the success of a privacy program:

    1) Set enforceable policies: In the absence of education or experience, people will naturally make poor privacy and security decisions with technology. This means that systems need to be easy to use securely. This is a critical point and probably one of the single largest opportunities for privacy and security programs to be revamped.

    2) Make it easier for your end users to do the right thing: Create simple policies, rules, and IT controls and make it easier for your end users to do their jobs effectively with the systems and controls that you want them to use. Don’t set up policies that are so cumbersome and restrictive that your employees are pushed to private cloud options – including Dropbox, Box, and Google for Work – to be able to effectively do their job. At the end of the day, your employees will do what they need to do to get their job done. Join them in making it simple to use the systems you can also control.

    3) Trust and Verify: Trust your end users to appropriately identify and classify sensitive data they are handling and/or creating, but verify that they are doing so. Use a layered approach to data classification to ensure that the policies, training, and tools are being properly understood and integrated into the day-to-day tasks of your workforce.

    4) Measure, Report, and Monitor: That which is not measured cannot be improved. Don’t have a policy that sits on a shelf - policies should be living, breathing documents that reflect and direct the flow of your business. Privacy and security should not be seen as blockers to productivity but rather as enablers of the business. Your reporting can help you build a better security program, as well as help you demonstrate the Return On Investment (ROI) for your program.

    Privacy officers must closely align not only with their security counterparts, but also with their IT counterparts. For privacy officers fluent in the language of the law, it is important to understand the limitations and possibilities available to their company through technology.

    tag

    Financial

    ROI

    Weekly Brief

    loading
    Top 10 Compliance Solutions Companies - 2022

    Featured Vendors

    MasterSAM

    Sanjeev Dhar, MD

    entity solutions

    Matthew Franceschini, CEO & Co-founder

    ON THE DECK

    Compliance 2022

    Top Vendors

    Compliance 2021

    Top Vendors

    Compliance 2020

    Top Vendors

    Compliance 2019

    Top Vendors

    Compliance 2018

    Top Vendors

    Compliance 2017

    Top Vendors

    Compliance 2016

    Top Vendors

    Previous Next

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Deliver Resiliency with Managed Services

    Deliver Resiliency with Managed Services

    Edy Salim, Head of Technology Services & Enterprise Architecture, PT Adira Dinamika Multifinance Tbk
    Sustainable Future through Innovative Technology Solutions

    Sustainable Future through Innovative Technology Solutions

    Faisal Parvez, CIO and Director, BT
    How to align Supply Chain with Corporate Strategy

    How to align Supply Chain with Corporate Strategy

    Chanaka Rathnayake, Senior Production Manager (Packaging) at The HEINEKEN Company
    A dose of our own medicine

    A dose of our own medicine

    SABINA JANSTROM, IT DIRECTOR, DYNO NOBEL
    Insider Threat

    Insider Threat

    AI is America's best weapon for disrupting health inequities

    AI is America's best weapon for disrupting health inequities

    Michael Dowling, President & Ceo, Northwell Health and Tom Manning, Chairman, Ascertain
    Combating IoT Challenges with Smart Choices

    Combating IoT Challenges with Smart Choices

    Sandeep Babbar, Head Of Technology Innovation, Gwa Group Limited
    Artificial Intelligence regulations and its impact on medical devices

    Artificial Intelligence regulations and its impact on medical devices

    Leo Hovestadt, Director Quality Assurance Elekta
    Loading...

    Copyright © 2023 APAC CIOoutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    |  Sitemap |  Subscribe |   About us

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://compliance.apacciooutlook.com/cxoinsights/the-intersection-of-privacy-and-it-nwid-771.html