Estimated time: 15 min
One of the core aspects of any organization is the manipulation of data given that any carried out process can be abstracted to the generation, processing, storage, and publication of information. In the case of organizations performing activism or documentation in the area of Human Rights, there is an important variety of types of information whose commitment may trigger negative consequences for any organization, its members or related actors. The idea of developing a data protection policy is to establish a series of guidelines that help to treat each piece of information in the most appropriate way possible according to its sensitivity.
- Data mapping developed in the section Data mapping and classification
- Information flow mapping developed in the section Information flow mapping
- Template 1: Data protection policy open in a device to fill it up during the course of the activity.
|Sensitivity data levels||It is a scale by which is established how much a piece of information is considered delicate and needs to be protected. There are many proposed scales and their application depends on the organization's needs.|
|Principle of the minimum privilege||Proposes that data should be accessible only to those people who need to use it within their usual processes, reducing the attack surface and consequently the risks associated with minimizing the exposure of information. This principle is related to the **principle of need to know**.|
|Responsible for the information||Are those people with direct competencies in the manipulation of information. In some frames of reference they are divided depending on who creates the information, who manipulates it, who custody it, who destroys it and who is responsible for its commitment among other schemes. In this manual we try to abstract these differentials to the maximum, thinking of small work groups and the simplification of security policies, however, if the organization believes it is convenient to make this type of differentiation, it is also recommended to adopt the policies described to this need.|
|Disposing of information||Refers to the techniques used to dispose of data pieces once they have reached their useful life or that must be destroyed for any kind of regulations and safety reasons. Generally, these techniques have a different level of complexity and information in more or less secure archived, especially in terms of their possible reconstruction.|
Policies to be developed
- Data Protection Policy to be developed in this activity, abstracts existing content in the following policies described in standardized reference frames:
- Data classification policy: Defines criteria by which the sensitivity level of the information handled is determined, and strategic lines of management of this information at the proposed sensitivity levels. It also usually delineates those responsible for managing and safeguarding this piece of information worked on in the organization.
- Data retention policy: Defines, among other things, the time the organization can keep certain types of sensitive information, how to dispose of it, when it is removed, in which devices, which security practices should be applied to each type of sensitive information, and how sensitive information is processed according to legal regulations and best practices.
- Data access policy: Defines the pieces of information that can be accessed and manipulated by the different groups of the organization, in order to diminish the possibilities of commitment of the same and to make more efficient the information flow within the processes of the organization.
- What is the scope of the proposed policy?
- What levels of sensitivity does the information handled by the organization have and how are they described?
- How can any piece of information be classified at the proposed sensitivity levels?
- Who is responsible for the protection of the information?
- Who should have access to information and who should not?
- What measures should be taken to manipulate information according to their level of sensitivity? (Raise key concepts)
- What specific tools, practices and devices should be used to manipulate the information according to their level of sensitivity?
1. Scope of the policy
Basically, the scope associated with this policy covers two aspects:
- Affected team members: Take, for example, all the members of the team, only some of them (investigative journalism team, people in charge of handling complaints, etc.), even all the members of the organization or any external ally that somewhat collaborates on certain topics.
- Types of data considered: Having as options only certain types of information handled by the organization or all the pieces of information handled by the group. This exercise is designed to consider the second case, however, it can be handled as best the group judges as long as the activity can be developed fluently.
It is suggested to discuss both aspects and put down the results of the discussion in section (1) of the template.
2. Sensitivity levels of information
What levels of sensitivity does the information handled by the organization have and how are they described? How can any piece of information be classified according to the sensitivity levels proposed?
- Check the matrix of consequences of the activity data mapping and classification.
- Introduce some types of information in classification schemes commonly used in information security, then propose to keep up with impact levels developed.
- Public/confidential/secret/internal/regulatory data classifications, among others, are often used, taking into account the damage that may be caused by their commitment. In terms of our methodology, the same levels of impact proposed in previous sections can fill this space and therefore are suggested for reasons of simplicity.
- Unify in a single table cell the content of each row by the level of impact developed and empty this information in the section (2) as shown in the graph.
Levels of impact on information
3. Responsible for information
Who is responsible for the data protection?
When handling information with different levels of sensitivity, it is important to ensure that security measures are put in place to protect data, so it becomes relevant to know who is responsible for implementing and maintaining the suggested security measures. Although standardized reference frames propose several figures regarding responsibility for information, it is recommended only to use the figure of the custodian of the information. Depending on the needs and dynamics of the organization, there are several approaches to determining who are the custodians of the information. E.g.:
- People who generate the information objects.
- Coordinators of departments or areas associated with information objects.
- People who manipulate the information at every moment.
- Specific people designated case by case.
- Other allocation criteria.
The idea is to present these options and discuss which of them best applies to the organization and write it down in section (3) of the template.
4. Restriction basis of access to information
Who should have access to information and who should not?
In the framework of establishing data protection policies, it is important to consider the control of access to it by the team, this is achieved by having access control lists or rules that determine who can access each type of information and who does not Usually these considerations are included in a Data access policy, however, this type of policy is based on the principle of minimum privilege, where it is proposed that only people who need to manipulate certain information are able to access to it by rule, minimizing the possibilities of commitment.
The first premise that you want to validate with the group is if they would agree to formally follow this principle, it is expected that the agrees, but it is worth exploring any scenario where it might be difficult. In these cases, it must be made clear that the probability of compromising the information can go up considerably. The principle of the minimum privilege is written by default in section (4) of the template.
4a. Access control policies (optional)
In the event that the organization manages very sensitive information, is interested in deepening the control of access to information and the time is available, the first version of an access control matrix can be developed. In the section (4) of the template is an example of a matrix where different departments, areas, or even specific positions are placed as columns depending on the structure and dynamics of the organization, and as rows pieces of information with levels of high sensitivity, and then basically describe what areas or people can access to what pieces.
Data access control matrix
5. General data manipulation directives
What measures should be taken to manipulate information according to their level of sensitivity?
Using the matrix developed in the activity information flow, the general criteria described for each level of impact can be collected and depicted in section (5) of the template.
It is important that in this section you avoid describing specific tools or services, but the associated security features, which allow in case of changing any of them, have the criteria to select a new one that meets the same or better benefits. E.g.: do not suggest for communications Signal but Chat services with end-to-end encryption.
General considerations by level of impact
6. Specific data manipulation directives
What specific tools, practices and devices should be used to manipulate the information according to their level of sensitivity?
In a similar way to the previous step, for each level of impact or sensitivity, devices, other resting places of the information and communication channels that were selected for each level will be collected, and thus placed in the template of section (6) as shown in the table. Space is left to place all necessary considerations that need to be met in each case if applicable.
For simplicity, if the organization and the facilitator consider it convenient, only the highest levels of impact can be considered, since the lower levels may require quite more time and effort to fill in the information requested in the template, in this case, the tables for low and medium levels can be deleted.
Security directives by level of impact
Aspects excluded in the policy
- Information lifetime: where is specified for how long the organization will retain certain types of information and what kind of processing will need to be done before deletion.
- Disposition of the information: how the information should be eliminated, according to its type of sensitivity, with the intention of avoiding reconstruction of this information or tracking of data.
- Detail of risks associated with this policy: where it is elaborated in what kind of risks are being attacked with the fulfillment of this policy.
- Specific responsibilities: where you can specify responsibilities that escape being the custodian of the information and may be relevant to the organization.
- Training plan on the concepts, techniques and tools proposed in the policy.