You are on page 1of 2

BOOK

REVIEW

ISACA Privacy Principles and


Program Management Guide
ISACA® Privacy Principles and Program Management cloud and container computing services, mobile
Guide provides a comprehensive explanation of all applications, big data analytics, Internet of Things
things privacy. It is a necessary resource for any (IoT), bring your own device (BYOD) practices, and
Enjoying
auditor about to embark on a privacy audit or for tracking/surveillance technologies.
this article?
privacy practitioners who need to establish a privacy
management program within their organizations. There are 14 ISACA privacy principles, though • Read Implementing
the guide does take a while to get to them, a Privacy Protection
Across the world, privacy protection is handled in first acknowledging the context, background Program: Using
many ways; it is not just different across and changes in this arena over the COBIT® 5 Enablers
countries, but also within countries and years. These privacy principles are With the ISACA
within industries and sectors as well. clearly defined and mapped to other Privacy Principles.
This guide explains, in a clear and easy- major privacy frameworks such as www.isaca.org/
to-follow manner, the variety of privacy the International Organization for cobitprivacybook
protection legislation and different legal Standardization (ISO)/International
models that exist in many regions of the Electrotechnical Commission (IEC)’s • Learn more about,
world. ISO/IEC 29100:2011. discuss and
collaborate on privacy
While the definition of privacy varies The guide incorporates how ISACA’s and data protection
this guide includes the following COBIT® 5 framework can support the in the Knowledge
definition differentiating privacy from security: development or auditing of privacy management Center.
“Privacy is the right of an individual to trust that by covering the five governance and management
www.isaca.org/
others will appropriately and respectfully use, store, principles. The guide also explains how the COBIT 5
privacy-data-
share and dispose of his/her associated personal enablers can be adapted to build and maintain a
protection
and sensitive information within the context, and privacy program.
according to the purposes, for which it was collected
or derived.”1 The book includes high-level guidance for
implementing a privacy management program.
However, due to an inability to agree on a This could also be used by auditors when reviewing
standard/worldwide definition for privacy, the how an organization has gone about establishing
guide sets out an agreed-upon set of privacy its privacy management program. This guidance
categories that can be useful for auditors and includes considering the context in which personal
anyone wanting to establish a privacy program. information is collected, ensuring the appropriate
Those categories are: privacy protection environment is created to
match the business environment, recognizing and
1. Privacy of the person
addressing privacy pain points, enabling privacy
2. Privacy of behavior and action protection change, and implementing a life cycle
approach to privacy governance and management.
3. Privacy of communication
4. Privacy of data and image (information) The guide includes five appendices containing
information on legislative instruments and legal
5. Privacy of thoughts and feelings
actions pertaining to privacy from most regions
6. Privacy of location and space (territorial) of the world; privacy standards, frameworks and

7. Privacy of association
Reviewed by Diana M. Hamono, CISA, CGEIT, COBIT 5 Foundation
This book considers risk from new and evolving An executive director in the governance, risk and assurance team at
Synergy Group in Canberra, Australian Capital Territory, Australia, and a past
technologies, including social media, evolving
president of the ISACA Canberra Chapter.

ISACA JOURNAL VOL 1 1


©2018 ISACA. All rights reserved. www.isaca.org
self-regulation programs by industry, country and Editor’s Note
region, and sometimes even by city; certifications
that can be obtained relating to privacy; and a ISACA Privacy Principles and Program Management
range of non-ISACA privacy principles. Guide is available from the ISACA Bookstore. For
information, visit www.isaca.org/bookstore, contact
The guide covers all aspects related to privacy support at https://support.isaca.org/ or telephone
management and is highly recommended, as it +1.847.660.5650.
provides some essential points for privacy officers,
IT auditors, data managers/stewards, audit and risk Endnotes
committee members, and senior executive officers
1 ISACA, ISACA Privacy Principles and Program
in any organization and industry.
Management Guide, USA, 2017, p. 13

ISACA JOURNAL VOL 1 2


©2018 ISACA. All rights reserved. www.isaca.org

You might also like