Business a.m.

Monitoring a privacy programme

- Irene, a Fellow of Higher Education Academy, United Kingdom, is Managing Partner of Mirene Global Consults; and can be reached on mike@mireneglob­alconsults.com.ng and via twitter: @moshoke PhD

EVERY PRIVACY PRO GRAMME MONITOR ING IS KEY IN EV ERY DATA PRIVACY FRAMEWORK. The continual observatio­n of the programme is pivotal in a company’s privacy programme. Business function leaders and every stakeholde­r within the company must test some of the workings of what has been implemente­d. Yet, many stakeholde­rs fail to monitor what has been created and leave new processes to “rot”.

Privacy depends on a lot of components within the business—informatio­n security, human resource, marketing, customer success, customer relations etc— and therefore needs consistent monitoring. What areas therefore need monitoring?

Sometimes, many stakeholde­rs would argue that only business areas with “high risk” processes should be monitored. However, I would argue that that’s a flawed way of looking at privacy monitoring because monitoring is much more than monitoring business processes alone. It also entails monitoring staffs and how they handle, behave and work with informatio­n in their possession. Privacy profession­als, in the bid however, to prioritise workflow would first focus on business process.

Business process monitoring process consists of the collection of metrics created by business processes, examining these metrics, transformi­ng these metrics into key risk and key performanc­e indicators, and reporting these indicators to management. This would help the privacy profession­al determine what needs to be monitored and what needs to be improved. Each business process must be measured so that management can know how many different types of events—expected and not expected—which may occur in any given period.

It is much more than a numbers game. For example, a human resource department keeps experienci­ng errors by their staffs sending out pay informatio­n and addresses of their staff to third party companies. This has happened for three times. The human resource department needs to retrace their steps, carry out a root cause analysis and figure out why there is a repeat of these errors. And more importantl­y, there needs to be a check on staff training and what needs to be done to stop these errors from recurring.

The logging of privacy and security related events and the proactive monitoring of these logs are considered essential in privacy practices. These activities will help an organisati­on detect an array of activities, from misbehavio­ur by an employee to an active attack by a cybercrimi­nal.

In my experience, this event monitoring also feeds into building a new strategy companies can employ in the treatment of privacy risks. Monitoring activities related to data access can help any organisati­on identify improper uses of personal informatio­n. The monitoring activity is historical­ly practiced by highly regulated organisati­ons, however, more organisati­ons are implementi­ng this and getting results from this.

Companies can either employ the services of an external auditor to carry out this monitoring or set monitoring standards within their organisati­on to ensure that controls and procedures are working to meet their privacy goals. It is key in any privacy strategy to create a monitoring scheme because this can help the company detect privacy risks and ensure that the treatment of these risks is prioritise­d and push the privacy agenda in positively forward approach.

 ?? MICHAEL IRENE, ??
MICHAEL IRENE,

Newspapers in English

Newspapers from Nigeria