SlideShare una empresa de Scribd logo
1 de 16
Application Data Security And
PIPEDA Principals
General Application Data Security Aspects
•Privacy - Personal Information(PI) Handling
•Security - Secure PI data as per defined rules
Privacy - Personal Information(PI)
Handling
General Privacy Aspects
1. PI data definition
2. Definition of the PI data categories
and rules for each category
3. Process to insure proper use and
handling of the PI data based on rules
defined
1. PI Data Identification
Under PIPEDA, personal information (PI) includes:
• name, race, ethnic origin, religion, marital status, educational
level
• e-mail address and messages, IP (Internet protocol) address
• age, height, weight, medical records, blood type, DNA code,
fingerprints, voiceprint
• income, purchases, spending habits, banking information,
credit/debit card data, loan or credit reports, tax returns
• Social Insurance Number (SIN) or other identification
numbers.
https://www.priv.gc.ca/information/pub/guide_ind_e.asp
Identify PI Data Currently Used In All Corporate Systems
Under PIPEDA, personal information includes:
• name, race, ethnic origin, religion, marital status, educational level
• e-mail address and messages, IP (Internet protocol) address
• age, height, weight, medical records, blood type, DNA code,
fingerprints, voiceprint
• income, purchases, spending habits, banking information,
credit/debit card data, loan or credit reports, tax returns
• Social Insurance Number (SIN) or other identification numbers.
https://www.priv.gc.ca/information/pub/guide_ind_e.asp
2. PI Data Categorization (Draft)
2. PI Data Categorization (Draft)
• Personal Details Data Category
• Name, Marital Status, Age, Email Addresses, Postal
Addresses, Phone Numbers, IP Addresses, Device IDs
• Personal Financial Data Category
• Income, Purchases, Spending Habits, Banking
Information, Credit/Debit Cards, Loan or Credit
Details
• Personal Identification Data Category
• Social Insurance Number (SIN) , Drivers Licence and
any other personal ID.
3. Handling Rules For Each PI Data
Category (Draft)
• Rules for Personal Details Data Category
• Data In Transit – Encrypted (HTTPS)
• Data Storage – DB-level Encryption (TDE) only
• Display Rules: Show Clear Text
• Retention Rules: As per business needs or 7 years (?)
• Rules for Personal Financial Data Category
• Data In Transit – Encrypted (HTTPS)
• Data Storage – DB-level Encryption (TDE) + Field-level Encryption
• Display Rules: Show Only Last 4 Digits
• Retention Rules: As per business needs or 7 years (?)
• Rules for Personal Identification Data Category
• Data In Transit – Encrypted (HTTPS)
• Data Storage – DB-level Encryption (TDE) + Field-level Encryption
• Display Rules: Hidden (Visual Verification Will Be Available During
Data Input Only)
• Retention Rules: As per business needs or 7 years (?)
Security - Secure PI data as per
defined rules
General Security Aspects
•PI data storage
•PI data in transit
•PI data during the processing
PIPEDA Fair Information Principles
PIPEDA sets out 10 principles of fair information practices, which set up the basic privacy obligations under the law. They are:
• Accountability - Organizations should appoint someone to be responsible for privacy issues. They should make
information about their privacy policies and procedures to available to customers.
• Identifying purposes - Organization must identify the reasons for collecting your personal information before or at the
time of collection.
• Consent - Organizations should clearly inform you of the purposes for the collection, use or disclosure of personal
information.
• Limiting collection - Organizations should limit the amount and type of the information gathered to what is necessary.
• Limiting use, disclosure and retention - In general, organizations should use or disclose your personal information only for
the purpose for which it was collected, unless you consent. They should keep your personal information only as long as
necessary.
• Accuracy - Organizations should keep your personal information as accurate, complete and up to date as necessary.
• Safeguards - Organizations need to protect your personal information against loss or theft by using appropriate security
safeguards.
• Openness - An organization’s privacy policies and practices must be understandable and easily available.
• Individual access - Generally speaking, you have a right to access the personal information that an organization holds
about you.
• Recourse (Challenging compliance) - Organizations must develop simple and easily accessible complaint procedures.
When you contact an organization about a privacy concern, you should be informed about avenues of recourse.
PIPEDA Fair Information Principles – App Security Focus
PIPEDA sets out 10 principles of fair information practices, which set up the basic privacy obligations under the law. They are:
• Accountability - Organizations should appoint someone to be responsible for privacy issues. They should make
information about their privacy policies and procedures to available to customers.
• Identifying purposes - Organization must identify the reasons for collecting your personal information before or at the
time of collection.
• Consent - Organizations should clearly inform you of the purposes for the collection, use or disclosure of personal
information.
• Limiting collection - Organizations should limit the amount and type of the information gathered to what is necessary.
• Limiting use, disclosure and retention - In general, organizations should use or disclose your personal information only
for the purpose for which it was collected, unless you consent. They should keep your personal information only as long as
necessary.
• Accuracy - Organizations should keep your personal information as accurate, complete and up to date as necessary.
• Safeguards - Organizations need to protect your personal information against loss or theft by using appropriate security
safeguards.
• Openness - An organization’s privacy policies and practices must be understandable and easily available.
• Individual access - Generally speaking, you have a right to access the personal information that an organization holds
about you.
• Recourse (Challenging compliance) - Organizations must develop simple and easily accessible complaint procedures.
When you contact an organization about a privacy concern, you should be informed about avenues of recourse.
PIPEDA Fair Information Principles – App Security Focus
• Consent
• When applicable, make sure the consumer consent is taken
and logged with the timestamp.
• Retention
• Delete sensitive data as per rules for each category.
• Safeguards
• PI data is encrypted in the data storage
• PI data is encrypted in transit, through use of secure
communication protocols (SSL/TLS 1.2, SFTP etc.)
• Ensure PI data is not compromised during the processing
• Checking the code using Source Code Analysis Tools
• Checking applications at runtime using Runtime Application
Self-Protection Tools

Más contenido relacionado

La actualidad más candente

Introduction to data protection
Introduction to data protectionIntroduction to data protection
Introduction to data protectionRachel Aldighieri
 
WB-2022-01-25-India Data Protection Bill
WB-2022-01-25-India Data Protection BillWB-2022-01-25-India Data Protection Bill
WB-2022-01-25-India Data Protection BillTrustArc
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsAT Internet
 
General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...Cvent
 
Personal Data Protection in Indonesia
Personal Data Protection in IndonesiaPersonal Data Protection in Indonesia
Personal Data Protection in IndonesiaEryk Budi Pratama
 
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykData Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykEryk Budi Pratama
 
Melihat RUU Pelindungan Data Pribadi
Melihat RUU Pelindungan Data PribadiMelihat RUU Pelindungan Data Pribadi
Melihat RUU Pelindungan Data PribadiICT Watch
 
PDPA Compliance Preparation
PDPA Compliance PreparationPDPA Compliance Preparation
PDPA Compliance PreparationLawPlus Ltd.
 
Personal data protection bill
Personal data protection bill Personal data protection bill
Personal data protection bill Mathew Chacko
 
Privacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationPrivacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationEryk Budi Pratama
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - EnglishData Security
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and SecurityAnuMarySunny
 
Ringkasan Standar Kompetensi Data Protection Officer | Agustus 2023 | IODTI
Ringkasan Standar Kompetensi Data Protection Officer | Agustus 2023 | IODTIRingkasan Standar Kompetensi Data Protection Officer | Agustus 2023 | IODTI
Ringkasan Standar Kompetensi Data Protection Officer | Agustus 2023 | IODTIEryk Budi Pratama
 
Patient Privacy and Safety in Healthcare
Patient Privacy and Safety in HealthcarePatient Privacy and Safety in Healthcare
Patient Privacy and Safety in HealthcareQueen Myers
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_indiaAltacit Global
 

La actualidad más candente (20)

Introduction to data protection
Introduction to data protectionIntroduction to data protection
Introduction to data protection
 
DPIA
DPIADPIA
DPIA
 
The Protection of Personal Information Act 4 of 2013
The Protection of Personal Information Act 4 of 2013The Protection of Personal Information Act 4 of 2013
The Protection of Personal Information Act 4 of 2013
 
WB-2022-01-25-India Data Protection Bill
WB-2022-01-25-India Data Protection BillWB-2022-01-25-India Data Protection Bill
WB-2022-01-25-India Data Protection Bill
 
Introduction to GDPR
Introduction to GDPRIntroduction to GDPR
Introduction to GDPR
 
GDPR Demystified
GDPR DemystifiedGDPR Demystified
GDPR Demystified
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
 
General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...
 
Personal Data Protection in Indonesia
Personal Data Protection in IndonesiaPersonal Data Protection in Indonesia
Personal Data Protection in Indonesia
 
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykData Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
 
Melihat RUU Pelindungan Data Pribadi
Melihat RUU Pelindungan Data PribadiMelihat RUU Pelindungan Data Pribadi
Melihat RUU Pelindungan Data Pribadi
 
PDPA Compliance Preparation
PDPA Compliance PreparationPDPA Compliance Preparation
PDPA Compliance Preparation
 
Personal data protection bill
Personal data protection bill Personal data protection bill
Personal data protection bill
 
Privacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationPrivacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program Implementation
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - English
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and Security
 
Ringkasan Standar Kompetensi Data Protection Officer | Agustus 2023 | IODTI
Ringkasan Standar Kompetensi Data Protection Officer | Agustus 2023 | IODTIRingkasan Standar Kompetensi Data Protection Officer | Agustus 2023 | IODTI
Ringkasan Standar Kompetensi Data Protection Officer | Agustus 2023 | IODTI
 
PDPA 2010 at office (HairulHafiz)
PDPA 2010 at office (HairulHafiz)PDPA 2010 at office (HairulHafiz)
PDPA 2010 at office (HairulHafiz)
 
Patient Privacy and Safety in Healthcare
Patient Privacy and Safety in HealthcarePatient Privacy and Safety in Healthcare
Patient Privacy and Safety in Healthcare
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_india
 

Similar a Personal Information Protection and Electronic Documents Act (PIPEDA) and Implications for Application Security and Sensitive Data Handling in Software Systems

Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127Frank Dawson
 
Media_644046_smxx (1).pptx
Media_644046_smxx (1).pptxMedia_644046_smxx (1).pptx
Media_644046_smxx (1).pptxMichelleSaver
 
Preparing your Business for the Data Protection Bill
Preparing your Business for the Data Protection BillPreparing your Business for the Data Protection Bill
Preparing your Business for the Data Protection BillSymptai Consulting Limited
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response PlanNext Dimension Inc.
 
3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICECFG
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptxRavindra Babu
 
LW GDPR and Cyber Security.pptx
LW GDPR and Cyber Security.pptxLW GDPR and Cyber Security.pptx
LW GDPR and Cyber Security.pptxTimBee1
 
GDPR and Cyber Security LW.pptx
GDPR and Cyber Security LW.pptxGDPR and Cyber Security LW.pptx
GDPR and Cyber Security LW.pptxTimBee1
 
Global Data Privacy Regulation
Global Data Privacy RegulationGlobal Data Privacy Regulation
Global Data Privacy RegulationJatin Kochhar
 
GDPR Data Life Cycle
GDPR Data Life CycleGDPR Data Life Cycle
GDPR Data Life CycleJatin Kochhar
 
How to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security ProgramHow to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security ProgramFinancial Poise
 
IT6701 Information Management Unit - V
IT6701 Information Management Unit - VIT6701 Information Management Unit - V
IT6701 Information Management Unit - Vpkaviya
 
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...Harrison Clark Rickerbys
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsHarrison Clark Rickerbys
 
GDPR: Your Journey to Compliance
GDPR: Your Journey to ComplianceGDPR: Your Journey to Compliance
GDPR: Your Journey to ComplianceCobweb
 
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018Next Dimension Inc.
 
An introduction to data protection - Edinburgh
An introduction to data protection - EdinburghAn introduction to data protection - Edinburgh
An introduction to data protection - EdinburghRachel Aldighieri
 

Similar a Personal Information Protection and Electronic Documents Act (PIPEDA) and Implications for Application Security and Sensitive Data Handling in Software Systems (20)

Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
 
Gdpr for business full
Gdpr for business fullGdpr for business full
Gdpr for business full
 
Media_644046_smxx (1).pptx
Media_644046_smxx (1).pptxMedia_644046_smxx (1).pptx
Media_644046_smxx (1).pptx
 
Preparing your Business for the Data Protection Bill
Preparing your Business for the Data Protection BillPreparing your Business for the Data Protection Bill
Preparing your Business for the Data Protection Bill
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response Plan
 
3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptx
 
LW GDPR and Cyber Security.pptx
LW GDPR and Cyber Security.pptxLW GDPR and Cyber Security.pptx
LW GDPR and Cyber Security.pptx
 
Gdpr presentation
Gdpr presentationGdpr presentation
Gdpr presentation
 
GDPR and Cyber Security LW.pptx
GDPR and Cyber Security LW.pptxGDPR and Cyber Security LW.pptx
GDPR and Cyber Security LW.pptx
 
Global Data Privacy Regulation
Global Data Privacy RegulationGlobal Data Privacy Regulation
Global Data Privacy Regulation
 
GDPR Data Life Cycle
GDPR Data Life CycleGDPR Data Life Cycle
GDPR Data Life Cycle
 
GDPR Data Lifecycle
GDPR Data LifecycleGDPR Data Lifecycle
GDPR Data Lifecycle
 
How to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security ProgramHow to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security Program
 
IT6701 Information Management Unit - V
IT6701 Information Management Unit - VIT6701 Information Management Unit - V
IT6701 Information Management Unit - V
 
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business Advisors
 
GDPR: Your Journey to Compliance
GDPR: Your Journey to ComplianceGDPR: Your Journey to Compliance
GDPR: Your Journey to Compliance
 
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
 
An introduction to data protection - Edinburgh
An introduction to data protection - EdinburghAn introduction to data protection - Edinburgh
An introduction to data protection - Edinburgh
 

Más de Michael Sukachev

SOA vs Microservices vs SBA
SOA vs Microservices vs SBASOA vs Microservices vs SBA
SOA vs Microservices vs SBAMichael Sukachev
 
TOGAF Sample Matrices, Catalogs and Diagrams from the Open Group
TOGAF Sample Matrices, Catalogs and Diagrams from the Open GroupTOGAF Sample Matrices, Catalogs and Diagrams from the Open Group
TOGAF Sample Matrices, Catalogs and Diagrams from the Open GroupMichael Sukachev
 
EA practice establishment - Strawman plan
EA practice establishment -  Strawman planEA practice establishment -  Strawman plan
EA practice establishment - Strawman planMichael Sukachev
 
Basic set of core TOGAF artifacts and deliverables by ADM phase
Basic set of core TOGAF artifacts and deliverables by ADM phaseBasic set of core TOGAF artifacts and deliverables by ADM phase
Basic set of core TOGAF artifacts and deliverables by ADM phaseMichael Sukachev
 
Agile Architecture And The Role Of The Architect In The Agile Team
Agile Architecture And The Role Of The Architect In The Agile TeamAgile Architecture And The Role Of The Architect In The Agile Team
Agile Architecture And The Role Of The Architect In The Agile TeamMichael Sukachev
 
Practical Enterprise Architecture in Medium-size Corporation using TOGAF
Practical Enterprise Architecture in Medium-size Corporation using TOGAFPractical Enterprise Architecture in Medium-size Corporation using TOGAF
Practical Enterprise Architecture in Medium-size Corporation using TOGAFMichael Sukachev
 

Más de Michael Sukachev (8)

SOA vs Microservices vs SBA
SOA vs Microservices vs SBASOA vs Microservices vs SBA
SOA vs Microservices vs SBA
 
TOGAF Sample Matrices, Catalogs and Diagrams from the Open Group
TOGAF Sample Matrices, Catalogs and Diagrams from the Open GroupTOGAF Sample Matrices, Catalogs and Diagrams from the Open Group
TOGAF Sample Matrices, Catalogs and Diagrams from the Open Group
 
TOGAF®9.1 in Pictures
TOGAF®9.1 in PicturesTOGAF®9.1 in Pictures
TOGAF®9.1 in Pictures
 
EA practice establishment - Strawman plan
EA practice establishment -  Strawman planEA practice establishment -  Strawman plan
EA practice establishment - Strawman plan
 
Basic set of core TOGAF artifacts and deliverables by ADM phase
Basic set of core TOGAF artifacts and deliverables by ADM phaseBasic set of core TOGAF artifacts and deliverables by ADM phase
Basic set of core TOGAF artifacts and deliverables by ADM phase
 
Agile Architecture And The Role Of The Architect In The Agile Team
Agile Architecture And The Role Of The Architect In The Agile TeamAgile Architecture And The Role Of The Architect In The Agile Team
Agile Architecture And The Role Of The Architect In The Agile Team
 
Practical Enterprise Architecture in Medium-size Corporation using TOGAF
Practical Enterprise Architecture in Medium-size Corporation using TOGAFPractical Enterprise Architecture in Medium-size Corporation using TOGAF
Practical Enterprise Architecture in Medium-size Corporation using TOGAF
 
SignalR Overview
SignalR OverviewSignalR Overview
SignalR Overview
 

Último

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Último (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Personal Information Protection and Electronic Documents Act (PIPEDA) and Implications for Application Security and Sensitive Data Handling in Software Systems

  • 1. Application Data Security And PIPEDA Principals
  • 2. General Application Data Security Aspects •Privacy - Personal Information(PI) Handling •Security - Secure PI data as per defined rules
  • 3. Privacy - Personal Information(PI) Handling
  • 4. General Privacy Aspects 1. PI data definition 2. Definition of the PI data categories and rules for each category 3. Process to insure proper use and handling of the PI data based on rules defined
  • 5. 1. PI Data Identification
  • 6. Under PIPEDA, personal information (PI) includes: • name, race, ethnic origin, religion, marital status, educational level • e-mail address and messages, IP (Internet protocol) address • age, height, weight, medical records, blood type, DNA code, fingerprints, voiceprint • income, purchases, spending habits, banking information, credit/debit card data, loan or credit reports, tax returns • Social Insurance Number (SIN) or other identification numbers. https://www.priv.gc.ca/information/pub/guide_ind_e.asp
  • 7. Identify PI Data Currently Used In All Corporate Systems Under PIPEDA, personal information includes: • name, race, ethnic origin, religion, marital status, educational level • e-mail address and messages, IP (Internet protocol) address • age, height, weight, medical records, blood type, DNA code, fingerprints, voiceprint • income, purchases, spending habits, banking information, credit/debit card data, loan or credit reports, tax returns • Social Insurance Number (SIN) or other identification numbers. https://www.priv.gc.ca/information/pub/guide_ind_e.asp
  • 8. 2. PI Data Categorization (Draft)
  • 9. 2. PI Data Categorization (Draft) • Personal Details Data Category • Name, Marital Status, Age, Email Addresses, Postal Addresses, Phone Numbers, IP Addresses, Device IDs • Personal Financial Data Category • Income, Purchases, Spending Habits, Banking Information, Credit/Debit Cards, Loan or Credit Details • Personal Identification Data Category • Social Insurance Number (SIN) , Drivers Licence and any other personal ID.
  • 10. 3. Handling Rules For Each PI Data Category (Draft)
  • 11. • Rules for Personal Details Data Category • Data In Transit – Encrypted (HTTPS) • Data Storage – DB-level Encryption (TDE) only • Display Rules: Show Clear Text • Retention Rules: As per business needs or 7 years (?) • Rules for Personal Financial Data Category • Data In Transit – Encrypted (HTTPS) • Data Storage – DB-level Encryption (TDE) + Field-level Encryption • Display Rules: Show Only Last 4 Digits • Retention Rules: As per business needs or 7 years (?) • Rules for Personal Identification Data Category • Data In Transit – Encrypted (HTTPS) • Data Storage – DB-level Encryption (TDE) + Field-level Encryption • Display Rules: Hidden (Visual Verification Will Be Available During Data Input Only) • Retention Rules: As per business needs or 7 years (?)
  • 12. Security - Secure PI data as per defined rules
  • 13. General Security Aspects •PI data storage •PI data in transit •PI data during the processing
  • 14. PIPEDA Fair Information Principles PIPEDA sets out 10 principles of fair information practices, which set up the basic privacy obligations under the law. They are: • Accountability - Organizations should appoint someone to be responsible for privacy issues. They should make information about their privacy policies and procedures to available to customers. • Identifying purposes - Organization must identify the reasons for collecting your personal information before or at the time of collection. • Consent - Organizations should clearly inform you of the purposes for the collection, use or disclosure of personal information. • Limiting collection - Organizations should limit the amount and type of the information gathered to what is necessary. • Limiting use, disclosure and retention - In general, organizations should use or disclose your personal information only for the purpose for which it was collected, unless you consent. They should keep your personal information only as long as necessary. • Accuracy - Organizations should keep your personal information as accurate, complete and up to date as necessary. • Safeguards - Organizations need to protect your personal information against loss or theft by using appropriate security safeguards. • Openness - An organization’s privacy policies and practices must be understandable and easily available. • Individual access - Generally speaking, you have a right to access the personal information that an organization holds about you. • Recourse (Challenging compliance) - Organizations must develop simple and easily accessible complaint procedures. When you contact an organization about a privacy concern, you should be informed about avenues of recourse.
  • 15. PIPEDA Fair Information Principles – App Security Focus PIPEDA sets out 10 principles of fair information practices, which set up the basic privacy obligations under the law. They are: • Accountability - Organizations should appoint someone to be responsible for privacy issues. They should make information about their privacy policies and procedures to available to customers. • Identifying purposes - Organization must identify the reasons for collecting your personal information before or at the time of collection. • Consent - Organizations should clearly inform you of the purposes for the collection, use or disclosure of personal information. • Limiting collection - Organizations should limit the amount and type of the information gathered to what is necessary. • Limiting use, disclosure and retention - In general, organizations should use or disclose your personal information only for the purpose for which it was collected, unless you consent. They should keep your personal information only as long as necessary. • Accuracy - Organizations should keep your personal information as accurate, complete and up to date as necessary. • Safeguards - Organizations need to protect your personal information against loss or theft by using appropriate security safeguards. • Openness - An organization’s privacy policies and practices must be understandable and easily available. • Individual access - Generally speaking, you have a right to access the personal information that an organization holds about you. • Recourse (Challenging compliance) - Organizations must develop simple and easily accessible complaint procedures. When you contact an organization about a privacy concern, you should be informed about avenues of recourse.
  • 16. PIPEDA Fair Information Principles – App Security Focus • Consent • When applicable, make sure the consumer consent is taken and logged with the timestamp. • Retention • Delete sensitive data as per rules for each category. • Safeguards • PI data is encrypted in the data storage • PI data is encrypted in transit, through use of secure communication protocols (SSL/TLS 1.2, SFTP etc.) • Ensure PI data is not compromised during the processing • Checking the code using Source Code Analysis Tools • Checking applications at runtime using Runtime Application Self-Protection Tools