When the controller comes knocking, the processor (such as outsourced service providers or OSPs) must open the door. However, the scope, frequency, and assurance levels of their mechanisms are sometimes cost-prohibitive and insufficient in providing meaningful third-party assurance. Explore the kind of assurance that can demonstrate to the controller that the processor has the right controls or mechanisms in place to protect privacy.
In today’s environment, organizations are being inundated with extensive volumes of data, driving the need to better understand the data environment amidst all threats and vulnerabilities. As it relates to data privacy, an organization that collects personal data for which they determine the purpose and means of processing is known as a Controller. When an organization processes personal data, they are known as a Processor. While an organization may act in the capacity of both a Controller and Processor, in many cases Controllers will outsource the processing of personal data to a third-party Processor. Examples of this include using a third party to perform payroll processing, statement printing, or providing cloud applications and storage.
With this level of data sharing between organizations and operating models associated with a multitude of stakeholders, complexities in such trusted relationships will continue to unfold. While this presents a timely opportunity to create value across organizations, it can also result in difficulties with identification, clear visibility, management, and communication with stakeholders.
One of the many challenges is security and privacy risks between a data subject, the Controller, and the Processor. How can a newsworthy event in the OSP “processor” environment influence a data controller’s reputation or customers? What is being done to monitor and manage these emerging privacy considerations and rulesets? Where does your organization fit within these challenges?
These questions can put stress on the ecosystem, hampering transparent communication and the flow of information to stakeholders that help them to make informed decisions.
There are several approaches to address the risks related to the processes outsourced to OSPs. Each of these approaches provides the customer with its own level of “assurance”, which can be thought of as the overall comfort that can be obtained from various monitoring mechanisms. Each organization may have varying degrees of acceptable risk tolerance when it comes to the level of assurance to obtain. Some considerations in how to choose the right mechanism include:
We explore some of the challenges and solutions associated with outsourced relationships and risk monitoring within, specifically highlighting the emerging privacy considerations.
While determining as a customer, you should consider which types of reports to go for, and similarly, as an OSP, which types of reports to plan for. Following are some questions one should ask to figure it out.
However, before undertaking a new assurance report, a readiness review should be considered to identify potential control gaps and leave time for management to remediate them.