Expanding the OSI Stack for Privacy Risk Management

 
E
x
p
a
n
d
i
n
g
 
t
h
e
 
O
S
I
 
S
t
a
c
k
 
t
o
 
D
e
s
c
r
i
b
e
C
a
t
e
g
o
r
i
e
s
 
o
f
 
P
r
i
v
a
c
y
 
T
a
s
k
s
:
T
h
e
 
P
r
i
v
a
c
y
 
I
n
s
t
i
t
u
t
i
o
n
s
 
R
i
s
k
M
a
n
a
g
e
m
e
n
t
 
F
r
a
m
e
w
o
r
k
 
P
r
o
f
e
s
s
o
r
 
P
e
t
e
r
 
S
w
i
r
e
G
e
o
r
g
i
a
 
T
e
c
h
 
S
c
h
e
l
l
e
r
 
C
o
l
l
e
g
e
 
o
f
 
B
u
s
i
n
e
s
s
A
l
s
t
o
n
 
&
 
B
i
r
d
 
L
L
C
N
I
S
T
 
P
r
i
v
a
c
y
 
F
r
a
m
e
w
o
r
k
 
C
o
n
f
e
r
e
n
c
e
M
a
y
 
1
2
,
 
2
0
1
9
 
I
n
t
r
o
d
u
c
t
i
o
n
 
Warm welcome to this conference, to consider the draft NIST
Privacy Framework: An Enterprise Risk Management Tool
 
I
n
t
r
o
d
u
c
t
i
o
n
 
One observation comparing NIST Cybersecurity and Privacy
Frameworks:
C
y
b
e
r
s
e
c
u
r
i
t
y
 
F
r
a
m
e
w
o
r
k
 
e
x
p
a
n
d
e
d
 
t
h
e
 
s
c
o
p
e
 
o
f
d
i
s
c
u
s
s
i
o
n
s
 
a
b
o
u
t
 
c
y
b
e
r
s
e
c
u
r
i
t
y
Previous discussions focused on the technical aspects
of cybersecurity
NIST Framework adds organizational & management
aspects
P
r
i
v
a
c
y
 
F
r
a
m
e
w
o
r
k
 
f
o
c
u
s
e
s
 
o
n
 
p
a
r
t
 
o
f
 
l
o
n
g
-
s
t
a
n
d
i
n
g
d
i
s
c
u
s
s
i
o
n
s
 
a
b
o
u
t
 
p
r
i
v
a
c
y
I
m
p
o
r
t
a
n
t
 
t
o
 
d
e
f
i
n
e
 
s
c
o
p
e
 
o
f
 
P
r
i
v
a
c
y
 
F
r
a
m
e
w
o
r
k
,
 
a
n
d
l
o
c
a
t
e
 
w
i
t
h
i
n
 
p
r
e
-
e
x
i
s
t
i
n
g
 
p
r
i
v
a
c
y
 
d
i
s
c
u
s
s
i
o
n
s
 
O
v
e
r
v
i
e
w
 
o
f
 
t
h
i
s
 
P
r
e
s
e
n
t
a
t
i
o
n
 
B
u
i
l
d
 
o
n
 
p
u
b
l
i
s
h
e
d
 
r
e
s
e
a
r
c
h
 
a
b
o
u
t
 
t
h
e
 
n
o
n
-
c
o
d
e
 
a
s
p
e
c
t
s
 
o
f
c
y
b
e
r
s
e
c
u
r
i
t
y
A
p
p
l
y
 
t
h
a
t
 
f
r
a
m
e
w
o
r
k
 
t
o
 
p
r
i
v
a
c
y
 
r
i
s
k
 
m
a
n
a
g
e
m
e
n
t
C
a
t
e
g
o
r
i
z
e
 
p
r
i
v
a
c
y
 
r
i
s
k
s
 
t
o
 
a
n
 
e
n
t
e
r
p
r
i
s
e
 
b
e
y
o
n
d
 
t
h
e
i
n
t
e
r
n
a
l
 
a
n
d
 
c
o
n
t
r
a
c
t
u
a
l
 
p
r
a
c
t
i
c
e
s
 
o
f
 
t
h
e
 
o
r
g
a
n
i
z
a
t
i
o
n
P
r
o
p
o
s
e
 
a
n
 
i
n
t
e
l
l
e
c
t
u
a
l
 
s
t
r
u
c
t
u
r
e
 
t
o
 
l
o
c
a
t
e
 
t
h
e
 
s
c
o
p
e
 
o
f
 
t
h
e
d
r
a
f
t
 
i
n
 
t
h
e
 
b
r
o
a
d
e
r
 
s
e
t
 
o
f
 
p
r
i
v
a
c
y
 
d
i
s
c
u
s
s
i
o
n
s
,
 
s
u
c
h
 
a
s
 
s
e
l
f
-
r
e
g
u
l
a
t
i
o
n
,
 
n
a
t
i
o
n
a
l
 
l
a
w
s
,
 
a
n
d
 
r
u
l
e
s
 
f
o
r
 
c
r
o
s
s
-
b
o
r
d
e
r
 
d
a
t
a
 
f
l
o
w
s
P
r
o
p
o
s
e
 
a
 
P
r
i
v
a
c
y
 
I
n
s
t
i
t
u
t
i
o
n
s
 
R
i
s
k
 
M
a
n
a
g
e
m
e
n
t
 
(
P
I
R
M
)
F
r
a
m
e
w
o
r
k
 
 
 
CACM, Published 9/26/18
 
T
h
e
m
e
 
o
f
 
C
A
C
M
 
A
r
t
i
c
l
e
:
G
r
o
w
t
h
 
i
n
 
N
o
n
-
C
o
d
e
 
C
y
b
e
r
s
e
c
u
r
i
t
y
 
R
e
a
l
 
c
y
b
e
r
s
e
c
u
r
i
t
y
 
t
o
d
a
y
 
d
e
v
o
t
e
s
 
e
n
o
r
m
o
u
s
 
e
f
f
o
r
t
 
t
o
 
n
o
n
-
c
o
d
e
 
v
u
l
n
e
r
a
b
i
l
i
t
i
e
s
 
a
n
d
 
r
e
s
p
o
n
s
e
s
.
T
h
e
 
C
y
b
e
r
s
e
c
u
r
i
t
y
 
W
o
r
k
f
o
r
c
e
 
F
r
a
m
e
w
o
r
k
 
o
f
 
t
h
e
 
N
a
t
i
o
n
a
l
I
n
i
t
i
a
t
i
v
e
 
f
o
r
 
C
y
b
e
r
s
e
c
u
r
i
t
y
 
E
d
u
c
a
t
i
o
n
 
l
i
s
t
s
 
3
3
 
s
p
e
c
i
a
l
t
y
 
a
r
e
a
s
f
o
r
 
c
y
b
e
r
s
e
c
u
r
i
t
y
 
j
o
b
s
.
 
T
e
n
 
o
f
 
t
h
e
 
s
p
e
c
i
a
l
t
y
 
a
r
e
a
s
 
p
r
i
m
a
r
i
l
y
i
n
v
o
l
v
e
 
c
o
d
e
,
 
b
u
t
 
m
o
r
e
 
t
h
a
n
 
h
a
l
f
 
p
r
i
m
a
r
i
l
y
 
i
n
v
o
l
v
e
 
n
o
n
-
c
o
d
e
w
o
r
k
 
(
1
5
 
a
r
e
a
s
,
 
i
n
 
m
y
 
e
s
t
i
m
a
t
e
)
 
o
r
 
a
r
e
 
m
i
x
e
d
 
(
e
i
g
h
t
 
a
r
e
a
s
,
p
e
r
 
m
y
 
a
s
s
e
s
s
m
e
n
t
)
.
C
A
C
M
 
a
r
t
i
c
l
e
 
s
e
e
k
s
 
t
o
 
c
a
t
e
g
o
r
i
z
e
 
t
h
e
 
n
o
n
-
c
o
d
e
 
a
s
p
e
c
t
s
 
o
f
c
y
b
e
r
s
e
c
u
r
i
t
y
Expand the OSI stack to new layers 8, 9, 10
D
e
f
i
n
e
 
f
o
r
 
e
a
c
h
 
l
a
y
e
r
 
t
h
e
 
p
r
o
b
l
e
m
s
,
 
d
i
s
c
i
p
l
i
n
e
s
,
 
a
n
d
t
e
a
m
 
m
e
m
b
e
r
s
h
i
p
 
S
e
v
e
n
 
L
a
y
e
r
s
 
o
f
 
t
h
e
 
O
S
I
 
S
t
a
c
k
 
In my experience, these seven layers are well known to knowledgeable
computer people who work on cybersecurity.  Intuitively, they also know
that cyber-attacks can happen at any of these 7 levels.
 
 
 
L
a
y
e
r
s
 
8
,
 
9
,
 
a
n
d
 
1
0
:
 
N
a
t
u
r
a
l
 
L
a
n
g
u
a
g
e
 
E
x
a
m
p
l
e
s
 
f
r
o
m
 
C
y
b
e
r
s
e
c
u
r
i
t
y
 
GT MGMT/CoC/PubPol 4726/6726 “Information Security Strategies
and Policy”
Required for Masters in Cybersecurity
How do all the pieces of this course fit together? Tasks:
L
a
y
e
r
 
8
:
 
C
o
r
p
o
r
a
t
e
 
c
y
b
e
r
s
e
c
u
r
i
t
y
 
p
o
l
i
c
i
e
s
 
a
n
d
g
o
v
e
r
n
a
n
c
e
 
 
e
.
g
.
,
 
d
r
a
f
t
 
r
a
n
s
o
m
w
a
r
e
 
p
o
l
i
c
y
 
f
o
r
 
a
 
h
o
s
p
i
t
a
l
g
r
o
u
p
L
a
y
e
r
 
9
:
 
G
o
v
e
r
n
m
e
n
t
 
l
a
w
s
/
r
e
g
u
l
a
t
i
o
n
s
 
 
e
.
g
.
,
 
p
r
o
p
o
s
e
d
s
t
a
t
e
 
l
e
g
i
s
l
a
t
i
o
n
 
t
o
 
g
o
v
e
r
n
 
I
o
T
 
c
y
b
e
r
s
e
c
u
r
i
t
y
L
a
y
e
r
 
1
0
:
 
N
a
t
i
o
n
 
s
t
a
t
e
 
a
n
d
 
i
n
t
e
r
n
a
t
i
o
n
a
l
 
 
e
.
g
.
,
 
d
r
a
f
t
N
a
t
i
o
n
a
l
 
S
e
c
u
r
i
t
y
 
C
o
u
n
c
i
l
 
m
e
m
o
 
o
n
 
c
y
b
e
r
t
h
r
e
a
t
s
 
f
r
o
m
 
R
u
s
s
i
a
a
n
d
 
p
o
l
i
c
y
 
o
p
t
i
o
n
s
 
t
o
 
r
e
s
p
o
n
d
F
o
r
 
e
a
c
h
,
 
w
h
a
t
 
s
k
i
l
l
 
s
e
t
 
n
e
e
d
e
d
 
o
n
 
t
h
e
 
e
n
t
e
r
p
r
i
s
e
 
t
e
a
m
,
 
t
o
e
f
f
e
c
t
i
v
e
l
y
 
m
a
n
a
g
e
 
r
i
s
k
s
?
Skills needed beyond areas where computer scientists are
comfortable
 
C
r
e
a
t
e
 
a
 
3
x
3
 
M
a
t
r
i
x
:
 
I
n
s
t
i
t
u
t
i
o
n
a
l
 
S
o
u
r
c
e
s
o
f
 
G
o
v
e
r
n
a
n
c
e
 
o
f
 
R
i
s
k
 
Horizontal layers
Layer 8: organizational
Layer 9: government
Layer 10: international
Vertical columns
Column A: actions within an organization or nation
Column B: relations with other actors
Column C: other limits from that layer
Layer 8: limits on private sector from private sector
Layer 9: limits on government from government
Layer 10: limits on nation from other nations
 
L
a
y
e
r
 
8
:
 
P
r
i
v
a
c
y
 
w
i
t
h
i
n
 
O
r
g
a
n
i
z
a
t
i
o
n
s
:
C
o
n
t
r
a
c
t
s
 
L
a
y
e
r
 
9
:
 
G
o
v
e
r
n
m
e
n
t
 
L
a
y
e
r
:
 
L
a
w
 
L
a
y
e
r
 
1
0
:
 
I
n
t
e
r
n
a
t
i
o
n
a
l
 
L
a
y
e
r
:
 
D
i
p
l
o
m
a
c
y
 
W
h
e
r
e
 
d
o
 
U
s
e
r
s
 
f
i
t
?
 
F
o
c
u
s
 
o
f
 
3
x
3
 
m
a
t
r
i
x
 
o
n
 
m
a
n
a
g
i
n
g
 
p
r
i
v
a
c
y
 
r
i
s
k
s
 
f
o
r
 
o
r
g
a
n
i
z
a
t
i
o
n
s
,
g
o
v
e
r
n
m
e
n
t
s
,
 
a
n
d
 
i
n
t
e
r
n
a
t
i
o
n
a
l
l
y
A user is not an organization, government or international actor
I
 
s
u
g
g
e
s
t
 
u
s
e
r
s
 
a
r
e
 
p
a
r
t
 
o
f
 
L
a
y
e
r
 
8
P
r
i
v
a
t
e
 
s
e
c
t
o
r
 
a
c
t
o
r
s
 
r
a
n
g
e
 
f
r
o
m
 
i
n
d
i
v
i
d
u
a
l
 
u
s
e
r
s
/
s
o
l
e
p
r
o
p
r
i
e
t
o
r
s
h
i
p
 
t
o
 
m
o
d
e
s
t
 
s
i
z
e
 
t
o
 
l
a
r
g
e
 
o
r
g
a
n
i
z
a
t
i
o
n
s
EU law – individuals retain privacy rights when acting in
business capacity
Users lack an IT department, a general counsel, and face lots of
risks
8
A
:
 
W
i
t
h
i
n
 
t
h
e
 
h
o
u
s
e
h
o
l
d
 
 
h
o
w
 
i
n
d
i
v
i
d
u
a
l
/
f
a
m
i
l
y
 
m
a
n
a
g
e
s
p
r
i
v
a
c
y
 
r
i
s
k
s
8
B
:
 
R
e
l
a
t
i
o
n
s
 
w
i
t
h
 
o
t
h
e
r
 
a
c
t
o
r
s
 
 
T
e
r
m
s
 
o
f
 
s
e
r
v
i
c
e
,
 
i
d
e
n
t
i
t
y
 
t
h
e
f
t
i
n
s
u
r
a
n
c
e
,
 
h
i
r
e
 
G
e
e
k
 
S
q
u
a
d
U
s
e
r
 
p
r
o
t
e
c
t
i
o
n
 
i
s
 
a
 
b
i
g
 
c
o
n
c
e
r
n
 
a
t
 
9
A
 
(
g
o
v
e
r
n
m
e
n
t
 
r
e
g
u
l
a
t
i
o
n
 
o
f
b
u
s
i
n
e
s
s
)
,
 
s
u
c
h
 
a
s
 
G
D
P
R
,
 
H
I
P
A
A
 
I
m
p
l
i
c
a
t
i
o
n
s
 
f
o
r
 
M
a
n
a
g
i
n
g
 
P
r
i
v
a
c
y
 
R
i
s
k
 
Computer scientists/engineers are used to thinking about layers 1 to
7
CACM: Pedagogic Cybersecurity Framework (PCF)
T
o
d
a
y
:
 
P
r
i
v
a
c
y
 
I
n
s
t
i
t
u
t
i
o
n
s
 
R
i
s
k
 
M
a
n
a
g
e
m
e
n
t
 
F
r
a
m
e
w
o
r
k
 
(
P
I
R
M
F
r
a
m
e
w
o
r
k
)
 
(
S
u
g
g
e
s
t
i
o
n
s
 
f
o
r
 
o
t
h
e
r
 
t
i
t
l
e
?
)
The expanded OSI stack helps privacy engineers and others:
S
p
o
t
 
t
h
e
 
r
i
s
k
s
 
a
n
d
 
m
i
t
i
g
a
t
i
o
n
s
 
f
o
r
 
e
a
c
h
 
p
a
r
t
 
o
f
 
l
a
y
e
r
s
 
8
 
t
o
 
1
0
D
e
f
i
n
e
 
t
h
e
 
s
k
i
l
l
 
s
e
t
s
 
n
e
e
d
e
d
 
f
o
r
 
y
o
u
r
 
t
e
a
m
Enterprise draws on the relevant expertise in technology,
organizational behavior, law, and international relations as
needed
 
R
e
s
e
a
r
c
h
 
A
g
e
n
d
a
 
f
o
r
 
M
a
n
a
g
i
n
g
 
P
r
i
v
a
c
y
R
i
s
k
s
 
Each cell in the 3x3 matrix has characteristic research
questions
8
B
 
 
h
o
w
 
t
o
 
d
e
s
i
g
n
 
(
l
a
w
/
b
u
s
i
n
e
s
s
)
 
a
n
d
 
i
m
p
l
e
m
e
n
t
(
p
r
i
v
a
c
y
 
e
n
g
i
n
e
e
r
i
n
g
)
 
c
o
n
t
r
a
c
t
s
 
f
o
r
 
d
a
t
a
 
a
c
q
u
i
s
i
t
i
o
n
 
a
n
d
d
i
s
s
e
m
i
n
a
t
i
o
n
?
8
C
 
a
n
d
 
9
A
 
 
l
a
w
 
a
n
d
 
p
o
l
i
t
i
c
a
l
 
s
c
i
e
n
c
e
 
q
u
e
s
t
i
o
n
s
 
o
f
 
m
i
x
 
o
f
m
a
r
k
e
t
s
,
 
r
e
g
u
l
a
t
i
o
n
,
 
a
n
d
 
s
e
l
f
-
r
e
g
u
l
a
t
i
o
n
 
t
o
 
p
r
o
t
e
c
t
p
r
i
v
a
c
y
1
0
C
 
 
r
o
l
e
 
o
f
 
s
u
p
r
a
n
a
t
i
o
n
a
l
 
i
n
s
t
i
t
u
t
i
o
n
s
 
(
i
n
t
e
r
n
a
t
i
o
n
a
l
r
e
l
a
t
i
o
n
s
)
 
P
o
t
e
n
t
i
a
l
 
f
o
r
 
t
h
e
 
P
r
i
v
a
c
y
 
C
u
r
r
i
c
u
l
u
m
 
Helps describe what topics are done in each course:
Mostly corporate governance for CPOs (layer 8)
Mostly design of state/national laws (layer 9)
Mostly international relations, for global interoperability
(layer 10)
An overall curriculum could determine how full the
coverage is of the 3x3 matrix
 
P
I
R
M
 
F
r
a
m
e
w
o
r
k
 
a
n
d
 
P
o
s
s
i
b
l
e
I
n
t
e
g
r
a
t
i
o
n
 
w
i
t
h
 
N
I
S
T
 
P
r
i
v
a
c
y
 
F
r
a
m
e
w
o
r
k
 
N
I
S
T
 
F
r
a
m
e
w
o
r
k
:
 
A
n
 
E
n
t
e
r
p
r
i
s
e
 
R
i
s
k
 
M
a
n
a
g
e
m
e
n
t
 
T
o
o
l
C
u
r
r
e
n
t
 
d
r
a
f
t
 
f
o
c
u
s
e
s
 
o
n
 
8
A
 
(
c
o
m
p
l
i
a
n
c
e
 
w
i
t
h
i
n
 
a
n
 
o
r
g
a
n
i
z
a
t
i
o
n
)
a
n
d
 
8
B
 
(
c
o
n
t
r
a
c
t
s
 
w
i
t
h
 
o
t
h
e
r
 
o
r
g
a
n
i
z
a
t
i
o
n
s
)
Word search for “Regulatory” - legal/regulatory now a small part
of “Identify” activities
P
r
i
v
a
c
y
 
I
n
s
t
i
t
u
t
i
o
n
s
 
R
i
s
k
 
M
a
n
a
g
e
m
e
n
t
 
F
r
a
m
e
w
o
r
k
 
h
i
g
h
l
i
g
h
t
s
 
w
a
y
s
t
h
a
t
 
e
n
t
e
r
p
r
i
s
e
 
r
i
s
k
 
m
a
n
a
g
e
m
e
n
t
 
i
n
t
e
r
s
e
c
t
s
 
w
i
t
h
 
a
 
b
r
o
a
d
e
r
 
s
e
t
 
o
f
c
o
m
p
e
t
e
n
c
i
e
s
 
a
n
d
 
i
s
s
u
e
s
W
i
t
h
 
s
t
e
a
d
y
 
s
t
r
e
a
m
 
o
f
 
i
s
s
u
e
s
 
a
t
 
l
a
y
e
r
s
 
8
C
,
 
9
,
 
a
n
d
 
1
0
 
t
h
e
e
n
t
e
r
p
r
i
s
e
 
t
e
a
m
 
s
h
o
u
l
d
 
h
a
v
e
 
s
k
i
l
l
 
s
e
t
 
t
o
 
i
d
e
n
t
i
f
y
 
a
n
d
 
r
e
s
p
o
n
d
t
o
 
a
 
w
i
d
e
 
r
a
n
g
e
 
o
f
 
p
r
i
v
a
c
y
-
r
e
l
a
t
e
d
 
d
e
v
e
l
o
p
m
e
n
t
s
E
x
a
m
p
l
e
:
 
c
u
r
r
e
n
t
 
p
r
o
j
e
c
t
 
f
o
r
 
o
n
e
 
c
o
m
p
a
n
y
 
o
n
 
h
o
w
 
t
o
 
r
e
s
p
o
n
d
t
o
 
r
i
s
k
 
o
f
 
c
u
t
-
o
f
f
 
o
f
 
p
e
r
s
o
n
a
l
 
d
a
t
a
 
f
r
o
m
 
E
U
 
t
o
 
U
.
S
.
 
u
n
d
e
r
S
c
h
r
e
m
s
 
I
I
 
c
a
s
e
 
n
o
w
 
a
t
 
t
h
e
 
E
u
r
o
p
e
a
n
 
C
o
u
r
t
 
o
f
 
J
u
s
t
i
c
e
 
C
o
n
c
l
u
s
i
o
n
:
 
C
o
n
t
r
i
b
u
t
i
o
n
s
 
o
f
 
t
h
e
 
1
0
-
l
a
y
e
r
s
t
a
c
k
 
P
r
i
v
a
c
y
 
I
n
s
t
i
t
u
t
i
o
n
s
 
R
i
s
k
 
M
a
n
a
g
e
m
e
n
t
 
F
r
a
m
e
w
o
r
k
 
p
r
o
v
i
d
e
s
 
a
p
a
r
s
i
m
o
n
i
o
u
s
 
s
t
r
u
c
t
u
r
e
 
t
o
 
o
r
g
a
n
i
z
e
 
t
h
e
 
j
u
m
b
l
e
 
o
f
 
i
s
s
u
e
s
 
n
o
w
c
r
o
w
d
i
n
g
 
i
n
t
o
 
p
r
i
v
a
c
y
 
m
a
n
a
g
e
m
e
n
t
,
 
l
a
w
,
 
a
n
d
 
p
o
l
i
c
y
For practitioners, students, and teachers, a way to keep the
many issues straight
E
n
t
e
r
p
r
i
s
e
 
r
i
s
k
s
 
c
a
n
 
h
a
p
p
e
n
 
a
t
 
l
a
y
e
r
s
 
8
,
 
9
,
 
a
n
d
 
1
0
,
 
i
f
 
t
h
e
c
o
m
p
a
n
y
 
h
a
s
 
b
a
d
 
p
o
l
i
c
i
e
s
,
 
t
h
e
 
n
a
t
i
o
n
 
h
a
s
 
b
a
d
 
l
a
w
s
,
 
o
r
 
t
h
e
i
n
t
e
r
n
a
t
i
o
n
a
l
 
c
o
m
m
u
n
i
t
y
 
d
i
s
r
u
p
t
s
 
a
p
p
r
o
p
r
i
a
t
e
 
d
a
t
a
 
f
l
o
w
s
B
e
c
a
u
s
e
 
s
o
 
m
u
c
h
 
o
f
 
p
r
i
v
a
c
y
 
d
i
s
c
u
s
s
i
o
n
 
t
o
 
d
a
t
e
 
h
a
s
 
b
e
e
n
 
o
u
t
s
i
d
e
 
o
f
8
A
 
a
n
d
 
8
B
,
 
i
n
t
e
l
l
e
c
t
u
a
l
l
y
 
i
m
p
o
r
t
a
n
t
 
t
o
 
f
i
n
d
 
s
o
m
e
 
w
a
y
 
t
o
 
p
l
a
c
e
N
I
S
T
 
d
r
a
f
t
 
i
n
t
o
 
a
 
m
o
r
e
 
c
o
m
p
r
e
h
e
n
s
i
v
e
 
i
n
t
e
l
l
e
c
t
u
a
l
 
f
r
a
m
e
w
o
r
k
T
h
e
 
P
I
R
M
 
F
r
a
m
e
w
o
r
k
 
i
s
 
o
n
e
 
c
a
n
d
i
d
a
t
e
 
t
o
 
p
u
t
 
t
h
e
 
c
u
r
r
e
n
t
 
N
I
S
T
d
r
a
f
t
 
i
n
t
o
 
a
 
b
r
o
a
d
e
r
,
 
o
r
g
a
n
i
z
i
n
g
 
a
p
p
r
o
a
c
h
 
t
o
 
p
r
i
v
a
c
y
 
r
i
s
k
m
a
n
a
g
e
m
e
n
t
T
h
a
t
 
w
o
u
l
d
 
c
l
a
r
i
f
y
 
w
h
a
t
 
t
h
e
 
N
I
S
T
 
d
r
a
f
t
 
d
o
e
s
,
 
a
n
d
 
d
o
e
s
 
n
o
t
,
s
e
e
k
 
t
o
 
d
o
Thank you
 
F
o
c
u
s
 
o
f
 
t
h
e
 
N
I
S
T
 
P
r
i
v
a
c
y
 
F
r
a
m
e
w
o
r
k
Slide Note
Embed
Share

Explore the categorization of privacy risks within enterprises beyond internal practices, contractual obligations, and regulatory frameworks. The presentation delves into the development of a Privacy Institutions Risk Management framework proposed by Professor Peter Swire at Georgia Tech, Scheller College of Business, to address the evolving landscape of privacy discussions.

  • Privacy Risk Management
  • Privacy Framework
  • Enterprise Privacy
  • Data Protection

Uploaded on Sep 29, 2024 | 1 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. Expanding the OSI Stack to Describe Categories of Privacy Tasks: The Privacy Institutions Risk Management Framework Professor Peter Swire Georgia Tech Scheller College of Business Alston & Bird LLC NIST Privacy Framework Conference May 12, 2019

  2. Introduction Warm welcome to this conference, to consider the draft NIST Privacy Framework: An Enterprise Risk Management Tool

  3. Introduction One observation comparing NIST Cybersecurity and Privacy Frameworks: Cybersecurity Framework expanded the scope of discussions about cybersecurity Previous discussions focused on the technical aspects of cybersecurity NIST Framework adds organizational & management aspects Privacy Framework focuses on part of long-standing discussions about privacy Important to define scope of Privacy Framework, and locate within pre-existing privacy discussions

  4. Overview of this Presentation Build on published research about the non-code aspects of cybersecurity Apply that framework to privacy risk management Categorize privacy risks to an enterprise beyond the internal and contractual practices of the organization Propose an intellectual structure to locate the scope of the draft in the broader set of privacy discussions, such as self- regulation, national laws, and rules for cross-border data flows Propose a Privacy Institutions Risk Management (PIRM) Framework

  5. CACM, Published 9/26/18

  6. Theme of CACM Article: Growth in Non-Code Cybersecurity Real cybersecurity today devotes enormous effort to non- code vulnerabilities and responses. The Cybersecurity Workforce Framework of the National Initiative for Cybersecurity Education lists 33 specialty areas for cybersecurity jobs. Ten of the specialty areas primarily involve code, but more than half primarily involve non-code work (15 areas, in my estimate) or are mixed (eight areas, per my assessment). CACM article seeks to categorize the non-code aspects of cybersecurity Expand the OSI stack to new layers 8, 9, 10 Define for each layer the problems, disciplines, and team membership

  7. Seven Layers of the OSI Stack In my experience, these seven layers are well known to knowledgeable computer people who work on cybersecurity. Intuitively, they also know that cyber-attacks can happen at any of these 7 levels.

  8. Layers 8, 9, and 10: Natural Language Layer 10 International Natural language Natural language Diplomacy Layer 9 Governmental Law Layer 8 Organizational Natural Contracts language Computer Code Layers 1-7 OSI stack Various protocols

  9. Examples from Cybersecurity GT MGMT/CoC/PubPol 4726/6726 Information Security Strategies and Policy Required for Masters in Cybersecurity How do all the pieces of this course fit together? Tasks: Layer 8: Corporate cybersecurity policies and governance e.g., draft ransomware policy for a hospital group Layer 9: Government laws/regulations e.g., proposed state legislation to govern IoT cybersecurity Layer 10: Nation state and international e.g., draft National Security Council memo on cyberthreats from Russia and policy options to respond For each, what skill set needed on the enterprise team, to effectively manage risks? Skills needed beyond areas where computer scientists are comfortable

  10. Create a 3x3 Matrix: Institutional Sources of Governance of Risk Horizontal layers Layer 8: organizational Layer 9: government Layer 10: international Vertical columns Column A: actions within an organization or nation Column B: relations with other actors Column C: other limits from that layer Layer 8: limits on private sector from private sector Layer 9: limits on government from government Layer 10: limits on nation from other nations

  11. Layer 8: Privacy within Organizations: Contracts Within the Organization Relations with Other Actors Other Limits on Private Sector Examples of privacy law and policy Roles, such as CPO, lawyers and privacy engineers DPIAs/PIAs & other internal policies Training Systems for access and other data subject rights Users precautions Vendor & other contracts & management More broadly, rules on data dissemination, including to researchers Breach insurance DAA auto, and other self-regulatory standards Technical standards such as W3C and IETF For each, what skill set on the team?

  12. Layer 9: Government Layer: Law Within the Organization Relations with Other Actors Limits on Government Examples of privacy law and policy GDPR, HIPAA, GLBA, and other privacy laws (100+ countries) Data breach laws spreading Rules limiting strong encryption De-identification rules (fewer limits where not PII/personal data) Constitutional and statutory limits on what the state can do, such as 4th Amendment, ECPA, FISA, or other illegal surveillance Processor/business associate rules Data broker/public record rules Rules on data acquisition & dissemination For each, what skill set on the team?

  13. Layer 10: International Layer: Diplomacy Within the Nation Relations with Other Nations Other Limits on Nations Examples of privacy law and policy Non-binding international approaches, such as OECD Privacy Guidelines Formal agreements, such as EU/US Privacy Shield or EU/Japan adequacy Cooperation with other nations, such as coordinated privacy enforcement Possible supra- national rules, such as by UN European Convention on Human Rights (Strasbourg Court) Council of Europe Convention 108 and Budapest Convention Limits on cross- border transfer, such as prohibit export to nations that lack adequate protections Data localization requirements, to protect citizens or enable law enforcement access For each, what skill set on the team?

  14. Where do Users fit? Focus of 3x3 matrix on managing privacy risks for organizations, governments, and internationally A user is not an organization, government or international actor I suggest users are part of Layer 8 Private sector actors range from individual users/sole proprietorship to modest size to large organizations EU law individuals retain privacy rights when acting in business capacity Users lack an IT department, a general counsel, and face lots of risks 8A: Within the household how individual/family manages privacy risks 8B: Relations with other actors Terms of service, identity theft insurance, hire Geek Squad User protection is a big concern at 9A (government regulation of business), such as GDPR, HIPAA

  15. Implications for Managing Privacy Risk Computer scientists/engineers are used to thinking about layers 1 to 7 CACM: Pedagogic Cybersecurity Framework (PCF) Today: Privacy Institutions Risk Management Framework (PIRM Framework) (Suggestions for other title?) The expanded OSI stack helps privacy engineers and others: Spot the risks and mitigations for each part of layers 8 to 10 Define the skill sets needed for your team Enterprise draws on the relevant expertise in technology, organizational behavior, law, and international relations as needed

  16. Research Agenda for Managing Privacy Risks Each cell in the 3x3 matrix has characteristic research questions 8B how to design (law/business) and implement (privacy engineering) contracts for data acquisition and dissemination? 8C and 9A law and political science questions of mix of markets, regulation, and self-regulation to protect privacy 10C role of supranational institutions (international relations)

  17. Potential for the Privacy Curriculum Helps describe what topics are done in each course: Mostly corporate governance for CPOs (layer 8) Mostly design of state/national laws (layer 9) Mostly international relations, for global interoperability (layer 10) An overall curriculum could determine how full the coverage is of the 3x3 matrix

  18. PIRM Framework and Possible Integration with NIST Privacy Framework NIST Framework: An EnterpriseRisk Management Tool Current draft focuses on 8A (compliance within an organization) and 8B (contracts with other organizations) Word search for Regulatory - legal/regulatory now a small part of Identify activities Privacy Institutions Risk Management Framework highlights ways that enterprise risk management intersects with a broader set of competencies and issues With steady stream of issues at layers 8C, 9, and 10 the enterprise team should have skill set to identify and respond to a wide range of privacy-related developments Example: current project for one company on how to respond to risk of cut-off of personal data from EU to U.S. under Schrems II case now at the European Court of Justice

  19. Conclusion: Contributions of the 10-layer stack Privacy Institutions Risk Management Framework provides a parsimonious structure to organize the jumble of issues now crowding into privacy management, law, and policy For practitioners, students, and teachers, a way to keep the many issues straight Enterprise risks can happen at layers 8, 9, and 10, if the company has bad policies, the nation has bad laws, or the international community disrupts appropriate data flows Because so much of privacy discussion to date has been outside of 8A and 8B, intellectually important to find some way to place NIST draft into a more comprehensive intellectual framework The PIRM Framework is one candidate to put the current NIST draft into a broader, organizing approach to privacy risk management That would clarify what the NIST draft does, and does not, seek to do Thank you

  20. Focus of the NIST Privacy Framework

More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#