IAPP Top-Mistakes
IAPP Top-Mistakes
IAPP Top-Mistakes
Many incidents occur even as employees believe they are doing the right thing, but are instead
burdening the company with unnecessary risk. In my experience, these are the top mistakes
employees make, absent proper awareness and training.
TOP MISTAKES
4. Multi-tasking
1. Being overly helpful Most employees are busy, and they may have
multiple system windows open. However, with
Employees are focused on meeting the needs more system windows comes an increase in
of their internal and external clients. However, the likelihood of a privacy incident. Employees
being overly helpful may result in an employee may enter information in the incorrect screen,
providing unnecessary information to complete resulting in the incorrect transmission of data.
a task, which increases the risk of a privacy
incident. For example, without proper guidance, 5. Over-collection of data
a well-intended employee may provide more
personal information than required. If that Companies have privacy policies and notices
information is provided to unauthorized explaining how information is collected and
individuals, it may result in mandatory breach used. However, remembering the details of
notifications. the privacy policy and notice may quickly be
forgotten by employees, as there are many other
2. Unsecured transmission daily demands. Over-collection of data may not
only result in a privacy incident but potential
Employees are in a rush and may transmit legal action by federal and state entities, or civil
data without using proper encryption or data suits, for failure to follow a company’s promise to
protection steps. This misstep occurs when its customers.
technology is too difficult to use, the recipient
cannot read encrypted transmissions, or the
employee was not properly trained.
Mitigating risk is an ongoing
process and requires the privacy
3. Sending files to the incorrect recipient office to establish a network
of champions.
This may be the most common, and difficult,
issue to tackle at a company. Many of today’s
email clients store past email addresses. 6. Inconsistent business processes
However, this can increase the chances of a
mistake as employees may use the incorrect, Most companies must respond rapidly to
auto-filled email address and fail to double-check business needs but forget to notify the privacy
the recipient’s name. It is only after the email is office regarding potential required changes
sent, or when the recipient notifies the sender to the privacy policy, notice and documented
of the incorrect transmission, that the error is controls. As stated above, inconsistent processes,
discovered. not supported by the documented privacy policy
Employees are overburdened with performance A privacy impact assessment, or other change
quotas and many times will develop a work- control process, must be implemented to ensure
around for cumbersome processes. Ensure it meets an acceptable level of risk and impacts
technology is easy to use for both the employee to other processes are considered. Control
and recipient. Job aids or other helpful wikis can changes must also be documented in a central
assist a user with common issues. Technology repository for future auditing.
Mitigating risk is an ongoing process and requires the privacy office to establish a network of
champions. The privacy office must be active in the field to build relationships and understand
business challenges, which can be used to develop job aids or other training material. When a
privacy incident happens, the privacy office must evaluate the breakdown, assess potential control
weaknesses, and conduct a trend analysis to prevent future occurrences.
Improving privacy controls is an ongoing journey. One that is more effective when the journey is
taken as a group, rather than alone.