Privacy Controls, DLP & Compliance
Kiα»m soΓ‘t Quyα»n riΓͺng tΖ°, DLP & TuΓ’n thα»§
Theory
Privacy by Design (PbD) β 7 Principles
Developed by Ann Cavoukian, Privacy by Design (PbD) is the principle that privacy must be built into systems and processes from the start β not added as an afterthought. It is embedded in GDPR (Article 25) and is fundamental to regulatory compliance for FinTech Company X.
| # | Principle | What It Means |
|---|---|---|
| 1 | Proactive not Reactive | Anticipate and prevent privacy issues before they occur β not respond after a breach |
| 2 | Privacy as the Default | Default settings must protect privacy; users must actively opt in to share more data, not opt out |
| 3 | Privacy Embedded into Design | Privacy is integral to the system architecture β not a feature added on top afterward |
| 4 | Full Functionality (Positive-Sum) | Privacy AND functionality β not a trade-off. Both goals can and must be achieved simultaneously |
| 5 | End-to-End Security | Protect data through its entire lifecycle β from creation to secure destruction |
| 6 | Visibility and Transparency | Be open about what data is collected, why, and how it is processed β privacy notices, data maps |
| 7 | Respect for User Privacy | Keep it user-centric β individual data subject rights are paramount; build controls that empower users |
Anonymization vs Pseudonymization
These are often confused β the distinction has major regulatory implications:
| Feature | Anonymization | Pseudonymization |
|---|---|---|
| Reversible? | No β no mapping table kept; original identity cannot be recovered | Yes β with the separate mapping table, original identity can be restored |
| GDPR personal data? | No β once truly anonymized, GDPR no longer applies | Yes β still personal data (GDPR applies); offers reduced risk but not exemption |
| Example | Replace customer phone number with a random hash and discard the mapping | Replace phone number with a token; mapping table stored separately in secure vault |
| Use case | Analytics datasets, ML training data for production models | Production databases with audit trail needs; reduces breach impact while preserving reversibility |
Tokenization & Data Masking
- Tokenization: Replaces sensitive data with a non-sensitive surrogate value (token) with no mathematical relationship to the original. Primary use: PCI-DSS scope reduction. Card Processor holds the real PAN; FinTech Company X holds only the token β no PAN ever stored in Platform C systems.
- Data masking: Shows partial data (e.g., ****-****-****-1234). Used in non-production environments and UI displays where the full value is not needed. Partner E card display should show only last 4 digits.
Data Loss Prevention (DLP)
DLP systems monitor and prevent unauthorized transfer or exfiltration of sensitive data. Three deployment modes:
| Type | Monitors | TS Use Case |
|---|---|---|
| Network DLP | Outbound traffic β email attachments, web uploads, SFTP transfers | Alert if customer PII is emailed to personal Gmail; block unencrypted PII uploads to external storage |
| Endpoint DLP | USB copy, print, clipboard, screen capture on employee devices | Prevent staff from copying customer data to personal USB drives |
| Cloud DLP | Cloud storage buckets (GCS, S3) β scans for sensitive data in wrong location | Scan GCS buckets for PII in wrong bucket (e.g., public bucket containing loan PDFs) |
Digital Rights Management (IRM / DRM)
IRM (Information Rights Management) β also called DRM β controls what recipients can do with a document or file. Unlike perimeter controls (firewalls, DLP), IRM controls travel with the data itself. This means a recipient who legitimately receives a document still cannot print it, forward it, or copy from it if the IRM policy prohibits those actions.
- View-only restrictions (cannot print or copy)
- No-forward on emails
- Time-limited access (document expires after 30 days)
- Watermarking (track who leaked a document)
Data Subject Rights
| Right | GDPR | Philippines DPA 2012 |
|---|---|---|
| Access | Art. 15 β right to know what data is held and how it is processed | Sec. 16(b) β right to access personal information |
| Rectification | Art. 16 β right to correct inaccurate data | Sec. 16(c) β right to dispute and correct inaccurate data |
| Erasure (Right to be Forgotten) | Art. 17 β right to deletion (with exceptions) | Sec. 16(d) β right to erasure or blocking of data |
| Data Portability | Art. 20 β right to receive data in structured format | Sec. 18 β right to data portability |
| Object | Art. 21 β right to object to processing (e.g., marketing) | Sec. 16(f) β right to object to processing |
| No Automated Decision-Making | Art. 22 β right not to be subject to solely automated decisions with significant effect | Sec. 16(g) β right to complain about automated decisions |
Key Terms
Exam Tips
Work Application β FinTech Company X
| PbD Principle | Platform C Implementation Check | Gap / Action |
|---|---|---|
| 1. Proactive | Are privacy impact assessments (PIA/DPIA) run before new features ship? | Add DPIA gate to feature release process; required for any new personal data field |
| 2. Privacy Default | Does Platform C default to collecting minimum fields? Does Partner C lead form have all optional fields unchecked by default? | Audit Partner C form β any pre-ticked consent checkboxes are non-compliant under DPA 2012 |
| 3. Embedded | Is encryption part of the schema design, not a post-deployment patch? | Confirm AES-256-CTR defined in schema migrations, not retrofitted via application layer |
| 6. Transparency | Is there a privacy notice displayed before Partner C (PH) form submission? | Required by DPA 2012 β privacy notice must be shown before data collection begins; consent checkbox required; NPC-registered data processing activity |
Practice Questions
Q1. Platform C's loan application form collects 32 fields. A privacy review finds that only 18 are required for the credit decision. The remaining 14 are collected "because they might be useful for future marketing." Which Privacy by Design principle does removing the 14 fields most directly address?
A) Principle 4 β Full Functionality B) Principle 2 β Privacy as the Default + data minimization C) Principle 6 β Transparency D) Principle 3 β Embedded into Design
β B) Principle 2 β Privacy as the Default + data minimizationQ2. Platform C replaces a customer's phone number with a randomly generated token for analytics use. The mapping table (token β original phone number) is stored in a separate, access-controlled vault. Is this anonymization or pseudonymization?
A) Anonymization β data is replaced with a token B) Pseudonymization β mapping table exists; original identity can be restored C) Tokenization β equivalent to PCI-DSS tokenization D) Encryption β functionally equivalent to AES encryption
β B) Pseudonymization β mapping table existsQ3. FinTech Company X uses Card Processor for card processing. Platform C stores only the Card Processor-issued token; Card Processor holds the actual PAN. What is the primary security benefit of this arrangement?
A) Biometric data is protected by eKYC Vendor B) FinTech Company X's Platform C systems are removed from PCI-DSS cardholder data scope C) Customer consent is automatically captured D) Data minimization is achieved for PII
β B) Platform C systems are removed from PCI-DSS cardholder data scopeQ4. A confidential Partner A credit policy document was legitimately emailed to a Partner A executive. FinTech Company X wants to ensure the executive cannot print it or forward it to third parties. Which control achieves this?
A) Network DLP β block outbound email attachments B) Endpoint DLP β monitor USB and print on the executive's device C) IRM / DRM β embed controls in the document that prevent printing and forwarding D) Data masking β redact sensitive sections before sending
β C) IRM / DRM β controls travel with the documentQ5. A Philippine Partner C customer submits a data erasure request under DPA 2012. However, the customer has an active loan with Partner A that is currently in arrears and may result in legal action. Can FinTech Company X deny the erasure request? Why?
A) No β data subject rights are absolute under DPA 2012 B) Yes β the data may be required for the establishment, exercise, or defense of legal claims C) Yes β but only if NPC is notified within 72 hours D) No β the right to erasure has no exceptions under Philippines law
β B) Yes β data required for legal claims