Anda di halaman 1dari 15

Protecting personal information using

Generally Accepted Privacy Principles


(GAPP) and Continuous Control Monitoring
to enhance corporate governance

Marilyn Prosch
Received (in revised form): 1st March, 2008

School of Global Management and Leadership, Arizona State University, PO Box 37100, Phoenix, AZ
85069, USA; E-mail: marilyn.prosch@asu.edu

Marilyn Prosch PhD is an Associate Professor of had their personal information compromised and the inves-
Accounting Information Systems at Arizona State tigation revealed that a mere $102,000 spent on data
University. She has met with or spoken to the US redaction would have prevented the snafu (see references 1 and
Department of Commerce, US FTC, National Asso- 2). Top management, including CEOs, CFOs, CISOs,
ciation of Secretaries of State, and the Arizona
and CPOs all need to be aware of privacy risk manage-
Auditor General’s Office on the subject of GAPP,
ment issues and techniques to reduce privacy risk.
and has conducted various research studies on
privacy breaches and GAPP.
Researchers need to help advance the development and
measurement of privacy-enhancing techniques and the
implementation of GAPP in order to help move organi-
EXECUTIVE SUMMARY
sations along the Privacy Maturity Model. This article is
KEYWORDS: privacy, GAPP, data protection, written by a member of the AICPA’s Privacy Task Force
continuous monitoring
and a Certified Information Privacy Professional.
International Journal of Disclosure and Governance
The first decade of the new millennium may well become
(2008) 5, 153–166. doi:10.1057/jdg.2008.7;
known as the era of data breaches. In a recent speech
published online 10 April 2008
given by the Federal Trade Commission’s (FTC) Chief
Privacy Officer, Marc Groman, he emphasised to the ‘If you haven’t heard of the Generally Accepted
National Association of Secretaries of States to prepare Privacy Principles (GAPP), take stock: They’re
well because ‘you will have a data breach’ (Washington, likely to become the most important new
DC, 18th February, 2008). This article discusses the source of requirements for your IT projects
present privacy crisis and offers a solution to managing sinceY2k and Sarbanes–Oxley.Why is this? The
and reducing privacy risk through the use of the AICPA/ accounting industry has closed ranks around
CICA’s Generally Accepted Privacy Principles (GAPP). the idea that the GAPP is the best international
When the court of public opinion or the FTC is grilling framework for assessing the privacy health of an
an organisation regarding a data breach, the best defence organization…. What is the GAPP? I have to
for the organisation is to provide evidence, such as adher- agree with the auditors on this one. It’s the best
ence to GAPP criteria or an actual GAPP audit, that attempt so far to address the main point of pain
they were diligent and serious about data protection poli- for global chief privacy officers: the growing
cies. Recently, the Chair of Her Majesty’s Revenue & complexity of privacy regulations around the
Customs in the UK resigned after 25 million Britons world.’ (Cline3)

© 2008 Palgrave Macmillan Ltd. 1741-3591 $30.00 Vol. 5, 2, 153–166 International Journal of Disclosure and Governance 153
www.palgrave-journals.com/jdg
Protecting personal information using GAPP and CCM

INTRODUCTION per incident cost was lower, but still quite high
When new positions are created at the ‘C’ at Ł1.4m for 2007. Organisations of all types
suite level, that action sends the signal that top are falling victim to these breaches. According
management is taking related matters seriously, to the Privacy Rights Clearinghouse data, the
hence the rise of the Chief Privacy Officer. types of data breaches publicly reported for
A list of relatively recent ‘first’ appointments 2007 in the US affected the following types
of CPOs could be given, but it would be a of organisations:
long list. Such new appointments range from
the Department of Homeland Security, to the • 95 government and non-profit agencies;
State of Arizona, to Microsoft. In 2000, when • 87 educational institutions;
IBM named their first CPO, a Gartner analyst, • 51 healthcare organisations;
Bill Malik declared ‘The Chief Privacy Officer • 93 for-profit organisations.
is a trend whose time has come’.4 About the
same time that CPOs began to expand their In the UK, data breaches have also plagued
presence in corporate boardrooms, the Amer- organisations. For example, in 2007 two com-
ican Institute of Certified Public Accountants puter discs went missing from Her Majesty’s
jointly with the Canadian Institute of Char- Revenue & Customs. They contained the
tered Accountants (AICPA/CICA5) responded personal details of all 25 million UK families
by creating a Privacy Task Force in 2001 that claiming a child benefit. The data were not
ultimately ended up developing what is now encrypted and contained information including
known as Generally Accepted Privacy Prin- names, addresses, dates of birth, national insur-
ciples (GAPP). GAPP is a comprehensive ance numbers, and bank and building society
framework that provides specific criteria that account details. Actually, data breaches occurred
CPOs and other privacy and security experts before this ‘privacy storm’ began; however, new
can use to assess, build, and monitor privacy data breach notification laws, such as Califor-
programmes. Ultimately, GAPP can be used to nia’s Civil Code Sections 1798.29 and 1798.82,
perform privacy audits. require that organisations notify the victims.
What is the driving force behind CPO Such notification laws have now been enacted
appointments and the development of GAPP? in 38 US states. As discussed later, the EU has
The plain and simple answer is loss and theft historically been a leader in data protection
of personal information (PI). A plague of data regulation; however, data breach notification
breaches has affected organisations of all types. laws are still pending.
According to many sources at the time, 2005 As the cost of data collection, storage, and
was considered to be the worst year by far in processing increasingly declines due to software
terms of the sheer number of privacy breaches and hardware enhancements, the ability of indi-
experienced by organisations.6 Unfortunately, viduals to control data kept by business and gov-
the negative trend has not ebbed. According ernment entities also declines. Managing this
to the Identity Theft Resource Center, data data becomes an important corporate govern-
breaches in the US reached a record number ance issue because all organisations that collect,
in 2007 with more than 79 million records use, or store PI face privacy risk. What is con-
reported compromised.These data breaches have sidered a precious asset by many organisations
significant costs and they are rising. According is the object of concern by many individuals.
to a study of actual data breaches conducted by For example, in the past, businesses collected
the Ponemon Institute, the average total per- data primarily about customers based on their
incident costs in 2007 for the US were $6.3m, purchasing history. These same businesses, along
compared to an average per incident cost of with ever-changing technology, now have web-
$4.8m in 2006. In the UK, the average total based and wireless capabilities that allow them

154 International Journal of Disclosure and Governance Vol. 5, 2, 153–166 © 2008 Palgrave Macmillan Ltd. 1741-3591 $30.00
Prosch

to monitor and record other types of behaviour, as a privacy misfit can damage your company’s
such as browsing activity, frequently without reputation, lead to costly litigation and send your
the knowledge or consent of the individual. customers running to the competition’.That book
‘The computer has been accused of harboring was written by two Canadians, one of whom was
a potential for increased surveillance of the the Privacy Commissioner of Ontario at about
citizen by the state, and the consumer by the the same time that wide-sweeping federal legis-
corporation’.7 lation was being phased in for all organisations
The objective of this paper is threefold. operating in Canada. The Canadian legislation,
First, a discussion of the cultural lag8 in the Personal Information Protection and Electronic
management of PI that has resulted from the Documents Act (PIPEDA), was largely based on
advances in technology accelerating faster than the European Commission’s 1995 Data Protec-
the capacity to control such information is tion Directive. Increasingly, Canadian companies
presented. The second objective is to intro- find themselves with a competitive advantage
duce the AICPA/CICA’s GAPP and to discuss simply because they keep their customers’ data
how these principles can be used in enhancing in Canada and specifically are not sending it to
corporate governance over PI by developing the US because it is considered to be better pro-
and implementing Continuous Control Moni- tected in Canada.10
toring (CCM) environments that contain PI. A fundamental difference between the Euro-
The benefits of using the criteria in GAPP and pean Commission’s widely recognised and
incorporating them into CCM environments pioneering EU Data Protection Directive and
are also discussed. Finally, a privacy maturity the US privacy regime regarding employee PI
model is presented to help guide researchers is succinctly stated as employer data collection
and members of industry enhance data protec- requirements (US) vs employee privacy rights
tion techniques. (EU). Anti-discrimination laws and worker
safety laws in the US require that employees
TECHNOLOGY, PRIVACY, AND collect all types of PI, whereas the collection
CULTURAL LAG of such data in the EU is generally strictly
Privacy issues, including both security and prohibited. Consider that while Canada and its
corporate abuse of PI, are hotly debated in provinces and the EU and its member countries
the US between consumer advocacy groups, all have some form of Privacy Commissioner’s
privacy advocacy groups, legislators, regulators, office, the US has no equivalent position at the
industry groups, and the press. Most state leg- federal level, and few at the state level.11
islators, frustrated with the lack of federal leg- Regarding customers, the EU provides data
islation, have increasingly been enacting their protection for all consumers that requires that
own legislation, with California often leading personal data on the internet be:
the way. Internationally, the US has far less pri-
vacy protection for consumers and employees • processed fairly and lawfully;
than the EU, Canada, Australia, Switzerland, and • collected and processed for specified,
Argentina, among others. explicit legitimate purpose;
As we consider the value of privacy pro- • accurate and current; and
tection of PI, one important question posed • kept no longer than deemed necessary to
by businesses as they are confronted by various fulfil the stated purpose.
groups to invest in data protection and pri-
vacy enhancing technologies and processes is Further, users have the following rights:
this — what is in it for us? Cavoukian and
Hamilton9 espouse the benefits of the privacy • access to personal data;
payoff to businesses, asserting that ‘being exposed • correction, erasure, or blocking of information;

© 2008 Palgrave Macmillan Ltd. 1741-3591 $30.00 Vol. 5, 2, 153–166 International Journal of Disclosure and Governance 155
Protecting personal information using GAPP and CCM

• objection to usage; fundamental differences in privacy environ-


• objection to automated individual decisions; ments and privacy practices between these dif-
and ferent cultures are reminiscent of a sentiment
• judicial remedy and compensation. made by Tinker13 that no reason exists ‘why
the social environment should be treated as
Since consumers in the US do not have the inevitable and immutable; it has to be created,
same sort of data protection mandated in the together with the institutions that populate it’.
EU and Canada, among other countries, the Society’s expectations about privacy can actu-
question to businesses is whether this pri- ally be eroded.12
vacy is valued. Millions of data transfers occur At this juncture in the US, the trajectory
every day between the US and EU, and the that privacy issues will take, both now and in
EU Directive gives its member countries essen- the future, is uncertain. What is certain is that if
tially ‘a global reach’ with an attached liability technological solutions are not offered in a cost-
for noncompliance. Basically, non-European effective manner in a largely self-regulated envi-
companies have to meet the EU’s Directive ronment, then the solutions offered will not be
if they want to conduct electronic commerce embraced by organisations.The US is not alone,
in Europe or risk legal action. In response to however, in the concern by its citizens regarding
the EU’s Directive, the US Department of technological privacy protection, even though
Commerce and the European Commission it lags behind many other countries in privacy
developed a ‘safe harbour’ framework in July legislation. A recent survey indicates that people
2000 that allows US organisations to satisfy in Canada (66 per cent), Spain (62 per cent)
specific requirements and ensure that personal and the US (60 per cent) are similarly worried
data flows to the United States are not inter- about providing PI on websites.14
rupted. The safe harbour framework provides Marshall15 notes that the rapid rise of the
a solution to the differences between the EU internet and electronic commerce has not
and US approaches to privacy protection and allowed the ethical support theory and imple-
ensures greater protection for EU citizen’s PI. mentation to develop at a fast enough rate to
Many US privacy advocates are upset that the maintain a proper balance between technology
implementation of safe harbour provisions by and individual rights. This phenomenon can be
US firms results in greater privacy rights for best understood when framed in Ogburn’s16
foreign citizens than for the US’s own citizens. cultural lag theory where rapid technological
To date, over 1,500 US companies have signed progress occurs with inadequate develop-
up for Safe Harbour. ment of ethical support for new technology.8
The cultural differences in these countries Rapid technological advances that easily allow
have had a profound impact on the evolution privacy infringements are widely in use, yet
of privacy protection requirements. Cultural little progress has been made enhancing pri-
differences can shape expectations, and expec- vacy through technology.17 Data security and
tations can, to some extent, shape legislation flagrant breaches of privacy have reached an
and regulatory requirements.12 Technology as epidemic stage, and consumers are begin-
an enabler of the silent erosion of a reasonable ning to question whether they want to accept
expectation of privacy is arguably occurring the erosion of their privacy by the business
in the US12 and to a lesser extent, in the EU community.
and Canada. The difference is likely due to the Ethicists and groups, such as the Center for
cultural expectations of the two populations Democracy and Technology, have been cham-
and the approaches by government and regu- pioning privacy efforts since technology first
latory agencies to either protect the consumer became available that easily and cheaply allows
(EU) or to protect business (US). The resulting e-surveillance; however, ‘until a technology has

156 International Journal of Disclosure and Governance Vol. 5, 2, 153–166 © 2008 Palgrave Macmillan Ltd. 1741-3591 $30.00
Prosch

achieved a critical level of social diffusion suf- The relationship among these three elements is
ficient to engender popular controversy, broad illustrated in Figure 1. Up until time a, tech-
social attention is seldom given’.15 The relation- nology, privacy expectations, and privacy con-
ship between technology, social culture, and pri- trols are all fairly congruent. New technologies
vacy controls is illustrated using an adaptation of (such as clickstream data capture, global posi-
Ogburn’s cultural lag diagram in Figure 1. tioning systems (GPS), and wireless devices)
Typically, Ogburn’s cultural lag theory is cat- begin to get introduced at time a, at which
egorised as one of four types of cultural lags: point in time social expectations and controls
material culture accelerates faster than nonma- over the new technologies became lagging
terial culture, material culture accelerates faster behind the new technologies. Then as mem-
than other types of material culture, social cul- bers of society begin to realise that the data
ture accelerates faster than material culture, or are being collected, shared, generated, and sold
nonmaterial culture accelerates faster than other among companies, and that the data are not well
types of nonmaterial culture.18 In explaining protected against theft or loss, cries for greater
the inter-relationships between privacy, tech- protection begin to be made at time b. During
nology, and consumer’s expectations, three ele- the period between points b and c, the aware-
ments are presented: ness of privacy issues is raised and the increased
privacy expectations cause the community to
(1) material culture — technologies, such as seek enhanced material culture in the form of
the internet and wireless devices, such as privacy-enhancing technologies and controls.
RFID technologies; At this point in time, our society is some-
(2) social culture — consumer’s expectations where between time periods b and c in
of privacy; and Figure 1. In 2005, 81 per cent of firms surveyed
(3) material culture — privacy-enhancing tech- experienced the loss of one or more laptops
nologies and controls, such as appointing containing sensitive information during the past
a CPO, image scrambling algorithms, and 12 months (Ponemon Institute and Vontu19), 4
encryption of PI both during data transmis- per cent of all Americans were affected by iden-
sion and for data at rest. tity fraud in 2005,20 and well over 300 privacy

a b c

Technology

Social Culture
(Privacy Expectations)

Privacy-enhancing
Technologies & controls

Adjusted Maladjusted Adjusted


Time

Figure 1: Ogburn’s sequential time-paradigm of cultural lag technology, social culture, and
privacy controls

© 2008 Palgrave Macmillan Ltd. 1741-3591 $30.00 Vol. 5, 2, 153–166 International Journal of Disclosure and Governance 157
Protecting personal information using GAPP and CCM

breaches were reported in 2007 affecting mil- continuous, measurable, and auditable, so that
lions of people, according to the Privacy Rights members of society can be assured that their
Clearinghouse. A study conducted by Javelin privacy needs are being met.
and the Better Business Bureau found that for
a 12-month period ending in early 2006, 8.9
million individuals in the US were victims of DATA TOUCHPOINTS AND ASSOCIATED
identity fraud. Further, the average amount TECHNOLOGIES
per fraud victim was $6,383 and the average In this section we discuss the technological
fraud resolution time spent by each victim changes that have occurred, as indicated in
was 40 h! the line segment ab labelled ‘Technology’ in
Thus, technology has accelerated faster than Figure 1. This section discusses both the data
associated controls and monitoring technolo- touchpoints and the technologies that facili-
gies have been developed and implemented, tate the collection, use, and disclosure of such
and a period of maladjustment has resulted. We data. Events where data are collected, processed,
have reached a point where much focus needs stored, or used are considered to be touchpoints.
to be placed on good corporate governance Figure 2 illustrates such touchpoints and the
regarding the protection of PI and on creating many times and ways in which data may be
and implementing privacy-enhancing tech- replicated. Personal data may be collected in
nologies and controls so that the environment digital format directly from the individual
can approach an adjusted state. The next sec- when he/she is on the internet. For instance,
tions discuss current privacy technologies and individuals may enter data to complete online
the need for privacy-enhancing technologies purchases, register products for warranties, or
and controls that are designed to be effective, subscribe to various services. Data about an

Actions by Initial Organizational Family Affiliate


Individuals Business System Business

Internally
Generated Data Sharing
data Forward Transfer Transaction/
Data entry, operational
browsing database
Data
activity
Entry

Data
Transaction/ Transaction/
operational Sharing operational
Manually
Submitted Data database database

data Entry

Periodic
transfer

In-store Data
Data Data Data Data
purchase Warehouse Warehouse
Sharing Warehouse Sharing

Figure 2: Data touchpoints*


*AICPA’s understanding and implementing privacy services

158 International Journal of Disclosure and Governance Vol. 5, 2, 153–166 © 2008 Palgrave Macmillan Ltd. 1741-3591 $30.00
Prosch

individual’s online activities, such as which reference files that have either been corrected
web pages are examined and/or for how long, or deleted since the last backup may have the
or logs of internet chat sessions may be cap- errors reintroduced if backup restorations are
tured as well. Medical histories or offline retail made and the updates are lost. Data at rest and
purchase transaction data may be collected on data in transit are both at risk; the number of
paper-based forms and later entered into the laptop thefts/losses as mentioned earlier is at
computer. an unacceptably high level — 81 per cent of
Once personal data are collected, it may be firms surveyed experienced such losses in 2005.
stored in an organisation’s operational data- Wireless devices, by definition, are vulnerable to
bases and further copied into data warehouses interception, so PI sent over these devices, like
where it can be accessed and downloaded by all other confidential information, needs to be
employees for various purposes. Improved tech- secured with some form of encryption.
nologies and declining cost of storage make data Wireless devices are increasingly equipped
replication and data sharing easy and inexpen- with GPS devices. For instance, technology
sive. Personal data may be shared with others has been developed to allow the location of
either within the Organisational Family system, cell phone users to be identified to allow fire
as depicted in Figure 2, or with unaffiliated and police rescue workers to be able to pin-
third parties. Organisations may send personal point 911 callers. Many privacy advocates are
data on to affiliate organisations for a variety concerned about what businesses will do with
of reasons: wireless devices that enable the recording of
the device’s location and time. The term auto-
• to help process the transaction (eg credit matic location identification (ALI) data has
card company); been coined to represent these type of data.
• to help fill orders (eg a transportation com- A concern by many individuals is having their
pany or a supplier that is drop-shipping to whereabouts tracked and linked to their per-
the customer); sonally identifiable information.
• to outsourcers who process data on behalf Another related issue being debated by pri-
of the organisation; and/or vacy experts is the use of RFID tags. RFID
• for marketing or other negotiated pur- tags contain microchips and very small radio
poses. antennas than can be attached to products.
They transmit a unique identifying number to
Organisations that collect personal data should an electronic reader, which in turn links to a
disclose with whom and why personal data will computer database where information about
be shared. Data replication and data sharing also the item is stored. Some privacy advocates are
present challenges related to data quality. Cor- concerned about these devices being placed in
rection of erroneous data and destruction of items which can be read very easily from a
stale or outdated data becomes especially dif- distance and personal items being used to track
ficult once the data have been replicated and both the whereabouts of individuals and per-
shared with others. Keeping track of the per- sonal use patterns of such devices. Here again,
sonal data transferred to affiliates at any given the public is concerned about having PI linked
point in time is very difficult. Over time, an to devices that can track location. A further
organisation may have many data sharing agree- concern is the possibility that such data might
ments with different companies, which further be shared with others. However, on the flip side,
compounds the problem. the family of a patient with Alzheimer’s may
Data backup and recovery procedures can find it comforting to know that local hospitals
also add to the difficulty of fulfilling correc- can immediately read the RFID tag when a
tion and deletion requests. Data in master or wandering patient is admitted into the hospital.

© 2008 Palgrave Macmillan Ltd. 1741-3591 $30.00 Vol. 5, 2, 153–166 International Journal of Disclosure and Governance 159
Protecting personal information using GAPP and CCM

Also, tracking and protecting inventory can be reduce the risk of data breaches or loss of PI.
enhanced with the use of RFID devices, so Encryption packages and one-time passwords
the challenge for management is to find a bal- are prevalent in practice. Lo-jack protection for
ance between justifiable business needs and the lost or stolen computers is available. Also, soft-
protection of PI. ware is available that can scan files looking for
Organisations struggle to find a balance unprotected, confidential information, monitor
between organisational goals of improved servers examining all files being passed through
efficiency and better customer service and servers, and actively block email and web com-
the individual’s desire for protection of per- munications that contain confidential data,
sonal privacy. Top management must consider including email and web transfers.
these trade-offs. For example, if a marketing
firm ‘learns’ that an individual travels a certain GAPP AND ACCOUNTANTS AS
route everyday, it could send them a wire- PROVIDERS OF ASSURANCE SERVICES
less advertisement or coupon codes for gas In 2001, the AICPA formed a Privacy Task
stations, restaurants, or bars located on the Force to develop a Privacy Framework and
route. Depending on whom you ask, this Criteria that resulted in the formulation of
could be construed as intelligent marketing or GAPP that can be used by accounting firms
an annoying invasion of privacy. In terms of of all sizes to provide privacy services and assur-
‘good’ privacy practices, such advertisements ances to their clients. As mentioned previously,
should only be sent if the individual has agreed various US and international legislative acts
to have their locations tracked and if they have been passed. This myriad of legislation
want to receive such advertisements. Data can make privacy assessment and compliance
quality, including age and accuracy of data, an overwhelming task. One objective of the
should be considered by management. Storing AICPA’s task force is to provide a consistent
data just because ‘you can’ may actually increase framework for developing sound, auditable
privacy risk. privacy practices that when implemented will
Given the developments in technology that likely comply with any applicable legislation.
allow organisations to collect a multitude of Accountants are uniquely qualified to provide
types of PI, as well as requirements by some and implement comprehensive privacy services.
industries, states, and other countries, many Greenstein and Hunton22 give the following
software consortiums and vendors have already reasons why accountants are uniquely qualified
developed privacy-enhancing technologies.The to provide these services. Accountants have the
current reality is that many privacy-enhancing ability to:
technologies exist and are available for imme-
diate implementation. Prosch21 discusses the • comprehensively understand both current
need to protect PI from ‘cradle to grave’ as well and future statutory regulations that may
as the types of technologies currently available be applicable to a firm;
for each phase of the data lifecycle. Existing • assess the risk faced by a firm for inadequate
technologies can help to move the Privacy, privacy policy and practices;
Social Culture, and Privacy Controls environ- • align systems and infrastructure with devel-
ment from a period of maladjustment to adjust- oped policies and close any privacy gaps;
ment as indicated by point c in Figure 1 where • design both high-level plan and detailed
harmony among these three constructs is once working documents in order to achieve
again achieved. privacy compliance;
For example, the current marketplace offers • identify the various privacy components, as
various piecemeal privacy-enhancing technolo- well as build and implement any necessary
gies, that when implemented, can dramatically changes to them to close any privacy gaps;

160 International Journal of Disclosure and Governance Vol. 5, 2, 153–166 © 2008 Palgrave Macmillan Ltd. 1741-3591 $30.00
Prosch

• assess the adequacy of privacy policies and Microsoft, and ChoicePoint, obtain a third-
practices of relevant business partners and party privacy audit every two years for a period
service providers; of 10–20 years.While the FTC does not specify
• monitor the implemented system’s compli- by whom or what standards these audits should
ance with its stated policies and practices. be performed, GAPP provides a sound set of
auditable privacy criteria upon which top man-
Each of these core skill sets is based on activi- agement can rely. GAPP is composed of ten
ties that accountants have been performing for Privacy Principles and 66 auditable criteria with
decades in their attest, assurance, and tax advi- examples. GAPP is founded on key concepts
sory services. Further, a major problem with from significant domestic and international pri-
stated privacy policies is that a consumer has no vacy laws, regulations, and guidelines. The ten
real way of knowing whether a firm abides by principles are listed and defined in Table 1. The
them. For example, if a consumer requests that a FTC tends to focus on security that is one
firm erase PI from their database, such as items of the ten principles of GAPP. Thus, GAPP is
browsed on a website over the past five years, more comprehensive than what is required by
they have no way of knowing whether these the FTC in its orders to companies that have
data were in fact purged on both its operational experienced data breaches.
database and its archived databases. Accountants GAPP is presented in three-column format.
are uniquely positioned to provide an assurance The first column contains the criteria.23 The
function over compliance with stated privacy second column, which contains illustrations and
practices. explanations, is designed to enhance the under-
The Federal Trade Commission (FTC) inves- standing of the criteria. The illustrations are not
tigates and sanctions organisations that inad- intended to be comprehensive, nor are any of the
equately protect PI, and have required that illustrations required for an entity to have met
some of them, such as Petco, Tower Records, the privacy criteria. The third column contains

Table 1: AICPA Generally Accepted Privacy Principles

1 Management. The entity defines, documents, communicates, and assigns accountability for its privacy
policies and documents.
2 Notice. The entity provides notice about its privacy policies and procedures and identifies the purposes
for which personal information is collected, used, retained, and disclosed.
3 Choice and consent. The entity described the choices available to the individual and obtains implicit or
explicit consent with respect to the collection, use, retention, and disclosure of personal information.
4 Collection. The entity collects personal information only for the purposes identified in the notice.
5 Use and retention. The entity limits the use of personal information to the purposes identified in the
notice and the information for which the individual has provided implicit or explicit consent. The
entity retains personal information for only as long as necessary to fulfill the stated purposes.
6 Access. The entity provides individuals with access to their personal information for review and update.
7 Disclosure to third parties. The entity discloses personal information to third parties only for the pur-
poses identified in the notice and only with the implicit or explicit consent of the individual.
8 Security. The entity protects personal information against unauthorised access (both physical and logi-
cal.
9 Quality. The entity maintains accurate, complete, and relevant personal information for the purposes
identified in the notice.
10 Monitoring and enforcement. The entity monitors with its privacy policies and procedures to address
privacy-related inquiries and disputes.

© 2008 Palgrave Macmillan Ltd. 1741-3591 $30.00 Vol. 5, 2, 153–166 International Journal of Disclosure and Governance 161
Protecting personal information using GAPP and CCM

additional considerations, including supplemental organisations adopt a best practices mindset.This


information such as good privacy practices and will hopefully lead organisations down a path
selected requirements of specific laws and regula- that will ultimately allow them to meet all of
tions that pertain to a certain industry or country. the relevant GAPP criteria in the future.
Within each principle, the criteria are organised GAPP does not specifically have continuous
as either policies and communications or proce- audit requirements, but it does have many
dures and controls. The following table illustrates process-related criteria that lend themselves
a breakdown of each component by the number well to continuous monitoring and reporting
and type of criteria for each principle. processes. Thus, while the formal assurance
opinions that can currently be rendered are for
a historical period, the ‘process’ requirements
Criteria Principles contain many salient ingredients for a CCM
environment. CCM is a management method-
1 2 3 4 5 6 7 8 9 10 Total ology aimed at facilitating corporate operations,
Policies and 3 2 3 3 2 2 3 2 2 2 24 supervision, and meta-supervision through the
communica- constant measurement of corporate activity, its
tions comparison against standards and the reporting
Procedures 7 3 4 3 2 7 4 6 2 4 42 of discrepancies leading to corrective manage-
and controls ment action.24 Further CCM techniques may
also be used to monitor PI and evaluate it more
Total 10 5 7 6 4 9 7 8 4 6 66 frequently than the ‘historical’ perspective.

CCM ENVIRONMENTS AND GAPP A PRIVACY LIFECYCLE MATURITY


As mentioned earlier, the ability to collect PI has MODEL
accelerated faster than the ability to control and In this section, a Privacy Lifecycle Maturity
monitor it. Privacy-enhancing technologies and Model is presented that can be used to guide
methodologies are in their infancy in terms of researchers and industry. The Capability Matu-
adoption. Developing privacy-enhancing tech- rity Model (CMM) developed by the Soft-
nologies and methodologies with a continuous ware Engineering Institute is the methodology
monitoring/assurance perspective makes good used as the basis for the proposed model. The
business sense given the plethora of recent pri- CMM model is a five-level evolutionary path of
vacy breaches, and it will also strengthen gov- increasingly organised and systematically more
ernance over an organisation’s operations. With mature processes, and its terminology has been
traditional financial audits, ‘the major obstacle adapted to reflect data protection processes.
to adopting a continuous process remains the The model is graphically depicted in Figure
lack of commitment by organizations to invest 3. Also depicted in Figure 3 is an estimate of
in the technology required to develop and the number of organisations currently in each
implement a continuous auditing process’.24 phase and the risk of data breach. Each of these
The same arguments are being made on the maturity stages is discussed.
privacy assurance front as well. However, great At the initial level, data protection processes
opportunity exists for companies developing/ are disorganised, even chaotic. Success is likely
enhancing privacy regimes to design continuous to depend on individual and compartmentalised
monitoring and reporting components into the efforts. For example, encryption on websites
system since we are still in the early development may occur primarily by happenstance because a
stages. Practitioners are currently using GAPP as third-party shell site was used, and the payment
a consulting framework with the goal of helping page is encrypted by default. Different servers

162 International Journal of Disclosure and Governance Vol. 5, 2, 153–166 © 2008 Palgrave Macmillan Ltd. 1741-3591 $30.00
Prosch

High

Ad hoc
adaption
Number of Organizations

of privacy
enhancing
technologies
& policies

Limited
Privacy
Policies and
Procedures
Developed
Continuous
Enterprise-wide, Privacy
data life cycle Monitoring
management
GAPP Audit
Low

Initial Repeatable Defined Managed Optimized


High Number of Data Breaches Low

Figure 3: Privacy Lifecycle Maturity Model

throughout an organisation may not use sim- because the requisite processes would have been
ilar encryption methods. Treatment of paper- established. Thus, in the repeatable phase some
based documents with PI may vary widely by data protection processes are beginning to be
department and branch office. Employee use established and deployed in certain parts of the
and protection of PDA devices that transmit or organisation.
store PI may vary widely. The organisation may In the next stage, the processes are being
not even be fully aware of which employees specifically defined. An organisation has devel-
are using PDA devices to access business data. oped its own standard processes through
Whatever data protection processes exist are greater attention to documentation, standardi-
not considered to be repeatable, because they sation, and integration across the entire enter-
are not sufficiently defined and documented to prise. With data protection, the weakest link
allow them to be replicated. can be the porthole through which the data
The second stage is considered to be the leaks or even pours out. All PI throughout
repeatable level because basic data protection the entire enterprise must be protected. A
techniques are established. For example, encryp- company cannot protect data that it does
tion of data on laptops may be used in cer- not know it has. This stage cannot be met
tain applications. The laptops of all accounting until a complete inventory of all PI has been
employees may be required to have the financial taken and documented — from cradle to grave.
data on it encrypted. However, the laptops of the Each and every copy or transfer of data must
sales department may not have this requirement, be considered. The transfer of data to and
and the PI of customers may reside on these from third parties, as well as the collection
laptops. The successes of encrypting the data and processing of data by third parties must be
on the accountants’ laptops could be repeated, considered as well.

© 2008 Palgrave Macmillan Ltd. 1741-3591 $30.00 Vol. 5, 2, 153–166 International Journal of Disclosure and Governance 163
Protecting personal information using GAPP and CCM

At the managed level, an organisation moni- defence for the organisation is to provide evi-
tors and controls its own processes through dence, such as adherence to GAPP criteria or
data collection and analysis. Organisations that an actual GAPP audit, that they were diligent
outsource any of their data processes need to and serious about data protection policies.
have an assurance that each of their third-party At the optimising level, processes are continu-
processors have data protection policies at least ously improved through monitoring feedback
equivalent to their own. Merely ‘trusting’ an from current processes.The feedback serves two
outsourcing organisation to comply with its own purposes: monitoring and improvement. Moni-
privacy policies and or contractual agreements is toring activities encompass both policies and
not sufficient.While data processing can be out- communications and procedures and controls,
sourced, responsibility cannot. According to the but not necessarily over the same time intervals.
research conducted by the Ponemon Institute,25 Management has to carefully assess which proc-
breaches by third-party organisations in the US esses and controls need to be monitored in real
were reported by 40 per cent of respondents, up time and which can be monitored in intervals,
from 29 per cent in 2006. Also, in the UK, one- and then determine the appropriate intervals.
third of the breaches studied by the Ponemon Email communications, for example, may be
Institute resulted from data being shared with monitored in real time to verify whether PI
third parties in the normal course of business. is being transmitted, by whom, and to whom.
The implication is that, in order for businesses Verification checks before sending the message
to progress along the privacy maturity model, may or may not be used in real time.
the third-party data processors must provide Feedback is also a key component in the
their customers with assurances regarding their optimising stage. For example, monitoring
own data protection policies and procedures. In techniques may indicate that a piece of data
reality, this will be more efficient for the third- that is currently being collected is no longer
party processors. Rather than have to deal with used in any process, and management may, as a
multiple audit teams sent by their customers, result, determine that the risk of collecting and
they can choose to hire an auditor to examine protecting such data is greater than the benefit
their organisation’s privacy policies and proce- of possessing it. For example, a website that
dures. The auditor can use GAPP as the criteria collects clickstream data recording children’s
for assessment and then they can provide an activities on a website may realise it is not actu-
assurance opinion that the third-party processor ally using the data once it becomes older than
can share with their customers. a month. At that point, based on the feedback
Once an organisation is comprehensively from the monitoring system, it may choose to
managing its data protection practices through purge the old fields of non-relevant data. A
data collection and analysis, it will be prepared privacy-enhanced CCM environment has the
to engage an accountant to perform a GAPP potential to greatly reduce privacy risk.
audit. Putting adequate processes in place that
will allow an organisation to ‘pass’ a GAPP
audit should substantially reduce an organi- DISCUSSION
sation’s risk of a data breach, but risk cannot The accounting profession has recognised
be eliminated. As recently mentioned by the that protection of PI is an important aspect
FTC’s Chief Privacy Officer, Marc Groman, in of controlling an organisation’s systems and
a speech to the National Association of Secre- business environment. Undoubtedly, material
taries of State (Washington, DC, 18th February, and social lags have occurred between pri-
2008),‘You will have a data breach’. When the vacy-invasive technologies, consumers’ aware-
court of public opinion or the FTC is grilling ness and expectations of privacy issues, and
an organisation regarding a data breach, the best privacy-enhancing technologies. Accountants

164 International Journal of Disclosure and Governance Vol. 5, 2, 153–166 © 2008 Palgrave Macmillan Ltd. 1741-3591 $30.00
Prosch

are already guiding top management in imple- 8 Ogburn, W. F. (1966). Social Change, Dell Pub-
menting sound ethical and reliable systems, lishing, New York, NY.
and corporate accountability for controls has 9 Cavoukian, A. and Hamilton, T. (2002). Privacy
increased due to Sarbanes–Oxley. Many of Payoff, McGraw-Hill, New York.
10 McQuay, T. (2006) ‘Privacy is changing out-
the tasks involved in protecting PI build upon
sourcing in Canada’, Globeandmail.com, 27 July.
characteristics and skills that members of the
11 The Patriot Act of 2002 created a Chief Pri-
accounting profession already possess.26 Some vacy Officer under the Department of Home-
of the complications and potential problems land Security; however, this position is not
associated with the use of traditional assurance considered equivalent because of where it is
methods for businesses with digital operating housed.
environments have been previously discussed 12 Shapiro, B. and Baker, C. R. (2001) ‘Informa-
with a call for members of the accounting pro- tion technology and the social construction of
fession and researchers to think more holisti- information privacy’, Journal of Accounting and
cally about continuous controls.26 GAPP is a Public Policy, 20, 295–322.
giant step forward towards continuous controls 13 Tinker, T. (1988) ‘Panglossian accounting
in a larger domain area than financial reporting. theories: The science of apologizing in style’,
Accounting, Organisations and Society, 13(2),
Further, the accounting profession has tangibly
165–189.
responded to the cultural lag by developing a 14 Zureik, E., Stalker, L., Smith, E., Lyon, D. and
comprehensive set of auditable privacy criteria, Chan, Y. (2008). Privacy, Surveillance, and the
GAPP, that fosters the enhancement of corpo- Globalization of PI: International Comparisons,
rate governance over PI. McGill-Queens University Press, Kingston,
forthcoming.
15 Marshall, K. (1999) ‘Has technology intro-
duced new ethical problems?’, Journal of
REFERENCES Business Ethics, 19, 81–90.
1 Leatham, S. (2007) ‘Data breach affects 16 Ogburn, W. F. (1957) ‘Cultural lag as theory’,
25 million Britons’, Ireland IT Newsletter, Sociology and Social Research, 41, 167–174.
22nd November, 2007.http://www.enn.ie/ 17 Karat, C. M., Brodie, C. and Karat, J. (2006)
article/10123479.html. ‘Usable privacy and security for personal
2 Shifrin, T. (2007) ‘UK data breach: Stripping information management’, Communications of
the data “would have not have been costly,”’, the ACM, 49(1), 56–57.
Computerworld Online, 6th December, 2007. 18 Brinkman, R. L. and Brinkman, J. E. (2005)
3 Cline, J. (2007) ‘Mind the GAPP: Account- ‘Cultural lag: A framework for social justice’,
ants bring GAAP-like principles to the privacy International Journal of Social Economics, 32(3),
sphere’, Computerworld Online, 6th December, 228–249.
2007. 19 Ponemon Institute and Vontu, Inc (2006). 2006
4 Wilcox, J. (2000) ‘IBM appoints chief privacy Cost of Data Breach Study,Vontu, San Francisco,
officer’, news.com, 28th November, 2000,http:// CA.
w w w. n ew s . c o m / I B M - a p p o i n t s - c h i e f - 20 Weiss, T. (2006) ‘Customers don’t want data
privacy-officer/2100-1001_3-249135.html. handled by outside vendors: They’ll likely go
5 AICPA/CICA (2006). Generally Accepted elsewhere if a data breach occurs’, Computer-
Privacy Principles, AICPA/CICA, New York, NY. world Online, 24th October, 2006.
6 Lemos, R. (2005) ‘Data security moves front 21 Prosch, M. (2008) ‘Preventing identify theft
and center in 2005’, Security Focus’, 29th throughout the entire data life cycle’, Working
December, 2005, http://www.securityfocus. Paper, Arizona State University.
com/news/11366. 22 Greenstein, M. and Hunton, J. (2003)
7 Clarke, R. A. (1988) ‘Information technology ‘Extending the accounting brand to privacy
and dataveillance’, Communications of the ACM, services’, Journal of Information Systems, 17(2),
31(5), 498–512. 87–110.

© 2008 Palgrave Macmillan Ltd. 1741-3591 $30.00 Vol. 5, 2, 153–166 International Journal of Disclosure and Governance 165
Protecting personal information using GAPP and CCM

23 These criteria meet the definition of ‘criteria 24 Alles, M., Kogan, A., Vasarhelyi, M. A. and
established by a recognized body’ described Warren Jr., J. D. (2007). BNA Accounting Policy
in the third general standard for attestation and Practice Portfolios. Buchanan Ingersoll &
engagements in the United States in Chapter Rooney PC, ISSN 1933-0243.
1 of Statement on Standards for Attestation 25 Ponemon Institute and Vontu, Inc (2007).
Engagements No. 10, Attestation Engagements: 2007 Cost of Data Breach Study, Vontu, San
Revision and Recodification (AICPA, Professional Franscisco, CA.
Standards, vol. 1, AT sec. 101.24), as amended, 26 Greenstein, M. and Ray, A. (2002) ‘Holistic,
and in the standards for assurance engage- continuous assurance integration: E-business
ments in Canada (CICA Handbook, paragraph opportunities and challenges’, Journal of Infor-
5025.41). mation Systems, 16, 1–20.

166 International Journal of Disclosure and Governance Vol. 5, 2, 153–166 © 2008 Palgrave Macmillan Ltd. 1741-3591 $30.00

Anda mungkin juga menyukai