marilyn prosch, ph.d., cipp arizona state university

10
Marilyn Prosch, Ph.D., CIPP Arizona State University

Upload: jayson-webster

Post on 03-Jan-2016

219 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Marilyn Prosch, Ph.D., CIPP Arizona State University

Marilyn Prosch, Ph.D., CIPPArizona State University

Page 2: Marilyn Prosch, Ph.D., CIPP Arizona State University

Maria in Germany

Division A

Pierre in France

Division B

Pierre’s house

Customer

Credit Memo

Order

Vendor

Division XSpain

Page 3: Marilyn Prosch, Ph.D., CIPP Arizona State University

• Multiple Divisions• Multiple Countries• Internal Audit will likely want to transfer employee

data into a central repository

Page 4: Marilyn Prosch, Ph.D., CIPP Arizona State University

EmployeePersonal

Information(address)

VendorInformation(address)

CustomerInformation(address)

Cross-Referencing

Page 5: Marilyn Prosch, Ph.D., CIPP Arizona State University

Pierre’s house

Address 1

2000-2007

Anjuli’shouse

2008

Address 1

Pierre’s house

2008Address 2

Page 6: Marilyn Prosch, Ph.D., CIPP Arizona State University

EmployeePersonal

Information(address)

Pierre – Address 2Anjuli – Address 1

VendorInformation(address)

CustomerInformation(Address 1)

Cross-Referencing

False Positive

Page 7: Marilyn Prosch, Ph.D., CIPP Arizona State University

• EU law, until recently, restricted the transfer of personal data to countries not on the short list of those deemed to have adequate protections in place.

• US is not considered “adequate”• EU data protection authorities have just amended the

rules for overseas data transfers. • The Article 29 Working Party has created Binding

Corporate Rules (BCRs) that will allow companies to send data within an organization, but outside EU borders and into countries whose data protection standards the European Commission has not found adequate.

Page 8: Marilyn Prosch, Ph.D., CIPP Arizona State University

• “In determining reasonableness, considerations include the breadth of the information collected, the extent of the intrusion, whether the collection and use relates to a specific investigation or whether it is an ongoing surveillance program of the employer implemented on the off chance that it might find something.

• Canadian law is in general not friendly to intrusive ongoing monitoring that is not incident or investigation based but might rather be characterized as a “fishing expedition.” It would come down to the employer’s situation, the demonstrated necessity for the program etc and proportionality vis a vis the employer’s needs and the employee’s right to privacy.”

Page 9: Marilyn Prosch, Ph.D., CIPP Arizona State University

• One would need to ask questions such as:

• Would the database and data matching include all employees or is it more targeted

• Will there be any sensitive personal information involved• Is the program likely to be effective in achieving its stated

purpose?• Conflict of interest/fraud detection – is there another less

privacy intrusive way to monitor• Is it the data matching ongoing or a one off or annual program?• Is the program incident related? Incident activated?• Is it reasonable and proportionate given the employer needs

and purposes.

Page 10: Marilyn Prosch, Ph.D., CIPP Arizona State University

• Descriptive research: What are companies actually doing? Are they aware of the issues? If so, how are they handling these issues? Are they using some kind of data masking during these processes?

• Normative research: How can we build privacy protection into processes?o Data tagging and maskingo Data replication (logging)o Security around possession and handlingo Data life and destruction techniques (poison pills)