Friday, February 21, 2025
HomePrivacyNIST Released Privacy Framework 2020 to Improve Enterprise Privacy Through Risk Management...

NIST Released Privacy Framework 2020 to Improve Enterprise Privacy Through Risk Management – Download A Free E-Book

Published on

SIEM as a Service

Follow Us on Google News

National Institute of Standard and Technology (NIST) released a Privacy framework for 2020 to improving privacy through enterprise risk management.

NIST Privacy Framework is a voluntary tool developed in collaboration with stakeholders intended to help organizations identify and manage privacy risks to build innovative products and services while protecting individuals’ privacy.

It enables better privacy engineering practices that support privacy by design concepts and helps organizations protect individuals’ privacy.

NIST specifically build this framework to fulfill the current compliance obligation and facilitating communication about privacy practices with the customers, business partners, regulators, and assessors.

The current NIST privacy framework followed by a cybersecurity framework – Framework for Improving Critical Infrastructure released in 2018.

Same as cybersecurity framework, A privacy framework developed of 3 parts: Core, Profiles, and Implementation Tiers.

The Core Tier focuses on the executive level to implementation and operation level that handles the important privacy protection activities.

Profiles focusing the priority on best meet organizational privacy values, mission or business needs, and risks.

The implementation tier talks about decision-making and communication about the sufficiency of organizational processes and resources to manage privacy risk.

Privacy Framework
Core, Profiles, and Implementation Tiers

How to Use the Privacy Framework

When the Privacy Framework used as a risk management tool, it assists an organization to optimize beneficial uses of data and the development of innovative systems, products, and services.

The privacy framework will answer the fundamental question How are we considering the impacts on individuals as we develop our systems, products, and services?”

According to the NIST framework “The decision about how to apply it is left to the implementing organization. For example, an organization may already have robust privacy risk management processes but may use the Core’s five Functions as a streamlined way to analyze and articulate any gaps.”

The variety of ways in which the Privacy Framework can be used by organizations:

  1. Mapping to Informative References
  2. Strengthening Accountability
  3. Establishing or Improving a Privacy Program
  4. Applying the System Development LifeCycle
  5. Using within the Data Processing Ecosystem
  6. Informing Buying Decisions

Download Here the complete Privacy Framework E-book and Core version.1.0.

Also Read:

The Most Important Role of Penetration Testing in Data Privacy and Protection

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...

ACRStealer Malware Abuses Google Docs as C2 to Steal Login Credentials

The ACRStealer malware, an infostealer disguised as illegal software such as cracks and keygens,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

PriveShield – Advanced Privacy Protection with Browser Profile Isolation

A browser extension named PRIVESHIELD automatically creates isolated profiles to group websites based on...

Beware Of Dating Apps Exposing Your Personal And Location Details To Cyber Criminals

Threat actors often attack dating apps to steal personal data, including sensitive data and...

Europol Concerns Over Privacy Enhancing Technologies Challenge Lawful Interception

A new position paper argues that Privacy Enhancing Technologies (PET) used in Home Routing...