Acknowledgments |
|
xv | |
Introduction |
|
xvii | |
|
Chapter 1 Developing a Privacy Program |
|
|
1 | (60) |
|
|
1 | (1) |
|
|
2 | (1) |
|
|
2 | (1) |
|
|
2 | (1) |
|
|
3 | (2) |
|
Establish a Data Governance Model |
|
|
5 | (1) |
|
|
5 | (2) |
|
|
7 | (6) |
|
Establish a Privacy Program |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
14 | (1) |
|
|
14 | (6) |
|
Privacy Program Strategy Development |
|
|
20 | (9) |
|
|
29 | (2) |
|
Structure the Privacy Team |
|
|
31 | (1) |
|
|
31 | (17) |
|
|
48 | (1) |
|
Privacy Program Communications |
|
|
48 | (1) |
|
Privacy Training and Awareness |
|
|
49 | (4) |
|
Maintaining an Awareness Program |
|
|
53 | (1) |
|
|
53 | (2) |
|
|
55 | (1) |
|
|
56 | (3) |
|
|
59 | (2) |
|
Chapter 2 Privacy Program Framework |
|
|
61 | (76) |
|
Develop the Privacy Program Framework |
|
|
62 | (1) |
|
|
62 | (1) |
|
Developing Privacy Policies |
|
|
63 | (2) |
|
|
65 | (2) |
|
|
67 | (7) |
|
Establishing Legal Basis for Processing |
|
|
74 | (1) |
|
Establishing Legitimate Interest |
|
|
74 | (1) |
|
|
75 | (2) |
|
|
77 | (7) |
|
|
84 | (2) |
|
|
86 | (7) |
|
|
93 | (11) |
|
Implement the Privacy Program Framework |
|
|
104 | (1) |
|
Building a Privacy Operation |
|
|
104 | (2) |
|
Developing and Running Data Protection Operations |
|
|
106 | (1) |
|
Developing and Running Data Monitoring Operations |
|
|
106 | (2) |
|
Working with Data Subjects |
|
|
108 | (2) |
|
|
110 | (1) |
|
|
110 | (1) |
|
|
111 | (2) |
|
|
113 | (1) |
|
Data Subject Engagement Metrics |
|
|
113 | (1) |
|
|
114 | (1) |
|
Program and Process Maturity |
|
|
114 | (1) |
|
|
114 | (1) |
|
|
115 | (1) |
|
|
115 | (1) |
|
Resource Management Metrics |
|
|
116 | (1) |
|
Online Tracking and Behavioral Profiling |
|
|
116 | (1) |
|
Tracking Techniques and Technologies |
|
|
117 | (7) |
|
Tracking in the Workplace |
|
|
124 | (1) |
|
|
125 | (3) |
|
|
128 | (1) |
|
|
129 | (2) |
|
|
131 | (3) |
|
|
134 | (3) |
|
Chapter 3 Privacy Operational Lifecycle: Assess |
|
|
137 | (28) |
|
|
138 | (1) |
|
|
138 | (1) |
|
Baselining Program Elements |
|
|
139 | (1) |
|
Third-Party Risk Management |
|
|
140 | (1) |
|
|
141 | (1) |
|
Privacy Regulation Requirements |
|
|
142 | (1) |
|
|
143 | (4) |
|
|
147 | (1) |
|
Assessing Processing Centers and Work Centers |
|
|
148 | (1) |
|
|
149 | (1) |
|
Document and Media Destruction |
|
|
149 | (1) |
|
|
150 | (1) |
|
Mergers, Acquisitions, and Divestitures |
|
|
151 | (1) |
|
Influencing the Transaction |
|
|
151 | (1) |
|
|
152 | (1) |
|
Privacy Impact Assessments and Data Privacy Impact Assessments |
|
|
152 | (1) |
|
Privacy Threshold Analysis |
|
|
153 | (1) |
|
|
153 | (1) |
|
Engaging Data Subjects in a PIA |
|
|
154 | (1) |
|
|
154 | (1) |
|
Integrating into Existing Processes |
|
|
155 | (1) |
|
Recordkeeping and Reporting |
|
|
155 | (1) |
|
Risks Specific to Privacy |
|
|
155 | (2) |
|
|
157 | (1) |
|
|
158 | (1) |
|
|
159 | (1) |
|
|
159 | (1) |
|
|
160 | (3) |
|
|
163 | (2) |
|
Chapter 4 Privacy Operational Lifecycle: Protect |
|
|
165 | (52) |
|
Information Security Practices |
|
|
165 | (1) |
|
Identity and Access Management |
|
|
166 | (11) |
|
Technical Security Controls |
|
|
177 | (16) |
|
Administrative Safeguards |
|
|
193 | (3) |
|
Privacy and Security by Design |
|
|
196 | (2) |
|
Integrating Privacy into Organization Operations |
|
|
198 | (1) |
|
|
198 | (1) |
|
IT Development and Operations |
|
|
198 | (1) |
|
Business Continuity and Disaster Recovery Planning |
|
|
199 | (1) |
|
Mergers, Acquisitions, Divestitures |
|
|
199 | (1) |
|
|
199 | (2) |
|
|
201 | (1) |
|
|
201 | (1) |
|
|
201 | (1) |
|
|
202 | (1) |
|
|
203 | (1) |
|
|
203 | (1) |
|
|
203 | (1) |
|
Security and Emergency Services |
|
|
204 | (1) |
|
|
204 | (1) |
|
|
205 | (1) |
|
Other Protection Measures |
|
|
205 | (1) |
|
Data Retention and Archiving |
|
|
205 | (2) |
|
|
207 | (1) |
|
Data Sharing and Disclosure |
|
|
207 | (1) |
|
Costs of Technical Controls |
|
|
208 | (2) |
|
|
210 | (1) |
|
|
211 | (1) |
|
|
211 | (3) |
|
|
214 | (3) |
|
Chapter 5 Privacy Operational Lifecycle: Sustain |
|
|
217 | (28) |
|
Monitoring a Privacy Program |
|
|
217 | (1) |
|
Business Process Monitoring |
|
|
218 | (1) |
|
Privacy and Security Event Monitoring |
|
|
219 | (6) |
|
|
225 | (1) |
|
|
225 | (3) |
|
Auditing Privacy Programs |
|
|
228 | (1) |
|
|
228 | (1) |
|
|
229 | (1) |
|
|
229 | (1) |
|
|
230 | (2) |
|
|
232 | (2) |
|
Auditing Specific Privacy Practices |
|
|
234 | (4) |
|
|
238 | (1) |
|
|
239 | (1) |
|
|
240 | (2) |
|
|
242 | (3) |
|
Chapter 6 Privacy Operational Lifecycle: Respond |
|
|
245 | (20) |
|
Data Subject Requests and Privacy Rights |
|
|
245 | (1) |
|
|
246 | (3) |
|
|
249 | (1) |
|
Privacy Incident Response |
|
|
250 | (1) |
|
Incident Response Regulations |
|
|
250 | (1) |
|
Phases of Incident Response |
|
|
250 | (4) |
|
Privacy Incident Response Plan Development |
|
|
254 | (4) |
|
Privacy Continuous Improvement |
|
|
258 | (1) |
|
|
258 | (1) |
|
|
259 | (1) |
|
|
260 | (3) |
|
|
263 | (2) |
|
Appendix A The Risk Management Life Cycle |
|
|
265 | (42) |
|
The Risk Management Process |
|
|
266 | (3) |
|
Risk Management Methodologies |
|
|
269 | (1) |
|
|
269 | (5) |
|
|
274 | (3) |
|
Factor Analysis of Information Risk |
|
|
277 | (1) |
|
|
278 | (1) |
|
|
278 | (1) |
|
Subsystem and Software Assets |
|
|
279 | (1) |
|
Cloud-Based Information Assets |
|
|
279 | (1) |
|
|
279 | (1) |
|
|
279 | (1) |
|
|
280 | (1) |
|
|
281 | (1) |
|
|
281 | (1) |
|
Qualitative Asset Valuation |
|
|
282 | (1) |
|
Quantitative Asset Valuation |
|
|
282 | (1) |
|
|
283 | (1) |
|
|
283 | (3) |
|
|
286 | (1) |
|
Advanced Persistent Threats |
|
|
287 | (1) |
|
|
288 | (1) |
|
Vulnerability Identification |
|
|
289 | (1) |
|
Third-Party Vulnerability Identification |
|
|
290 | (2) |
|
|
292 | (1) |
|
Risk, Likelihood, and Impact |
|
|
293 | (1) |
|
|
293 | (1) |
|
|
294 | (1) |
|
Risk Analysis Techniques and Considerations |
|
|
295 | (1) |
|
|
295 | (1) |
|
Qualitative Risk Analysis |
|
|
296 | (1) |
|
Semiquantitative Risk Analysis |
|
|
296 | (1) |
|
Quantitative Risk Analysis |
|
|
296 | (2) |
|
|
298 | (1) |
|
Other Risk Analysis Methodologies |
|
|
299 | (1) |
|
Risk Evaluation and Ranking |
|
|
299 | (1) |
|
|
300 | (1) |
|
|
300 | (4) |
|
|
304 | (1) |
|
|
304 | (3) |
|
Appendix B About the Online Content |
|
|
307 | (4) |
|
|
307 | (1) |
|
Your Total Seminars Training Hub Account |
|
|
307 | (1) |
|
|
307 | (1) |
|
Single User License Terms and Conditions |
|
|
307 | (2) |
|
|
309 | (1) |
|
|
309 | (2) |
Glossary |
|
311 | (24) |
Index |
|
335 | |