In the spirit of the first thread, I am introducing the second. that is, HOW do 
we go about protecting/auditing PII (personal identifiable information)
         
        The first thing I have to say, don't expect for an average size company 
to be able within a short period of time to completely tackle the issue. Not 
going to happen.
         
        In the previous thread we had mention as a short note about the 
differences of encryption/masking techniques. Let me expand on this  in random 
order of importance
         
        a) IT industry is notorious on different people using different terms 
for the same thing. the following are some sample techniques for scrubbing of 
data
         
        1) Encryption both record and field. reversible
         
        2) Data Aging. reversible
         
        3) Generating Data. non reversible
         
        4) Look-up/translation. depending can be reversible or not
         
        each technique (among others) do have their uses for different type of 
data. the type and need depends on analysis and best practices.
         
        b) You want to make sure that anything you do on the Dist. environment 
that the same results need to be had on the Mainframe (applicable). (enterprise 
wide) Most application span many environments (windows/red 
hat/UNIX/MVS/Oracle/Excel/DB2/VSAM/MS Access/XML/ etc. (to name but a few) and 
you want to make sure that client 1 in application a is scrubbed the same way 
in application b, c etc. Otherwise items like system/user acceptance/volume 
testing will probably fail
         
        c) The process needs to be repeatable. so the same record going in will 
produce the same record going out. The reasoning behind that is not every 
file/db can be always scrubbed at the same time, and for the same frequency.
         
        d) The most important. and the most time consuming. The analysis of the 
environment. Where is all the PII info. How are they all related. Which files 
need to be looked at,  what are the business rules for those files/fields. The 
success of the entire project rely on the time spent here. 
         
        e) After you initially set up the process, make sure that it is 
implemented as an ongoing bases as this is not a static but a dynamic 
requirement as your business moves forward. How are changes going to be 
applied/monitored. What will the EDP/Internal/external auditors requirements 
(audit trails? logging etc?)
         
        f) if you choice a vendor to help you, have they been doing this for 
awhile? what expertise do they bring to the table. Do they have supporting 
tools (HINT The company I work for does not only sell software but provide 
tools to help as well) (sorry for the commercial but they do pay the bills 
<S>). Do they have implementation teams in place with previous expertise 
(ditto). Are their people certified by a publicly recognized association
         
        g) Do you have upper management 'buy in'. without this projects like 
this have limited chance for success.
         
        I) is there a way to 'monitor' the exact data that the CSR (customer 
service rep) accessed so if there are any questions arising it can be quickly 
discovered/confirmed. The scenario of a banking rep access accounts that she/he 
are not responsible for?
         
        as before comments are encouraged. If you want further info fell free 
in contacting me. 
         
        these posts are my personnel opinion alone
         
         
         
        Robert Galambos CIPP/C CIPP/IT  
        
                Compuware Senior Technical Specialist 
        IBM Certified Database Associate 
        IBM Certified DB2 9 for z/OS Database Administration
        Certified Information Privacy Professional/Canada
        Certified Information Privacy Professional/Information Technology
                   
        [email protected]
         
                        Tel: +1 905 886 7000 
        Toll Free: +1 800 263 7189
        Fax: +1 905 886 7023
        Quebec: +1 877-281-1888 
          


 
Le contenu de ce courriel s'adresse au destinataire seulement. Il contient de 
l'information pouvant être confidentielle. Vous ne devez ni le copier ni 
l'utiliser ni le divulguer à qui que ce soit à moins que vous soyez le 
destinataire ou une personne désignée autorisée. Si vous le receviez par 
erreur, veuillez nous aviser immédiatement et le détruire.
 

The contents of this e-mail are intended for the named addressee only. It 
contains information that may be confidential. Unless you are the named 
addressee or an authorized designee, you may not copy or use it, or disclose it 
to anyone else. If you received it in error please notify us immediately and 
then destroy it.

 


        
         "Service in every product...

         Les renseignements contenus dans le présent message électronique sont 
confidentiels et concernent exclusivement le(s) destinataire(s) désigné(s). Il 
est strictement interdit de distribuer ou de copier ce message. Si vous avez 
reçu ce message par erreur, veuillez répondre par courriel à l'expéditeur et 
effacer ou détruire toutes les copies du présent message.
         

        

         

        Le contenu de ce courriel s'adresse au destinataire seulement. Il 
contient de l'information pouvant être confidentielle. Vous ne devez ni le 
copier ni l'utiliser ni le divulguer à qui que ce soit à moins que vous soyez 
le destinataire ou une personne désignée autorisée. Si vous le receviez par 
erreur, veuillez nous aviser immédiatement et le détruire.

         

                The contents of this e-mail are intended for the named 
addressee only. It contains information that may be confidential. Unless you 
are the named addressee or an authorized designee, you may not copy or use it, 
or disclose it to anyone else. If you received it in error please notify us 
immediately and then destroy it.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to