Data protection audits, outcomes and lessons learnt

advertisement
Information
Commissioner’s Office
Data protection audits,
outcomes and lessons learnt
John-Pierre Lamb, Group Manager, Good Practice
October, 2014
Our Mission:
The ICO is the UK’s independent authority set up to uphold
information rights in the public interest, promoting openness
by public bodies and data privacy for individuals.
Our role:
• Encourage good practice
• Assess eligible complaints
• Advise individuals and organisations
• Take appropriate action on non-compliance
What is Good Practice?
Section 51 (7) of the DPA 1998:
Gives the Information Commissioner power to assess any
organisation’s processing of personal data for the following of ‘good
practice’, with the agreement of the data controller.
Good practice is defined very generally in the Act as “practices for
processing personal data which appear to be desirable. This includes,
but is not limited to, compliance with the requirement of the Act”.
Good Practice Team
Our aim:
To help organisations understand how to comply with the DPA.
Who we work with:
A wide range of organisations from small charities and
voluntary organisations through to high profile government
departments and household name companies.
How we do this:
• DPA & PECR audits
• Advisory visits
• Workshops
• Self assessment questionnaires
• Outcomes reporting
What is personal data?
Data which relate to a living individual who can be identified
(a)from those data, or
(b)from those data and other information which is in the
possession of, or is likely to come into the possession of, the
data controller
and includes any expression of opinion about the individual
and any indication of the intentions of the data controller or
any other person in respect of the individual
What is sensitive personal data?
Personal data relating to:
•
•
•
•
•
•
•
•
racial or ethnic origin
political opinions
religious beliefs or other beliefs of a similar nature
trade union membership
physical or mental health or condition
sexual life
any offence - the commission, or alleged commission of
any court proceedings or sentence relating to any
offence committed or alleged to have been committed
Data Protection Act 1998
The eight principles
Audit Process
Audit approach – process overview
• Consensual engagement, then agree a scope of work with
the organisation plus LoE and interview schedule – one to
two months before the audit
• Carry out an off-site adequacy review of an organisation’s
documented policies and procedures
• Carry out an on-site review of the procedures in practice for
processing personal data – 3 days, 2/3 auditors
• Provide a report with recommendations and assurance
opinion – 8 weeks from first draft to final report
• Draft an executive summary for publication on our website,
with the consent of the organisation
• Carry out a follow-up review – depends on assurance level
Benefits of an ICO DP audit
• helps to raise awareness of data protection and what the ICO
considers appropriate to enable compliance with DPA
• identifies data protection risks and provides practical, pragmatic,
organisational-specific recommendations
• shows an organisation’s commitment to, and recognition of, the
importance of data protection
• opportunity to use the ICO’s experience & resources (at no
expense) to provide an independent assurance of the existence
and effectiveness of data protection controls
• sharing knowledge with trained, experienced, qualified staff and an
improved working relationship with the ICO
Key scope areas
• Data protection governance:
structure, roles and responsibilities,
policies and procedures, risk management, compliance reviews and audit,
performance monitoring and reporting
• Records management:
roles and responsibilities, policies and
procedures, collection of data/fair processing, storage and maintenance,
retention and disposal of data plus monitoring and reporting
• Security of personal data:
structure, roles & responsibilities, policies
& procedures, asset management, physical security, identity access
management, network access controls, system monitoring and incident
reporting, remote working and web/cloud based applications
Key scope areas
• Training & awareness:
induction, specific and role based, refresher
training, and performance and reporting
• Requests for personal data:
accountability, training, records,
performance monitoring, compliance monitoring including correct use of
redaction and DPA exemptions plus third party request handling
• Data sharing:
roles and responsibility, fair processing, risk and legality
assessment, formal data sharing agreements, monitoring and reporting,
data quality, security
Security – scope and risk
The technical and organisational measures in place to ensure
that there is adequate security over personal data held in
manual or electronic form.
Risk: Without robust controls to ensure that personal data
records, both manual and electronic, are held securely in
compliance with the DPA, there is a risk that they may be
lost or used inappropriately, resulting in regulatory action
against, and/or reputational damage to, the organisation,
and damage and distress to individuals.
ICO audit - Security controls
Sectors audited: Apr 2011 to Sep 2014
5%
9%
Central govt
23%
31%
Local govt
NHS
Private
11%
Criminal Justice
21%
Other
Scope area analysis: Jan 2011-Dec 2013
Local government only
Data protection
governance
4%
18%
17%
15%
22%
24%
Training and
awareness
Records
management
Security of personal
data
Requests for
personal data
Data sharing
Scope area analysis: Feb 2010-Jan 2014
Health only
8%
7%
22%
29%
16%
18%
Data protection
governance
Training and
awareness
Records
management
Security of personal
data
Requests for
personal data
Data sharing
Assurance opinion analysis:
Data Protection Governance in local government and health authorities
57
%
28
13
4
60
Local
Government
26
Health
Authorities
8
4
High
Reasonable Limited Very limited
assurance assurance assurance assurance
Assurance opinion analysis:
Records Management in local government and health authorities
63
50
%
44
Local
Government
32
Health
Authorities
0
5
6
0
High
Reasonable Limited Very limited
assurance assurance assurance assurance
Assurance opinion analysis:
Security in local government and health authorities
61
67
Local
Government
33 33
%
Health
Authorities
6
0
0
0
High
Reasonable Limited Very limited
assurance assurance assurance assurance
Assurance opinion analysis:
Training & Awareness in local government and health authorities
50
41
%
19
9
36
Local
Government
31
Health
Authorities
14
0
High
Reasonable Limited Very limited
assurance assurance assurance assurance
Assurance opinion analysis:
Requests for personal data in local government and health authorities
63
41
%
41
Local
Government
38
Health
Authorities
15
0
4
0
High
Reasonable Limited Very limited
assurance assurance assurance assurance
Assurance opinion analysis:
Data sharing in local government and health authorities
80
%
Local
Government
43
29
29
20
0
0
0
High
Reasonable Limited Very limited
assurance assurance assurance assurance
Health
Authorities
Common areas for improvement:
Records Management
•
Lack of regular internal audit (IS & data handling), compliance monitoring
and reporting; plus use of independent external assurance
•
Lack of formal records management framework including strategy, roles
and responsibility plus policies and procedures
•
Lack of effective, formal training programme incorporating RM which
comprises of mandatory induction and periodic refresher training; plus the
monitoring and enforcement of training attendance against corporate KPIs
•
Absence of Information Asset Registers (IARs) and associated risk
assessment procedure plus ineffective/poorly trained IAOs
•
Lack of effective controls concerning retention, weeding and secure
destruction of both electronic and manual records
•
Lack of effective security and control for manual records especially when
being transported or transferred
Common areas for improvement:
Security of personal data
•
Lack of regular internal audit, compliance monitoring and reporting; plus
use of independent external assurance
•
Lack of effective control of IT system access rights, including starters,
movers and leavers protocols (permanent and contract staff) plus
automated reconciliation with HR / payroll systems
•
Lack of effective network endpoint controls and mobile device encryption,
plus password control and enforcement
•
Lack of security controls for remote access and home working
•
Absence of 3rd party monitoring – confidential waste disposal, IT hardware
disposal, storage and disposal of records
Other common areas for improvement:
•
Lack of effective monitoring and reporting mechanisms concerning subject
access requests, plus performance against corporate KPIs
•
Lack of use of PIA/PBD for projects and system changes involving
processing of personal data
•
Absence of effective, specialised training programmes for key roles
including periodic refresher training; plus the monitoring and enforcement
of training attendance against corporate KPIs
•
Lack of centralised control, monitoring and review of data sharing
agreements
Look familiar ???
When things go wrong – civil monetary penalties

Sensitive information mixed up and given to wrong person








Halton Borough Council
Devon County Council
Plymouth City Council
Telford & Wrekin District Council
Norfolk County Council
Midlothian Council
Powys County Council
£70,000
£90,000
£60,000
£90,000
£80,000
£140,000
£130,000
May 2013
December 2012
November 2012
May 2012
February 2012
January 2012
December 2011
Sensitive information sent to wrong address












North Staffordshire Combined Healthcare Trust
Leeds City Council
St George’s Healthcare NHS Trust
Aneurin Bevan Health Board
Stoke-on-Trent City Council
Cheshire East Council
North Somerset Council
Worcestershire County Council
Surrey County Council
Central London Community Healthcare NHS Trust
Hertfordshire County Council
Ministry of Justice
£55,000
£95,000
£60,000
£70,000
£120,000
£80,000
£60,000
£80,000
£120,000
£90,000
£100,000
£140,000
fax
post
post
post
email
email
email
email
email
fax
fax
email
June 2013
November 2012
July 2012
April 2012
October 2012
February 2012
November 2011
November 2011
June 2011
April 2012
November 2010
October 2013
When things go wrong – civil monetary penalties

Sensitive information lost or stolen












network hacked
DVD lost
unencrypted USB
papers
papers
papers
papers
unencrypted laptop
unencrypted laptop
unencrypted laptop
portable hard drive
Inadequate disposal of old files or computer hard drives







Sony Computer Entertainment Europe Ltd £250,000
Nursing and Midwifery Council
£150,000
Greater Manchester Police
£150,000
London Borough of Lewisham
£70,000
London Borough of Barnet
£70,000
Lancashire Constabulary
£70,000
Croydon Council
£100,000
Ealing Borough Council
£80,000
Hounslow Borough Council
£70,000
Glasgow City Council
£150,000
Ministry of Justice
£180,000
NHS Surrey
Stockport Primary Care Trust
Scottish Borders Council
Belfast Health & Social Care Trust
Brighton & Sussex Univ Hosp NHS Trust
Department of Justice (NI)
£200,000
£100,000
£250,000
£225,000
£325,000
£185,000
Sensitive information taken from websites





Aberdeen City Council
Islington Borough Council
Torbay Care Trust
British Pregnancy Advisory Service
Think W3
£100,000
£70,000
£175,000
£200,000
£150,000
February 2013
February 2013
September 2012
December 2012
May 2012
March 2012
February 2012
February 2011
February 2011
June 2013
August 2014
hard drives
paper files
paper files
paper files
hard drives
paper files
June 2013
June 2013
September 2012
June 2012
May 2012
January 2014
online disclosure
online disclosure
online disclosure
hacking
hacking
August 2013
August 2013
July 2012
February 2014
July 2014
Keep in touch
Subscribe to news feeds, blogs or our e-newsletter at
www.ico.gov.uk and find us on…
www.twitter.com/iconews
Download