Governance
| Examples of good practice | Examples of poor practice | ||
| • | Identification of data security as a key specific risk, subject to its own governance, policies and procedures and risk assessment. | • | Treating data security as an IT issue and failing to involve other key staff from across the business in the risk assessment process. |
| • | A senior manager with overall responsibility for data security, specifically mandated to manage data security risk assessment and communication between the key stakeholders within the firm such as: senior management, information security, Human Resources, financial crime, security, IT, compliance and internal audit. | • | No written policies and procedures on data security. |
| • | A specific committee with representation from relevant business areas to assess, monitor and control data security risk, which reports to the firm’s Board. As well as ensuring coordinated risk management, this structure sends a clear message to all staff about the importance of data security. | • | Firms do not understand the need for knowledge-sharing on data security. |
| • | Written data security policies and procedures that are proportionate, accurate and relevant to staff’s day-to-day work. | • | Failing to take opportunities to share information with, and learn from, peers and others about data security risk and not recognising the need to do so. |
| • | An open and honest culture of communication with pre-determined reporting mechanisms that make it easy for all staff and third parties to report data security concerns and data loss without fear of blame or recrimination. | • | A ‘blame culture’ that discourages staff from reporting data security concerns and data losses. |
| • | Firms seeking external assistance if they feel they do not have the necessary expertise to complete a data security risk assessment themselves. | • | Failure to notify customers affected by data loss in case the details are picked up by the media |
| • | Firms liaising with peers and others to increase their awareness of data security risk and the implementation of good systems and controls. | ||
| • | Detailed plans for reacting to a data loss including when and how to communicate with affected customers. | ||
| • | Firms writing to affected customers promptly after a data loss, telling them what has been lost and how it was lost. | ||
| • | Firms offering advice on protective measures against identity fraud to consumers affected by data loss and, where appropriate, paying for such services to be put in place. | ||
