SlideShare a Scribd company logo
1 of 38
Download to read offline
© 2020 TrustArc Inc. Proprietary and Confidential Information.
5 Signs Your Privacy Management
Program is Not Working for You
August 26, 2020
Speakers
2
Paul Breitbarth
LL.M
Director, EU Policy &
Strategy
TrustArc
Edward Hu
Senior Counsel and Data
Protection Officer
TrustArc
Agenda
3
5 Signs
1. Inability to scale
2. Inability to map data flows to country specific laws & regulations
3. Inability to respond to requests from individuals and regulators
4. Frequent security incidents
5. Inability to perform a function because someone is absent
© 2020 TrustArc Inc. Proprietary and Confidential Information.
Inability to scale
Inability to Scale - Fundamental Concepts
5
The difference between a scalable process vs. program
Program
● A privacy program is the company’s management of its data protection and data handling
obligations from laws, contracts, consumer expectations, and operations.
Process
● A privacy process is the implemented organizational or technical safeguard in place to
satisfy a data protection or data handling obligation. For example
○ Inventorying and updating data flows for systems, products, and services that process
[personal] data.
○ Assessing and testing technical measures to manage data processing.
○ DSRs process.
Inability to Scale - Making the Case
6
Why do you need to be able to scale?
Increase agility, minimize risk
● Meet the demands of business growth
○ Increase in the number of business processes
○ Increased volume
● Meet the demands of increasing regulatory requirements
○ Expansion into other countries.
○ E.g. increase in total DSRs after GDPR, CCPA, et alia.
● A scaling exercise helps even without current business growth or additional
regulatory requirements.
○ Identify and remedy process inefficiency (scaling down easier than scaling up)
○ Certifications
Inability to Scale - How to Do It
How to build a scalable process? A scalable program?
Scalable processes
● Repeatable and capable of withstanding an increase in volume or throughput
● In order to do that, map the process and identify inefficiencies
● Identify repeated actions and remove inefficiencies (templates, workflow)
● Automate where possible
Scalable programs
● Regulation agnostic
● Based on controls and activities
● Frameworks can adapt to any law(s)
● Better than adapting to laws individually (which may be vague or not cover all areas of risk)
7
Inability to Scale - Example Frameworks
● NIST Privacy Framework
○ (100 controls, 8 functions, 29 control categories)
○ https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.01162020.pdf
● TrustArc + Nymity Framework
○ (55 controls, 3 pillars, 16 categories)
○ (130+ PMAs, 3 pillars, 13 PMC)
○ https://info.trustarc.com/Web-Resource-2020-01-20-Privacy-Data-Governance-Framework_LP.html
● APEC Privacy Framework
● ISO 27001 (Information Security Management System)
○ (114 controls, 14 groups, 35 control categories)
8
Inability to Scale - Example Framework Categories and Controls
Nymity PMC: Maintain a Governance Structure
○ PMA: Assign data privacy responsibility to an individual like General Counsel,
Privacy Officer, CPO, etc.
○ PMA: Conduct regular communication between privacy office and others
responsible for data privacy in the organization.
TrustArc Categories: Disclosure to Third Parties and Onward Transfer
○ Control: Assess vendors handling personal data for effective safeguards and
controls.
○ Control: Ensure personal data is adequately protected when transferred
internationally, including transfers to third parties and vendors.
9
10
11
When to build a scalable process or program?
Processes
● Removing inefficiency is always a plus, but sometimes there are costs.
○ Cost of undertaking
○ Cost of software solutions
● Cost benefit analysis for software
○ Quantify the cost of an existing process
○ Determine the cost savings over time. Hidden costs (operational, fines or penalties)
Programs
● Not many situations in which you wouldn’t want to use a framework
● Investing now for cost and time savings and risk mitigation
Inability to Scale - When to Implement, Effect on Bottom Line
12
© 2020 TrustArc Inc. Proprietary and Confidential Information.
Inability to map data flows to
country specific laws &
regulations
Map Data Flows to country specific laws & regulations
14
Today’s Privacy Landscape
Source: Nymity Research - Maps & Charts
Data Transfer - Countries with Restrictions
Source: Nymity Research - Maps & Charts
Inability to Map to Legislation - Fundamental Concepts
16
Ad Hoc Compliance v. Accountable Program
Ad Hoc Compliance
● Every new law is a challenge to comply with and takes up resources for implementation of
compliance measures.
○ Controls are too specific
○ No way to monitor what’s coming up – caught unaware
Accountable Program
● An accountable program allows an organization to leverage existing processes to comply
with new laws
○ Identify the delta between laws
○ Assess any gaps and additional requirements
Accountability Based Approach
17
Leverage existing activities to comply with many laws and evidence of accountability to
demonstrate compliance
ONE ACCOUNTABLE
PRIVACY PROGRAM
Evidence of Privacy Management Activities or
Controls exists throughout the organization (within
the privacy program as well as operations);
evidence is collected in a centralized repository,
structured in a line with the Privacy Management
Categories or Standards.
MANY REGULATORY
REQUIREMENTS
Evidence of accountability
is mapped to requirements
allowing the organization to
demonstrate compliance
with laws and regulations
on-demand, supported by
evidence.
Hypothetical Scenario - “SaaS Europe”
Business Process
● Your company uses a vendor, Wamazon S4, to provide a hosting service in Germany.
● The platform hosted on Wamazon collects PI from Portugal, Sweden, France, and the UK.
● The Wamazon server syncs with your company’s data center (American Web Svcs) in
Virginia, U.S.
● Employees in Virginia (U.S.) and technical support staff in Oregon (U.S.) login to the U.S.
server and sometimes access PI to provide account management and tech support.
● Document the locations for your data subjects and systems and the data flows.
● (Also document processing purposes, controls, roles (controller/processor), vendors, etc.)
Understanding Your Own Data - Mapping Your Data Flows
18
Data Flow Map
Europe
Understanding Your Own Data - Mapping Your Data Flows
19
Data Flow Maps - World View
Understanding Your Own Data - Mapping Your Data Flows
20
Hypothetical Scenario - “SaaS Europe”
Data Flow Diagrams
Understanding Your Own Data - Mapping Your Data Flows
21
© 2020 TrustArc Inc. Proprietary and Confidential Information.
Inability to respond to
requests from individuals
and regulators
Inability to Respond to Individual Requests
23
Most Data Protection Laws allow for Individual Requests
● > 110 countries with Individual Rights Requests
○ Right of Access
○ Right of Correction
○ Right of Deletion
○ Right of Data Portability
○ and others
Challenges
● Volume of Requests (may increase following publicity and/or data breach)
● Finding the Data (structured and unstructured)
● Respecting the Deadlines
Individual Rights Request Timeframes: from <7 days to >30 days
24
Inability to Respond to Individual Requests
How to Respond to Individual Requests
Improve processes
● Centralise entry point for requests (web form, email address, etc.)
● Develop standardised business processes
○ Authentication of Individuals
○ Triage by type of request
○ Compliance requirements based on country of residence of requestor
○ How to retrieve data (including who can offer support)
○ What to do in case of massive volume of requests (how to ensure peak capacity?)
● Automate where possible
● Documentation or record of responses to requests
25
Demonstrate Compliance
26
Centralized management and metrics
Demonstrate Compliance
27
Detailed reporting and record logs (dummy data)
Inability to Respond to Requests: DPA Enforcement
28
Poland - 20 July 2020
The Polish DPA imposed a fine of ~$ 1,350 to an entrepreneur running a non-public nursery and pre-school.
The organization had notified a data breach, but with insufficient information to conduct any follow up
enquiries, and did not respond to multiple follow up requests from the DPA. The Polish commissioner
indicated the fine is “a clear signal to all entities that disregarding their obligation to cooperate, on request,
with the supervisory authority, especially by hindering access to information necessary for the performance of
its tasks, is a serious infringement and as such is subject to fines
Source
Argentina - 1 June 2020
The Argentinian DPA imposed a fine of ~$ 4,000 to a company for non-compliance with an access request.
The company had no process in place to deal with request for access outside of their platform, nor to deal
with requests from the supervisory authority - it assumed it was only subject to court orders, but not to
administrative enforcement.
Source | Nymity Reference
© 2020 TrustArc Inc. Proprietary and Confidential Information.
Frequent security incidents
Frequent Security Incidents
30
No Data Protection without Data Security
● One of the core principles of privacy legislation
Challenges
● Human mistakes
● Keeping security up to date at all times
○ BYOD
○ Cost
● Ensuring all security incidents and data breaches are reported
○ Creating organizational trust - in- and externally
Frequent Security Incidents
31
No Data Protection without Data Security
Solutions
● Define clear security standards and policies, including for dealing with incidents
○ And train employees on security policies on a regular basis
● Log every security incident
○ And ensure the log is regularly reviewed by the privacy team, IT and company
leadership
● Use a certification as a method to systematically address IT and organizational controls
and to find gaps.
○ SOC 2, Type 2 (effectiveness of controls)
Frequent security incidents: DPA Enforcement
32
Denmark - 29 May 2019
PFA Pension Fund was criticised for a lack of compliance with Article 32 GDPR. By February 2019, the
organization had reported 66 data breaches under the GDPR, of which 62 related to unintentional disclosures
of personal data. Following an investigation, the Danish DPA concluded the organization’s security standards
were lacking. A fine was avoided, since the organization in the meantime had started a security improvement
process.
Source | Nymity Reference
Netherlands - 17 July 2019 and beyond
A hospital in The Hague was fined €460,000 for employee snooping. Over 100 non-authorized employees
looked at the file of a reality TV starlet admitted to hospital. The Dutch DPA investigated and criticised the
hospital’s security policies. Since the fine was imposed, two further security incidents took place, including the
use of the backside of a document containing patient data as a shopping list (which was subsequently left
behind) and collecting patient survey data via a third party, without an appropriate data processing
agreement.
Source | Nymity Reference
© 2020 TrustArc Inc. Proprietary and Confidential Information.
Inability to perform a
function because someone
is absent
Lack of Resiliency - Signs of a Problem
Fault Tolerance
Definition:
The ability for a system to continue operating properly in the event of the failure of
some of its components.
How do you know you have a problem?
● Turnover, PTO, or even an overburdened individual may reveal the existence and
extent of the problem.
● Inability to meet internal SLAs.
● When institutional knowledge exists only within individuals.
34
Lack of Resiliency - Why It’s a Problem
Why is lack of fault tolerance a problem?
● Privacy laws are often bound to specific deadlines for responses.
○ Article 30 requests which are due right away.
○ DSRs - Missing deadlines or frequently extending deadlines.
● Contractual obligations are often bound to specific deadlines.
○ Notice in case of a breach.
○ Changes to sub-processors.
○ Prior notice for audits.
● Resource cost to reinvent/rediscover an already existing process.
35
Documentation
● Document existing policies and procedures
○ They don’t have to be perfect, but they do have to be documented.
● Document who the backup persons are.
● E.g.
○ DPAs and other contracts
■ Playbook of positions and acceptable terms
■ Checklist vis-a-vis relevant privacy laws
○ Security or privacy assessments
Matrix Your Staff
● Designate primary responsibility, designate a backup person
○ Provide adequate training (shadow / walkthrough), using the documentation
○ Ensure access is in place (network permissions, created accounts, etc.)
● In addition to having fault tolerance, you will have a load balancing solution!
○ Load balancing solutions must be in place before the overload occurs.
36
Lack of Resiliency - Solving the Problem
© 2019 TrustArc Inc Proprietary and Confidential Information
Q&A
© 2019 TrustArc Inc Proprietary and Confidential Information
Thank You!
See http://www.trustarc.com/insightseries for the 2020
Privacy Insight Series and past webinar recordings.
If you would like to learn more about how TrustArc can support
you with compliance, please reach out to sales@trustarc.com for
a free demo.

More Related Content

What's hot

How to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy RiskHow to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy RiskTrustArc
 
CCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
CCPA Compliance from Ground Zero: Start to Finish with TrustArc SolutionsCCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
CCPA Compliance from Ground Zero: Start to Finish with TrustArc SolutionsTrustArc
 
Third-Party Risk Management: How to Identify, Assess & Act
Third-Party Risk Management: How to Identify, Assess & ActThird-Party Risk Management: How to Identify, Assess & Act
Third-Party Risk Management: How to Identify, Assess & ActTrustArc
 
How to Leverage Your GDPR Compliance for CCPA, Privacy Shield & More New Requ...
How to Leverage Your GDPR Compliance for CCPA, Privacy Shield & More New Requ...How to Leverage Your GDPR Compliance for CCPA, Privacy Shield & More New Requ...
How to Leverage Your GDPR Compliance for CCPA, Privacy Shield & More New Requ...TrustArc
 
2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...TrustArc
 
Privacy 2020: Recap & Predictions
Privacy 2020: Recap & PredictionsPrivacy 2020: Recap & Predictions
Privacy 2020: Recap & PredictionsTrustArc
 
COVID-19: What are the Potential Impacts on Data Privacy?
COVID-19: What are the Potential Impacts on Data Privacy?COVID-19: What are the Potential Impacts on Data Privacy?
COVID-19: What are the Potential Impacts on Data Privacy?TrustArc
 
The Court Speaks: Privacy Shield, Standard Contractual Clauses and Cookie Con...
The Court Speaks: Privacy Shield, Standard Contractual Clauses and Cookie Con...The Court Speaks: Privacy Shield, Standard Contractual Clauses and Cookie Con...
The Court Speaks: Privacy Shield, Standard Contractual Clauses and Cookie Con...TrustArc
 
2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...TrustArc
 
LGPD is Here: What to know to understand compliance and enforcement action
LGPD is Here: What to know to understand compliance and enforcement actionLGPD is Here: What to know to understand compliance and enforcement action
LGPD is Here: What to know to understand compliance and enforcement actionTrustArc
 
So Many States, So Many Privacy Laws: US State Privacy Law Update
So Many States, So Many Privacy Laws: US State Privacy Law UpdateSo Many States, So Many Privacy Laws: US State Privacy Law Update
So Many States, So Many Privacy Laws: US State Privacy Law UpdateTrustArc
 
China's PIPL: How to Comply in Under 60 Days
China's PIPL: How to Comply in Under 60 DaysChina's PIPL: How to Comply in Under 60 Days
China's PIPL: How to Comply in Under 60 DaysTrustArc
 
Mastering Article 30 Compliance: Conducting, Maintaining & Reporting on your ...
Mastering Article 30 Compliance: Conducting, Maintaining & Reporting on your ...Mastering Article 30 Compliance: Conducting, Maintaining & Reporting on your ...
Mastering Article 30 Compliance: Conducting, Maintaining & Reporting on your ...TrustArc
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) Kimberly Simon MBA
 
Beginning your General Data Protection Regulation (GDPR) Journey
Beginning your General Data Protection Regulation (GDPR) JourneyBeginning your General Data Protection Regulation (GDPR) Journey
Beginning your General Data Protection Regulation (GDPR) JourneyMicrosoft Österreich
 
Marketing under the GDPR: What You Can and Cannot Do [Webinar Slides]
Marketing under the GDPR: What You Can and Cannot Do [Webinar Slides]Marketing under the GDPR: What You Can and Cannot Do [Webinar Slides]
Marketing under the GDPR: What You Can and Cannot Do [Webinar Slides]TrustArc
 
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...CIO Edge
 
BigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesBigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesDimitri Sirota
 
Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRIT Governance Ltd
 
EU Update: Applying the new SCCs, or ‘just’ the complete GDPR?
EU Update: Applying the new SCCs, or ‘just’ the complete GDPR?EU Update: Applying the new SCCs, or ‘just’ the complete GDPR?
EU Update: Applying the new SCCs, or ‘just’ the complete GDPR?TrustArc
 

What's hot (20)

How to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy RiskHow to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy Risk
 
CCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
CCPA Compliance from Ground Zero: Start to Finish with TrustArc SolutionsCCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
CCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
 
Third-Party Risk Management: How to Identify, Assess & Act
Third-Party Risk Management: How to Identify, Assess & ActThird-Party Risk Management: How to Identify, Assess & Act
Third-Party Risk Management: How to Identify, Assess & Act
 
How to Leverage Your GDPR Compliance for CCPA, Privacy Shield & More New Requ...
How to Leverage Your GDPR Compliance for CCPA, Privacy Shield & More New Requ...How to Leverage Your GDPR Compliance for CCPA, Privacy Shield & More New Requ...
How to Leverage Your GDPR Compliance for CCPA, Privacy Shield & More New Requ...
 
2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
 
Privacy 2020: Recap & Predictions
Privacy 2020: Recap & PredictionsPrivacy 2020: Recap & Predictions
Privacy 2020: Recap & Predictions
 
COVID-19: What are the Potential Impacts on Data Privacy?
COVID-19: What are the Potential Impacts on Data Privacy?COVID-19: What are the Potential Impacts on Data Privacy?
COVID-19: What are the Potential Impacts on Data Privacy?
 
The Court Speaks: Privacy Shield, Standard Contractual Clauses and Cookie Con...
The Court Speaks: Privacy Shield, Standard Contractual Clauses and Cookie Con...The Court Speaks: Privacy Shield, Standard Contractual Clauses and Cookie Con...
The Court Speaks: Privacy Shield, Standard Contractual Clauses and Cookie Con...
 
2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
 
LGPD is Here: What to know to understand compliance and enforcement action
LGPD is Here: What to know to understand compliance and enforcement actionLGPD is Here: What to know to understand compliance and enforcement action
LGPD is Here: What to know to understand compliance and enforcement action
 
So Many States, So Many Privacy Laws: US State Privacy Law Update
So Many States, So Many Privacy Laws: US State Privacy Law UpdateSo Many States, So Many Privacy Laws: US State Privacy Law Update
So Many States, So Many Privacy Laws: US State Privacy Law Update
 
China's PIPL: How to Comply in Under 60 Days
China's PIPL: How to Comply in Under 60 DaysChina's PIPL: How to Comply in Under 60 Days
China's PIPL: How to Comply in Under 60 Days
 
Mastering Article 30 Compliance: Conducting, Maintaining & Reporting on your ...
Mastering Article 30 Compliance: Conducting, Maintaining & Reporting on your ...Mastering Article 30 Compliance: Conducting, Maintaining & Reporting on your ...
Mastering Article 30 Compliance: Conducting, Maintaining & Reporting on your ...
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
Beginning your General Data Protection Regulation (GDPR) Journey
Beginning your General Data Protection Regulation (GDPR) JourneyBeginning your General Data Protection Regulation (GDPR) Journey
Beginning your General Data Protection Regulation (GDPR) Journey
 
Marketing under the GDPR: What You Can and Cannot Do [Webinar Slides]
Marketing under the GDPR: What You Can and Cannot Do [Webinar Slides]Marketing under the GDPR: What You Can and Cannot Do [Webinar Slides]
Marketing under the GDPR: What You Can and Cannot Do [Webinar Slides]
 
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
 
BigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesBigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar Slides
 
Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPR
 
EU Update: Applying the new SCCs, or ‘just’ the complete GDPR?
EU Update: Applying the new SCCs, or ‘just’ the complete GDPR?EU Update: Applying the new SCCs, or ‘just’ the complete GDPR?
EU Update: Applying the new SCCs, or ‘just’ the complete GDPR?
 

Similar to 5 Signs Your Privacy Management Program is Not Working for You

Nymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesTrustArc
 
Data protection: Steps Organisations can take to ensure compliance
Data protection: Steps Organisations can take to ensure complianceData protection: Steps Organisations can take to ensure compliance
Data protection: Steps Organisations can take to ensure complianceEquiGov Institute
 
Michael Josephs
Michael JosephsMichael Josephs
Michael JosephsdaveGBE
 
#HR and #GDPR: Preparing for 2018 Compliance
#HR and #GDPR: Preparing for 2018 Compliance #HR and #GDPR: Preparing for 2018 Compliance
#HR and #GDPR: Preparing for 2018 Compliance Dovetail Software
 
Data privacy and security in uae
Data privacy and security in uaeData privacy and security in uae
Data privacy and security in uaeRishalHalid1
 
Creating a GDPR Action Plan; Not a Freakout Plan
Creating a GDPR Action Plan; Not a Freakout PlanCreating a GDPR Action Plan; Not a Freakout Plan
Creating a GDPR Action Plan; Not a Freakout PlanMediacurrent
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceAdrian Dumitrescu
 
Data Privacy: The Hidden Beast within Mergers & Acquisitions
Data Privacy: The Hidden Beast within Mergers & AcquisitionsData Privacy: The Hidden Beast within Mergers & Acquisitions
Data Privacy: The Hidden Beast within Mergers & AcquisitionsTrustArc
 
What is a data protection impact assessment? what are the essential stages to...
What is a data protection impact assessment? what are the essential stages to...What is a data protection impact assessment? what are the essential stages to...
What is a data protection impact assessment? what are the essential stages to...Infinity Legal Solutions
 
Teradata's approach to addressing GDPR
Teradata's approach to addressing GDPRTeradata's approach to addressing GDPR
Teradata's approach to addressing GDPRPaul O'Carroll
 
Toreon adding privacy by design in secure application development oss18 v20...
Toreon adding privacy by design in secure application development   oss18 v20...Toreon adding privacy by design in secure application development   oss18 v20...
Toreon adding privacy by design in secure application development oss18 v20...Sebastien Deleersnyder
 
What is a data protection impact assessment?
What is a data protection impact assessment?What is a data protection impact assessment?
What is a data protection impact assessment?Infinity Legal Solutions
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessSirius
 
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...confluent
 
GDPR offer by Keley-Data
GDPR offer by Keley-DataGDPR offer by Keley-Data
GDPR offer by Keley-DataHatime Araki
 
Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers Gary Dodson
 

Similar to 5 Signs Your Privacy Management Program is Not Working for You (20)

Nymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 States
 
Data protection: Steps Organisations can take to ensure compliance
Data protection: Steps Organisations can take to ensure complianceData protection: Steps Organisations can take to ensure compliance
Data protection: Steps Organisations can take to ensure compliance
 
Michael Josephs
Michael JosephsMichael Josephs
Michael Josephs
 
#HR and #GDPR: Preparing for 2018 Compliance
#HR and #GDPR: Preparing for 2018 Compliance #HR and #GDPR: Preparing for 2018 Compliance
#HR and #GDPR: Preparing for 2018 Compliance
 
Data privacy and security in uae
Data privacy and security in uaeData privacy and security in uae
Data privacy and security in uae
 
Creating a GDPR Action Plan; Not a Freakout Plan
Creating a GDPR Action Plan; Not a Freakout PlanCreating a GDPR Action Plan; Not a Freakout Plan
Creating a GDPR Action Plan; Not a Freakout Plan
 
Your data is your business: Secure it or Lose it!
Your data is your business: Secure it or Lose it!Your data is your business: Secure it or Lose it!
Your data is your business: Secure it or Lose it!
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
Data Privacy: The Hidden Beast within Mergers & Acquisitions
Data Privacy: The Hidden Beast within Mergers & AcquisitionsData Privacy: The Hidden Beast within Mergers & Acquisitions
Data Privacy: The Hidden Beast within Mergers & Acquisitions
 
What is a data protection impact assessment? what are the essential stages to...
What is a data protection impact assessment? what are the essential stages to...What is a data protection impact assessment? what are the essential stages to...
What is a data protection impact assessment? what are the essential stages to...
 
Teradata's approach to addressing GDPR
Teradata's approach to addressing GDPRTeradata's approach to addressing GDPR
Teradata's approach to addressing GDPR
 
Toreon adding privacy by design in secure application development oss18 v20...
Toreon adding privacy by design in secure application development   oss18 v20...Toreon adding privacy by design in secure application development   oss18 v20...
Toreon adding privacy by design in secure application development oss18 v20...
 
What is a data protection impact assessment?
What is a data protection impact assessment?What is a data protection impact assessment?
What is a data protection impact assessment?
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
 
2016 11-17-gdpr-integro-webinar
2016 11-17-gdpr-integro-webinar2016 11-17-gdpr-integro-webinar
2016 11-17-gdpr-integro-webinar
 
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...
 
GDPR offer by Keley-Data
GDPR offer by Keley-DataGDPR offer by Keley-Data
GDPR offer by Keley-Data
 
Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event
 
Data Governance
Data GovernanceData Governance
Data Governance
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
 

More from TrustArc

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc
 
TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc
 
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc
 
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...TrustArc
 
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...TrustArc
 
CBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceCBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceTrustArc
 
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfEverything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfTrustArc
 
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...TrustArc
 
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsPrivacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsTrustArc
 
Building Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsBuilding Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsTrustArc
 
The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...TrustArc
 
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdfTrustArc
 
Artificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceArtificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceTrustArc
 
How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023TrustArc
 
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act:  Using Consumer Data and Maintaining TrustThe Ultimate Balancing Act:  Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act: Using Consumer Data and Maintaining TrustTrustArc
 
The Cost of Privacy Teams: What Your Business Needs To Know
The Cost of Privacy Teams: What Your Business Needs To KnowThe Cost of Privacy Teams: What Your Business Needs To Know
The Cost of Privacy Teams: What Your Business Needs To KnowTrustArc
 
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdf
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdfTrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdf
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdfTrustArc
 
TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?
TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?
TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?TrustArc
 

More from TrustArc (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
 
TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI Innovations
 
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
 
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
 
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
 
CBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceCBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy Compliance
 
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfEverything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
 
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
 
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsPrivacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
 
Building Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsBuilding Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy Certifications
 
The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...
 
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
 
Artificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceArtificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI Governance
 
How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023
 
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act:  Using Consumer Data and Maintaining TrustThe Ultimate Balancing Act:  Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust
 
The Cost of Privacy Teams: What Your Business Needs To Know
The Cost of Privacy Teams: What Your Business Needs To KnowThe Cost of Privacy Teams: What Your Business Needs To Know
The Cost of Privacy Teams: What Your Business Needs To Know
 
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdf
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdfTrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdf
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdf
 
TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?
TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?
TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?
 

Recently uploaded

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Recently uploaded (20)

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

5 Signs Your Privacy Management Program is Not Working for You

  • 1. © 2020 TrustArc Inc. Proprietary and Confidential Information. 5 Signs Your Privacy Management Program is Not Working for You August 26, 2020
  • 2. Speakers 2 Paul Breitbarth LL.M Director, EU Policy & Strategy TrustArc Edward Hu Senior Counsel and Data Protection Officer TrustArc
  • 3. Agenda 3 5 Signs 1. Inability to scale 2. Inability to map data flows to country specific laws & regulations 3. Inability to respond to requests from individuals and regulators 4. Frequent security incidents 5. Inability to perform a function because someone is absent
  • 4. © 2020 TrustArc Inc. Proprietary and Confidential Information. Inability to scale
  • 5. Inability to Scale - Fundamental Concepts 5 The difference between a scalable process vs. program Program ● A privacy program is the company’s management of its data protection and data handling obligations from laws, contracts, consumer expectations, and operations. Process ● A privacy process is the implemented organizational or technical safeguard in place to satisfy a data protection or data handling obligation. For example ○ Inventorying and updating data flows for systems, products, and services that process [personal] data. ○ Assessing and testing technical measures to manage data processing. ○ DSRs process.
  • 6. Inability to Scale - Making the Case 6 Why do you need to be able to scale? Increase agility, minimize risk ● Meet the demands of business growth ○ Increase in the number of business processes ○ Increased volume ● Meet the demands of increasing regulatory requirements ○ Expansion into other countries. ○ E.g. increase in total DSRs after GDPR, CCPA, et alia. ● A scaling exercise helps even without current business growth or additional regulatory requirements. ○ Identify and remedy process inefficiency (scaling down easier than scaling up) ○ Certifications
  • 7. Inability to Scale - How to Do It How to build a scalable process? A scalable program? Scalable processes ● Repeatable and capable of withstanding an increase in volume or throughput ● In order to do that, map the process and identify inefficiencies ● Identify repeated actions and remove inefficiencies (templates, workflow) ● Automate where possible Scalable programs ● Regulation agnostic ● Based on controls and activities ● Frameworks can adapt to any law(s) ● Better than adapting to laws individually (which may be vague or not cover all areas of risk) 7
  • 8. Inability to Scale - Example Frameworks ● NIST Privacy Framework ○ (100 controls, 8 functions, 29 control categories) ○ https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.01162020.pdf ● TrustArc + Nymity Framework ○ (55 controls, 3 pillars, 16 categories) ○ (130+ PMAs, 3 pillars, 13 PMC) ○ https://info.trustarc.com/Web-Resource-2020-01-20-Privacy-Data-Governance-Framework_LP.html ● APEC Privacy Framework ● ISO 27001 (Information Security Management System) ○ (114 controls, 14 groups, 35 control categories) 8
  • 9. Inability to Scale - Example Framework Categories and Controls Nymity PMC: Maintain a Governance Structure ○ PMA: Assign data privacy responsibility to an individual like General Counsel, Privacy Officer, CPO, etc. ○ PMA: Conduct regular communication between privacy office and others responsible for data privacy in the organization. TrustArc Categories: Disclosure to Third Parties and Onward Transfer ○ Control: Assess vendors handling personal data for effective safeguards and controls. ○ Control: Ensure personal data is adequately protected when transferred internationally, including transfers to third parties and vendors. 9
  • 10. 10
  • 11. 11
  • 12. When to build a scalable process or program? Processes ● Removing inefficiency is always a plus, but sometimes there are costs. ○ Cost of undertaking ○ Cost of software solutions ● Cost benefit analysis for software ○ Quantify the cost of an existing process ○ Determine the cost savings over time. Hidden costs (operational, fines or penalties) Programs ● Not many situations in which you wouldn’t want to use a framework ● Investing now for cost and time savings and risk mitigation Inability to Scale - When to Implement, Effect on Bottom Line 12
  • 13. © 2020 TrustArc Inc. Proprietary and Confidential Information. Inability to map data flows to country specific laws & regulations
  • 14. Map Data Flows to country specific laws & regulations 14 Today’s Privacy Landscape Source: Nymity Research - Maps & Charts
  • 15. Data Transfer - Countries with Restrictions Source: Nymity Research - Maps & Charts
  • 16. Inability to Map to Legislation - Fundamental Concepts 16 Ad Hoc Compliance v. Accountable Program Ad Hoc Compliance ● Every new law is a challenge to comply with and takes up resources for implementation of compliance measures. ○ Controls are too specific ○ No way to monitor what’s coming up – caught unaware Accountable Program ● An accountable program allows an organization to leverage existing processes to comply with new laws ○ Identify the delta between laws ○ Assess any gaps and additional requirements
  • 17. Accountability Based Approach 17 Leverage existing activities to comply with many laws and evidence of accountability to demonstrate compliance ONE ACCOUNTABLE PRIVACY PROGRAM Evidence of Privacy Management Activities or Controls exists throughout the organization (within the privacy program as well as operations); evidence is collected in a centralized repository, structured in a line with the Privacy Management Categories or Standards. MANY REGULATORY REQUIREMENTS Evidence of accountability is mapped to requirements allowing the organization to demonstrate compliance with laws and regulations on-demand, supported by evidence.
  • 18. Hypothetical Scenario - “SaaS Europe” Business Process ● Your company uses a vendor, Wamazon S4, to provide a hosting service in Germany. ● The platform hosted on Wamazon collects PI from Portugal, Sweden, France, and the UK. ● The Wamazon server syncs with your company’s data center (American Web Svcs) in Virginia, U.S. ● Employees in Virginia (U.S.) and technical support staff in Oregon (U.S.) login to the U.S. server and sometimes access PI to provide account management and tech support. ● Document the locations for your data subjects and systems and the data flows. ● (Also document processing purposes, controls, roles (controller/processor), vendors, etc.) Understanding Your Own Data - Mapping Your Data Flows 18
  • 19. Data Flow Map Europe Understanding Your Own Data - Mapping Your Data Flows 19
  • 20. Data Flow Maps - World View Understanding Your Own Data - Mapping Your Data Flows 20
  • 21. Hypothetical Scenario - “SaaS Europe” Data Flow Diagrams Understanding Your Own Data - Mapping Your Data Flows 21
  • 22. © 2020 TrustArc Inc. Proprietary and Confidential Information. Inability to respond to requests from individuals and regulators
  • 23. Inability to Respond to Individual Requests 23 Most Data Protection Laws allow for Individual Requests ● > 110 countries with Individual Rights Requests ○ Right of Access ○ Right of Correction ○ Right of Deletion ○ Right of Data Portability ○ and others Challenges ● Volume of Requests (may increase following publicity and/or data breach) ● Finding the Data (structured and unstructured) ● Respecting the Deadlines
  • 24. Individual Rights Request Timeframes: from <7 days to >30 days 24
  • 25. Inability to Respond to Individual Requests How to Respond to Individual Requests Improve processes ● Centralise entry point for requests (web form, email address, etc.) ● Develop standardised business processes ○ Authentication of Individuals ○ Triage by type of request ○ Compliance requirements based on country of residence of requestor ○ How to retrieve data (including who can offer support) ○ What to do in case of massive volume of requests (how to ensure peak capacity?) ● Automate where possible ● Documentation or record of responses to requests 25
  • 27. Demonstrate Compliance 27 Detailed reporting and record logs (dummy data)
  • 28. Inability to Respond to Requests: DPA Enforcement 28 Poland - 20 July 2020 The Polish DPA imposed a fine of ~$ 1,350 to an entrepreneur running a non-public nursery and pre-school. The organization had notified a data breach, but with insufficient information to conduct any follow up enquiries, and did not respond to multiple follow up requests from the DPA. The Polish commissioner indicated the fine is “a clear signal to all entities that disregarding their obligation to cooperate, on request, with the supervisory authority, especially by hindering access to information necessary for the performance of its tasks, is a serious infringement and as such is subject to fines Source Argentina - 1 June 2020 The Argentinian DPA imposed a fine of ~$ 4,000 to a company for non-compliance with an access request. The company had no process in place to deal with request for access outside of their platform, nor to deal with requests from the supervisory authority - it assumed it was only subject to court orders, but not to administrative enforcement. Source | Nymity Reference
  • 29. © 2020 TrustArc Inc. Proprietary and Confidential Information. Frequent security incidents
  • 30. Frequent Security Incidents 30 No Data Protection without Data Security ● One of the core principles of privacy legislation Challenges ● Human mistakes ● Keeping security up to date at all times ○ BYOD ○ Cost ● Ensuring all security incidents and data breaches are reported ○ Creating organizational trust - in- and externally
  • 31. Frequent Security Incidents 31 No Data Protection without Data Security Solutions ● Define clear security standards and policies, including for dealing with incidents ○ And train employees on security policies on a regular basis ● Log every security incident ○ And ensure the log is regularly reviewed by the privacy team, IT and company leadership ● Use a certification as a method to systematically address IT and organizational controls and to find gaps. ○ SOC 2, Type 2 (effectiveness of controls)
  • 32. Frequent security incidents: DPA Enforcement 32 Denmark - 29 May 2019 PFA Pension Fund was criticised for a lack of compliance with Article 32 GDPR. By February 2019, the organization had reported 66 data breaches under the GDPR, of which 62 related to unintentional disclosures of personal data. Following an investigation, the Danish DPA concluded the organization’s security standards were lacking. A fine was avoided, since the organization in the meantime had started a security improvement process. Source | Nymity Reference Netherlands - 17 July 2019 and beyond A hospital in The Hague was fined €460,000 for employee snooping. Over 100 non-authorized employees looked at the file of a reality TV starlet admitted to hospital. The Dutch DPA investigated and criticised the hospital’s security policies. Since the fine was imposed, two further security incidents took place, including the use of the backside of a document containing patient data as a shopping list (which was subsequently left behind) and collecting patient survey data via a third party, without an appropriate data processing agreement. Source | Nymity Reference
  • 33. © 2020 TrustArc Inc. Proprietary and Confidential Information. Inability to perform a function because someone is absent
  • 34. Lack of Resiliency - Signs of a Problem Fault Tolerance Definition: The ability for a system to continue operating properly in the event of the failure of some of its components. How do you know you have a problem? ● Turnover, PTO, or even an overburdened individual may reveal the existence and extent of the problem. ● Inability to meet internal SLAs. ● When institutional knowledge exists only within individuals. 34
  • 35. Lack of Resiliency - Why It’s a Problem Why is lack of fault tolerance a problem? ● Privacy laws are often bound to specific deadlines for responses. ○ Article 30 requests which are due right away. ○ DSRs - Missing deadlines or frequently extending deadlines. ● Contractual obligations are often bound to specific deadlines. ○ Notice in case of a breach. ○ Changes to sub-processors. ○ Prior notice for audits. ● Resource cost to reinvent/rediscover an already existing process. 35
  • 36. Documentation ● Document existing policies and procedures ○ They don’t have to be perfect, but they do have to be documented. ● Document who the backup persons are. ● E.g. ○ DPAs and other contracts ■ Playbook of positions and acceptable terms ■ Checklist vis-a-vis relevant privacy laws ○ Security or privacy assessments Matrix Your Staff ● Designate primary responsibility, designate a backup person ○ Provide adequate training (shadow / walkthrough), using the documentation ○ Ensure access is in place (network permissions, created accounts, etc.) ● In addition to having fault tolerance, you will have a load balancing solution! ○ Load balancing solutions must be in place before the overload occurs. 36 Lack of Resiliency - Solving the Problem
  • 37. © 2019 TrustArc Inc Proprietary and Confidential Information Q&A
  • 38. © 2019 TrustArc Inc Proprietary and Confidential Information Thank You! See http://www.trustarc.com/insightseries for the 2020 Privacy Insight Series and past webinar recordings. If you would like to learn more about how TrustArc can support you with compliance, please reach out to sales@trustarc.com for a free demo.