Lessons Learned While Building a Privacy Operations Center at Headspace Health
Shobhit Mehta
About me
Goals
Assumptions
�
Why? (1/4)
Legal and regulatory requirements.
Why? (2/4)
Mandatory requirements from app stores.
Apple
Why? (3/4)
145 breaches reported as of Apr 10, 2023
Prevent financial and reputational loss.
Why? (4/4)
Ongoing media scrutiny.
Helps earn (or lose) trust.
But, most importantly…
Privacy is an existential risk.
Privacy is:
Privacy is not:
Guiding Principles of Privacy (1/4)
Guiding Principles of Privacy (2/4)
Guiding Principles of Privacy (3/4)
Guiding Principles of Privacy (4/4)
What constitutes a POC?
Privacy Operations Center
Governance & Management
Tools
Security
& Awareness
Partnerships
Data Management v/s Data Governance
Governance & Management
Organize
Store
Protect
Maintain
Classification
Frameworks
Policies
Procedures
Stewardship
Strategic
Data Classification
Governance & Management
Highly Restricted
Restricted
Confidential
Public
Traditional data classification didn’t fit our requirements.
Headspace Health Data Classification
Governance & Management
Parent Classification | Child Classification (US / International) | Examples |
Sensitive | PHI / Health | Health records, chat transcripts |
Sensitive Personal Information / Special Category Data | Government ID, religious beliefs | |
Private | PII / Personal Data | Name, Email (not direct identifiers to PHI) |
Customer Confidential | Customer Confidential | Eligibility files |
Company Confidential | Company Confidential / Internal | Business plans, meditations |
Research | Research | De-identified PHI, anonymized aggregate data sets |
Public | Public | Marketing materials, press releases |
Governance & Management
Classification is incomplete without inventory.
&
Complete data inventory is extremely hard.
Milestone for initial inventory
Governance & Management
This only covered the data that we already have.�{we’ll come back to this slide in a moment}
Name | Purpose | Internal / External | Storage Type | Storage Name | Classification | Structured / Unstructured | Retention Period | Owner |
Data Subject Access Requests (DSAR) Tools
Governance & Management
Milestone for initial inventory
Governance & Management
This only covered the data that we already have.
Name | Purpose | Internal / External | Storage Type | Storage Name | Classification | Structured / Unstructured | Retention Period | Owner |
Privacy Impact Assessments
Partnerships
Legal team is your best friend. :)
Privacy & Security Review Procedure
Partnerships
Product
Engineering
Legal, Privacy, Security
Shifting Privacy Left & Right
Tools
Embed privacy tools as part of SDLC
Automated Data Classification & Labeling
Data Governance
Privacy Threat Modeling - Data Oriented
Security & Awareness
Minimize - Limit collection of personal data.
Abstract - Limit processing of personal data.
Separate - Separate the processing of personal data.
Hide - Protect personal data, or make it unlinkable or unobservable.
Source - Privacy Design Strategies
Privacy Threat Modeling - Process Oriented
Security & Awareness
Inform - Inform members about processing.
Control - Provide members control over the processing of their data.
Enforce - Enforce processing personal data in a privacy-friendly manner.
Demonstrate - Demonstrate processing personal data in a privacy friendly way manner.
Source - Privacy Design Strategies
Privacy Awareness
Security & Awareness
Summary
Security enables Privacy.
#putmembersfirst
Building world’s most trusted mental health organization.
Resources