Privacy by Design is to include functionality and options that allow customers to configure many privacy-related controls, such as logging, log retention and secure personally identifiable information.
In Oracle FLEXCUBE Investor servicing privacy by design is achieved by the following features:
This chapter contains the following sections:
This section contains the following topics:
Multi Factor Authentication (MFA) is a method of confirming user access after multiple level of user access validation.
Oracle FLEXCUBE Investor Servicing provides framework to enable Multi Factor Authentication (MFA) using third part MFA provider. MFA can be enabled at user level. If MFA is applicable for a user, user will be allowed to login only after successful additional authentication implemented using MFA.
Oracle FLEXCUBE Investor Servicing is not shipped with any inbuilt third party MFA. IMFAAuthenticatePassword interface needs to be extended to implement MFA validation.
In Oracle FLEXCUBE Investor Servicing framework support is provided to implement any third party MFA provider.
Steps to implement third party MFA authentication
Following are the steps to implement third party MFA authentication:
MFA Login will be considered as successful if “msgStatus” tag value is “SUCCESS”.
You can capture MFA applicability and MFA ID for a user using ‘User Maintenance’ screen. If MFA applicable is selected as ‘Yes’, then MFA ID is mandatory.
MFA ID should be unique. You can map one MFA ID to one user in the system. Closed user will also be considered for unique MFA ID validation. MFA ID is an amendable field.
If user is enabled for Multi Factor Authentication (MFA), after successful application user authentication, user will be prompted to input multi factor PIN of user’s MFA ID
The system will validate MFA PIN for the MFA ID using implemented MFA class. After successful authentication using MFA, system will log in to the application. If user is MFA authenticated, system will show the MFA authentication status in the home page.You can provide multi factor pin to authenticate.
On successful authentication, the system will log in to the application.
This section contains the following topics:
Pseudonymization is a procedure by which personally identifiable information within a data set is replaced by one or more artificial identifiers during view.
User maintenance screen is enhanced to allow /dis-allow user to view PII data. If View PII is maintained as “No”, you will be restricted to map only PIIVIEWROLE, PIIVIEWROLE_PAS roles.
You cannot modify factory shipped PIIVIEWROLE, PIIVIEWROLE_PA to add other function IDs or other actions. There will not be any validation for amending these roles.
Personal Identifiable Information screen will be used to maintain Pseudonymization table column mapping as needed. This maintenance allows enabling table column to be anonymized.
You can invoke ‘PII Access Policy Maintenance’ screen by typing UTDPIIMT’ in UT Module and PADPIIMT in Pension Administration module in the field at the top right corner of the Application tool bar and clicking on the adjoining arrow button.
Select ‘Enter Query’ from the Actions menu in the Application tool bar to query the required details. Only view and modify operation are supported in the screen.
You can specify the following details:
Personal Information Type
Alphanumeric; 200 Characters; Mandatory
Specify the personal information type to be restricted. Alternatively, you can select personal information type from the option list. The list displays all valid personal information type maintained in the system.
Activity
Mandatory
Select the activity status from the drop-down list. The list displays the following values:
After specifying personal information type and Activity, click ‘Execute Query’ option. The system displays the following values pertaining to the personal information type details:
You can edit the above values by clicking ‘Unlock option.
Personal Information Type
Display
The system displays the personal information type details provided before executing the query.
Default Status to
Optional
Select the status that needs to be defaulted from the drop-down list. The list displays the following values:
If you select ‘Yes’ then the system resets ‘Applicable’ field to Yes for all the records. Same is the case if you select ‘No’.
Table Name
Display
The system displays the table name based on the ‘Personal Information Type’ value selected.
Column Name
Display
The system displays the column name based on the ‘Personal Information Type’ value selected.
Data Type
Display
The system displays the data type based on the ‘Personal Information Type’ value selected.
Applicable
Mandatory
The system default the status based on the ‘Default Status to’ value selected. However, you can amend this value by selecting ‘Yes’ or ‘No’ from the from the drop-down list.
For Pseudonymization, if you select ‘Applicable’ field as ‘Yes’, then system will mask data as the format maintained. Else, the system will not mask the data.
For Anonymization, if you select ‘Applicable’ field as ‘Yes’, the system will update data with hashed value. Else, the system will not update the data.
Anonymization Where Clause
Display
The system displays the Anonymization where clause for the table column.
Note
Anonymization where clause is applicable only for Anonymization batch.
After providing the necessary details, click ‘Save’ option. If Pseudonymization Applicable field is changed, then the system will mark the same for regeneration of policy.
Note
You can add or modify the service provider related table masking only in default FMG as maintained. All the Redact related details will be factory shipped. For any new maintenance the predefined data needs to be maintained operationally.
The factory shipped data will show only first 3 characters and rest will be masked for the remaining length of the data. The system will mask the data whose length is less than 3.
Note the following:
This section contains the following topics:
You can start the Pseudonymization process using ‘PII Data Masking Batch’ screen. You can invoke this screen by typing ‘UTDPIIBT’ from FMG module or ‘PADPIIBT’ from Pension module in the field at the top right corner of the Application tool bar and clicking on the adjoining arrow button.
Select ‘Pseudonymization; option from ‘Activity’ field. Click ‘Process’..
You can specify the following details:
Activity
Mandatory
Select the activity from the drop-down list. The list displays the following values:
Click ‘Process’ button to process the batch.
To process Pseudonymization policy creation, select ‘Pseudonymization’ in ‘Activity’ field and click ‘Process’ button. The system submits the job to create/alter redact policy for which changes are done.
To view the status of the Pseudonymization process, specify Keystring details and click ‘View ‘Activity Status’. The system displays the following values:
To process Anonymization, select Anonymization’ in ‘Activity’ field and click ‘Process’ button.
Once the batch is processed, you can view the activity status.To view the status of the Anonymization process, click ‘View ‘Activity Status’ button.
Process Reference Number
Alphanumeric; 50 Characters; Optional
The system displays the process reference number to query the status. However you can amend this value by selecting the values from the option list. The list displays all valid key string maintained in the system.
Anonymization Status
Optional
Select the anonymization status from the drop-down list. The list displays the following values:
Current Process Status
Optional
Select the current status from the drop-down list. The list displays the following values:
After specifying the necessary details, click ‘View Activity Status’ button. The system displays the following values:
Once all the Anonymization static data is verified you can start the process.
Once the process is running you cannot run another process. If you click ‘Process’ button while Anonymization job is running, the system will display an error message. For failed Anonymization process, you can restart the same after correcting the necessary data process.
On abort, you should update the status to restart.
If the job is completed with an error, and then you click ‘Process’ button, the system restarts the masking process for the failed tables.
You can mask the data by giving Seed value in ‘SEEDDATA’ Param code in ‘Parameter Setup Detail’ screen. This can be changed before each process of Anonymization i.e. one seed data for one complete process for all fund managers.
All the policy related Pseudonymization and row level security should be disabled or dropped.
This section contains the following topics:
Anonymization process is either encrypting or partially removing personally identifiable information permanently in the database. Anonymization used when moving database from production server to other environment.
Personal Identifiable Information screen is used to edit Anonymization table column mapping.
This maintenance allows enabling table column applicable for implementing Anonymization. Application user cannot add any data in the screen.
User can invoke ‘PII Access Policy Maintenance’ screen by typing UTDPIIMT’ in UT Module and PADPIIMT in Pension Administration module in the field at the top right corner of the Application tool bar and clicking on the adjoining arrow button.
Select ‘Enter Query’ from the Actions menu in the Application tool bar to query the required details. Only View and Modify operations are supported in the screen. User will not be allowed to add additional details through screen..
For further details on this screen, refer ‘Pseudonymization Personal Information Maintenance’ section in this user manual.
This section contains the following topics:
Anonymization Personal Information Batch is to permanently anonymize PII data after execution of this batch. For every execution one batch number will be generated. Batch number is used to view the activity status.
User can start the Anonymization process using ‘PII Data Masking Batch’ screen. You can invoke this screen by typing ‘UTDPIIBT’ in UT Module and PADPIIBT in Pension Administration module in the field at the top right corner of the Application tool bar and clicking on the adjoining arrow button.
Select “Anonymization” activity and click on process to initiate anonymization.
You can click View Activity Status button to view the list of activities in each status by selecting current status and batch number..
For further details, refer ‘Pseudonymization personal information Batch’ section in this user manual.
This section contains the following topics:
Transparent Data Encryption (TDE) enables to encrypt sensitive data, such as Personally Identifiable Information stored in tables and tablespaces.
After the data is encrypted, this data is transparently decrypted for authorized users or applications when they access this data. TDE helps protect data stored on media (also called data at rest) in the event that the storage media or data file is stolen
Oracle Database uses authentication, authorization, and auditing mechanisms to secure data in the database, but not in the operating system data files where data is stored. To protect these data files, Oracle Database provides Transparent Data Encryption (TDE). TDE encrypts sensitive data stored in data files. To prevent unauthorized decryption, TDE stores the encryption keys in a security module external to the database, called a keystore.
Enabling TDE for a database is explained in Installation manual database.pdf
This section contains the following topics:
Customer options for providing consent on data usage and sharing at point and time where the end-user data is collected.
Consent Maintenance screen allows to capture consent/opt-in for service offering. Also for customer to configure list of data captured, stored, shared and for what business purpose. It also allows customer to opt-out of the service provided or accept and opt-out request from the process.
If consent is provided for the same purpose, existing consent details will be overridden. Only new consent details for the same purpose will be stored in the system. History of consent details available only in audit logs.
You can capture the consent details using ‘Consent Maintenance Detail’ screen. You can invoke this screen by typing ‘UTDCONMT’ from agency branch module or ‘PADCONMT’ from Pension Module in the field at the top right corner of the Application tool bar and clicking on the adjoining arrow button..
You can specify the following details:
Consent Entity Type
Alphanumeric; 1 Character; Mandatory
Specify the consent entity type. Alternatively, you can select consent entity type from adjoining option list. The list displays all valid consent entity type maintained in CONSENTENTITY Param code.
Description
Display
The system displays the description for the selected consent entity type.
Consent Entity ID
Alphanumeric; 12 Characters; Mandatory
Specify the consent entity ID. Alternatively, you can select consent entity ID from adjoining option list. The list displays all valid consent entity ID maintained in the system.
If you select ‘U - Unit Holder ID’ in ‘Consent Entity Type field, then ‘Find UH’ button will return unit holder details. If you select ‘P - PAS Party ID’, then ‘Find UH’ is not applicable.
Consent purpose cannot be deleted but can be withdrawn.
Consent Purpose
Alphanumeric; 100 Characters; Mandatory
Specify the purpose of consent. Alternatively, you can select consent purpose from adjoining option list. The list displays all valid consent purpose maintained in the CONSENTPURS param code.
Consent Details
Alphanumeric; 255 Characters; Optional
Specify the details of the consent.
Status
Optional
Select the status of consent from the drop-down list. The list displays the following values:
Submitted Date
Date Format; Mandatory
Select the date on when the consent request is received from the adjoining calendar.
Valid From Date
Date Format; Mandatory
Select the validity period from the adjoining calendar.
This field is applicable only if you have selected ‘Status’ field as ‘Active’.
Valid Till Date
Date Format; Mandatory
Select the validity period from the adjoining calendar.
This field is applicable only if you have selected ‘Status’ field as ‘Active’.
Withdrawal Date
Date Format; Optional
Select the date of withdrawal from the adjoining calendar.
This field is applicable only if you have selected ‘Status’ field as ‘Withdraw’. Record modified date will be considered as Withdraw date.
This section contains the following topics:
You can retrieve a previously entered record in the Summary Screen, as follows:
Invoke the ‘Consent Maintenance Summary’ screen by typing ‘UTSCONMT’ in the field at the top right corner of the Application tool bar and clicking on the adjoining arrow button and specify any or all of the following details in the corresponding details.
Click ‘Search’ button to view the records. All the records with the specified details are retrieved and displayed in the lower portion of the screen.
Note
You can also retrieve the individual record detail from the detail screen by querying in the following manner:
You can perform Edit, Amend, Authorize, operations by selecting the operation from the Action list. You can also search a record by using a combination of % and alphanumeric value
This section contains the following topics:
Data minimization is the process of deleting the data on expiry of the holding period.
Purge/Archival process can be used to minimize the data set.
You can specify Purge/Archival process at functionality level or at table level.
You can specify the table and the set of records to be deleted by maintaining valid join conditions among the tables.
Data minimization can also be scheduled to run on specific time intervals.
For further details, refer ‘Purge Frequency Maintenance’ section in ‘Admin’ user manual.
This section contains the following topics:
Customers may be required to provide end-users with copies of their data in a structured, commonly used electronically readable format. Support a configuration that lets customers enable their end-users to perform the export themselves or provide means for end-users to request that customer perform it.
User can export or import data set with Data Interface maintenance.
User can specify the set of tables, columns that need to be exported or imported.
User can also specify the format in which export/import file need to be generated.
For further details, refer ‘Setting up and Maintaining Interfaces’ section in ‘Interface’ user manual.
This section contains the following topics:
Application users are classified to allow/disallow to access sensitive information. Customers will be classified as protected and unprotected.
Users with full access are allowed to see all customers. Users with limited access are allowed to view unprotected customer.
For further details, refer ‘Row Level Security Maintenance’ section in ‘Security’ user manual.
For further details, refer ‘Invoking Customer Maintenance Detail Screen’ section in ‘Entities’ user manual.
Role based access to the User with appropriate module will be able to perform his duties.
With grouping of Function ids into roles users can be mapped to particular roles as per their requirements. Also user’s access across module to specific function ID can be restricted.
For further details, refer ‘Ensuring Security for Fund Manager’ and ‘Ensuring Security for Agency Branch’ section in ‘Security’ user manual.
This section contains the following topics:
FCIS supports storing PII data accessed by the business user. The data access audit log covers the following data
For further details, refer Personal Data Protection Act document.
FCIS supports logging data captured or modified by the business user. The audit log stores the user name, data captured date time and the captured data for audit purposes.
Application logs can be enabled at application level to identify any failures. By default, application logs are disabled. Administrators or support team only can enable application logs.
You should take backup of all database related files such as, data files, control files, redologs, archived files, init.ora, config.ora etc periodically to reduce the data loss.
Securing Backup
Security Guide provides detailed information on securing database, Backup controls and securing database backups.