getting data privacy right for digital financial services
play

Getting Data Privacy Right for Digital Financial Services June 26, - PowerPoint PPT Presentation

Getting Data Privacy Right for Digital Financial Services June 26, 2019 Why care about data protection? Maintain your customers trust Avoid legal and regulatory problems Keep your company running Customers care about this, Fines, lawyers,


  1. Getting Data Privacy Right for Digital Financial Services June 26, 2019

  2. Why care about data protection? Maintain your customers’ trust Avoid legal and regulatory problems Keep your company running Customers care about this, Fines, lawyers, and distraction use valuable Outages can kill momentum and stop you and it must be part of your brand time and money from gaining traction 66 of customers at risk of average time to contain 55% leaving in case of a a data breach once breach identified days

  3. While building our Data Protection Toolkit, we looked at both Data Privacy and Data Security Data Privacy Data Security • How should we manage data • What infrastructure solutions do we • Do our customers understand and integrations with our partners ? need to protect against breaches? agree to what data is captured and how it’s used? • What regulatory & compliance issues • What technical solutions do we need • Who owns our customer data – who must we manage? to protect against breaches? can change/erase it? • How can we move our organization • What processes should we toward greater privacy & security? implement to ensure security? • What is the best response to a breach? • How do we stay up to date with security challenges? Significant areas of overlap – important to consider privacy and security topics jointly

  4. We developed a Data Protection Toolkit to help our early-stage fintechs assess, design, and implement the right data protection strategy Discovery Assess Design Design Implementation Implementation • What level of data protection is • Where do I need to get to on data • How should I roll out changes to data Questions to answer appropriate for our data? protection? protection in my company? • What gaps do we have in our current • What initiatives do I need to put in • How can investors test & support pre- level of data protection? place to get there? and post-investment? • Data audit and risk • Targeted content • Initiative prioritization Resources in this guide assessment workshop on key topics template templates • Data policy template • Implementation checklist • Data protection • Investor diligence & assessment portfolio management • Initiative list template guide Click HERE for data protection Click HERE for data policy See appendix of resource for all assessment template other blank templates

  5. The right data protection mindset – make the right tradeoffs High-profile Risk increases with the volume and value of your data. Financial services companies Established are at higher risk of attack “Every blackmailer, state actor, and class action lawyer wants a piece of us” Risk of data Growth protection “People know that we have issue sensitive data, so are actively attacking us from Startup multiple angles” “Still early enough that recovery from a major data issue would be difficult, but we’re under the radar enough that we’re facing few direct attacks” “Nobody cares enough about our 10 customers to cause an issue – growth is more important than perfect security” Time and money spent on data protection The “right” security approach is one appropriate for your business’ size, stage, and data sensitivity; however, it is important to consider the tradeoff of building security right the first time vs. retrofitting at a later stage

  6. Data privacy best practices across data lifecycle What does “good” look like when it comes to data privacy? Overall Best Practices Capture Usage Retention & Erasure Be extremely transparent • Always obtain consent to access and use • Share how providing data helps the customer – • Tell customers what data will be retained, for Customers don’t typically understand (or customer data – include what data, how it’ll be e.g. “Your location data lets us 1) verify your how long, and in what form: read) disclosures – so don’t assume that used, and any other key legal identify to give you better rates, as well as - De-identified vs. identified they do! provide tailored marketing to you…” - Single data pull vs. ongoing feed • When obtaining consent, think of the customer - Physical vs. electronic – easy to read, jargon-free, mobile friendly, • High-level and detailed versions – full legal local language, etc. Use key facts statements. consent may include more detail Keep all data confidential • Check customer disclosures of data acquired • Proactively notify customers when sharing their • Upon erasure, ensure data is completely deleted data with 3 rd parties – e.g. bureaus, partners Especially with personal data, maintaining from partners – even being one level removed across where it’s stored – incl. with partners, confidentiality preserves trust carries some risk redundant servers, etc. • Only use the data for its intended purpose – tier • Highlight confidentiality when acquiring data access and permissions, process checks if data used inappropriately • Be particularly careful with identity • • • Let customers “own” their data Where possible, allow customers to opt-out of Where possible, allow customers to opt-out of Have a process for customers to request updates Whether or not this is legally the case in specific data access – clearly explain specific data uses – for more intrusive data such to, correction of, or erasure of their information your geography, that’s likely what consequences (e.g. higher prices, potential to as geolocation, restrictions on how that data – self-service or through customer support customers think. To maintain their trust, not be approved) may be used • Have a process to withdraw consent – ensure act as if their data is their own clear explanation of the consequences of withdrawal • • • Take, keep, and use only what’s valuable Don’t collect all data for all customers – identify Be particularly conscious of regulation when Set a retention policy for customer data – tie All data carries risk, so don’t collect data the pieces which drive the most business value, using sensitive classifications – e.g. race, this to how long this data is useful for data’s sake or keep data that is no and don’t collect the rest gender, political persuasion, genetics, etc. • Have a “what data should we keep” process – longer relevant to your needs. • “Sunshine test” – only use data in ways that periodically determine which data isn’t worth would survive if they were out in the “light of keeping. Look at tradeoff between “invasive” day” and “useful”

  7. Practices to build a data protection culture What does a best in class data protection culture look like? Key beliefs Practices to reinforce • Data protection newsletter – quarterly email to staff. Make this engaging and pithy (have someone in marketing help!) “Data security threats are real – all of us (not just tech) need to be - Threat data – summary number of attempts to enter the system, if any were successful, and how the data protection team is following up aware and careful” - Current events – share one article and how it relates to the company - Employee highlight – public recognition for those who surface issues - Other content – phishing quiz, recent examples of risks, repercussions of previous data breaches, process reminders • Accountable executive for data protection is not just responsible for technology – perception is critical here - Have non-technical (i.e. not IT) people train employees on data protection • Celebrate employees who surface issues – publicly recognize people who flag security risks or uncover vulnerabilities “I want to be open and transparent about data - During team meetings, “spotlight” developers or employees who have helped protection issues” - Occasional broader public recognition (e.g. newsletter) • Don’t punish people who cause security issues – this will lead to people hiding issues rather than surfacing them • Blame-free post-mortems after any security incident to highlight weaknesses in the process which led to issues “Data protection is an ongoing effort , not a one-time fix” • Ongoing “security tracker” capturing security tradeoffs made in development, then clear the backlog of items every six months • Limit partner integrations wherever possible “ More sharing = more risk ” • Don’t take all customer data, simply because they legally allow us to – assume some level of consumer privacy protection “ Customers don’t understand consent ” • Periodic data “purges” where we discard data that is not useful for marketing or underwriting

  8. How to implement data privacy and protection best practices: prioritize based on risk and effort & cost Highest Priority Medium Priority Create unique logins for each employee EXAMPLE Instill Regular Security code Penetration review Testing Risk of data incident Medium Priority Lowest Priority Employee Top-shelf VPN Recognition Effort & cost to implement change Once initiatives are prioritized, implementation can begin

Recommend


More recommend