Personal Data Protection and Security Measures November 2014 Data privacy breaches do happen … Who will be the next? Number of complaints in Hong Kong Contactless smart card operator case Hospital case Magazine case Government office employee video case Deceitful data collection case Six banks involved selling of data of 600,000 customers Bank retention of data 99 years case Government authority in healthcare case Data leakage of 8000 students case Police Notebook Case Papers dump case 1507 1600 1400 1225 1200 1000 789 800 906 888 919 953 972 1067 1233 Fitness centre case 1022 834 824 568 600 418 400 253 200 52 0 95-96 96-96 97-98 98-99 99-00 00-01 01-02 02-03 03-04 04-05 05-06 06-07 07-08 08-09 09-10 10-11 11-12 12-13 Enactment of PDPO Code of Practice on Consumer Credit Data Commencement of PDPO Code of Practice on the Identity Card Page 2 Consultation paper Code of Practice on HR Management Legislative Council Brief Personal Data (Privacy)(Amendment) Bill 2011 Guidelines on employee monitoring DURS Consultation Paper Enactment of Personal Data (Privacy) (Amendment) Ordinance 2012 (Source: http://www.pcpd.org.hk/english/publications/annualreport.html) Privacy Seminar for HKU Agenda Page 3 1 Data Privacy Regulations and Requirements 2 Information Security Measures 3 Privacy Management Program and Data Inventories 4 Practices in the University 5 Case Study Privacy Seminar for HKU 1. Data privacy regulations and requirements ► ‘Personal data’ means any data ► (a) relating directly or indirectly to a living individual; ► ► ► Indirect relationship; Remoteness Direct relationship; Triviality (b) from which it is practicable for the identity of the individual to be directly or indirectly ascertained; and ► ► Practicable = reasonably practicable Take into account all relevant data controlled by the party in question ► ► (c) in a form in which access to or processing of the data is practicable. ► Page 4 Totality of such data Form refers to the physical shape, structure, type, etc. of the data in question Privacy Seminar for HKU 1. Data privacy regulations and requirements (cont’d) DPP2: Accuracy and Retention This provides that personal data should be accurate, up-to-date and kept no longer than necessary DPP1: Collection This provides for the lawful and fair collection of personal data and sets out the information a data user must give to a data subject when collecting personal data from the subject (see PICS sample on next page) Data Collection DPP4: Security Safeguards Data Storage Data Usage / Transfer DPP3: Use Unless the data subject gives consent, his/her personal data should only be used for the purposes for which they were collected or a directly related purpose Page 5 Data Destroy Data Maintenance This requires appropriate security measures to be applied to personal data (including data in a form in which access to or processing of the data is not practicable) DPP5: Transparency of Policies and Practices This provides for openness by data users about the kinds of personal data they hold and the main purposes for which personal data are used DPP6: Access and Correction This provides data subjects with the rights of access to and correction of their personal data Privacy Seminar for HKU 1. Data privacy regulations and requirements (cont’d) JUPAS Personal Information Collection Statement Page 6 Privacy Seminar for HKU 1. Data privacy regulations and requirements (cont’d) ► Practical Tips ► ► ► ► ► Page 7 PICS should not be too vague or wide in scope Remember to put PICS in exit interviews/ alumni contact forms Collect as little personal data as possible Allow certain personal data to be voluntarily collected HKID is considered to be sensitive personal data Privacy Seminar for HKU 1. Data privacy regulations and requirements (cont’d) Ensure that information collected are adequate but not excessive Collection of personal data relevant to recruitment exercise ► What personal data should be collected for recruiting ► Work experience, job skills, competencies, academic/professional qualifications, good characters and other attributes required for the job ► What should an employer collect regarding ID cards ► Employer should not collect a copy of the identity card of a job applicant during the recruitment process unless and until the individual has accepted an offer of employment ► Regarding job applicant’s family data what should be asked? ► Should only ask about a job applicant’s family data when assessing conflict of interest and if there actually is the need. (mpf, insurance) ► Should outside activities be recorded? ► Recording the details of a candidate’s outside activities and interest must be excessive unless the employer can demonstrate that such details is relevant to the inherent requirements of the job Page 8 Privacy Seminar for HKU 1. Data privacy regulations and requirements (cont’d) ► Practical tips ► ► ► Page 9 Data retention policy House keeping of personal data such as emails Inform data subject or get consent if personal data will be retained forever Privacy Seminar for HKU 1. Data privacy regulations and requirements (cont’d) Ensure that personal data are accurate Ensure that personal data are retained only for the amount of time necessary to complete the purpose. ► ► What are some good ways to ensure that employee data is accurate ► Employers can implement a reminder system to ask employee to report changes of their personal data. An employer can also consider providing employees with copies of employment-related data at regular intervals and invite them to report on any changes that need to be made What should we do with personal data of job applicants that are rejected ► According to the Code of Practice on Human Resource Management, personal data of unsuccessful applicants may be retained for a period of up to two years from the date of rejecting applicants and should then be destroyed. They should also provide unsuccessful job applicants the opportunity to request the destruction of their data if they do not wish them to be used for this purpose. Page 10 Privacy Seminar for HKU 1. Data privacy regulations and requirements (cont’d) ► Practical tips ► ► ► ► Page 11 Privacy clauses with data processors Placements, internships and special classes Get consent from students if for additional purposes Direct Marketing Privacy Seminar for HKU 1. Data privacy regulations and requirements (cont’d) Ensure that personal data are only used for the purposes mention in DPP1 ► Can an employer enter into an agreement with a credit card company to offer a credit card with special terms and conditions for its employee ► Unless the employer obtained prescribed consent, the employer should not use the employee’s data and pass them to the credit card company for marketing of the card. ► Can an employer transfer documents regarding an employee’s medical claim to its insurer ► This is a directly related purpose to the original purpose for which claim documents are collected. ► Can an employer transfer documents to the inland revenue department? ► This is a statutory requirement for disclosure and should be transferred. Page 12 Privacy Seminar for HKU 1. Data privacy regulations and requirements (cont’d) Ensure that personal data are secure ► When transferring personal data to third parties, what are some examples of protecting personal data ► When mailing out documents, keep it in a sealed envelope addressed to the recipient and marked “Private and Confidential”. If it is email transmission, security protection software should be use such as encryption. ► What are some ways to protect electronic files of job applicants ► Database comprising personal data of job applicants should be accessible only by a secure password on a need to know basis. Page 13 Privacy Seminar for HKU 1. Data privacy regulations and requirements (cont’d) Data Leakage Prevention (“DLP”) Project ► Encryption of USB flash drive before any write access to the device ► Access to the USB flash drive will be protected by password and data stored in the device will be encrypted ► The software is available for download by all staff after logon into HKU portal under the DLP Project web site. ► Mandatory for all PCs that are within scope of the DLP Project ► Step by step guide, FAQs and download the software at http://www.its.hku.hk/dlp-project/ Page 14 Privacy Seminar for HKU 14 1. Data privacy regulations and requirements (cont’d) Ensure that Privacy Policy Statement are easily accessed ► A PPS should be made available to anyone, in an easily accessible manner, whether the personal data is collected by the data user in the physical world or in the online world ► If a data user operates a website, it is recommended that a web version of the PPS be made available by means of a prominent link at the top or at the bottom of the home page and every page of the website. ► PPS should be linked directly ► What goes into a good PPS ► ► ► ► ► ► ► ► ► ► Page 15 Collection of personal data from minors Cookies Retention of Personal Data Handling of sensitive personal data Disclosure of personal data Protection measures Outsourcing Arrangement Transparency Access and Correction Answering enquiries about privacy policy and practices Privacy Seminar for HKU 1. Data privacy regulations and requirements (cont’d) Ensure that Data Access Request is performed according to procedure ► ► ► ► ► ► Create a Data Access Request Form Check the identity of the requestor Response to a DAR within 40 days Log book Reasonable Fee Give the requestor a written notification with reasons if cannot comply with a DAR within 40 days Page 16 Privacy Seminar for HKU 2. Information Security Measures ► ► Data Classification - Identify / Manage / Protect Data Three Levels of Classification ► ► ► ► ► Sensitive Restricted Official Use Only Protection due to proprietary, ethical or privacy considerations Restricted ► ► Page 17 Open to Public No Restriction on Access Sensitive ► ► Public Public Protected by regulations, policies or contractual agreements Unauthorized access may cause financial or reputational loss to HKU Privacy Seminar for HKU 2. Information Security Measures (Cont’d) Page 18 Privacy Seminar for HKU 2. Information Security Measures (Cont’d) ► Practical Tips ► Work Station ► ► ► ► ► ► Storage ► ► ► Encryption Backup Removable Storage ► ► ► Page 19 Complex Password Enable login password and screen saver password Logout Avoid using public computer to access confidential files Physical Security Encryption Erase data after use Store sensitive data only when it is absolutely necessary Privacy Seminar for HKU 2. Information Security Measures (Cont’d) ► Practical Tips ► Cloud Storage ► ► ► ► ► Social Network ► ► ► Privacy and Security Settings Manage your friends Mobile Security ► ► ► Page 20 Privacy and confidentiality Data Retention Exposure of data Data Encryption Enable Screen Lock Encrypt data Install mobile security apps Privacy Seminar for HKU 3. Privacy Management Program and Data Inventories Privacy Management Program (PMP) ► PCPD has advocated that identified sectors (banking, insurance, telecommunications and insurance) should develop and maintain a PMP (for the promotion of accountability) ► To ensure that appropriate policies and procedures are in place to promote good privacy practices in the following areas (Feb 2013): Organization commitment, program controls, monitoring and annual review of program control effectiveness, and assessing and updating program controls. ► 35 companies had pledged in Feb 2014 to implement the PMP. Page 21 Privacy Seminar for HKU 3. Privacy Management Program and Data Inventories (Cont’d) Privacy Management Program (PMP) (Cont’d) ► Organization commitment ► Program controls ► Personal information inventory ► Policies ► Risk assessment tools ► Training and education requirements ► Breach and incident management response protocol ► Service provider management ► External communication ► Monitoring and annual review of program control effectiveness ► Assess and update program controls as necessary Page 22 Privacy Seminar for HKU 3. Privacy Management Program and Data Inventories (Cont’d) ► ► “An organisation should know what kinds of personal data it holds (for example, personal data of employees, personal data of customers, etc.), how the personal data is being used – and whether the organization really needs it at all” “Every component of an accountable, effective privacy management programme begins with this assessment.” – Privacy Management Programme : A Best Practice Guide Page 23 Privacy Seminar for HKU 3. Privacy Management Program and Data Inventories (Cont’d) Page 24 Privacy Seminar for HKU 4. Practices in the University ► ► ► ► ► ► ► The Privacy Policy Statement: http://www.hku.hk/privacy_policy/ Code of Practice: https://uis.hku.hk/web/gsabc/pdpo_cop.pdf (portable storage devices, incident handling / reporting and other guidelines) Data Collection Statement Statutory Data Access / Correction Request Process University Data Protection Officer and Personal Data Protection Coordinators Information Technology Services (advice / security measures / guidelines / training information): http://www.its.hku.hk/services/training/infosec/personal-dataprotection Central Compliance Team (compliance/monitoring) Page 25 Privacy Seminar for HKU 25 5. Case Study Case No.: 1997005 Employee resignation notice containing excessive data ► ► ► ► A company sent fax messages to its customers to inform them of the resignation of an employee. Included in the messages is his identity card number. This was done without the employee's knowledge or consent. Upon enquiry by the PCPD, the company explained that the act was intended to prevent the exemployee soliciting business from its clients. The Commissioner's views on the matter ► Breach of DPP4 ► Did not ensure Personal Data were protected from accidental or unauthorized use. ► Breach of DPP 3. ► When employee resigns, purpose of notifying customers that he resigned is regarded as a directly related purpose. ► However, the personal data used for such a purpose should be limited to those data which are sufficient. ► Disclosing the employee's identity card number is unnecessary. Page 26 Privacy Seminar for HKU 5. Case Study (Cont’d) Case No.: 2006014 Employee complained her employer logged in her computer collecting cookies without notifying her ► An organization allows its employees to have access to computers for work related activities. The employee was assigned a user name and a password that was set by herself. ► The employee’s supervisor ask for the employee’s password, stating it’s for “emergency use” ► Supervisor then logon to the employee’s computer by using the password and collected the employee’s browsing data. The Supervisor then use it as evidence that the employee has been playing online games during office hour. ► The employee complain to the commissioner about the supervisor’s collection of the employee’s cookies Contravention of DPP1 ► Cookies are personal data as it contained information (english name) to identify the individual and the cookies were gathered to address the individual’s suspected breach of regulations. ► The collection of cookies by the supervisor logging into the computer with the password was inconsistent with the original purpose of collecting the employee's password ► The employee would not expect her supervisor to collect the cookies ► Action Taken: Organization has to stop using employees' passwords to log in their computers and access their browsing history, unless their prior consent was obtained Contravention of DPP5 ► The Organization had not clearly notified the employee of the purpose of employee monitoring, the monitoring activities that might be taken, or the use of the data collected ► Action Taken: Organization has to put in place monitoring and security policies and remind its employees of the policies Page 27 Privacy Seminar for HKU 5. Case Study (Cont’d) Case No.: 1998123 Use of data obtained from Land Registry for direct marketing purpose. The following question had been asked in this enquiry case: Q: We are a bank. We have obtained the list of Transacted Property addresses which are issued by Land Registry. We intend to use those Transacted Property address for direct marketing purposes, that is for credit card promotion and we will also inform the occupants of those transacted property addresses that we will, without any charge to them, cease to use those data if they so requests. We would therefore request for your opinion on whether we can use the transacted property addresses list for our coming direct marketing campaign? Privacy Commissioner Preferred View and Comments ► Such data are not collected or disclosed by the Land Registry for the purpose of direct marketing and hence their use for this purpose would require the prior consent given voluntarily of the individuals who are the subjects of the data ► Individuals with whom you do not have a past banking relationship may be surprised to receive a direct marketing approach from you and may query how you obtained their contact details ► Result in a negative consumer reaction Page 28 Privacy Seminar for HKU 5. Case Study (Cont’d) Case No.: 2006010 Online data leakage of personal data of policyholder of an insurance company ► A database containing personal data of about 600 policyholders of an insurance company been leaked and was accessible by the public on the Internet via a website. ► The agent uploaded and stored the concerned personal data in a web file server at his home ► The data was therefore accessible to unauthorized persons through the Internet search engine. Contravention of DPP4 ► Caused by the inappropriate giving of access to the personal data to the insurance agent. ► Although the insurance company claimed to have established guidelines and control procedures to restrict the access and transfer of policyholders' personal data by insurance agents, PCPD found that the alleged controls were substantially inadequate Action by the Privacy Commissioner The insurance company has to specify clearly the circumstances under which processing of policyholders' personal data out of office premises are allowed Page 29 Privacy Seminar for HKU Q&A Page 30 Privacy Seminar for HKU