Monday, December 16, 2024
HomePrivacyNIST Released Privacy Framework 2020 to Improve Enterprise Privacy Through Risk Management...

NIST Released Privacy Framework 2020 to Improve Enterprise Privacy Through Risk Management – Download A Free E-Book

Published on

SIEM as a Service

National Institute of Standard and Technology (NIST) released a Privacy framework for 2020 to improving privacy through enterprise risk management.

NIST Privacy Framework is a voluntary tool developed in collaboration with stakeholders intended to help organizations identify and manage privacy risks to build innovative products and services while protecting individuals’ privacy.

It enables better privacy engineering practices that support privacy by design concepts and helps organizations protect individuals’ privacy.

- Advertisement - SIEM as a Service

NIST specifically build this framework to fulfill the current compliance obligation and facilitating communication about privacy practices with the customers, business partners, regulators, and assessors.

The current NIST privacy framework followed by a cybersecurity framework – Framework for Improving Critical Infrastructure released in 2018.

Same as cybersecurity framework, A privacy framework developed of 3 parts: Core, Profiles, and Implementation Tiers.

The Core Tier focuses on the executive level to implementation and operation level that handles the important privacy protection activities.

Profiles focusing the priority on best meet organizational privacy values, mission or business needs, and risks.

The implementation tier talks about decision-making and communication about the sufficiency of organizational processes and resources to manage privacy risk.

Privacy Framework
Core, Profiles, and Implementation Tiers

How to Use the Privacy Framework

When the Privacy Framework used as a risk management tool, it assists an organization to optimize beneficial uses of data and the development of innovative systems, products, and services.

The privacy framework will answer the fundamental question How are we considering the impacts on individuals as we develop our systems, products, and services?”

According to the NIST framework “The decision about how to apply it is left to the implementing organization. For example, an organization may already have robust privacy risk management processes but may use the Core’s five Functions as a streamlined way to analyze and articulate any gaps.”

The variety of ways in which the Privacy Framework can be used by organizations:

  1. Mapping to Informative References
  2. Strengthening Accountability
  3. Establishing or Improving a Privacy Program
  4. Applying the System Development LifeCycle
  5. Using within the Data Processing Ecosystem
  6. Informing Buying Decisions

Download Here the complete Privacy Framework E-book and Core version.1.0.

Also Read:

The Most Important Role of Penetration Testing in Data Privacy and Protection

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

The Rise of AI-Generated Professional Headshots

It’s clear that a person’s reputation is increasingly influenced by their online presence, which...

Hackers Abuse Google Ads To Attacking Graphic Design Professionals

Researchers identified a threat actor leveraging Google Search ads to target graphic design professionals,...

Hackers Using New IoT/OT Malware IOCONTROL To Control IP Cameras, Routers, PLCs, HMIs And Firewalls

Recent cyberattacks targeting critical infrastructure, including fuel management systems and water treatment facilities in...

Hackers Exploiting Apache Struts2 Vulnerability to Upload Malicious Payloads

Hackers have begun exploiting a newly discovered vulnerability in Apache Struts2, a widely used...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Beware Of Dating Apps Exposing Your Personal And Location Details To Cyber Criminals

Threat actors often attack dating apps to steal personal data, including sensitive data and...

Europol Concerns Over Privacy Enhancing Technologies Challenge Lawful Interception

A new position paper argues that Privacy Enhancing Technologies (PET) used in Home Routing...

Free Android VPNs Suffering Encryption Failures, New Report

VPN apps for Android increase privacy and security over the internet since connection data...