{"id":494,"date":"2023-08-31T09:19:00","date_gmt":"2023-08-31T09:19:00","guid":{"rendered":"https:\/\/privacyand.com\/?p=494"},"modified":"2023-08-27T21:21:47","modified_gmt":"2023-08-27T21:21:47","slug":"organizations-dont-get-it","status":"publish","type":"post","link":"https:\/\/privacyand.com\/?p=494","title":{"rendered":"Organizations Don&#8217;t Get It"},"content":{"rendered":"\n<p>Confusion over patchwork legislation and terminology can lead to inactivity in operationalization of privacy as a result of the inability to assign roles and responsibilities.\u00a0\u00a0<\/p>\n\n\n\n<p>If a Chief Privacy Officer is not required by legislation, who is responsible for organizational privacy programs, practices and outcomes?\u00a0\u00a0Ultimately, each organization decides how best to manage programs and when, or if, to track and report on outcomes.\u00a0\u00a0How does a data subject learn about how their information is managed at a given organization, and from whom?\u00a0\u00a0Such processes vary substantially from organization to organization.\u00a0\u00a0<\/p>\n\n\n\n<p><em><strong>Without access to, or consistency of, this information, it seems unlikely that a data subject could make informed decisions about privacy, or give meaningful consent.<\/strong><\/em><\/p>\n\n\n\n<p>The duality of a privacy professional\u2019s role combined with the variety of organizational cultures results in a number of different combinations of depth, quality, breadth, nature and application of operational privacy.\u00a0\u00a0<\/p>\n\n\n\n<p>Privacy programs have no set criteria, metric or descriptive quality.\u00a0\u00a0<\/p>\n\n\n\n<p>The same conditions that enable customization bring the lack of transparency for the data subject.\u00a0\u00a0How do I know if Hotmail and Gmail manage my information in the same way?\u00a0\u00a0Or if they do it differently, how do I know if that difference matters to me?\u00a0Information provided in privacy policies is often vague and lengthy.\u00a0\u00a0<\/p>\n\n\n\n<p>There are other privacy problems that manifest for data subjects when organizations try to respond to privacy requirements under legislation.<\/p>\n\n\n\n<p>Applying privacy legislation to service organizations means that front-line staff should be educated and empowered to discuss privacy with data subjects.\u00a0\u00a0For example, when a store clerk asks for my zip code, s\/he should be able to explain where it goes, who has access to it and why.\u00a0\u00a0Moreover, what are the implications for sharing or not sharing that information?\u00a0\u00a0<strong><em>Otherwise, a data subject cannot meaningfully provide consent to sharing that information.\u00a0<\/em><\/strong>\u00a0Imagine the store lines if this were the case now.\u00a0\u00a0The advent of cloud computing makes consent even more complex, particularly if the cloud services are outsourced or sold through a reseller.\u00a0\u00a0<\/p>\n\n\n\n<p>Privacy legislation sets out the rules for managing information, but this is predicated on the assumption that the initial collection of PI was lawful and appropriate.&nbsp;&nbsp;Even then, traditional computing schemes like role based access controls are difficult to implement in environments where there is a hierarchical service delivery model.&nbsp;&nbsp;For example, one person may work directly with the customer while another is responsible for data input.&nbsp;&nbsp;The data subject may assume their point of contact is the only person they are consenting to see their data.<\/p>\n\n\n\n<p>Breach notification requirements vary procedurally.\u00a0\u00a0<\/p>\n\n\n\n<p>For example, characteristics for what constitutes a breach are not set out by legislation.\u00a0\u00a0An unauthorized access by a staff person may or may not require notification, depending on the organization\u2019s practices and internal policies.\u00a0\u00a0<\/p>\n\n\n\n<p>Further, the mechanisms for identifying breaches, for example, back end logging, may increase the risk of breach itself by creating more records of PI.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Confusion over patchwork legislation and terminology can lead to inactivity in operationalization of privacy as a result of the inability to assign roles and responsibilities.\u00a0\u00a0 If a Chief Privacy Officer is not required by legislation, who is responsible for organizational privacy programs, practices and outcomes?\u00a0\u00a0Ultimately, each organization decides how best to manage programs and when, &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/privacyand.com\/?p=494\" class=\"more-link\">Read more<span class=\"screen-reader-text\"> &#8220;Organizations Don&#8217;t Get It&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1],"tags":[],"class_list":["post-494","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7IDr7-7Y","_links":{"self":[{"href":"https:\/\/privacyand.com\/index.php?rest_route=\/wp\/v2\/posts\/494","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/privacyand.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/privacyand.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/privacyand.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/privacyand.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=494"}],"version-history":[{"count":1,"href":"https:\/\/privacyand.com\/index.php?rest_route=\/wp\/v2\/posts\/494\/revisions"}],"predecessor-version":[{"id":495,"href":"https:\/\/privacyand.com\/index.php?rest_route=\/wp\/v2\/posts\/494\/revisions\/495"}],"wp:attachment":[{"href":"https:\/\/privacyand.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=494"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/privacyand.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=494"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/privacyand.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=494"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}