Data Privacy
Data Privacy
Data Privacy
APR 2018
Objectives
– To ensure that ERNST YOUNG Mercury Project Workforce Members are aware of IBM’s
Data Security and Privacy (DS&P) guidelines; and that they understand their project-
related responsibilities regarding DS&P.
Goal:
– To ensure that there is an effective DS&P processes, designed to reduce the risk of data
loss and/or mismanagement to an acceptable and reasonable level for the
project/contract, business processes, and information systems environment.
Data Privacy: The ability of individuals to determine when, how, and to what extent information
about them is used or disclosed to others
Sensitive personal information (SPI) could be misused to harm a person in a financial,
employment or social way. [The USA also focuses on information facilitating identity theft
(SSN, account code, PIN, etc.), and on medical information]
Personally identifiable information (PI) includes any data element relating to identified or
identifiable individuals
Business sensitive information (BSI) is information protected by a client or other company
as important to their business, the improper exposure or use of which could harm them.
*IBM’s definition of SPI can be found at: http://w3.ibm.com/ibm/privacy/practices_guidance.html
Security: The practices we employ through people, processes and technology to protect information
to minimize the potential of a data breach or security compromise
Benefits of execution
Critical Regulatory and Legal Requirements
Business optimization
Sarbanes-Oxley Act of 2002 Environmental Solid reputation / industry
Accounting Standards (SRV) Open Source Software differentiation
Export Regulations Intellectual Property
Immigration Data Security & Privacy
Tax
Consequences of
FFIEC
insufficient execution
LOST OPPORTUNITY
50% of consumers avoid making purchases
online because they are afraid their financial
information will be stolen (Source: Cyber
Security Industry Alliance survey of
consumers, 2007)
LOST CUSTOMERS
33% of consumers notified of a security
breach will terminate their relationship with the
company they perceive as responsible
(Source: Ponemon Institute, 2007)
LOST REVENUE
The average cost per hour of unplanned
downtime = $42,000, per 1000 transactions
(Source: Alinen ROI Report)
To secure IBM assets: Comply with IBM corporate instructions such as ITCS300 and
ITCS104, which collectively covers topics such as:
Do’s
Follow the clean desk policy.
Collect printouts from printer trays promptly.
All confidential documents/ literature/ information should be kept under lock
and key.
At the end of your working day, lock all your papers in the storage
provided.
Keep your drawer keys secure.
All confidential documents should be shredded prior to disposal
Activate the password protected keyboard/screen lock when leaving your
work area.
Don’ts
Do not leave your drawer keys at insecure locations
Do not leave Post-it Notes with confidential information at a place from
where it can be picked by anyone.
Do not leave any papers on your workstation after you leave for the day.
Do not leave any documents on the printer once you have printed them.
Do not attempt to install/run any software/code/application without prior
approval from IBM or Client.
Do not attempt to bypass any security controls
Do not attempt to access any IBM or client information which you are not
permitted to, or which is not relevant or required in the current
responsibilities.
Don’ts
Do not post IBM or client specific/ proprietary information on
public sites.
Do not access online music/ games sites, P2P software
(Kazaa, Napster, Skype etc.), chat sites and/or other
inappropriate forums through IBM or Client site. Do not
download or copy freeware and shareware software
from the Internet or any other source.
Never send passwords or other personal information about
yourself to anyone.
Do not auto forward emails from external addresses to your
official mail email id or vice versa
Do not forward chain mails / spam while accessing IBM or
client mail systems.
Never send inappropriate messages
Do not use the client email infrastructure for communication
on non-client related IBM confidential matters.
Do’s
Use Internet only for business related work.
Use only IBM provided licensed software.
Report obscene emails Delete unsolicited advertising e-
mail without replying to it
Remove Photo, MP3, movies etc from laptop
Remove trial versions
Don’ts
Personal details like DoB, Anniversary dates, Spouse/Children
names etc should not be used in the passwords.
Avoid using names of places, or other common dictionary words as
your password.
Don’t reveal your password to anyone.
Don’t write down your password for the world to see.
The new General Data Protection Regulation of the European Economic Area (EEA) which includes the
EU + Iceland, Liechtenstein, Norway. It establishes much more stringent data protection requirements
over personal data within its scope. Both the Data Controller and Data Processor (generally IBM) are
subject to fines under this new law of up to €20M or 4% of the organization’s global annual turnover
per incident.
The Regulation applies to all organizations that process personal data within the EEA or that process
personal data outside the EEA when the processing activities are related to the offering of goods or
services to the individual physically located in the EEA or when the processing activities are related to
the monitoring of an individual's behavior as far as the behavior takes place in any EEA country.
GDPR was published in May 2016 and will be in effect from May 25, 2018 (It will remain as national law
in the UK after Brexit).
Data Controller is responsible to ensure and demonstrate that data processing is performed in
accordance to the Regulation
20
“The GDPR Regulation applies to the “’Personal Data’ means any information relating to an identified or identifiable
processing of Personal Data wholly or natural person (‘Data Subject’); an identifiable natural person is one who can be
partly by automated means and to the identified, directly or indirectly, in particular by reference to an identifier such as a
processing other than by automated name, an identification number, location data, an online identifier or to one or more
means of personal data which form part of factors specific to the physical, physiological, genetic, mental, economic, cultural or
a filing system or are intended to form part social identity of that natural person”
of a filing system.“
FAQ: Is this Personal Data? YES (these Direct identifiers: Data that can be used to identify a person without
are just some examples…) additional information (e.g. name, social security number or contact information)
Indirect identifiers: Data that does not uniquely identify an individual but may
• Email IDs, phone numbers, car reveal individual identities if combined with additional data points from other
registration numbers sources (e.g. birthday or location)
• Electricity/gas meters
• Any Personal Data that we process for Ensure there is a common Read more…
the Client, about their staff, end users, understanding with the Client on o IBM Data Privacy resources:
customers etc. which data are Personal Data! Current PI definition
"Mary presentation“: illustrates how
• Online identifiers and location data to handle personal information
Business Contact Information: about a Client contact – follow the
Any Personal Data that we at IBM link on this page
• Date of birth maintain about our business contacts – o External article with overview of the new
Clients, subcons, partners etc. – is also definition of Personal Data
• A picture of a person (they can be subject to GDPR. It falls under IBM’s
identified, and the photo may also responsibility as a Controller.
convey additional Personal Data)
–Link: -- http://w3-03.ibm.com/security/secweb.nsf/ContentDocsByCtryTitle/Corporate~Incident+reporting?Open&Country=Global+Services
Do’s
When on IBM premises always carry your IBM ID card on
your person and display it prominently
When on customer premises always carry the customer
given ID card and display it prominently
Workstations should be physically locked (e.g. cable
locks) when unattended
If any physical asset including ID badge/Portable
media/Laptops etc are lost or stolen, report to physical
security officer and manager immediately
Keep System locked
Don'ts
Do not tailgate
Do not allow anyone to tailgate
Do not loan your ID badge to another employee
Do not leave your laptops unattended in your vehicle of in
any public place
• http://w3.the.ibm.com/ecmweb/cybersecurity/recent
ITCS 300 IT Security Standard in use at IBM
_policy_updates.html
• http://ams1.sby.ibm.com/as/as.nsf/content/as_data
Data Privacy GBS Data Security & Privacy Guidance
privacyguidance