# Explain Privacy and Data Sensitivity Concepts
## Privacy and Sensitive Data Concepts
- Security
- CIA Triad
- Privacy
- Personal data about data subjects
- Compliance with Regulations
- Rights of data subjects
- Information life cycle management
- Creation/collection
- Distribution/use
- Retention
- Disposal
## Data Roles and Responsibilities
![[Pasted image 20230710103539.png]]
![[Pasted image 20230710103611.png]]
## Data Classification
![[Pasted image 20230710104304.png]]
## Privacy Notices and Data Retention
![[Pasted image 20230710104355.png]]
## Data Sovereignty and Geographical Considerations
- Data sovereignty
- Jurisdiction that enforces personal data processing and storage regulations
- Geographical considerations
- Select storage locations to mitigate sovereignty issues
- Define access controls on the basis of client location
## Privacy Breaches and Data Breaches
- privacy breach -> someones PII gets leaked
- Data breach -> data got compromised
- Not specifically what data
- Overarching term
## Data Sharing and Privacy Terms of Agreement
- SLA
- require access controls and risk assessment to protect data
- **Interconnection Security Agreement (ISA)**
- External clients (non govt) connecting to government systems
- NDA
- Legal basis for protecting information assets
- Data sharing and use agreement
- Specify terms for the way a dataset can be analyzed
- Proscribe use of reidentification techniques
![[Pasted image 20230710105211.png]]
# Explain Privacy and Data Protection Controls
## Data Protection
- **Data at rest**
- In some sort of persistent storage media
- Encrypt the data, using techniques such as whole disk encryption, database encryption, and file- or folder-level encryption
- Apply permissions—Access Control Lists (ACLs)—to ensure only authorized users can read or modify the data
- **Data in transit (or data in motion)**
- Transmitted over a network
- Protected by transport encryption, such as TLS or IPSec
- **Data in use**
- cannot be encrypted
- Present in volatile memory, such as system RAM or CPU registers and cache
- Malicious intruder with rootkit access to the computer may be able to access it
- Trusted execution environments/enclaves
## Data Exfiltration
- Data exfiltration methods
- Removable media
- Transferring over the network
- Communicating data over the phone or by video
- Taking a picture or video of text data
- Ordinary countermeasures
- Ensure that all sensitive data is encrypted at rest
- Create and maintain offsite backups of data
- Ensure that systems storing or transmitting sensitive data are implementing access controls
- Restrict the types of network channels that attackers can use
- Train users about document confidentiality and the use of encryption to store and transmit data securely
## Data Loss Prevention
- systems to prevent/mitigate data loss/prevention
- DLP products scan files for matched strings and prevent unauthorized copying or transfer
- Policy server
- Endpoint agents
- Network agents
- Cloud-based DLP
- Remediation
- Alert only
- Block
- Quarantine
- Tombstone
- changes attachment with the private data to a privacy document or such
## Rights Management Services
- assign file permissions for different document roles
- Restrict printing and forwarding of documents
- Restrict printing and forwarding of email messages
## Privacy Enhancing Technologies
- Data minimization
- Only collect sufficient data to perform the specific purpose that consent was obtained for
- Deidentification
- Removing personal information from shared data sets
- Anonymization
- Irreversible deidentification techniques
- Pseudo-anonymization
- Reidentification is possible using a separate data source
- Reidentification attacks
- K-anonymous information
## Database Deidentification Methods
- Data masking
- Whole or partial redaction of strings
- Format-preserving masks
- Irreversible
- Tokenization
- Replacing field value with a random token
- Token stored in a separate data source (vault)
- Reversible with access to the vault
- Aggregation/banding
- Hashing and salting
- Indexing method
- Discarding original data for identifier