Much of the personal information shared across the Internet is not encrypted. Confidential data is too often lost because of online security breaches. To protect data, various measures are needed to ensure that private information is secured.
Advances in online technology, cloud computing, mobile phone technology and social media have revolutionized modern business and government operations. The public expects strong privacy protection, programs, and processes to safeguard their information.
U.S.federal law requires compliance and commitment to ensure personal identifiable information (PII) is managed with the utmost priority and care. The Privacy Act and The Section 208 of the E- Government Law requires that federal agencies maintain and protect PII, and it establishes the requirement for agencies to conduct Privacy Impact Assessments (PIA) for electronic information systems and collections. It also requires each federal agency to publish notice of its system of records (SORN) in the Federal Register and to allow individuals to request access to and make corrections to their record.
To ensure compliance with federal law, all systems that collect PII must be evaluated to determine how information is collected, secured, stored, retrieved, shared, and managed. M-03-22, OMB Guidance for Implementing the Privacy Provisions of the E-Government Act of 2002, provides direction to federal agencies on conducting PIAs. A PIA is a structure review of an information system to identify and mitigate risks, including risks to confidentiality, at every stage of the system life cycle.
How Wilson Consulting Group will help you
Wilson Consulting Group (WCG) understands the risks posed by privacy violations and assists organizations and government agencies to conduct Privacy Impact Assessments. WCG focuses on privacy threats and breaches that affect organizations and helps them mitigate risk and manage exposures. Our Privacy Impact Assessments guarantees that privacy risks are identified, evaluated, and remediated.
- Automation of Cybersecurity and the Role of Virtual CISOsJanuary 10, 2019
- A 2018 Cybersecurity ReviewDecember 28, 2018
- An Imminent Connection: 5G and Its Cybersecurity ImplicationsNovember 27, 2018