As the governance landscape continues to change and become more complex, where do you see compliance heading?
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Herold: The landscape will certainly become more complex before it starts to simplify through the consolidation of some of the disperse regulations and requirements. More organizations are realizing they need full-time dedicated resources for compliance. In the past, (and even in most organizations currently) compliance was considered something an existing position could address in just a couple of hours a week. As reality sinks in, organizations are realizing this is a major initiative that requires full-time, dedicated resources.
What are some of the major compliance myths you've come across?
Herold: Considering all regulations and laws, some of the most dangerous myths for organizations to believe are:
- Technology alone can bring an organization into regulatory compliance. THIS IS NOT TRUE!
- It will take only an hour or less, and a couple of quickly thrown-together slides, to provide adequate compliance training to personnel. THIS IS NOT TRUE!
- It will not impact an organization if their business partner, to whom they have entrusted confidential information, experiences a security breach, or is found to be in noncompliance. THIS IS NOT TRUE!
- Chances are as long as a publicized incident does not occur, regulatory noncompliance for some of the major regulations such as HIPAA and GLBA will never be discovered. THIS IS NOT TRUE!
- Organizations do not need to worry about compliance as much for regulations that have no fines specified. THIS IS NOT TRUE!
Herold: You can tell by the trend in the last couple of years and the bills being considered that legislators are focusing on protecting personal information no matter what the industry. The laws are also becoming slightly broader in what information needs to be addressed and what data protection requirements should apply to all organizations. I think we'll see an evolution. I think the US federal laws will become more wide-sweeping than in the past and they'll start to parallel the types of laws currently in effect in Japan, Canada, Australia and Europe where there's more emphasis on the need for all organizations to protect personal information, and for organizations to formally establish data protection safeguards, training and responsibility.
Herold:There are two critical things that involve most of the breaches. First, there doesn't appear to be enough employee information security and privacy education in those organizations, so people don't know how to take the appropriate precautions. For example, many people are leaving their laptops in cars, and thieves are either breaking in or simply opening unlocked doors, and stealing them. Your personnel should know they shouldn't leave their laptops exposed in such a manner, in addition to how to secure information. Proper employee education is cost-efficient and has a huge positive impact on organizations. There is a serious need for increased training and awareness in regards to privacy and security.
Second, many organizations are not properly safeguarding the confidential information they have on mobile computing devices. It's extremely important to encrypt all the confidential information on handhelds, PDAs and Blackberries, as well the data stored on back-up tapes and disks. If more organizations did this, these incidents would be non-incidents because no one would be able to decipher the encrypted private data.
Education and securing information, particularly with encryption, are two of the best actions organizations can take to protect their data, as part of a comprehensive information security program.
What about educating upper management and convincing them that it's worth the expense? What's the best approach?
Herold: This is critically important because it's where infosec pros often shoot themselves in the foot. They need to communicate the business impact information security noncompliance and incidents will have on the organization. Infosec pros typically start talking to business leaders about things that are technical in nature. However, upper management really want, and need, to hear about the impact on the business and the problems that will occur if they don't take action to address information security issues and compliance responsibilities. Infosec, privacy and compliance pros need to communicate what the different laws mean to their organization and what the implications are if their organization is found in noncompliance, and they need to show examples of what has happened to other organizations. Clear communication with business leaders, using the business leaders' perspectives, is key.
What are your thoughts on products that claim to help companies comply with regulations? Should companies be purchasing software or hardware for compliance?
Herold: Technology in the form of software and hardware can certainly support compliance and streamline many compliance activities. However, I am concerned when I read claims that such products will bring organizations into full compliance with regulations. The bulk of compliance activities involve the implementation of policies and procedures that are tailored to each organization's unique business environment, along with education to personnel and business partners about how to perform their job responsibilities to comply with these policies, procedures and regulatory requirements. Software and hardware alone will never be full compliance solutions, but they should be used where appropriate to support compliance activities.
It's now year two of SOX, how are companies shaping up and where should they focus next?
Herold: 2005 was a huge compliance activity year for companies with regard to SOX. Most got their independent reviews and audits completed. Now 2006 is the remediation year for these companies as they address the identified compliance deficiencies. Companies will need to carefully review their compliance gaps and realistically budget time, personnel and resources to closing those gaps. A key activity will be to document all this decision-making activity so the resulting actions can be justified if questioned during regulatory oversight activities.
For more on compliance and security risks, read an excerpt from The Practical Guide to Compliance and Security Risks.
About Rebecca Herold:
Rebecca Herold, CISSP, CISA, CISM, FLMI, is the community leader for Realtime-ITCompliance. Rebecca is an independent consultant, author and instructor with more than 16 years experience in information security, privacy and compliance. She has authored The Privacy Papers (Auerbach), The Privacy Management Toolkit (Information Shield), Managing an Information Security and Privacy Awareness and Training Program (Auerbach), The Practical Guide to HIPAA Privacy and Security Compliance (Auerbach), The Practical Guide to Compliance and Security Risks (Realtime Publishers) and The Definitive Guide to Security Inside the Perimeter (Realtime Publishers). She was Chief Privacy Officer for two consulting organizations and was instrumental in building the information security and privacy program while at Principal Financial Group, which was awarded the CSI Outstanding Security Program of the Year Award in 1997. Rebecca is also an adjunct professor for the Norwich University Master of Science in Information Assurance (MSIA) program. You can follow Rebecca's leading blog on information security, compliance and data protection at http://realtime-itcompliance.typepad.com.