• Skip to primary navigation
  • Skip to main content
  • Skip to footer
ControlCase No Tag LOGO md

ControlCase

IT Certifications, Continuous Compliance and Cybersecurity Services Provider

  • Company
    • About Us
    • Careers
    • Locations
    • Team
  • Industries
    • Business Process Outsourcing
    • Cloud Service Providers
    • Retail
    • Telecom | Entertainment
    • Managed Service Providers
  • Certifications
    • PCI DSS Certification
    • CSA STAR Certification
    • GDPR Assessment
    • HIPAA Assessment
    • HITRUST Certification
    • ISO 27001 Certification
    • FedRAMP 3PAO Services and NIST 800-53
    • CMMC Certification
    • MARS-E Assessment
    • PCI SSF
    • P2PE Certification
    • SOC2 Report
  • Solutions
    • Continuous Compliance Solution
    • One Audit
    • Card Data Discovery Software
    • Data Security Rating
  • Testing
    • Application Reviews
    • Application Security Training
    • Code Reviews
    • Card Data Discovery
    • External Vulnerability Scans
    • Firewall Security Reviews
    • Internal Vulnerability Scans
    • Log Monitoring
    • Penetration Testing
  • Resources
    • Events
    • News
    • Webinars
    • Courses
    • Blog
    • Tools
    • Become a Partner
  • Contact Us
  • English

HIPAA, CCPA, and GDPR: Privacy or Information Security?

You are here: Home / Blog / HIPAA, CCPA, and GDPR: Privacy or Information Security?

Many interdependencies exist between the security and privacy-related tasks demanded by compliance frameworks such as HIPAA, CCPA, and GDPR. The business implication is that enterprise security and privacy teams need to work together. Commercial platforms must also support this coordination – and the ControlCase solution is offered as a case study.

Introduction

Modern enterprise security teams must address many different types of requirements as they create their cyber defenses. These requirements can be internally generated, customer requested, legally defined, mandated by a court, or driven by an incident. They typically involve adding new protections such as cyber security platforms or increasing assurance such as through penetration testing.

Security teams must also address the best practices included in the various frameworks that have emerged during the past decade. In addition to security frameworks such as NIST Cyber Security Framework (SF), they must also deal with privacy frameworks such as the Health Insurance Portability and Accountability Act (HIPAA), California Consumer Protection Act (CCPA), and the General Data Protection Regulation (GDPR).

In this report, we review the differences between security and privacy frameworks, and how they are used by security and privacy teams. Data loss is shown to be vulnerable to several attack cases, and that both security and privacy teams are required to work together to prevent all bad outcomes. Specifically, without attention to both security and privacy concerns, it is unlikely that any complex organization will be able to ensure proper control of data.

WhitePaper: HIPAA, CCPA, and GDPR: Privacy or Information Security?
Download Now

Security Frameworks

To begin – let’s recognize that sensitive data can be leaked in three different ways: It can be leaked accidentally, such as an email sent unintentionally to the wrong recipient; it can be leaked intentionally, such as by a compromised insider; or it can be leaked as a result of bad policy, where the data is shared inappropriately as part of some business practice. Security frameworks address the first of these two cases.

Security Coverage of Data LeakageFigure 1. Security Coverage of Data Leakage

The two main cases in which data is accidentally leaked by an insider and data is intentionally leaked or stolen by a malicious actor are specifically addressed by security teams. The typical types of controls used include data leakage prevention (DLP) systems, user behavior analytics (UBA) tools, and various types of encryption. These tools work reasonably well, but security teams continue to try to improve their coverage and accuracy.

It is especially interesting to see, however, that security teams cannot and do not address the use case where businesses improperly leak data due to weak or poorly conceived business practices. That is, if product or service teams decide that it’s perfectly fine to sell customer data to a third party (a fact often hidden in the fine print of terms and conditions documents), then this is technically not a security issue. Customer might not like it – but this is not a breach.

Privacy Frameworks, Policies, and Platforms

Privacy frameworks have thus been developed to help define an organization’s intentional business practices regarding data handling. They complement security systems by helping an organization make good decisions about how to empower customers to take control of their data, and to support the rights and privileges of data owners. These decisions must take into account customer preferences, local laws, and technological feasibility.

In the best case, the implementation of security and privacy controls – driven by their respective frameworks – will be set up to coordinate and cooperate functionally. Both security and privacy control systems should, for example, generate audit log evidence of effectiveness so that auditors or assessors can gain confidence that things are working properly. Figure 2 shows how these controls might complete the data protection picture.

Privacy Coverage of Data LeakageFigure 2. Privacy Coverage of Data Leakage

The most popular and often-cited privacy frameworks are the General Data Protection Regulation (GDPR), the Health Insurance Portability and Accountability Act (HIPAA), and the California Consumer Privacy Act (CCPA). While many differences apply, all three frameworks are intended to protect the rights of users to control and manage their data. Unlike security frameworks, however, they focus on business practices rather than stopping hackers.

Comparing GDPR, HIPAA, and CCPAFigure 3. Comparing GDPR, HIPAA, and CCPA

The key issue here is that business practices can only control the management of data if the underlying mechanisms are in fact secure. If there are hacked data leaks to patient data, for example, then any business pledge to satisfy HIPAA cannot be made. In the next section, we outline this important interdependency, and we provide a roadmap for enterprise security and privacy teams to coordinate on a common set of objectives.

Coordination Between Security and Privacy

To learn more about the Coordination between Security and Privacy, and to receive our free 3-Step action plan for Enterprise, please download our whitepaper.

WhitePaper: HIPAA, CCPA, and GDPR: Privacy or Information Security?
Download Now

 

About TAG Cyber

TAG Cyber is a trusted cyber security research analyst firm, providing unbiased industry insights and recommendations to security solution providers and Fortune 100 enterprises. Founded in 2016 by Dr. Edward Amoroso, former SVP/CSO of AT&T, the company bucks the trend of pay-for-play research by offering in-depth research, market analysis, consulting, and personalized content based on hundreds of engagements with clients and non-clients alike—all from a former practitioner perspective.

Copyright © 2021 TAG Cyber LLC. This report may not be reproduced, distributed, or shared without TAG Cyber’s written permission. The material in this report is comprised of the opinions of the TAG Cyber analysts and is not to be interpreted as consisting of factual assertions. All warranties regarding the correctness, usefulness, accuracy, or completeness of this report are disclaimed herein.

Prepared by Dr. Edward G. Amoroso
Chief Executive Officer, TAG Cyber LLC
Research Professor NYU Center for Cyber Security (CCS)
eamoroso@tag-cyber.com

 

Contact our team today to get started

Related Blog

CCPA vs. GDPR
Importance of building a culture of security and compliance within your organization
How ControlCase’s “OneAudit” and “Continuous Compliance” Solutions Support Clients

About Us

ControlCase is a global provider of certification, cybersecurity, and continuous compliance services. ControlCase is committed to empowering organizations to develop and deploy strategic information security and compliance programs that are simplified, cost-effective, and comprehensive in both on-premise and cloud environments.
ControlCase offers certifications and a broad spectrum of cyber security services that meet the needs of companies required to certify to PCI DSS, HITRUST, SOC2, CMMC, ISO 27001, PCI PIN, PCI P2PE, PCI TSP, PCI SSF, CSA STAR, HIPAA, GDPR, SWIFT, and FedRAMP.

  • Facebook
  • LinkedIn
  • Twitter
  • YouTube

Footer

Connect

Corporate Headquarters
3975 FAIR RIDGE DR STE T25S-D
FAIRFAX, VA 22033

Send us a message

Call Us

Search

About Us

ControlCase is a United States based company, headquartered in Fairfax, Virginia with locations in North America, Europe, Latin America, Asia/Pacific, Australia and the Middle East to serve our clients globally.

Quick Links

  • Company
  • Careers
  • Locations
  • Covid-19 Notice

Certifications, Assessments and Reports

  • PCI DSS Certification
  • CSA STAR Certification
  • GDPR Assessment
  • HIPAA Assessment
  • HITRUST Certification
  • ISO 27001 Certification
  • FedRAMP and 3PAO Services
  • MARS-E Assessment
  • PCI SSF
  • P2PE Certification
  • SOC2 Report

© ControlCase LLC 2025 | Privacy Policy | Impartiality Statement | Legal Notices

  • English
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}