L7 - Data Protection Within Financial Industry
L7 - Data Protection Within Financial Industry
Presentation to WAIFEM
CONTENTS
Introduction 3
Conclusion 27
Questions 28
2
INTRODUCTION
• Background
• Data and Data Protection
• Data Protection Principles
• Need for Data Protection
Background
Unstructured Data
Metadata
Transactional Geospatial
Types of Protected Data in Financial Institution
Data Minimization : Only the minimum amount of data Accountability: Data controllers should ensure
3 necessary for the intended purpose should be collected compliance with data protection principles and
and processed.
7 compliance through documentation
• Background
• Financial Data Regulations
• Compliance Requirements for Financial Industry
Data Protection Regulations
Data protection regulations are legal framework established by governments or regulatory bodies to govern the
collection, processing, storage and sharing of personal data. These regulations aim to protect the privacy and
rights of individuals by imposing obligations on organizations that handle personal data.
Financial industry operates on a foundation of trust. Customers entrust financial institutions with some of their
most sensitive personal information, such as account details, financial history, and social security numbers. Data
breaches in this sector can have devastating consequences, leading to financial losses, identity theft, and
reputational damage.
Data protection regulations within the financial industry are specifically tailored to address the unique
challenges and risks associated with handling sensitive financial data. These regulations aim to safeguard the
privacy and security of consumers' financial information while also ensuring the integrity and stability of
financial markets.
Financial Data Regulations
Data regulations vary in scope , with some being broad and applicable across industries, while others are
specific to certain sectors. Within the Financial industry, there are regulatory bodies that oversee data
protection measures.
Basel 3
This is a global regulatory framework established by Basel Committee on Banking
supervision to strengthen the regulation, supervision and risk management practices of
bank.
Compliance Requirements for Financial Institutions
Data Security Measures are techniques and practices implemented to protect data from unauthorized
access, use, disclosure, alteration or destruction. These measures aim to ensure the confidentiality, integrity
and availability of data, safeguarding it against various threats and vulnerabilities.
Encryption is a data security measure that involves converting data into ciphertext using
encryption algorithms and keys. This process makes the data unreadable to anyone who
does not possess the corresponding decryption key.
In financial Industry, encryption plays a crucial role in protecting sensitive financial data
from unauthorized access, ensuring confidentiality and Integrity.
Encryption takes different form and vary based on the algorithms and methods used to
convert plaintext into ciphertext. Some common encryption techniques include;
• Symmetric Encryption
• Asymmetric Encryption
• Hash-Functions
• Stream Ciphers
• Block Ciphers
Access Control and Authentication
Access Control is the process of regulating who can access what resources
within a system or network. It involves defining and enforcing policies and
permission to restrict access to data, systems, and applications based on user
identity, roles, and privileges. Some Access control mechanisms include;
Phishing
Malicious mail sent by
attackers to trick
Supply Chain Attack individuals into revealing Data Breaches
A cyber attack strategy sensitive information. A security incident where
where attackers target sensitive, confidential data
vulnerabilities in a is accessed, disclosed or
company’s supplier or stolen by unauthorized
service providers to parties.
infiltrate their systems.
Ransomware
A malicious software
DDOS Attack designed to encrypt files or
A large volume of request block access to a computer
been sent to a target or system until a ransom is
SQL Injection paid.
system with the objective of
rendering that service or A cyber attack technique used
application unavailable to to exploit vulnerabilities in
its intended users. web applications.
DATA Protection and Risk Management
• Background
• Key Component of Data Protection
• Data Protection Challenges
• Best Practices for Data Protection
Data Governance and Risk Management
The process of categorizing data assets based on their sensitivity, criticality and usage.
Data Classification It can be achieved by labelling, tagging data to indicate its level of confidentiality,
access and restrictions.
Encryption of data in use, data in transit and data at rest. Implementation of strong
Data Encryption encryption algorithm and ensuring that encryption is consistent, interoperable, and
compliant with industry and regulatory requirements.
Adherence to the laws, regulations and guidelines that govern the protection and
Data Privacy Compliance handling of personal data. Furthermore, Ensuring compliance with data privacy
regulations such as the GDPR,PCI DSS.
Insider threats
Data Privacy
Excess data concerns
Compliance
Complexity
Best Practices for Data Protection
Deloitte provides audit, tax, consulting, and financial advisory services to public and private clients spanning multiple industries. With a globally connected network of member
firms in more than 150 countries and territories, Deloitte brings world-class capabilities and high-quality service to clients, delivering the insights they need to address their
most complex business challenges. Deloitte’s more than 245,000 professionals are committed to becoming the standard of excellence.
© 2024. For information, contact Deloitte & Touche. All rights reserved.
www.facebook.com/DeloitteNigeria twitter.com/DeloitteNigeria