I consider myself a private person, so, naturally, this tendency is reflected in my online profile. I do have Facebook and Instagram accounts, but these were initially created to monitor my children’s online activity and I rarely, if ever, post on them. I also have Twitter and LinkedIn accounts, which I use to post technology-, audit- and cybersecurity-related news. My only real online presence is reflected in this column, related blogs and anything ISACA posts to promote same.
So, is my privacy maintained? With the advent of machine learning, it is possible to classify text in any number of ways. Web services1 exist that use labeled training texts to determine the mood, gender, age and personality2 of content authors. I have fed some of my previous columns into the site and some of the classifications are scarily accurate.
Privacy is the right of an individual to trust that others will appropriately and respectfully use, store, share and dispose of his/her associated personal and sensitive information within the context and according to the purposes for which it was collected or derived.3 The context is important. I am aware that this column is posted online and does not require a password to access, therefore, I cannot reasonably expect my privacy to be fully maintained.
However, now consider your last audit report. How would you feel if it was used to classify your personality? Could your next promotion be decided by artificial intelligence (AI)? Is this acceptable? Probably not without consent. So how can we audit to help mitigate this and other privacy risk?
In previous columns,4, 5 I advocated the use of an ISACA paper on creating audit programs.6 This article will once again apply this process to build an audit program for privacy for your organization.
Determine Audit Subject
The first thing to establish is the audit subject. What does privacy mean in your enterprise? If there are distinct categories of data in use for different areas of the business, they should probably be recorded as separate audit universe items. Fundamentally, though, when considering privacy, the data can be broken down to data stored on customers and employees (the right of an individual).7 Besides databases, files and documents, it is important to also consider where the data are stored and/or from where they are derived, including:8
- Social media
- Cloud computing
- Mobile devices
- Big data analytics/machine learning/AI
- Internet of Things (IoT)
- Personal devices (bring your own device [BYOD])
- Tracking/surveillance technologies—drones, radio frequency identification (RFID) tags, closed circuit television (CCTV), global positioning satellite (GPS) devices
The key is to consider categories of data and determine the audit subject(s). You need to answer the key question: What are you auditing?
Define Audit Objective
Once you have decided what you are auditing, you need to establish the objective of the audit. Why are you auditing it? From an auditor’s perspective, it is advisable to adopt a risk-based view and define the objectives accordingly:
- First, consider the seven categories of privacy:
- Privacy of person
- Privacy of behavior and action
- Privacy of communication
- Privacy of data and image (information)
- Privacy of thoughts and feelings
- Privacy of location and space (territorial)
- Privacy of association9
- Next, consider the risk across the seven categories (figure 1).10 Privacy risk can lead to adverse publicity and reputational damage resulting in customer and economic loss, including fines.
- Finally, consider the audit objectives. This is likely to include compliance to laws and regulations (e.g., the US Health Insurance Portability and Accountability Act [HIPAA],11 the EU General Data Protection Regulation [GDPR]12, 13) and possibly the use of a framework such as International Organization for Standardization (ISO) and International Electrotechnical Commission’s (IEC) ISO/IEC 29100:2011 Information technology—Security techniques—Privacy framework.14 However, I also recommend considering the ISACA Privacy Principles (figure 2) for Audit Objectives. Why? Because the principles were developed by considering privacy laws, standards, frameworks and principles from around the world. They can, therefore, act as an overarching framework and will likely cover all privacy objectives.
Set Audit Scope
When you have defined the objectives of the audit, you should use a scoping process to identify the actual data that need to be audited. In other words, what are the limits to the audit? This could include data in a specific application, process, location or stored by certain devices. Again, this should be risk based.
Perform Pre-Audit Planning
Now that you have identified the risk, it should be evaluated to determine its significance. Conducting a risk assessment is critical in setting the final scope of a risk-based audit. The more significant the risk, the greater the need for assurance. Sample assurance considerations based upon the privacy principles include:15
- Choice and consent—Does the enterprise ensure that appropriate consent has been obtained prior to the transfer of personal information to other jurisdictions?
- Legitimate purpose specification and use limitation—Does the enterprise specify the purpose(s) for which personal information is collected?
- Personal information and sensitive information life cycle—Does the enterprise retain personal information for only as long as necessary?
- Accuracy and quality—Does the enterprise implement practices and processes to ensure that personal information is accurate, complete and up to date?
- Openness, transparency and notice—Does the enterprise provide clear and easily accessible information about its privacy policies and practices?
- Individual participation—Does the enterprise provide data subjects a process to access their personal information?
- Accountability—Does the enterprise assign roles, responsibility, accountability and authority for performing privacy processes?
- Security safeguards—Does the enterprise ensure that appropriate security safeguards are in place for all personal information?
- Monitoring, measuring and reporting—Does the enterprise report compliance with policies, standards and laws?
- Preventing harm—Does the enterprise establish processes to mitigate any personal harms that may occur to data subjects?
- Third-party/vendor management—Does the enterprise implement governance processes to ensure the appropriate protections and use of personal information that are transferred to third parties?
- Breach management—Has the enterprise established a documented policy and supporting procedure for identifying, escalating and reporting incidents?
- Security and privacy by design—Does the enterprise ensure executive support for the identification of personal information and privacy risk within enterprise events?
- Free flow of information and legitimate restriction—Does the enterprise follow the requirements of applicable data protection authorities for the transfer of personal information across country borders?
Interviewing the auditee to inquire about activities or areas of concern that should be included in the scope of the engagement. Once the subject, objective and scope are defined, the audit team can identify the resources that will be needed to perform the audit work.16
Determine Audit Procedures and Steps for Data Gathering
At this stage of the audit process, the audit team should have enough information to identify and select the audit approach or strategy and start developing the audit program.17 You now have enough information to decide what documents you expect to see, what laws and regulations apply, the criteria, and whom you are going to interview. You do, however, need to define the testing steps. In the latter half of 2017, ISACA released an audit/ assurance program that defines testing steps for data privacy.18 As always, this should be considered a starting point and should be adjusted based upon risk and criteria that are relevant to the organization you are auditing. It is worth spending the time to consider the risk and the resulting need for assurance (figure 3).
Key testing steps in the audit program are security related. However, it is important to remember that security does not mean privacy. Confidentiality is preserving authorized restrictions on access and disclosure, including means for protecting privacy and proprietary information.19 Privacy is a possible outcome of security.20
Conclusion
New and emerging technologies will enable enterprises to derive increased insight and, thus, value from data. This will, no doubt, provide competitive advantage. ISACA’s Privacy Principles can be used as an overarching framework in conjunction with these technologies to provide assurance that an enterprise respects the privacy rights of an individual. Demonstrating this to those individuals will also provide a competitive advantage.
Endnotes
1 uClassify is a free machine learning web service. http://www.uclassify.com/
2 The Myers and Briggs Foundation, The Myers-Briggs Type Indicator, www.myersbriggs.org/my-mbti-personality-type/mbti-basics/
3 ISACA, ISACA Privacy Principles and Program Management Guide, USA, 2016
4 Cooke, I.; “Audit Programs,” ISACA Journal, vol. 4, 2017, http://wup.ozone-1.com/resources/isaca-journal/issues
5 Cooke, I.; “Auditing Mobile Devices,” ISACA Journal, vol. 6, 2017, http://wup.ozone-1.com/resources/isaca-journal/issues
6 ISACA, Information Systems Auditing: Tools and Techniques, Creating Audit Programs, USA, 2016
7 Op cit ISACA, ISACA Privacy Principles and Program Management Guide, p.11
8 Ibid. p. 31
9 Ibid. p. 28
10 Ibid. p. 31
11 Department of Health and Human Services, Health Insurance Portability and Accountability Act, USA, http://www.hhs.gov/hipaa/index.html
12 European Commission, 2018 Reform of EU Data Protection Rules, http://ec.europa.eu/commission/priorities/justice-and-fundamental-rights/data-protection/2018-reform-eu-data-protection-rules_en
13 Herold, R.; “Using ISACA Privacy Principles for GDPR Compliance,” COBIT Focus, August 2017
14 International Organization for Standardization, ISO/IEC 29100:2011, Information technology—Security techniques—Privacy framework, http://www.iso.org/standard/45123.html
15 Op cit ISACA, ISACA Privacy Principles and Program Management Guide, p. 44
16 ISACA, Audit Plan Activities: Step-By-Step, 2016
17 Ibid.
18 ISACA, IS Audit/Assurance Program, Data Privacy, USA, 2017
19 Op cit ISACA, ISACA Privacy Principles and Program Management Guide, p. 13
20 Ibid.
Ian Cooke, CISA, CRISC, CGEIT, COBIT Assessor and Implementer, CFE, CPTE, DipFM, ITIL Foundation, Six Sigma Green Belt
Is the group IT audit manager with An Post (the Irish Post Office based in Dublin, Ireland) and has 30 years of experience in all aspects of information systems. Cooke has served on several ISACA committees and is a current member of ISACA’s CGEIT Exam Item Development Working Group. He is the community leader for the Oracle Databases, SQL Server Databases, and Audit Tools and Techniques discussions in the ISACA Knowledge Center. Cooke supported the update of the CISA Review Manual for the 2016 job practices and was a subject matter expert for ISACA’s CISA and CRISC Online Review Courses. He is the recipient of the 2017 John W. Lainhart IV Common Body of Knowledge Award for contributions to the development and enhancement of ISACA publications and certification training modules. He welcomes comments or suggestions for articles via email (Ian_J_Cooke@hotmail.com), Twitter (@COOKEI), or on the Audit Tools and Techniques topic in the ISACA Knowledge Center. Opinions expressed are his own and do not necessarily represent the views of An Post.