SlideShare a Scribd company logo
1 of 28
Download to read offline
Underwritten by:
#AIIMYour Digital Transformation Begins with
Intelligent Information Management
Data Privacy for the IM Practitioner:
Practical Advice for
Preparedness and Prevention
Presented February 26, 2020
Note – the art of this
cover slide will change.
Data Privacy for the IM Practitioner:
Practical Advice for Preparedness and Prevention
An AIIM Webinar presented February 26, 2020
Underwritten by:
Today’s Speakers
Kevin Craine
Content Strategist, AIIM
Host of AIIM On Air
John Montaña, J.D., FIIM, FAI
VP, Information Governance at Access
CEO, Montaña & Associates an Access Company
Host: Theresa Resek, CIP
VP, Market Intelligence
AIIM
Underwritten by:
Kevin Craine
Content Strategist, AIIM
Host of AIIM On Air
Introducing our Speaker
Underwritten by:
Driving Demand for Data Privacy
• Data privacy is on the mind of
C-Suite leaders in all industries.
• No organization is safe from
potential cyber theft and intrusion.
• In 2019, 2.7 billion identity records
were exposed by hackers and
placed for sale on the internet.
• Legislation worldwide has become
increasingly strict.
• Expectations are ever-evolving.
• Perception is everything in the eyes
of the market.
Underwritten by:
Underwritten by:
Volume, Velocity, and Variety
• Organizations anticipate the volume of information
will grow from X to 4.5X in the coming year.
• Over 60% of that information sprawl is
unstructured.
• Organizations are embracing technologies and
approaches that automate governance and
compliance.
• According to AIIM research, 51% of organizations
say that they are planning to spend “more” or “a
lot more” on information governance over the next
18-24 months.
Underwritten by:
Inevitable and Costly
• Experts tell us that the question is
not IF it will happen, but WHEN.
• The chances of being struck by
lightning = one in a million.
• The chances of organizations getting
hacked this year = one in four.
• The average total cost of a single
data breach is estimated at nearly $4
million.
• That calculation can certainly be
much higher – legal expense, fines,
and penalties; the loss of goodwill in
the market.
Underwritten by:
Recommendations
Implement a formal approach.
Have a plan and stick to it.
Regularly (annually) review, evaluate, and update your plan as
needed.
Place the privacy and security of information on the front burner of
strategic concerns.
Underwritten by:
John Montaña, J.D., FIIM, FAI
VP, Information Governance at Access
CEO, Montaña & Associates an Access Company
Introducing our Speaker
Underwritten by:
You say that Legislators
don't understand how
large companies work.
What do you mean by
that?
Underwritten by:
Legislation is Created in a Silo
Just knowing
what’s there – it’s
a lot of law, in a
lot of places
Outright conflicts – minimum
retention requirements versus
maximum permissible retention
Interpreting
dated or
vague laws
IT configuration – how to
make it all work in a big IT
environment
Administrative complexity – how
to manage dozens or hundreds of
unique requirements
Underwritten by:
What are some of the
considerations that IIM
pros must deal with that
legislators miss in the mix?
Underwritten by:
Considerations for Applying Privacy Legislation
Applying Legislation to Today… Taking into Account Yesterday…
Legislation was written without consideration for:
• Back file of old IT systems and physical boxes of records
• Most IT systems available when the laws were written are not capable of applying
law
• Even if capable, they are often not configured in a manner that supports being
compliant
• Non-compliant implementations are difficult to undo
Underwritten by:
Let’s talk about specific steps
to build an effective privacy
plan. You say it’s important
to start with a thorough
understanding of the current
capabilities within the
enterprise. Isn’t that just
more “analysis paralysis?”
Underwritten by:
Utilize Project Management Principles
1 2 3
4 5
Develop a clearly written
initial project scope /
charter / documentation
Develop a high-level project
roadmap / framework
• What industry / data types you are trying to
apply “privacy” to
• What is the information life-cycle for PII / SI?
• Establish a timeline with realistic milestones
• Regularly adjust / incorporate PIA findings
Clearly establish roles /
responsibilities – decision
rights
• Chief Privacy Officer (CPO) / Data
Protection Officer (DPO)
• Privacy Office (PO)
Develop a communication /
marketing plan
Prepare a budget
Underwritten by:
Now that I’ve surveyed
the technical
environment...
what’s next?
What are some steps
to build a meaningful
project plan?
Underwritten by:
Building the Privacy Program
Core Components Review
Create inventory
of Personal
Information Banks
(PIBs)
Develop staff
education and
awareness training and
collateral and
Communication plan
Post Privacy Policy and
Principles on the
organization’s website
Develop Privacy Notice
signage and arrange
for posting in relevant
areas (such as those
with video capture)
Actually apply the
retention schedule and
purge data that is not
needed
Do not collect
unnecessary data
that is not required
or contains PII
Underwritten by:
Once I have a plan, I’ve
got to sell it...not only to
company executives, but
also other stakeholders
(regulatory boards). Can
you outline some success
tips for gaining support
and buy-in?
Underwritten by:
Building Relationships with Stakeholders
Stakeholders are - ALL Staff / Third Parties / Customers that contribute, come in contact with or are affected by PII / SI
• Customers
• Shareholders
• Steering CommitteeAssurance Groups – Legal, Audit,
Compliance, Risk HR
Operations – Sales, Marketing, R&D,
Field Workers etc.
Chief Privacy Officer (CPO) / Data Protection Officer (DPO) Third-Parties / Contractors
Regulatory Agencies
Privacy Office (PO)
Board of Directors / Executive Team
IT
Underwritten by:
What about getting
front-line workers
onboard to adapt and
use new and changed
systems and policies?
Underwritten by:
Privacy Training
Appropriately Train ALL staff
and Third-Parties
Types of training
Do not overcomplicate
Market your privacy program
• Train the trainer
• Executives are not exempt
• CBT
• Live / In-person
• Manuals / Guides
• Workshops
• Keep language simple/ keep
cultural differences in mind
• Recognize top performers
Frequency of the training
• Annual
• New Hire
• Incident Based
• Third party / Contractor
Test the Privacy Incident
Response Plan
• Send out mock phishing emails
• Where is more training needed
• Log results – training & testing
Everyone who belongs to, or works with, an organization is responsible to
protect the PII / SI of the company and associated stakeholders!
Underwritten by:
One thing that is certain,
the rate of change is not
going to slow down. How
can we design our privacy
programs so that they will
be flexible and adapt to
changes in regulations,
technologies and market
expectations?
Underwritten by:
ChangeLegislation
Preparing for the Only Constant: Change
Underwritten by:
How Organizations Can Successfully Move Forward
Level Set
Expectations
Understand Current
Capabilities
Make Your Case
Change Is Your Only
Constant
25 | Copyright © 2020 Access - Confidential
26 | Copyright © 2020 Access - Confidential
AccessCorp.com
877-345-3546
John Montaña
Vice President, Information Governance
john.montana@montana-associates.com
Underwritten by:
#AIIMYour Digital Transformation Begins with
Intelligent Information ManagementYour Digital Transformation begins with
Intelligent Information Management

More Related Content

What's hot

Digital Transformation: Moving Beyond Enterprise Content Management to Conten...
Digital Transformation: Moving Beyond Enterprise Content Management to Conten...Digital Transformation: Moving Beyond Enterprise Content Management to Conten...
Digital Transformation: Moving Beyond Enterprise Content Management to Conten...Zia Consulting
 
Roy Atkinson - Closing keynote
Roy Atkinson - Closing keynote Roy Atkinson - Closing keynote
Roy Atkinson - Closing keynote itSMF UK
 
What You Don't Know about Document Management, But Should - M-Files
What You Don't Know about Document Management, But Should - M-FilesWhat You Don't Know about Document Management, But Should - M-Files
What You Don't Know about Document Management, But Should - M-FilesMarcoTechnologies
 
How to get a HR system in place fast.
How to get a HR system in place fast.How to get a HR system in place fast.
How to get a HR system in place fast.CoreHR
 
Human Centred Business Transformation
Human Centred Business TransformationHuman Centred Business Transformation
Human Centred Business TransformationThoughtworks
 
TRU Snacks Webinar Series - Effective Technology for Managing a Remote Workforce
TRU Snacks Webinar Series - Effective Technology for Managing a Remote WorkforceTRU Snacks Webinar Series - Effective Technology for Managing a Remote Workforce
TRU Snacks Webinar Series - Effective Technology for Managing a Remote WorkforceCitrin Cooperman
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...CloudIDSummit
 
How To Choose The Right HR Software - 7 Steps To Success
How To Choose The Right HR Software - 7 Steps To SuccessHow To Choose The Right HR Software - 7 Steps To Success
How To Choose The Right HR Software - 7 Steps To SuccessCoreHR
 
Looking Ahead: Predictions for 2016 and Beyond
Looking Ahead: Predictions for 2016 and BeyondLooking Ahead: Predictions for 2016 and Beyond
Looking Ahead: Predictions for 2016 and BeyondRES
 
Creating an IT Revolution within your Organization - QuickBase, Inc. at CIO V...
Creating an IT Revolution within your Organization - QuickBase, Inc. at CIO V...Creating an IT Revolution within your Organization - QuickBase, Inc. at CIO V...
Creating an IT Revolution within your Organization - QuickBase, Inc. at CIO V...QuickBase, Inc.
 
Your Business Documents On Steroids
Your Business Documents On SteroidsYour Business Documents On Steroids
Your Business Documents On SteroidsAIIM International
 
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?centralohioissa
 
Flexible and Secure Workspaces for the Modern Enterprise
Flexible and Secure Workspaces for the Modern EnterpriseFlexible and Secure Workspaces for the Modern Enterprise
Flexible and Secure Workspaces for the Modern EnterpriseRES
 
Kiriworks - Driving Digital Healthcare Payer Transformation
Kiriworks - Driving Digital Healthcare Payer Transformation Kiriworks - Driving Digital Healthcare Payer Transformation
Kiriworks - Driving Digital Healthcare Payer Transformation Patrick Goetz
 
Inbound Marketing is the Answer - Leighton Interactive
Inbound Marketing is the Answer - Leighton InteractiveInbound Marketing is the Answer - Leighton Interactive
Inbound Marketing is the Answer - Leighton InteractiveMarcoTechnologies
 
Eliminate Data Entry with Document Scanning, Data Capture and Extraction - PS...
Eliminate Data Entry with Document Scanning, Data Capture and Extraction - PS...Eliminate Data Entry with Document Scanning, Data Capture and Extraction - PS...
Eliminate Data Entry with Document Scanning, Data Capture and Extraction - PS...MarcoTechnologies
 
De-Siloing Project Coordination: Why You Need to Prioritize The Employee Expe...
De-Siloing Project Coordination: Why You Need to Prioritize The Employee Expe...De-Siloing Project Coordination: Why You Need to Prioritize The Employee Expe...
De-Siloing Project Coordination: Why You Need to Prioritize The Employee Expe...Aggregage
 
William Diederich - Security Certifications: Are They Worth the Investment? A...
William Diederich - Security Certifications: Are They Worth the Investment? A...William Diederich - Security Certifications: Are They Worth the Investment? A...
William Diederich - Security Certifications: Are They Worth the Investment? A...centralohioissa
 

What's hot (20)

Digital Transformation: Moving Beyond Enterprise Content Management to Conten...
Digital Transformation: Moving Beyond Enterprise Content Management to Conten...Digital Transformation: Moving Beyond Enterprise Content Management to Conten...
Digital Transformation: Moving Beyond Enterprise Content Management to Conten...
 
Roy Atkinson - Closing keynote
Roy Atkinson - Closing keynote Roy Atkinson - Closing keynote
Roy Atkinson - Closing keynote
 
What You Don't Know about Document Management, But Should - M-Files
What You Don't Know about Document Management, But Should - M-FilesWhat You Don't Know about Document Management, But Should - M-Files
What You Don't Know about Document Management, But Should - M-Files
 
How to get a HR system in place fast.
How to get a HR system in place fast.How to get a HR system in place fast.
How to get a HR system in place fast.
 
Human Centred Business Transformation
Human Centred Business TransformationHuman Centred Business Transformation
Human Centred Business Transformation
 
The Modern ERP Landscape
The Modern ERP LandscapeThe Modern ERP Landscape
The Modern ERP Landscape
 
TRU Snacks Webinar Series - Effective Technology for Managing a Remote Workforce
TRU Snacks Webinar Series - Effective Technology for Managing a Remote WorkforceTRU Snacks Webinar Series - Effective Technology for Managing a Remote Workforce
TRU Snacks Webinar Series - Effective Technology for Managing a Remote Workforce
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
How To Choose The Right HR Software - 7 Steps To Success
How To Choose The Right HR Software - 7 Steps To SuccessHow To Choose The Right HR Software - 7 Steps To Success
How To Choose The Right HR Software - 7 Steps To Success
 
Looking Ahead: Predictions for 2016 and Beyond
Looking Ahead: Predictions for 2016 and BeyondLooking Ahead: Predictions for 2016 and Beyond
Looking Ahead: Predictions for 2016 and Beyond
 
Creating an IT Revolution within your Organization - QuickBase, Inc. at CIO V...
Creating an IT Revolution within your Organization - QuickBase, Inc. at CIO V...Creating an IT Revolution within your Organization - QuickBase, Inc. at CIO V...
Creating an IT Revolution within your Organization - QuickBase, Inc. at CIO V...
 
Your Business Documents On Steroids
Your Business Documents On SteroidsYour Business Documents On Steroids
Your Business Documents On Steroids
 
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
 
Flexible and Secure Workspaces for the Modern Enterprise
Flexible and Secure Workspaces for the Modern EnterpriseFlexible and Secure Workspaces for the Modern Enterprise
Flexible and Secure Workspaces for the Modern Enterprise
 
Kiriworks - Driving Digital Healthcare Payer Transformation
Kiriworks - Driving Digital Healthcare Payer Transformation Kiriworks - Driving Digital Healthcare Payer Transformation
Kiriworks - Driving Digital Healthcare Payer Transformation
 
Inbound Marketing is the Answer - Leighton Interactive
Inbound Marketing is the Answer - Leighton InteractiveInbound Marketing is the Answer - Leighton Interactive
Inbound Marketing is the Answer - Leighton Interactive
 
Eliminate Data Entry with Document Scanning, Data Capture and Extraction - PS...
Eliminate Data Entry with Document Scanning, Data Capture and Extraction - PS...Eliminate Data Entry with Document Scanning, Data Capture and Extraction - PS...
Eliminate Data Entry with Document Scanning, Data Capture and Extraction - PS...
 
The Business Impact of IT
The Business Impact of ITThe Business Impact of IT
The Business Impact of IT
 
De-Siloing Project Coordination: Why You Need to Prioritize The Employee Expe...
De-Siloing Project Coordination: Why You Need to Prioritize The Employee Expe...De-Siloing Project Coordination: Why You Need to Prioritize The Employee Expe...
De-Siloing Project Coordination: Why You Need to Prioritize The Employee Expe...
 
William Diederich - Security Certifications: Are They Worth the Investment? A...
William Diederich - Security Certifications: Are They Worth the Investment? A...William Diederich - Security Certifications: Are They Worth the Investment? A...
William Diederich - Security Certifications: Are They Worth the Investment? A...
 

Similar to [Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for Preparedness and Prevention

Role of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseRole of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseCGTI
 
TrustArc-Webinar-Slides-2022-03-01-Is Your Privacy Program Ready for a Fundin...
TrustArc-Webinar-Slides-2022-03-01-Is Your Privacy Program Ready for a Fundin...TrustArc-Webinar-Slides-2022-03-01-Is Your Privacy Program Ready for a Fundin...
TrustArc-Webinar-Slides-2022-03-01-Is Your Privacy Program Ready for a Fundin...TrustArc
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach riskLivingstone Advisory
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessJoel Cardella
 
Automated Compliance: How to Create an IG Program that Manages Itself
Automated Compliance: How to Create an IG Program that Manages ItselfAutomated Compliance: How to Create an IG Program that Manages Itself
Automated Compliance: How to Create an IG Program that Manages ItselfJim Merrifield, IGP, CIP
 
Data protection: Steps Organisations can take to ensure compliance
Data protection: Steps Organisations can take to ensure complianceData protection: Steps Organisations can take to ensure compliance
Data protection: Steps Organisations can take to ensure complianceEquiGov Institute
 
Evolution of Records Management in Law Firms
Evolution of Records Management in Law FirmsEvolution of Records Management in Law Firms
Evolution of Records Management in Law FirmsJim Merrifield, IGP, CIP
 
The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)Kirsty Donovan
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsRobert 'Bob' Reyes
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach CostResilient Systems
 
Meeting the cyber risk challenge
Meeting the cyber risk challengeMeeting the cyber risk challenge
Meeting the cyber risk challengeFERMA
 
2019 06-19 convince customerspartnersboard gdpr-compliant
2019 06-19 convince customerspartnersboard gdpr-compliant2019 06-19 convince customerspartnersboard gdpr-compliant
2019 06-19 convince customerspartnersboard gdpr-compliantTrustArc
 
Standing Up A Holistic And World Class Information Governance Program
Standing Up A Holistic And World Class Information Governance ProgramStanding Up A Holistic And World Class Information Governance Program
Standing Up A Holistic And World Class Information Governance ProgramRafael Moscatel CRM, IGP
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurityIT Governance Ltd
 
Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...Livingstone Advisory
 
Falcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data PrivacyFalcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data PrivacyFalcon.io
 
Cost benefit analysis vs confidentiality
Cost benefit analysis vs confidentialityCost benefit analysis vs confidentiality
Cost benefit analysis vs confidentialityPrithvi Ghag
 
IT Risk assessment and Audit Planning
IT Risk assessment and Audit PlanningIT Risk assessment and Audit Planning
IT Risk assessment and Audit Planninggoreankush1
 

Similar to [Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for Preparedness and Prevention (20)

Role of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseRole of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve Howse
 
TrustArc-Webinar-Slides-2022-03-01-Is Your Privacy Program Ready for a Fundin...
TrustArc-Webinar-Slides-2022-03-01-Is Your Privacy Program Ready for a Fundin...TrustArc-Webinar-Slides-2022-03-01-Is Your Privacy Program Ready for a Fundin...
TrustArc-Webinar-Slides-2022-03-01-Is Your Privacy Program Ready for a Fundin...
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach risk
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
 
Automated Compliance: How to Create an IG Program that Manages Itself
Automated Compliance: How to Create an IG Program that Manages ItselfAutomated Compliance: How to Create an IG Program that Manages Itself
Automated Compliance: How to Create an IG Program that Manages Itself
 
Data protection: Steps Organisations can take to ensure compliance
Data protection: Steps Organisations can take to ensure complianceData protection: Steps Organisations can take to ensure compliance
Data protection: Steps Organisations can take to ensure compliance
 
Evolution of Records Management in Law Firms
Evolution of Records Management in Law FirmsEvolution of Records Management in Law Firms
Evolution of Records Management in Law Firms
 
The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act Brings
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
 
Co3 rsc r5
Co3 rsc r5Co3 rsc r5
Co3 rsc r5
 
Meeting the cyber risk challenge
Meeting the cyber risk challengeMeeting the cyber risk challenge
Meeting the cyber risk challenge
 
2019 06-19 convince customerspartnersboard gdpr-compliant
2019 06-19 convince customerspartnersboard gdpr-compliant2019 06-19 convince customerspartnersboard gdpr-compliant
2019 06-19 convince customerspartnersboard gdpr-compliant
 
Standing Up A Holistic And World Class Information Governance Program
Standing Up A Holistic And World Class Information Governance ProgramStanding Up A Holistic And World Class Information Governance Program
Standing Up A Holistic And World Class Information Governance Program
 
CGI Final
CGI FinalCGI Final
CGI Final
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurity
 
Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...
 
Falcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data PrivacyFalcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data Privacy
 
Cost benefit analysis vs confidentiality
Cost benefit analysis vs confidentialityCost benefit analysis vs confidentiality
Cost benefit analysis vs confidentiality
 
IT Risk assessment and Audit Planning
IT Risk assessment and Audit PlanningIT Risk assessment and Audit Planning
IT Risk assessment and Audit Planning
 

More from AIIM International

Create, Capture, Collaborate - Your Content Drives Organizational Value
Create, Capture, Collaborate - Your Content Drives Organizational ValueCreate, Capture, Collaborate - Your Content Drives Organizational Value
Create, Capture, Collaborate - Your Content Drives Organizational ValueAIIM International
 
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...Meet the Expert Panel - 2021 State of the Intelligent Information Management ...
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...AIIM International
 
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...AIIM International
 
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...AIIM International
 
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence ChannelsAIIM International
 
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...AIIM International
 
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...AIIM International
 
[Webinar Slides] Your 2019 Information Management Resolution: Part Two
[Webinar Slides] Your 2019 Information Management Resolution: Part Two[Webinar Slides] Your 2019 Information Management Resolution: Part Two
[Webinar Slides] Your 2019 Information Management Resolution: Part TwoAIIM International
 
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...AIIM International
 
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...AIIM International
 
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...AIIM International
 
[Webinar Slides] Modern Problems Require Modern Solutions
[Webinar Slides] Modern Problems Require Modern Solutions[Webinar Slides] Modern Problems Require Modern Solutions
[Webinar Slides] Modern Problems Require Modern SolutionsAIIM International
 
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...AIIM International
 
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...AIIM International
 
[AIIM18] Intelligent Information Management – Platinum Hit? Or Just Backgroun...
[AIIM18] Intelligent Information Management – Platinum Hit? Or Just Backgroun...[AIIM18] Intelligent Information Management – Platinum Hit? Or Just Backgroun...
[AIIM18] Intelligent Information Management – Platinum Hit? Or Just Backgroun...AIIM International
 
[AIIM18] Killing Multiple Privacy Birds With One Stone: Meeting both US and E...
[AIIM18] Killing Multiple Privacy Birds With One Stone: Meeting both US and E...[AIIM18] Killing Multiple Privacy Birds With One Stone: Meeting both US and E...
[AIIM18] Killing Multiple Privacy Birds With One Stone: Meeting both US and E...AIIM International
 
[AIIM18] A "Modern Records Management" Case Study: how the compliance departm...
[AIIM18] A "Modern Records Management" Case Study: how the compliance departm...[AIIM18] A "Modern Records Management" Case Study: how the compliance departm...
[AIIM18] A "Modern Records Management" Case Study: how the compliance departm...AIIM International
 
[AIIM18] Welcome to the Digital Age, North Carolina Courts: Our Document Auto...
[AIIM18] Welcome to the Digital Age, North Carolina Courts: Our Document Auto...[AIIM18] Welcome to the Digital Age, North Carolina Courts: Our Document Auto...
[AIIM18] Welcome to the Digital Age, North Carolina Courts: Our Document Auto...AIIM International
 
[AIIM18] When Billions are at Stake: an ECM mega project at Bradesco Bank - A...
[AIIM18] When Billions are at Stake: an ECM mega project at Bradesco Bank - A...[AIIM18] When Billions are at Stake: an ECM mega project at Bradesco Bank - A...
[AIIM18] When Billions are at Stake: an ECM mega project at Bradesco Bank - A...AIIM International
 

More from AIIM International (20)

2022 IIM Infographic.pptx
2022 IIM Infographic.pptx2022 IIM Infographic.pptx
2022 IIM Infographic.pptx
 
Create, Capture, Collaborate - Your Content Drives Organizational Value
Create, Capture, Collaborate - Your Content Drives Organizational ValueCreate, Capture, Collaborate - Your Content Drives Organizational Value
Create, Capture, Collaborate - Your Content Drives Organizational Value
 
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...Meet the Expert Panel - 2021 State of the Intelligent Information Management ...
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...
 
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...
 
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...
 
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels
 
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...
 
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...
 
[Webinar Slides] Your 2019 Information Management Resolution: Part Two
[Webinar Slides] Your 2019 Information Management Resolution: Part Two[Webinar Slides] Your 2019 Information Management Resolution: Part Two
[Webinar Slides] Your 2019 Information Management Resolution: Part Two
 
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
 
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...
 
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...
 
[Webinar Slides] Modern Problems Require Modern Solutions
[Webinar Slides] Modern Problems Require Modern Solutions[Webinar Slides] Modern Problems Require Modern Solutions
[Webinar Slides] Modern Problems Require Modern Solutions
 
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...
 
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...
 
[AIIM18] Intelligent Information Management – Platinum Hit? Or Just Backgroun...
[AIIM18] Intelligent Information Management – Platinum Hit? Or Just Backgroun...[AIIM18] Intelligent Information Management – Platinum Hit? Or Just Backgroun...
[AIIM18] Intelligent Information Management – Platinum Hit? Or Just Backgroun...
 
[AIIM18] Killing Multiple Privacy Birds With One Stone: Meeting both US and E...
[AIIM18] Killing Multiple Privacy Birds With One Stone: Meeting both US and E...[AIIM18] Killing Multiple Privacy Birds With One Stone: Meeting both US and E...
[AIIM18] Killing Multiple Privacy Birds With One Stone: Meeting both US and E...
 
[AIIM18] A "Modern Records Management" Case Study: how the compliance departm...
[AIIM18] A "Modern Records Management" Case Study: how the compliance departm...[AIIM18] A "Modern Records Management" Case Study: how the compliance departm...
[AIIM18] A "Modern Records Management" Case Study: how the compliance departm...
 
[AIIM18] Welcome to the Digital Age, North Carolina Courts: Our Document Auto...
[AIIM18] Welcome to the Digital Age, North Carolina Courts: Our Document Auto...[AIIM18] Welcome to the Digital Age, North Carolina Courts: Our Document Auto...
[AIIM18] Welcome to the Digital Age, North Carolina Courts: Our Document Auto...
 
[AIIM18] When Billions are at Stake: an ECM mega project at Bradesco Bank - A...
[AIIM18] When Billions are at Stake: an ECM mega project at Bradesco Bank - A...[AIIM18] When Billions are at Stake: an ECM mega project at Bradesco Bank - A...
[AIIM18] When Billions are at Stake: an ECM mega project at Bradesco Bank - A...
 

Recently uploaded

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Recently uploaded (20)

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for Preparedness and Prevention

  • 1. Underwritten by: #AIIMYour Digital Transformation Begins with Intelligent Information Management Data Privacy for the IM Practitioner: Practical Advice for Preparedness and Prevention Presented February 26, 2020 Note – the art of this cover slide will change. Data Privacy for the IM Practitioner: Practical Advice for Preparedness and Prevention An AIIM Webinar presented February 26, 2020
  • 2. Underwritten by: Today’s Speakers Kevin Craine Content Strategist, AIIM Host of AIIM On Air John Montaña, J.D., FIIM, FAI VP, Information Governance at Access CEO, Montaña & Associates an Access Company Host: Theresa Resek, CIP VP, Market Intelligence AIIM
  • 3. Underwritten by: Kevin Craine Content Strategist, AIIM Host of AIIM On Air Introducing our Speaker
  • 4. Underwritten by: Driving Demand for Data Privacy • Data privacy is on the mind of C-Suite leaders in all industries. • No organization is safe from potential cyber theft and intrusion. • In 2019, 2.7 billion identity records were exposed by hackers and placed for sale on the internet. • Legislation worldwide has become increasingly strict. • Expectations are ever-evolving. • Perception is everything in the eyes of the market.
  • 6. Underwritten by: Volume, Velocity, and Variety • Organizations anticipate the volume of information will grow from X to 4.5X in the coming year. • Over 60% of that information sprawl is unstructured. • Organizations are embracing technologies and approaches that automate governance and compliance. • According to AIIM research, 51% of organizations say that they are planning to spend “more” or “a lot more” on information governance over the next 18-24 months.
  • 7. Underwritten by: Inevitable and Costly • Experts tell us that the question is not IF it will happen, but WHEN. • The chances of being struck by lightning = one in a million. • The chances of organizations getting hacked this year = one in four. • The average total cost of a single data breach is estimated at nearly $4 million. • That calculation can certainly be much higher – legal expense, fines, and penalties; the loss of goodwill in the market.
  • 8. Underwritten by: Recommendations Implement a formal approach. Have a plan and stick to it. Regularly (annually) review, evaluate, and update your plan as needed. Place the privacy and security of information on the front burner of strategic concerns.
  • 9. Underwritten by: John Montaña, J.D., FIIM, FAI VP, Information Governance at Access CEO, Montaña & Associates an Access Company Introducing our Speaker
  • 10. Underwritten by: You say that Legislators don't understand how large companies work. What do you mean by that?
  • 11. Underwritten by: Legislation is Created in a Silo Just knowing what’s there – it’s a lot of law, in a lot of places Outright conflicts – minimum retention requirements versus maximum permissible retention Interpreting dated or vague laws IT configuration – how to make it all work in a big IT environment Administrative complexity – how to manage dozens or hundreds of unique requirements
  • 12. Underwritten by: What are some of the considerations that IIM pros must deal with that legislators miss in the mix?
  • 13. Underwritten by: Considerations for Applying Privacy Legislation Applying Legislation to Today… Taking into Account Yesterday… Legislation was written without consideration for: • Back file of old IT systems and physical boxes of records • Most IT systems available when the laws were written are not capable of applying law • Even if capable, they are often not configured in a manner that supports being compliant • Non-compliant implementations are difficult to undo
  • 14. Underwritten by: Let’s talk about specific steps to build an effective privacy plan. You say it’s important to start with a thorough understanding of the current capabilities within the enterprise. Isn’t that just more “analysis paralysis?”
  • 15. Underwritten by: Utilize Project Management Principles 1 2 3 4 5 Develop a clearly written initial project scope / charter / documentation Develop a high-level project roadmap / framework • What industry / data types you are trying to apply “privacy” to • What is the information life-cycle for PII / SI? • Establish a timeline with realistic milestones • Regularly adjust / incorporate PIA findings Clearly establish roles / responsibilities – decision rights • Chief Privacy Officer (CPO) / Data Protection Officer (DPO) • Privacy Office (PO) Develop a communication / marketing plan Prepare a budget
  • 16. Underwritten by: Now that I’ve surveyed the technical environment... what’s next? What are some steps to build a meaningful project plan?
  • 17. Underwritten by: Building the Privacy Program Core Components Review Create inventory of Personal Information Banks (PIBs) Develop staff education and awareness training and collateral and Communication plan Post Privacy Policy and Principles on the organization’s website Develop Privacy Notice signage and arrange for posting in relevant areas (such as those with video capture) Actually apply the retention schedule and purge data that is not needed Do not collect unnecessary data that is not required or contains PII
  • 18. Underwritten by: Once I have a plan, I’ve got to sell it...not only to company executives, but also other stakeholders (regulatory boards). Can you outline some success tips for gaining support and buy-in?
  • 19. Underwritten by: Building Relationships with Stakeholders Stakeholders are - ALL Staff / Third Parties / Customers that contribute, come in contact with or are affected by PII / SI • Customers • Shareholders • Steering CommitteeAssurance Groups – Legal, Audit, Compliance, Risk HR Operations – Sales, Marketing, R&D, Field Workers etc. Chief Privacy Officer (CPO) / Data Protection Officer (DPO) Third-Parties / Contractors Regulatory Agencies Privacy Office (PO) Board of Directors / Executive Team IT
  • 20. Underwritten by: What about getting front-line workers onboard to adapt and use new and changed systems and policies?
  • 21. Underwritten by: Privacy Training Appropriately Train ALL staff and Third-Parties Types of training Do not overcomplicate Market your privacy program • Train the trainer • Executives are not exempt • CBT • Live / In-person • Manuals / Guides • Workshops • Keep language simple/ keep cultural differences in mind • Recognize top performers Frequency of the training • Annual • New Hire • Incident Based • Third party / Contractor Test the Privacy Incident Response Plan • Send out mock phishing emails • Where is more training needed • Log results – training & testing Everyone who belongs to, or works with, an organization is responsible to protect the PII / SI of the company and associated stakeholders!
  • 22. Underwritten by: One thing that is certain, the rate of change is not going to slow down. How can we design our privacy programs so that they will be flexible and adapt to changes in regulations, technologies and market expectations?
  • 24. Underwritten by: How Organizations Can Successfully Move Forward Level Set Expectations Understand Current Capabilities Make Your Case Change Is Your Only Constant
  • 25. 25 | Copyright © 2020 Access - Confidential
  • 26. 26 | Copyright © 2020 Access - Confidential AccessCorp.com 877-345-3546 John Montaña Vice President, Information Governance john.montana@montana-associates.com
  • 27.
  • 28. Underwritten by: #AIIMYour Digital Transformation Begins with Intelligent Information ManagementYour Digital Transformation begins with Intelligent Information Management