SOC2 Controls Notes in SG - Privacy - NETSEC

Latest

Learning, Sharing, Creating

Cybersecurity Memo
Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

Saturday, August 3, 2024

SOC2 Controls Notes in SG - Privacy

  SOC2 Controls



SOC2 Privacy Controls



    PrivacySOC2:2017.P
7

Notice & CommunicationSOC2:2017.P.1
0

circle
Privacy NotificationSOC2:2017.P.1.1
0

circle
Communicates to Data SubjectsSOC2:2017.P.1.1.1
0

circle
Provides Notice to Data SubjectsSOC2:2017.P.1.1.2
0

circle
Covers Entities and Activities in NoticeSOC2:2017.P.1.1.3
0

circle
Uses Clear and Conspicuous LanguageSOC2:2017.P.1.1.4
0


Choice & Consent
SOC2:2017.P.2
0


Privacy Consent and Choice
SOC2:2017.P.2.1
0


Communicates to Data Subjects
SOC2:2017.P.2.1.1
0


Communicates Consequences of Denying or Withdrawing Consent
SOC2:2017.P.2.1.2
0

circle
Obtains Implicit or Explicit ConsentSOC2:2017.P.2.1.3
0

circle
Documents and Obtains Consent for New Purposes and UsesSOC2:2017.P.2.1.4
0

circle
Obtains Explicit Consent for Sensitive InformationSOC2:2017.P.2.1.5
0

circle
Obtains Consent for Data TransfersSOC2:2017.P.2.1.6
0

circle
CollectionSOC2:2017.P.3
0

circle
Personal Information CollectionSOC2:2017.P.3.1
0

circle
Limits the Collection of Personal InformationSOC2:2017.P.3.1.1
0

circle
Collects Information by Fair and Lawful MeansSOC2:2017.P.3.1.2
0

circle
Collects Information From Reliable SourcesSOC2:2017.P.3.1.3
0

circle
Informs Data Subjects When Additional Information Is AcquiredSOC2:2017.P.3.1.4
0

circle
Explicit ConsentSOC2:2017.P.3.2
0

circle
Obtains Explicit Consent for Sensitive InformationSOC2:2017.P.3.2.1
0

circle
Documents Explicit Consent to Retain InformationSOC2:2017.P.3.2.2
0

circle
Use, Retention & DisposalSOC2:2017.P.4
2

circle
Proper Use of Personal InformationSOC2:2017.P.4.1
0

circle
Uses Personal Information for Intended PurposesSOC2:2017.P.4.1.1
0

circle
Personal Information RetentionSOC2:2017.P.4.2
2

circle
Retains Personal InformationSOC2:2017.P.4.2.1
1

circle
Protects Personal InformationSOC2:2017.P.4.2.2
1

circle
Personal Information DisposalSOC2:2017.P.4.3
2

circle
Captures, Identifies, and Flags Requests for DeletionSOC2:2017.P.4.3.1
2

circle
Disposes of, Destroys, and Redacts Personal InformationSOC2:2017.P.4.3.2
0

circle
Destroys Personal InformationSOC2:2017.P.4.3.3
0

circle
AccessSOC2:2017.P.5
1

circle
Data Subject AccessSOC2:2017.P.5.1
1

circle
Authenticates Data Subjects' IdentitySOC2:2017.P.5.1.1
0

circle
Permits Data Subjects Access to Their Personal InformationSOC2:2017.P.5.1.2
1

circle
Provides Understandable Personal Information Within Reasonable TimeSOC2:2017.P.5.1.3
0

circle
Informs Data Subjects If Access Is DeniedSOC2:2017.P.5.1.4
0

circle
Data Subject AmendmentSOC2:2017.P.5.2
1

circle
Communicates Denial of Access RequestsSOC2:2017.P.5.2.1
1

circle
Permits Data Subjects to Update or Correct Personal InformationSOC2:2017.P.5.2.2
1

circle
Communicates Denial of Correction RequestsSOC2:2017.P.5.2.3
1

circle
Disclosure & NotificationSOC2:2017.P.6
3

circle
Consent for Third Party DisclosureSOC2:2017.P.6.1
1

circle
Communicates Privacy Policies to Third PartiesSOC2:2017.P.6.1.1
0

circle
Discloses Personal Information Only When AppropriateSOC2:2017.P.6.1.2
0

circle
Discloses Personal Information Only to Appropriate Third PartiesSOC2:2017.P.6.1.3
1

circle
Discloses Information to Third Parties for New Purposes and UsesSOC2:2017.P.6.1.4
0

circle
Authorized DisclosuresSOC2:2017.P.6.2
0

circle
Creates and Retains Record of Authorized DisclosuresSOC2:2017.P.6.2.1
0

circle
Unauthorized DisclosuresSOC2:2017.P.6.3
1

circle
Creates and Retains Record of Detected or Reported Unauthorized DisclosuresSOC2:2017.P.6.3.1
1

circle
Appropriate Third Party DisclosureSOC2:2017.P.6.4
1

circle
Discloses Personal Information Only to Appropriate Third PartiesSOC2:2017.P.6.4.1
1

circle
Remediates Misuse of Personal Information by a Third PartySOC2:2017.P.6.4.2
0

circle
Unauthorized Third Party DisclosureSOC2:2017.P.6.5
2

circle
Remediates Misuse of Personal Information by a Third PartySOC2:2017.P.6.5.1
1

circle
Reports Actual or Suspected Unauthorized DisclosuresSOC2:2017.P.6.5.2
1

circle
Notification of Unauthorized Third Party DisclosureSOC2:2017.P.6.6
0

circle
Remediates Misuse of Personal Information by a Third PartySOC2:2017.P.6.6.1
0

circle
Provides Notice of Breaches and IncidentsSOC2:2017.P.6.6.2
0

circle
Accounting of Personal InformationSOC2:2017.P.6.7
0

circle
Identifies Types of Personal Information and Handling ProcessSOC2:2017.P.6.7.1
0

circle
Captures, Identifies, and Communicates Requests for InformationSOC2:2017.P.6.7.2
0

circle
QualitySOC2:2017.P.7
1

circle
Accuracy of Personal InformationSOC2:2017.P.7.1
1

circle
Ensures Accuracy and Completeness of Personal InformationSOC2:2017.P.7.1.1
1

circle
Ensures Relevance of Personal InformationSOC2:2017.P.7.1.2
0

circle
Monitoring & EnforcementSOC2:2017.P.8
2

circle
Personal Information Dispute ResolutionSOC2:2017.P.8.1
2

circle
Communicates to Data SubjectsSOC2:2017.P.8.1.1
0


Addresses Inquiries, Complaints, and Disputes
SOC2:2017.P.8.1.2
0


Documents and Communicates Dispute Resolution and RecourseSOC2:2017.P.8.1.3
0


Documents and Reports Compliance Review Results
SOC2:2017.P.8.1.4
1


Documents and Reports Instances of NoncomplianceSOC2:2017.P.8.1.5
1


Performs Ongoing MonitoringSOC2:2017.P.8.1.6










SOC2 Privacy Evidences





Evidence Name

Evidence Description

Expiration Schedule

Type

Changes - Privacy Review

Provide a ticket or other evidence that demonstrates that a change has been reviewed for impact on data privacy. This may look like a CAB meeting discussion or a checklist item on a change ticket.

30

General

Complaint Procedure

Provide the company's procedures for addressing privacy related inquiries, complaints, and disputes.

364

Policy

Consent Form

Provide a screenshot of the form or button used to capture data subject consent. The screenshot should include the date/time stamp to be valid.

364

General

Consent Process

Provide the process steps for re-obtaining data subject's consent when their data will be used for a new purpose.

364

Policy

Data Breach Policy and Procedures

Provide the Breach Notification Policy and related procedures.
For HIPAA, the breach procedures should include a description of discovery, a description of types of unsecured protected health information, steps of action and documentation, contact procedures, a description of investigation procedures, and mitigation procedures.
For GDPR, the breach procedures should include steps to notify data subjects and supervisory authorities.

364

Policy

Data Collection

Provide a screenshot of the member profile sign-up showing that it only collects the minimum information necessary to provide the service. The screenshot should include the date/time stamp to be valid.

364

General

Data Deletion

Provide evidence of the most recent data subject request for deletion (e.g. email or ticket) and evidence that the deletion script was run to delete personal information. Alternatively, provide evidence within the system that the external user information is no longer present.

30

General

Data Destroyed

Provide the most recent evidence that data was destroyed according to the Data Retention Policy. This may be rare.

30

General

Data Dictionary

Provide a system generated list of all data elements used in the system. This should include data classification category, data owner, and any other relevant metadata.

364

General

Data Subject Authenticate Identity

Provide the documented procedure for the data subject authentication process prior to granting access to their personal information.

364

Policy

Data Subject Consent

Provide the external user database table that shows where consent is tracked in the table. Obscure any personally identifiable information (PII) data to protect user privacy. If uploading a manually created screenshot as evidence, it should include the date/time stamp to be valid.

364

General

Data Subject Request List

Provide a system generated list of all inquiries and requests made by data subjects to the organization during the audit period. Include the date of contact was made, the data subject's name or unique identifier, the nature of the request, and the date of the resolution of the request. The list should capture the following types of inquiries/requests: Deletion of user data, change of user data, and export of user data. The report or list must include a date/time stamp or other indication of when the list was created.

364

Population

Data Subject Sign in

Provide the documented process for data subjects to access their user profile and update their personal information.

364

General

Data Subject's Information Format

Provide an example of how personal information is made available to data subjects in an understandable format.

180

General

Deletion Request Tickets List

Provide a list from the ticketing system for all data deletion requests from the audit period.

364

Population

External User Validation

Provide evidence/screenshots to illustrate the external user validation process via the data dictionary. This may look like a snippet of the back-end code that shows the rules for the data collected, such as characters vs numbers, text length, a required field, etc. If uploading a manually created screenshot as evidence, it should include the date/time stamp to be valid.

364

General

Legal/Lawful Basis

Provide the document that outlines the organization's legal basis for processing PII. This may be a section of the Privacy Notice or may be a stand-alone document.

Ensure that the following processing activities have been considered:

- Necessary to satisfy a contract to which the data subject is a party.
- To comply with a legal obligation.
- To save somebody?€?s life.
- To perform a task in the public interest or to carry out some official function.
- Legitimate interest to process someone?€?s personal data.

364

Policy

List of PII Disclosure to Third Parties

Provide the list of all personally identifiable information (PII) disclosures to third parties during the audit period.

364

General

List of Unauthorized PII Disclosures

Provide a system generated list of unauthorized disclosures of a data subject's personal information during the audit period. The list should include relevant data about the disclosure such as the date, user, who disclosed to, and action taken.

90

Population

Management Review of PII Method Collection

Provide evidence (e.g. meeting minutes, management reports, management notes, a PowerPoint deck, emails) that management reviews the methods of collecting personal information before they are implemented.

90

General

Nondiscrimination in Privacy Policy

Provide the section of the public-facing privacy notice which states that the organization shall not discriminate against a consumer because the consumer exercised any of their consumer?€?s rights.

364

Policy

Notice of Collection

Provide the Notice of Collection text. If this is included in the Privacy Notice, attach that document as evidence here.

364

Policy

Notice of Financial Incentive

Provide a sample Notice of Financial Incentive to demonstrate that sufficient information is provided to data subjects so that they may make an informed decision about participating in the program.

364

General

Notice of Right to Limit

Provide the text of the Notice of Right to Limit. If this text is included within the Privacy Notice, attach that evidence item here. The Right to Limit Notice must contain all elements of current California privacy regulations.

364

Policy

PII Processor Contract

Provide a contract signed with a PII processor from within the audit period.

For CCPA (or other consumer privacy-related programs), the contract should ensure that the processor complies with appropriate privacy controls.

364

General

Privacy Notice at First Login

Provide the code snippet or screen shot demonstrating that new users are provided the Privacy Notice at initial login.

364

General

Privacy Policy - Internal

Provide the internal Privacy Policy. The internal Privacy Policy may include procedures on data handling.

364

Policy

Privacy Policy on Website

Provide the Privacy Notice or Policy on the website. This should include sections that address:
The purpose for collecting personal information
Types of personal information collected
Methods of collection
Use, retention, and disposal of personal information
Access to personal information
Disclosure of personal information to third parties
Security for privacy
Quality of personal information
Collection from other sources
Joint Controller(s) and related data subject rights

364

Policy

Privacy Policy Workflow

Provide documentation describing the external user registration workflow process; show where the external user is required to acknowledge the Privacy Policy in order to register. If uploading a manually created screenshot as evidence, it should include the date/time stamp to be valid.

364

General

Request for Identifying PII

Provide a screenshot of the tool used to track and record data subject's requests. The screenshot should include the date/time stamp to be valid.

30

General

Secure Document Storage

Provide evidence that shows where or how legal documentation is securely stored.

364

Settings








References






No comments:

Post a Comment