SlideShare una empresa de Scribd logo
1 de 14
Descargar para leer sin conexión
Managing Information Asset Register

                          By
                 Ben Oguntala. LLB, LLM
         Ben.oguntala@dataprotectionofficer.com
How many Information data do you have, what are they and with whom are they shared?


                                                                                 1
Our 5 simple steps
1      Define the key stakeholders

2   Create your IAR & supplier register


3   Map current IAR to Suppliers & ISA

4     Create the relevant processes


5            Solution roll out

                                      2
Overview of the framework
        Privacy             Compliance               Information                                              THE KEY STAKEHOLDERS
                                                                              Business units
         team                 team                     security                                               Access given these teams
                                                                                                              to ensure a consolidated
                                                                                                              coverage.

     www.dataprotectionofficer.com                                                         CREATE YOUR IAR/PR/3PR & ISA
                                                                                           The databases provided:
                                                                                           - IAR – information Asset register
                                                   3rd party
                                  register




                                                   register
                                  Project




                                                                                           - Project register
                   IAR




                                                                       ISA
                                                                                           - 3rd party register
                                                                                           - ISA – information sharing agreements




            Business unit 1                                     Business unit 2                              Business unit 2

 Projects     IAR        3rd parties         ISA     Projects     IAR        3rd parties   ISA    Projects     IAR   3rd parties   ISA

   13          9             12              6           13        9             12         6       13          9        12        6



                                                                                                                                       3
        Business units can be structured according to the hierarchy of your organisation
1               Define the key stakeholders

    Team                      Role                         Benefits


Procurement                                     Procurement are best placed
                       Supply of the list of
    team                                        to know which suppliers you
                           suppliers
                                                         deal with

                                                As part of compliance the ISA
Privacy team         Supply the ISA template,
                                                is used with all 3rd party data
                         PIA & approval
                                                         exchanges.

 Compliance                                       Compliance ensures all
                       Supply compliance
   team                                         policies and procedures are
                           baseline
                                                         adhered to.

 Information                                     Play an operational role in
                     Supply risk assessment
   security                                     assessing projects & changes
                            function
                                                    to your organisation


Business units         Supply Information         All business units listed
                        Assets projects &       including sub business units
                            changes                     and Partners
                                                                                  4
2      Create your IAR & supplier register

    Team             Role




                                        3rd party
                                        register
Procurement      Supply of the
    team             list of
                   suppliers

                 Supply the ISA
Privacy team     template, PIA




                                          ISA
                  & approval

 Compliance         Supply
   team           compliance




                                          IAR
                   baseline

 Information      Supply risk
   security       assessment
                   function



                                        register
                                        Project
                     Supply
Business units    Information
                     Assets
                   projects &
                    changes                              5
2   Create your IAR & supplier register

Business unit: Organisation hierarchy




                                          6
2   Create your IAR & supplier register

       The Asset Register

                    Buena Ventura




                                          7
2          Create your IAR & supplier register

          Editing the Information Asset Register
                                                          Risk impact assessment




Asset details include format, location, input & output.                       8
3   Map current IAR to Suppliers & ISA




                         List of 3rd parties that the
                         information asset is shared with




      Detailed view

                             3rd
                           parties




                                                    9
3          Map current IAR to Suppliers & ISA

                      Details of the Asset Register
                                                                       3rd
                                                                     parties




                                                                                              10
Each asset is risk assessed, classified, owner assigned and no. of 3rd parties shared with listed
4              Create the relevant processes
                                List of Information
                                       Assets
                     IAR
                                New information




                                                                             IAR
                                Asset registration
                                  Project/Asset           IAR       87
                                    mapping
                                                      Projects      32


    Business       Projects




                                                                             Projects
                                  New/change
     units                          project


                                Project/asset/sup
                  3rd parties     plier mapping




                                                                           parties
                                                                             3rd
                                  New supplier
                                   registration
                                                                 Project




                                                                                        ISA
                                   Compliance
                     ISA
                                                       Information asset
                                                                                        11
4                  Create the relevant processes
                       Risk rating                                                                  Incident
                    Types of assets                                                               management




                                               Information
Business




                                                                             3rd party
                                                                             supplier
                                                 register
                                                                                               Information security




                                                  Asset
  unit




                                                                                                                              3rd parties
                   Total no. of Assets                                                              compliance
                     Project/Asset                                                               Data Protection
                                                                                                     officer
                    Types of assets
                                                                                                  Project/Asset
                                           • Privacy impact assessment
                                           • contract
                                           • Information sharing agreement

                                                        Privacy team

    Business units        Asset ID    Owner     Classification      Record type          ISA        Suppliers     Review date


            HR              901      A smut      Restricted      Full customer info      5            MOJ          23/09/10

           Sales            789       S Red     Unrestricted     Customer financials     7           OMG           13/12/10

       Marketing            456       N Ball      financial          Customer            3           Detica        02/06/11

     Procurement            123       W Ed       Restricted         Record type          1           Logica        04/01/11
                                                                                                                          12
5                        Solution roll out


           Business unit 1             Stakeholders

Projects     IAR   3rd parties   ISA
                                       Procurement
  13          9        12        6
                                           team
           Business unit 2

                                       Privacy team




                                                                Phased roll out
Projects     IAR   3rd parties   ISA




                                                                                  Operation
  13          9        12        6




                                                        Pilot
           Business unit 3              Compliance
                                          team
Projects     IAR   3rd parties   ISA

  13          9        12        6
                                        Information
           Business unit 4                security

Projects     IAR   3rd parties   ISA

  13          9        12        6     Business units
                                                                                              13
Contact details
To know what Information Assets you have and
  with whom you are sharing them, contact

•   Ben Oguntala, LLB, LLM
•   Ben.oguntala@dataprotectionofficer.com
•   07812 039 867
•   www.dataprotectionofficer.com

                                               14

Más contenido relacionado

La actualidad más candente

SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterMichael Nickle
 
Enterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating ModelEnterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating ModelEryk Budi Pratama
 
Security Transformation Services
Security Transformation ServicesSecurity Transformation Services
Security Transformation Servicesxband
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)Ben Rothke
 
Security architecture
Security architectureSecurity architecture
Security architectureDuncan Unwin
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centersBrencil Kaimba
 
Putting MITRE ATT&CK into Action with What You Have, Where You Are
Putting MITRE ATT&CK into Action with What You Have, Where You ArePutting MITRE ATT&CK into Action with What You Have, Where You Are
Putting MITRE ATT&CK into Action with What You Have, Where You AreKatie Nickels
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management Ersoy AKSOY
 
MW_Arch Fastest_way_to_hunt_on_Windows_v1.01
MW_Arch Fastest_way_to_hunt_on_Windows_v1.01MW_Arch Fastest_way_to_hunt_on_Windows_v1.01
MW_Arch Fastest_way_to_hunt_on_Windows_v1.01Michael Gough
 
SIEM presentation final
SIEM presentation finalSIEM presentation final
SIEM presentation finalRizwan S
 
ISO 27004- Information Security Metrics Implementation
ISO 27004- Information Security Metrics ImplementationISO 27004- Information Security Metrics Implementation
ISO 27004- Information Security Metrics ImplementationNetwork Intelligence India
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehReZa AdineH
 
Cyber Threat Hunting Workshop
Cyber Threat Hunting WorkshopCyber Threat Hunting Workshop
Cyber Threat Hunting WorkshopDigit Oktavianto
 
Security Training: #3 Threat Modelling - Practices and Tools
Security Training: #3 Threat Modelling - Practices and ToolsSecurity Training: #3 Threat Modelling - Practices and Tools
Security Training: #3 Threat Modelling - Practices and ToolsYulian Slobodyan
 
7 Software Development Security
7 Software Development Security7 Software Development Security
7 Software Development SecurityAlfred Ouyang
 
Splunk Distributed Management Console
Splunk Distributed Management Console                                         Splunk Distributed Management Console
Splunk Distributed Management Console Splunk
 

La actualidad más candente (20)

SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
Enterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating ModelEnterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating Model
 
Security Transformation Services
Security Transformation ServicesSecurity Transformation Services
Security Transformation Services
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
 
Security architecture
Security architectureSecurity architecture
Security architecture
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
 
Putting MITRE ATT&CK into Action with What You Have, Where You Are
Putting MITRE ATT&CK into Action with What You Have, Where You ArePutting MITRE ATT&CK into Action with What You Have, Where You Are
Putting MITRE ATT&CK into Action with What You Have, Where You Are
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
 
MW_Arch Fastest_way_to_hunt_on_Windows_v1.01
MW_Arch Fastest_way_to_hunt_on_Windows_v1.01MW_Arch Fastest_way_to_hunt_on_Windows_v1.01
MW_Arch Fastest_way_to_hunt_on_Windows_v1.01
 
SIEM presentation final
SIEM presentation finalSIEM presentation final
SIEM presentation final
 
ISO 27004- Information Security Metrics Implementation
ISO 27004- Information Security Metrics ImplementationISO 27004- Information Security Metrics Implementation
ISO 27004- Information Security Metrics Implementation
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
 
Cyber Threat Hunting Workshop
Cyber Threat Hunting WorkshopCyber Threat Hunting Workshop
Cyber Threat Hunting Workshop
 
ISO 27001:2022 What has changed.pdf
ISO 27001:2022 What has changed.pdfISO 27001:2022 What has changed.pdf
ISO 27001:2022 What has changed.pdf
 
Security Training: #3 Threat Modelling - Practices and Tools
Security Training: #3 Threat Modelling - Practices and ToolsSecurity Training: #3 Threat Modelling - Practices and Tools
Security Training: #3 Threat Modelling - Practices and Tools
 
Cloud security
Cloud security Cloud security
Cloud security
 
7 Software Development Security
7 Software Development Security7 Software Development Security
7 Software Development Security
 
Chapter 5 - Identity Management
Chapter 5 - Identity ManagementChapter 5 - Identity Management
Chapter 5 - Identity Management
 
Splunk Distributed Management Console
Splunk Distributed Management Console                                         Splunk Distributed Management Console
Splunk Distributed Management Console
 

Destacado

Data/File Security & Control
Data/File Security & ControlData/File Security & Control
Data/File Security & ControlAdetula Bunmi
 
Using an Information Asset Register for the GDPR
Using an Information Asset Register for the GDPRUsing an Information Asset Register for the GDPR
Using an Information Asset Register for the GDPRReynold Leming
 
Fixed Asset Management by YENNES Infotec (P) Limited
Fixed Asset Management by YENNES Infotec (P) LimitedFixed Asset Management by YENNES Infotec (P) Limited
Fixed Asset Management by YENNES Infotec (P) LimitedYENNES Infotec P Limited
 
Real-World Data Governance: Managing Data & Information as an Asset - Governa...
Real-World Data Governance: Managing Data & Information as an Asset - Governa...Real-World Data Governance: Managing Data & Information as an Asset - Governa...
Real-World Data Governance: Managing Data & Information as an Asset - Governa...DATAVERSITY
 
Accounting for fixed assets (as 10)
Accounting for fixed assets (as 10)Accounting for fixed assets (as 10)
Accounting for fixed assets (as 10)Jalaj Shah
 
Asset Management Presentation
Asset Management PresentationAsset Management Presentation
Asset Management PresentationNeeraj Kumar
 
SAP - FIXED ASSETS ACCOUNTING
SAP - FIXED ASSETS ACCOUNTINGSAP - FIXED ASSETS ACCOUNTING
SAP - FIXED ASSETS ACCOUNTINGsaiprasadbagrecha
 

Destacado (8)

Data/File Security & Control
Data/File Security & ControlData/File Security & Control
Data/File Security & Control
 
Using an Information Asset Register for the GDPR
Using an Information Asset Register for the GDPRUsing an Information Asset Register for the GDPR
Using an Information Asset Register for the GDPR
 
Fixed Asset Management by YENNES Infotec (P) Limited
Fixed Asset Management by YENNES Infotec (P) LimitedFixed Asset Management by YENNES Infotec (P) Limited
Fixed Asset Management by YENNES Infotec (P) Limited
 
Real-World Data Governance: Managing Data & Information as an Asset - Governa...
Real-World Data Governance: Managing Data & Information as an Asset - Governa...Real-World Data Governance: Managing Data & Information as an Asset - Governa...
Real-World Data Governance: Managing Data & Information as an Asset - Governa...
 
Fixed asset management
Fixed asset managementFixed asset management
Fixed asset management
 
Accounting for fixed assets (as 10)
Accounting for fixed assets (as 10)Accounting for fixed assets (as 10)
Accounting for fixed assets (as 10)
 
Asset Management Presentation
Asset Management PresentationAsset Management Presentation
Asset Management Presentation
 
SAP - FIXED ASSETS ACCOUNTING
SAP - FIXED ASSETS ACCOUNTINGSAP - FIXED ASSETS ACCOUNTING
SAP - FIXED ASSETS ACCOUNTING
 

Similar a Managing Information Asset Registers

Creating Data Hubs to Enhance Information Sharing
Creating Data Hubs to Enhance Information SharingCreating Data Hubs to Enhance Information Sharing
Creating Data Hubs to Enhance Information SharingInnoTech
 
Enterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditEnterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditBob Rhubart
 
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011IBM Sverige
 
Enterprise Security Architecture: From Access to Audit
Enterprise Security Architecture: From Access to AuditEnterprise Security Architecture: From Access to Audit
Enterprise Security Architecture: From Access to AuditBob Rhubart
 
02 mda middle east - part 1
02 mda middle east - part 102 mda middle east - part 1
02 mda middle east - part 1PiLog
 
Securing and Governing Cloud APIs
Securing and Governing Cloud APIsSecuring and Governing Cloud APIs
Securing and Governing Cloud APIsCA API Management
 
Building a database security program
Building a database security programBuilding a database security program
Building a database security programmatt_presson
 
Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0debbanerjee
 
Sunera Business & Technology Risk Consulting
Sunera Business & Technology Risk ConsultingSunera Business & Technology Risk Consulting
Sunera Business & Technology Risk ConsultingSunera
 
Sunera business & technology risk consulting services -slide share
Sunera  business & technology risk consulting services -slide shareSunera  business & technology risk consulting services -slide share
Sunera business & technology risk consulting services -slide shareSunera
 
Cordex India - SAS Forum India: Loss Data Consortium
Cordex India - SAS Forum India: Loss Data ConsortiumCordex India - SAS Forum India: Loss Data Consortium
Cordex India - SAS Forum India: Loss Data ConsortiumSAS Institute India Pvt. Ltd
 
Cloudera sessions centralized management systems
Cloudera sessions   centralized management systemsCloudera sessions   centralized management systems
Cloudera sessions centralized management systemsCloudera, Inc.
 
Unified big data architecture
Unified big data architectureUnified big data architecture
Unified big data architectureDataWorks Summit
 
SunGard Enterprise Cloud Services @ Cloud Connect 2011
SunGard Enterprise Cloud Services @ Cloud Connect 2011SunGard Enterprise Cloud Services @ Cloud Connect 2011
SunGard Enterprise Cloud Services @ Cloud Connect 2011Satish Hemachandran
 
Integrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLCIntegrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLCDATAVERSITY
 
Secure Enterprise Cloud
Secure Enterprise CloudSecure Enterprise Cloud
Secure Enterprise CloudIndu Kodukula
 
Information Governance-a programmatic perspective on driving value through RI...
Information Governance-a programmatic perspective on driving value through RI...Information Governance-a programmatic perspective on driving value through RI...
Information Governance-a programmatic perspective on driving value through RI...Ledjit
 

Similar a Managing Information Asset Registers (20)

Creating Data Hubs to Enhance Information Sharing
Creating Data Hubs to Enhance Information SharingCreating Data Hubs to Enhance Information Sharing
Creating Data Hubs to Enhance Information Sharing
 
Enterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditEnterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to audit
 
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
 
SunGard Data Profiling
SunGard Data ProfilingSunGard Data Profiling
SunGard Data Profiling
 
Enterprise Security Architecture: From Access to Audit
Enterprise Security Architecture: From Access to AuditEnterprise Security Architecture: From Access to Audit
Enterprise Security Architecture: From Access to Audit
 
02 mda middle east - part 1
02 mda middle east - part 102 mda middle east - part 1
02 mda middle east - part 1
 
Privacy Impact Assessment Final
Privacy Impact Assessment FinalPrivacy Impact Assessment Final
Privacy Impact Assessment Final
 
Sap basis and_security_administration
Sap basis and_security_administrationSap basis and_security_administration
Sap basis and_security_administration
 
Securing and Governing Cloud APIs
Securing and Governing Cloud APIsSecuring and Governing Cloud APIs
Securing and Governing Cloud APIs
 
Building a database security program
Building a database security programBuilding a database security program
Building a database security program
 
Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0
 
Sunera Business & Technology Risk Consulting
Sunera Business & Technology Risk ConsultingSunera Business & Technology Risk Consulting
Sunera Business & Technology Risk Consulting
 
Sunera business & technology risk consulting services -slide share
Sunera  business & technology risk consulting services -slide shareSunera  business & technology risk consulting services -slide share
Sunera business & technology risk consulting services -slide share
 
Cordex India - SAS Forum India: Loss Data Consortium
Cordex India - SAS Forum India: Loss Data ConsortiumCordex India - SAS Forum India: Loss Data Consortium
Cordex India - SAS Forum India: Loss Data Consortium
 
Cloudera sessions centralized management systems
Cloudera sessions   centralized management systemsCloudera sessions   centralized management systems
Cloudera sessions centralized management systems
 
Unified big data architecture
Unified big data architectureUnified big data architecture
Unified big data architecture
 
SunGard Enterprise Cloud Services @ Cloud Connect 2011
SunGard Enterprise Cloud Services @ Cloud Connect 2011SunGard Enterprise Cloud Services @ Cloud Connect 2011
SunGard Enterprise Cloud Services @ Cloud Connect 2011
 
Integrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLCIntegrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLC
 
Secure Enterprise Cloud
Secure Enterprise CloudSecure Enterprise Cloud
Secure Enterprise Cloud
 
Information Governance-a programmatic perspective on driving value through RI...
Information Governance-a programmatic perspective on driving value through RI...Information Governance-a programmatic perspective on driving value through RI...
Information Governance-a programmatic perspective on driving value through RI...
 

Más de Ben Omoakin Oguntala, developingafrica(dot)net

Más de Ben Omoakin Oguntala, developingafrica(dot)net (15)

Developing Africa Ode Remo brochure
Developing Africa Ode Remo brochureDeveloping Africa Ode Remo brochure
Developing Africa Ode Remo brochure
 
Developing Africa - Ode Remo
Developing Africa - Ode RemoDeveloping Africa - Ode Remo
Developing Africa - Ode Remo
 
Thisday story with Oguntala
Thisday story with OguntalaThisday story with Oguntala
Thisday story with Oguntala
 
Africa secretariat - The Home of African raw materials
Africa secretariat - The Home of African raw materials Africa secretariat - The Home of African raw materials
Africa secretariat - The Home of African raw materials
 
Data Leakage Prevention
Data Leakage PreventionData Leakage Prevention
Data Leakage Prevention
 
Risk Assessment And Risk Treatment
Risk Assessment And Risk TreatmentRisk Assessment And Risk Treatment
Risk Assessment And Risk Treatment
 
Data Protection Compliance In Economically Depressing Times
Data Protection Compliance In Economically Depressing TimesData Protection Compliance In Economically Depressing Times
Data Protection Compliance In Economically Depressing Times
 
Fraud Monitoring Solution
Fraud Monitoring SolutionFraud Monitoring Solution
Fraud Monitoring Solution
 
Conformidad De Seguridad De InformacióNv2
Conformidad De Seguridad De InformacióNv2Conformidad De Seguridad De InformacióNv2
Conformidad De Seguridad De InformacióNv2
 
Iso 27001 Audit Evidence Acquisitionv3
Iso 27001 Audit Evidence Acquisitionv3Iso 27001 Audit Evidence Acquisitionv3
Iso 27001 Audit Evidence Acquisitionv3
 
Iso 27001 Audit Evidence Acquisition
Iso 27001 Audit Evidence AcquisitionIso 27001 Audit Evidence Acquisition
Iso 27001 Audit Evidence Acquisition
 
Gprs/3G Troubleshooter
Gprs/3G TroubleshooterGprs/3G Troubleshooter
Gprs/3G Troubleshooter
 
Pci V2
Pci V2Pci V2
Pci V2
 
FoI
FoIFoI
FoI
 
Dpa V3
Dpa V3Dpa V3
Dpa V3
 

Managing Information Asset Registers

  • 1. Managing Information Asset Register By Ben Oguntala. LLB, LLM Ben.oguntala@dataprotectionofficer.com How many Information data do you have, what are they and with whom are they shared? 1
  • 2. Our 5 simple steps 1 Define the key stakeholders 2 Create your IAR & supplier register 3 Map current IAR to Suppliers & ISA 4 Create the relevant processes 5 Solution roll out 2
  • 3. Overview of the framework Privacy Compliance Information THE KEY STAKEHOLDERS Business units team team security Access given these teams to ensure a consolidated coverage. www.dataprotectionofficer.com CREATE YOUR IAR/PR/3PR & ISA The databases provided: - IAR – information Asset register 3rd party register register Project - Project register IAR ISA - 3rd party register - ISA – information sharing agreements Business unit 1 Business unit 2 Business unit 2 Projects IAR 3rd parties ISA Projects IAR 3rd parties ISA Projects IAR 3rd parties ISA 13 9 12 6 13 9 12 6 13 9 12 6 3 Business units can be structured according to the hierarchy of your organisation
  • 4. 1 Define the key stakeholders Team Role Benefits Procurement Procurement are best placed Supply of the list of team to know which suppliers you suppliers deal with As part of compliance the ISA Privacy team Supply the ISA template, is used with all 3rd party data PIA & approval exchanges. Compliance Compliance ensures all Supply compliance team policies and procedures are baseline adhered to. Information Play an operational role in Supply risk assessment security assessing projects & changes function to your organisation Business units Supply Information All business units listed Assets projects & including sub business units changes and Partners 4
  • 5. 2 Create your IAR & supplier register Team Role 3rd party register Procurement Supply of the team list of suppliers Supply the ISA Privacy team template, PIA ISA & approval Compliance Supply team compliance IAR baseline Information Supply risk security assessment function register Project Supply Business units Information Assets projects & changes 5
  • 6. 2 Create your IAR & supplier register Business unit: Organisation hierarchy 6
  • 7. 2 Create your IAR & supplier register The Asset Register Buena Ventura 7
  • 8. 2 Create your IAR & supplier register Editing the Information Asset Register Risk impact assessment Asset details include format, location, input & output. 8
  • 9. 3 Map current IAR to Suppliers & ISA List of 3rd parties that the information asset is shared with Detailed view 3rd parties 9
  • 10. 3 Map current IAR to Suppliers & ISA Details of the Asset Register 3rd parties 10 Each asset is risk assessed, classified, owner assigned and no. of 3rd parties shared with listed
  • 11. 4 Create the relevant processes List of Information Assets IAR New information IAR Asset registration Project/Asset IAR 87 mapping Projects 32 Business Projects Projects New/change units project Project/asset/sup 3rd parties plier mapping parties 3rd New supplier registration Project ISA Compliance ISA Information asset 11
  • 12. 4 Create the relevant processes Risk rating Incident Types of assets management Information Business 3rd party supplier register Information security Asset unit 3rd parties Total no. of Assets compliance Project/Asset Data Protection officer Types of assets Project/Asset • Privacy impact assessment • contract • Information sharing agreement Privacy team Business units Asset ID Owner Classification Record type ISA Suppliers Review date HR 901 A smut Restricted Full customer info 5 MOJ 23/09/10 Sales 789 S Red Unrestricted Customer financials 7 OMG 13/12/10 Marketing 456 N Ball financial Customer 3 Detica 02/06/11 Procurement 123 W Ed Restricted Record type 1 Logica 04/01/11 12
  • 13. 5 Solution roll out Business unit 1 Stakeholders Projects IAR 3rd parties ISA Procurement 13 9 12 6 team Business unit 2 Privacy team Phased roll out Projects IAR 3rd parties ISA Operation 13 9 12 6 Pilot Business unit 3 Compliance team Projects IAR 3rd parties ISA 13 9 12 6 Information Business unit 4 security Projects IAR 3rd parties ISA 13 9 12 6 Business units 13
  • 14. Contact details To know what Information Assets you have and with whom you are sharing them, contact • Ben Oguntala, LLB, LLM • Ben.oguntala@dataprotectionofficer.com • 07812 039 867 • www.dataprotectionofficer.com 14