Ask The Expert Featured Article

February 12, 2013

Beginner's Guide to Data Security and Information Security Compliance & Audits

By TMCnet Special Guest
Flavio Villanustre and Belinda Hickling, VP of Information Security, LexisNexis Risk Solutions and Information Security Officer and Director of Hosted Services, Latitude Software

This article originally appeared in the Jan./Feb. 2013 issue of CUSTOMER magazine.

In virtually any regulated industry, compliance is at once a legal requirement, a risk management strategy, and an ethical imperative. Healthcare, insurance, finance, and especially accounts receivable management, compliance is a full-time concern. Or at least it should be. If you are a third-party collector for a creditor, for example, chances are good that, at some point, you’ll be audited for recovery performance as well as compliance practices. Moreover, in this era of consumer lawsuits, no company that deals with consumers on a regular basis can be effective if it isn’t fully cognizant of compliance issues.

Here are some critical steps that can help reduce risk both for compliance and security.

Goals for a comprehensive data security program

The primary objective in designing a data security program is to mitigate risks. To that end, first identify the different data types and classify them based on company needs and legal and regulatory frameworks. This approach allows for a straightforward determination of data value, and helps determine protective measures to be implemented, along with associated retention requirements. Thereafter, implementation must be part of a coordinated comprehensive information security program, with adoption and support from the top of the organization.

10 steps to data security

1. Inventory: Know what data you have and where it resides. Label data repositories and data records, and use these labels (maintained in electronic logs) to track individual records along their lifetimes.

2. Research: Understand the laws and regulations that could apply to data, as well as the controls that various regulations require.

-Is encryption of data at rest required?

- How long should this data be retained?

- Is there ongoing litigation that would require retaining this data for a longer period of time?

- What is the value to the business?

-What is the risk level associated with the loss/exposure?

- Is any of this data subject to credit card industry PCI (News - Alert) compliance?

- Is off-site backup of this data needed?

3. Access controls: Identify groups that should have access to data, compare them with people who should have access based on data sensitivity or regulatory requirements, and then correct the gap. To prevent unauthorized access, implement an authorization process during access provisioning, and ensure an expedited access revocation process upon job role changes or terminations. Additional measures should include periodically reviewing the access process, and ensuring that data is made available only on a need-to-know basis.

4. Application security: Review the security of all applications that have access to your data. If applications are built in house, implement a Secure Development Lifecycle process to provide defensive coding practices training, foster code reviews, and perform regular application security assessments. If applications are commercial apps, ensure that vendor notifications on security issues are promptly handled, and that updates and patches are swiftly deployed.

5. Infrastructure security:

-Verify that any external access to data repositories is properly vetted, and that adequate isolation is in place across the network architecture.

- Implement physical access controls where applicable.

- Implement a data disposal program to ensure that magnetic and non-magnetic media is securely wiped before their removal from secure environments.

- Deploy data encryption at rest and/or full disk encryption if any data repositories leave the secure perimeter (laptops, mobile devices, off-site backups).

-Ensure that transmission channels are encrypted for sensitive data.

-Implement two-factor authentication if external access is required to sensitive data.

6. Data retention policies: Define a consistent policy and communicate it across the organization. Avoid complex classifications and keep the number of categories to the minimum required by law, regulations or company needs.

7. Data loss prevention: Implement a system to detect and block accidental and/or intentional data leaks.

8. The human factor: Conduct background screening as part of your hiring and contracting practices, and provide regular awareness campaigns and training for data security and cyber threats.

9. Audit: Assess regularly the effectiveness of all security measures and apply corrective actions to improve controls over time.

10. Transfer residual risk: If, after applying the previous nine security steps, the residual risk is still not acceptable to the level of risk tolerance of the organization, transfer part of this risk by contracting an insurance policy to cover it.

Information security compliance audits

The best approach here is to answer three high-level questions with regards to information security compliance:

1. What are you trying to accomplish? Begin by clearly defining your requirements.

2. Which compliance framework are you trying to achieve? Determine guidelines that most cleanly align with your requirements: PCI-DSS 2.0, SSAE-16 (replaces SAS (News - Alert) 70), ISO1799 27001 (compliance), ISO 17799 (certification), COBit, and COSO.

3. Who or what is driving compliance efforts? Include all stakeholders and influencers. Many times compliance efforts are driven by clients. When that’s the case, take the time to ensure that client requirements are legitimate, and appropriate for your organization.

Download the complete whitepaper to learn more:

Beginner’s Guides to Data Security and Information Security Compliance & Audits

Visit | www.inin.com/whitepapers




Edited by Brooke Neuman


Related Contact Center Solutions Articles

    Appeals Court OKs Redbox's Customer Info Disclosure to Third Parties

    The U.S. Court of Appeals for the Seventh Circuit, based in Chicago, has given its approval of Redbox's practices for disclosing customer information to a third party regarding customer service issues. [ Read More ]
    10/31/2014

    On How to Avoid Challenges and Added Costs of Open Enrollment Period for 'Obamacare'

    If you live in the U.S., consider this a type of public service announcement. We are about to enter the open enrollment period for 2015 as part of the continuing rollout of the Patient Protection and Affordable Care Act (PPACA), which has become better known as "Obamacare." As we are all aware, the initial rollout of Obamacare was problematic-to put it politely. However, the good news is that, thanks to some great work by the IT industry experts called in to fix it, healthcare.gov is working bet… [ Read More ]
    10/31/2014

    Getting Ready for the Holiday Rush-The Role of Customer Experience Transformation

    It should be no surprise to anyone that the holiday season is fast-approaching, which means "all hands on deck" in the contact centers of retailers. And, as we move into what can best be characterized as the "Omni-channel Era" when it comes to providing a compelling customer experience, retailers are busy transforming virtually every aspect of how to provide such experiences. [ Read More ]
    10/31/2014

    When it comes to Contact Center Agents 'Mind the Gap'

    As content curator and contributor to the Contact Center Solutions Community, part of my function is to review information and insights from around the Web and illuminate them to our readers. In this regard, I would like to recommend an insightful posting from IT-Online titled, "How to differentiate customer experience." [ Read More ]
    10/30/2014

FOLLOW US

Contact Center Solutions Glossary of Terms

Featured eBook

    All Things Customer Interaction Solutions eBOOK
    It has been said that customer interaction centers are the front door to any organization's value chain. This is an accurate description of the transformations taking place in contact centers as a result of enhancements in multichannel communications, speech analytics, IVR capabilities, integrations with unified communications capabilities (UC) and other collaboration tools and applications, and the move to the cloud...

Featured Whitepaper

    Microsoft® Lync® in the Contact Center: Integrating with Customer Interaction Center™ to Provide a Barrier-free Customer Experience To implement contact center functionality, organizations using Microsoft Lync Server 2010 can follow the unified communications blueprint of open standards interoperability and integrate to a contact center solution of their choice. Customer Interaction Center (CIC) from Interactive Intelligence is a proven best of breed contact center solution that merits consideration ...

Featured Success Story

    Contact Center Solutions Featured Success Story
    Interactive Intelligence all-in-one IP communications software suite integrated with Microsoft Lync helps Bentley save $200,000 annually.

Featured Product Demo

    Contact Center Solutions Interaction Analyzer™
    Interaction Analyzer™
    Real-time word and phrase spotting. Alerting. Analytics. Scoring. Coaching. Watch how Interaction Analyzer turns every moment, of every past and present call, into data that lets you deliver an exceptional customer experience.

Featured Resources

Ask the Expert