SlideShare a Scribd company logo
1 of 34
Download to read offline
1
© 2020 TrustArc Inc. Proprietary and Confidential Information.
CCPA Compliance from Ground Zero:
Start to Finish with TrustArc Solutions
July 29, 2020
2
● We will be starting a couple minutes after the hour
● This webinar will be recorded and the recording and slides sent out later today
● Please use the GoToWebinar control panel on the right hand side to submit any
questions for the speakers
Thank you for joining the webinar
“CCPA Compliance from Ground Zero: Start to Finish with
TrustArc Solutions”
3
Speakers
K Royal, FIP, CIPP/US / E, CIPM, CDPSE
Associate General Counsel - Privacy Intelligence
TrustArc
Beth Sipula, FIP, CIPM, CIPP/US
Director, Consulting
TrustArc
4
CCPA
Overview and
Main
Components
Journey
Stages of CCPA
Program
Management
Maturity
TrustArc
CCPA Solutions
for Every Stage
of Compliance
Today’s Goals
5
CCPA Overview
5
California Consumer Privacy Act
● Passed in June 2018 and revised later in September
○ then revised in October 2019
● Broadest privacy law in the U.S.
● Impacts any business with data on California consumers, households, or devices
● Regulations submitted to Office of Administrative Law
● Meanwhile, California Privacy Rights Act is on the November ballot
Top Provisions of the CCPA
● Expanded scope: people and data
● Transparency and notice
● Individual rights and “Do not sell my personal data”
● Private right of action
6
California Privacy Rights Act - CPRA
6
● Ballot initiative - https://www.caprivacy.org/
● Definitions
○ Consent, contractor, share, sensitive personal information, and business definition
amended regarding applicability within those sharing branding
● Rights
○ Correction and limit use and disclosure of SPI
● Third parties / service providers
○ Notice at collection, contractual obligations, requires levels or protection,
cooperation on consumer requests, flowdown provisions
● Security
○ Explicit provisions, “reasonable” and “appropriate to the nature” of PI, annual audit
of cybersecurity with submission to the Consumer Privacy Protection Agency
7
Transparency
Individual Rights
Third Party Management
Risk Management (including security)
Main Components of CCPA
8
Notice and data processing activities - online and in person, internal and external
● A business that collects a consumer’s personal information shall,
○ at or before the point of collection,
○ inform consumers as to the
■ the categories of personal information to be collected and
■ the purposes for which the categories of personal information shall be used.
● A business shall not collect additional categories of personal information or use personal
information collected for additional purposes without providing the consumer with notice
consistent with this section.
Additional Elements
● Be informed of rights
● Reasonably accessible
● Clear and conspicuous link (do not sell)
Transparency - Overview
9
Know the requirements
Follow the requirements
Update and Review
Develop Process: Identify elements - online and offline, Provide notice,
Quality checks, Update as needed, Review regularly
Data inventory and
practices
Know Your Data
Internal
and
External
Notice
https://www.w3.org/WAI/standards-guidelines/wcag/
Transparency - Compliance
10
Individual Rights - Overview
Right to Know /
Request Access
Right to
Non-discrimination
Right to Opt OutRight to Delete
Plus, portability (easily accessible format) and notice.
CPRA adds right to correction.
11
Know Your Data ResponseIntake
Develop Process: Intake, Internal Routing, Response (substance and form)Data inventory
Individual Rights - Compliance
12
Third Party Management - Overview
Service Provider definition
○ processes information on behalf of a business
○ to which the business discloses a consumer’s PI
○ for a business purpose
○ pursuant to a written contract
○ provided that the contract prohibits:
■ retaining, using, or disclosing the PI for any purpose, including commercial purposes,
other than for the specific purpose of performing the services specified in the contract
for the business
Third party definition – anyone who is NOT
○ Under contract with restrictions on
■ Selling the PI
■ retaining, using, or disclosing the PI for any purpose, including commercial purposes,
other than for the specific purpose of performing the services specified in the contract
for the business
■ Retaining, using, or disclosing the information outside of the direct business
relationship between the person and the business
○ Includes a certification of understanding the restrictions and will comply
13
Third Party Management - Compliance
Identify Identify the third parties that interact with personal
information, at some point along the information lifecycle
Assess Assess risks associated with the third party, classify
based on risk, identify mitigations in place
Address Address actions needed by priority, assign
responsibility, mitigate
14
Risk Management - Overview
Notice /
Awareness
Processes &
Controls
Third PartiesPersonal
Information
Identify risks, Analyze risks, Evaluate / prioritize
risks, Mitigate risks, Monitor effectiveness of
controls, Review & Reassess
15
Platform
Capabilities
PRIVACY OUTCOMES
Regulatory Insights and Monitoring
Privacy Program Insights
Risk Management
Benchmarks and Planning
Consent Management
Privacy Rights Management
Breach Response
Audit and Assurance
Compliance Monitoring
Awareness
Task Management and Action Plans
Reporting
DataCapture
Applications
External API’s
KNOWLEDGE BASE
Data Inventory Hub My Company Info Tracker Scans
Intelligence
System(IoP)
Libraries
TrustArc Privacy and Data Governance Accountability Framework
Law and Regulatory
Standards Repository
INTELLIGENCE ENGINES
Risk Management - Compliance
TrustArc Data Privacy Management Platform
Deep Intelligence + Complete Automation
© 2019 TrustArc Inc Proprietary and Confidential Information
CCPA Privacy Management
Journey
17
Privacy Management Journey
Predict and
Prioritize
• Privacy roles and
team built
• Management reviews
formalized (int/ext)
• Cross-functional
process and
automation in place
• Real-time monitoring
in place
Managed
Semi-Automated
• Functional team
identified
• Procedures and
processes
implemented
• Business
communicates
processes internally
Defined
Document
Sharing
• Some policies
centrally managed in
silos
• Some procedures and
processes
• Leadership
awareness but
resources are limited
Repeatable
Usage & Expertise
IncreaseEfficiency&Effectiveness
Spreadsheets and
Decentralized
• Decentralized
• Informal, inconsistent
procedures and
processes
• Reactive
• Leadership
awareness limited
Ad Hoc
Continuous
Improvement
• Leadership engaged
on privacy team
outcomes
• Continuous
monitoring & risk
assessments
• Risk-aware enterprise
and embedded
controls
• Remedial actions
taken to ensure
compliance
Optimized
Based on AICPA/CICA Privacy Maturity Model
18
Poll Question
18
Where are you in your CCPA privacy management journey?
● Ad Hoc
● Repeatable
● Defined
● Managed
● Optimized
19
Privacy Management Journey
Predict and
Prioritize
Managed
Semi-Automated
Defined
Document
Sharing
Repeatable
Spreadsheets and
Decentralized
Ad Hoc
Continuous
Improvement
Optimized
Individual Rights Request
Vendor Termination
Client Request
Potential Incident
20
Privacy Management Journey: Ad Hoc
Spreadsheets and
Decentralized
• Decentralized
• Informal, inconsistent
procedures and
processes
• Reactive
• Leadership awareness
limited
Ad Hoc
*Based on AICPA/CICA
Privacy Maturity Model
Knowledge: Understand the internal and external environment and what data,
jurisdictions, standards/rules, business activities apply and how. Begin to educate leaders
and prioritize efforts.
Main Goal
Vendors, current practices, data, leader knowledge, priorities.
Focus Area
Document third parties and systems, conduct third party and company risk
assessments, determine which requirements apply, assess preparedness,
create policy and standard library, prioritize and track remediation activities.
TrustArc
21
Privacy
Profile
22
Operational
Templates
23
Privacy Management Journey: Repeatable
Document
Sharing
• Some policies
centrally managed in
silos
• Some procedures and
processes
• Leadership
awareness but
resources are limited
Repeatable
*Based on AICPA/CICA
Privacy Maturity Model
Build Components: Identify functions critical in a privacy program, begin to address gaps,
enhance knowledge across select functions within organization.
Main Goal
Organizational data and internal policies, individual rights, consent and
transparency, transborder data flow.
Focus Area
Data Inventory and DPIA assistance, outsourced Privacy Office, Enterprise
Certification, APEC Privacy Recognition for Processors.
TrustArc
24
Risk Profile
25
Program Maturity and Trends
26
Privacy Management Journey: Defined
Semi-Automated
• Functional team
identified
• Procedures and
processes
implemented
• Business
communicates
processes internally
Defined
*Based on AICPA/CICA
Privacy Maturity Model
Operational Efficiency: Continue to address compliance issues and formalize the privacy
program; identify opportunities to increase efficiency and scalability through automation.
Establish a privacy culture and communicate externally.
Main Goal
Continue to close high priority gaps: DPIAs/PIAs, individual rights, transparency,
third party management, incident response and breach, transborder data flow
issues.
Focus Area
Document business processes, conduct DPIAs/PIAs, review third parties,
review risks and track activities, manage individual rights.
TrustArc
27
Data Inventory Hub
28
Data Flow
29
Privacy Management Journey: Managed
Predict and
Prioritize
• Privacy roles and
team built
• Management reviews
formalized (int/ext)
• Cross-functional
process and
automation in place
• Real-time monitoring
in place
Managed
*Based on AICPA/CICA
Privacy Maturity Model
Consistency and wisdom. Run an effective and efficient privacy program;
implement internal and external management/operational reviews.
Main Goal
Consistently manage processes to review and refresh program data; gather
and make decisions based on program data.
Focus Area
Run automated assessments and refresh activities on a regular basis, review
program metrics/report/adjust privacy program plan; Establish oversight,
monitoring, and executive/board reporting supported by technology.
TrustArc
30
Privacy Profile
Demonstrate privacy compliance
and accountability to customers,
partners, and the public through
participation in a TRUSTe
Assurance Program
Determine which Assurance
Programs will mitigate your
international data transfer risks
Prepare to demonstrate
compliance and accountability
with Your Policy and Standards
Library and Operational
Templates
Monitor and audit privacy
compliance and accountability
with Attestor
31
Privacy Management Journey: Optimized
Continuous
Improvement
• Leadership engaged
on privacy team
outcomes
• Continuous
monitoring & risk
assessments
• Risk-aware enterprise
and embedded
controls
• Remedial actions
taken to ensure
compliance
Optimized
*Based on AICPA/CICA
Privacy Maturity Model
Continuous Improvement: Review progress internally and compare with peers.
Main Goal
Regularly review and refine all privacy program component risks, goals, and
activities. Compare results with other organizations, new expectations in the law
or marketplace. Report and adjust.
Focus Area
Leverage results of technology-supported monitoring, benchmark against
others, and make adjustments.
TrustArc
32
The tech works for you...
© 2019 TrustArc Inc Proprietary and Confidential Information
Questions?
© 2019 TrustArc Inc Proprietary and Confidential Information
Thank You!
See http://www.trustarc.com/insightseries for the 2020
Privacy Insight Series and past webinar
recordings.
If you would like to learn more about how TrustArc can support you with compliance, please reach out to
sales@trustarc.com for a free demo.

More Related Content

What's hot

How to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy RiskHow to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy RiskTrustArc
 
Privacy Frameworks: The Foundation for Every Privacy Program
Privacy Frameworks: The Foundation for Every Privacy ProgramPrivacy Frameworks: The Foundation for Every Privacy Program
Privacy Frameworks: The Foundation for Every Privacy ProgramTrustArc
 
So Many States, So Many Privacy Laws: US State Privacy Law Update
So Many States, So Many Privacy Laws: US State Privacy Law UpdateSo Many States, So Many Privacy Laws: US State Privacy Law Update
So Many States, So Many Privacy Laws: US State Privacy Law UpdateTrustArc
 
The Court Speaks: Privacy Shield, Standard Contractual Clauses and Cookie Con...
The Court Speaks: Privacy Shield, Standard Contractual Clauses and Cookie Con...The Court Speaks: Privacy Shield, Standard Contractual Clauses and Cookie Con...
The Court Speaks: Privacy Shield, Standard Contractual Clauses and Cookie Con...TrustArc
 
Assessing Risk: How Organizations Can Proactively Manage Privacy Risk
Assessing Risk: How Organizations Can Proactively Manage Privacy RiskAssessing Risk: How Organizations Can Proactively Manage Privacy Risk
Assessing Risk: How Organizations Can Proactively Manage Privacy RiskTrustArc
 
California Consumer Privacy Act (CCPA): Countdown to Compliance
California Consumer Privacy Act (CCPA): Countdown to ComplianceCalifornia Consumer Privacy Act (CCPA): Countdown to Compliance
California Consumer Privacy Act (CCPA): Countdown to ComplianceTinuiti
 
Privacy 2020: Recap & Predictions
Privacy 2020: Recap & PredictionsPrivacy 2020: Recap & Predictions
Privacy 2020: Recap & PredictionsTrustArc
 
2019 10-23 ccpa survival guide
2019 10-23 ccpa survival guide2019 10-23 ccpa survival guide
2019 10-23 ccpa survival guideTrustArc
 
GDPR changes affect direct marketing
GDPR changes affect direct marketingGDPR changes affect direct marketing
GDPR changes affect direct marketingSpotler
 
Update Your CCPA Plan with Practical Insights into the Proposed Regulations, ...
Update Your CCPA Plan with Practical Insights into the Proposed Regulations, ...Update Your CCPA Plan with Practical Insights into the Proposed Regulations, ...
Update Your CCPA Plan with Practical Insights into the Proposed Regulations, ...TrustArc
 
2019 04-17 10 steps to ccpa compliance
2019 04-17 10 steps to ccpa compliance2019 04-17 10 steps to ccpa compliance
2019 04-17 10 steps to ccpa complianceTrustArc
 
COVID-19: What are the Potential Impacts on Data Privacy?
COVID-19: What are the Potential Impacts on Data Privacy?COVID-19: What are the Potential Impacts on Data Privacy?
COVID-19: What are the Potential Impacts on Data Privacy?TrustArc
 
2019 06-19 convince customerspartnersboard gdpr-compliant
2019 06-19 convince customerspartnersboard gdpr-compliant2019 06-19 convince customerspartnersboard gdpr-compliant
2019 06-19 convince customerspartnersboard gdpr-compliantTrustArc
 
2019 09-26 leveraging the power of automated intelligence for privacy management
2019 09-26 leveraging the power of automated intelligence for privacy management2019 09-26 leveraging the power of automated intelligence for privacy management
2019 09-26 leveraging the power of automated intelligence for privacy managementTrustArc
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
California Consumer Privacy Act: What your brand needs to know
California Consumer Privacy Act: What your brand needs to knowCalifornia Consumer Privacy Act: What your brand needs to know
California Consumer Privacy Act: What your brand needs to knowOgilvy Health
 
Understanding gdpr compliance gdpr analytics tools
Understanding gdpr compliance  gdpr analytics toolsUnderstanding gdpr compliance  gdpr analytics tools
Understanding gdpr compliance gdpr analytics toolsRominaMariaBaltariu
 

What's hot (20)

How to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy RiskHow to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy Risk
 
Privacy Frameworks: The Foundation for Every Privacy Program
Privacy Frameworks: The Foundation for Every Privacy ProgramPrivacy Frameworks: The Foundation for Every Privacy Program
Privacy Frameworks: The Foundation for Every Privacy Program
 
So Many States, So Many Privacy Laws: US State Privacy Law Update
So Many States, So Many Privacy Laws: US State Privacy Law UpdateSo Many States, So Many Privacy Laws: US State Privacy Law Update
So Many States, So Many Privacy Laws: US State Privacy Law Update
 
The Court Speaks: Privacy Shield, Standard Contractual Clauses and Cookie Con...
The Court Speaks: Privacy Shield, Standard Contractual Clauses and Cookie Con...The Court Speaks: Privacy Shield, Standard Contractual Clauses and Cookie Con...
The Court Speaks: Privacy Shield, Standard Contractual Clauses and Cookie Con...
 
Assessing Risk: How Organizations Can Proactively Manage Privacy Risk
Assessing Risk: How Organizations Can Proactively Manage Privacy RiskAssessing Risk: How Organizations Can Proactively Manage Privacy Risk
Assessing Risk: How Organizations Can Proactively Manage Privacy Risk
 
California Consumer Privacy Act (CCPA): Countdown to Compliance
California Consumer Privacy Act (CCPA): Countdown to ComplianceCalifornia Consumer Privacy Act (CCPA): Countdown to Compliance
California Consumer Privacy Act (CCPA): Countdown to Compliance
 
Privacy 2020: Recap & Predictions
Privacy 2020: Recap & PredictionsPrivacy 2020: Recap & Predictions
Privacy 2020: Recap & Predictions
 
2019 10-23 ccpa survival guide
2019 10-23 ccpa survival guide2019 10-23 ccpa survival guide
2019 10-23 ccpa survival guide
 
GDPR changes affect direct marketing
GDPR changes affect direct marketingGDPR changes affect direct marketing
GDPR changes affect direct marketing
 
Update Your CCPA Plan with Practical Insights into the Proposed Regulations, ...
Update Your CCPA Plan with Practical Insights into the Proposed Regulations, ...Update Your CCPA Plan with Practical Insights into the Proposed Regulations, ...
Update Your CCPA Plan with Practical Insights into the Proposed Regulations, ...
 
2019 04-17 10 steps to ccpa compliance
2019 04-17 10 steps to ccpa compliance2019 04-17 10 steps to ccpa compliance
2019 04-17 10 steps to ccpa compliance
 
COVID-19: What are the Potential Impacts on Data Privacy?
COVID-19: What are the Potential Impacts on Data Privacy?COVID-19: What are the Potential Impacts on Data Privacy?
COVID-19: What are the Potential Impacts on Data Privacy?
 
GDPR
GDPRGDPR
GDPR
 
2019 06-19 convince customerspartnersboard gdpr-compliant
2019 06-19 convince customerspartnersboard gdpr-compliant2019 06-19 convince customerspartnersboard gdpr-compliant
2019 06-19 convince customerspartnersboard gdpr-compliant
 
Gdpr presentation
Gdpr presentationGdpr presentation
Gdpr presentation
 
2019 09-26 leveraging the power of automated intelligence for privacy management
2019 09-26 leveraging the power of automated intelligence for privacy management2019 09-26 leveraging the power of automated intelligence for privacy management
2019 09-26 leveraging the power of automated intelligence for privacy management
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
GDPR
GDPRGDPR
GDPR
 
California Consumer Privacy Act: What your brand needs to know
California Consumer Privacy Act: What your brand needs to knowCalifornia Consumer Privacy Act: What your brand needs to know
California Consumer Privacy Act: What your brand needs to know
 
Understanding gdpr compliance gdpr analytics tools
Understanding gdpr compliance  gdpr analytics toolsUnderstanding gdpr compliance  gdpr analytics tools
Understanding gdpr compliance gdpr analytics tools
 

Similar to CCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions

Nymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesTrustArc
 
Creating a GDPR Action Plan; Not a Freakout Plan
Creating a GDPR Action Plan; Not a Freakout PlanCreating a GDPR Action Plan; Not a Freakout Plan
Creating a GDPR Action Plan; Not a Freakout PlanMediacurrent
 
Implementing And Managing A Multinational Privacy Program
Implementing And Managing A Multinational Privacy ProgramImplementing And Managing A Multinational Privacy Program
Implementing And Managing A Multinational Privacy ProgramMSpadea
 
Data protection: Steps Organisations can take to ensure compliance
Data protection: Steps Organisations can take to ensure complianceData protection: Steps Organisations can take to ensure compliance
Data protection: Steps Organisations can take to ensure complianceEquiGov Institute
 
Data Privacy: The Hidden Beast within Mergers & Acquisitions
Data Privacy: The Hidden Beast within Mergers & AcquisitionsData Privacy: The Hidden Beast within Mergers & Acquisitions
Data Privacy: The Hidden Beast within Mergers & AcquisitionsTrustArc
 
Common Practice in Data Privacy Program Management
Common Practice in Data Privacy Program ManagementCommon Practice in Data Privacy Program Management
Common Practice in Data Privacy Program ManagementEryk Budi Pratama
 
DLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The ChallengesDLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The ChallengesNapier University
 
D&B onboard.pdf
D&B onboard.pdfD&B onboard.pdf
D&B onboard.pdfWilson Kao
 
Privacy Operations (PrivacyOps) Framework - Feroot Privacy
Privacy Operations (PrivacyOps) Framework - Feroot PrivacyPrivacy Operations (PrivacyOps) Framework - Feroot Privacy
Privacy Operations (PrivacyOps) Framework - Feroot PrivacyIvan Tsarynny
 
PrivacyOps Framework
PrivacyOps FrameworkPrivacyOps Framework
PrivacyOps FrameworkFeroot
 
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020Delphix
 
Data Analytics for Auditors Analysis and Monitoring
Data Analytics for Auditors Analysis and MonitoringData Analytics for Auditors Analysis and Monitoring
Data Analytics for Auditors Analysis and MonitoringJim Kaplan CIA CFE
 
General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6 General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6 Jim Kaplan CIA CFE
 
What is a data protection impact assessment? what are the essential stages to...
What is a data protection impact assessment? what are the essential stages to...What is a data protection impact assessment? what are the essential stages to...
What is a data protection impact assessment? what are the essential stages to...Infinity Legal Solutions
 
Privacy Policies: Guide to Protecting User Data
Privacy Policies: Guide to Protecting User DataPrivacy Policies: Guide to Protecting User Data
Privacy Policies: Guide to Protecting User DataPrivacyCenter.cloud
 
Wayne richard - pia risk management - atlseccon2011
Wayne richard - pia risk management - atlseccon2011Wayne richard - pia risk management - atlseccon2011
Wayne richard - pia risk management - atlseccon2011Atlantic Security Conference
 

Similar to CCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions (20)

Nymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 States
 
Creating a GDPR Action Plan; Not a Freakout Plan
Creating a GDPR Action Plan; Not a Freakout PlanCreating a GDPR Action Plan; Not a Freakout Plan
Creating a GDPR Action Plan; Not a Freakout Plan
 
Implementing And Managing A Multinational Privacy Program
Implementing And Managing A Multinational Privacy ProgramImplementing And Managing A Multinational Privacy Program
Implementing And Managing A Multinational Privacy Program
 
Data protection: Steps Organisations can take to ensure compliance
Data protection: Steps Organisations can take to ensure complianceData protection: Steps Organisations can take to ensure compliance
Data protection: Steps Organisations can take to ensure compliance
 
Data Privacy: The Hidden Beast within Mergers & Acquisitions
Data Privacy: The Hidden Beast within Mergers & AcquisitionsData Privacy: The Hidden Beast within Mergers & Acquisitions
Data Privacy: The Hidden Beast within Mergers & Acquisitions
 
What is CT- DPO.pdf
What is CT- DPO.pdfWhat is CT- DPO.pdf
What is CT- DPO.pdf
 
Common Practice in Data Privacy Program Management
Common Practice in Data Privacy Program ManagementCommon Practice in Data Privacy Program Management
Common Practice in Data Privacy Program Management
 
DLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The ChallengesDLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The Challenges
 
D&B onboard.pdf
D&B onboard.pdfD&B onboard.pdf
D&B onboard.pdf
 
California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)
 
GDPR Series Session 4
GDPR Series Session 4GDPR Series Session 4
GDPR Series Session 4
 
Privacy Operations (PrivacyOps) Framework - Feroot Privacy
Privacy Operations (PrivacyOps) Framework - Feroot PrivacyPrivacy Operations (PrivacyOps) Framework - Feroot Privacy
Privacy Operations (PrivacyOps) Framework - Feroot Privacy
 
PrivacyOps Framework
PrivacyOps FrameworkPrivacyOps Framework
PrivacyOps Framework
 
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
 
Data Analytics for Auditors Analysis and Monitoring
Data Analytics for Auditors Analysis and MonitoringData Analytics for Auditors Analysis and Monitoring
Data Analytics for Auditors Analysis and Monitoring
 
General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6 General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6
 
What is a data protection impact assessment? what are the essential stages to...
What is a data protection impact assessment? what are the essential stages to...What is a data protection impact assessment? what are the essential stages to...
What is a data protection impact assessment? what are the essential stages to...
 
Privacy Policies: Guide to Protecting User Data
Privacy Policies: Guide to Protecting User DataPrivacy Policies: Guide to Protecting User Data
Privacy Policies: Guide to Protecting User Data
 
Wayne richard - pia risk management - atlseccon2011
Wayne richard - pia risk management - atlseccon2011Wayne richard - pia risk management - atlseccon2011
Wayne richard - pia risk management - atlseccon2011
 
All about a DPIA by Andrey Prozorov 2.0, 220518.pdf
All about a DPIA by Andrey Prozorov 2.0, 220518.pdfAll about a DPIA by Andrey Prozorov 2.0, 220518.pdf
All about a DPIA by Andrey Prozorov 2.0, 220518.pdf
 

More from TrustArc

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc
 
TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc
 
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc
 
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...TrustArc
 
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...TrustArc
 
CBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceCBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceTrustArc
 
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfEverything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfTrustArc
 
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...TrustArc
 
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsPrivacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsTrustArc
 
Building Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsBuilding Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsTrustArc
 
The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...TrustArc
 
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdfTrustArc
 
Artificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceArtificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceTrustArc
 
How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023TrustArc
 
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act:  Using Consumer Data and Maintaining TrustThe Ultimate Balancing Act:  Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act: Using Consumer Data and Maintaining TrustTrustArc
 
The Cost of Privacy Teams: What Your Business Needs To Know
The Cost of Privacy Teams: What Your Business Needs To KnowThe Cost of Privacy Teams: What Your Business Needs To Know
The Cost of Privacy Teams: What Your Business Needs To KnowTrustArc
 
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdf
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdfTrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdf
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdfTrustArc
 
TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?
TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?
TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?TrustArc
 

More from TrustArc (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
 
TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI Innovations
 
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
 
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
 
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
 
CBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceCBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy Compliance
 
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfEverything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
 
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
 
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsPrivacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
 
Building Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsBuilding Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy Certifications
 
The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...
 
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
 
Artificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceArtificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI Governance
 
How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023
 
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act:  Using Consumer Data and Maintaining TrustThe Ultimate Balancing Act:  Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust
 
The Cost of Privacy Teams: What Your Business Needs To Know
The Cost of Privacy Teams: What Your Business Needs To KnowThe Cost of Privacy Teams: What Your Business Needs To Know
The Cost of Privacy Teams: What Your Business Needs To Know
 
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdf
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdfTrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdf
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdf
 
TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?
TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?
TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?
 

Recently uploaded

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Recently uploaded (20)

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

CCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions

  • 1. 1 © 2020 TrustArc Inc. Proprietary and Confidential Information. CCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions July 29, 2020
  • 2. 2 ● We will be starting a couple minutes after the hour ● This webinar will be recorded and the recording and slides sent out later today ● Please use the GoToWebinar control panel on the right hand side to submit any questions for the speakers Thank you for joining the webinar “CCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions”
  • 3. 3 Speakers K Royal, FIP, CIPP/US / E, CIPM, CDPSE Associate General Counsel - Privacy Intelligence TrustArc Beth Sipula, FIP, CIPM, CIPP/US Director, Consulting TrustArc
  • 4. 4 CCPA Overview and Main Components Journey Stages of CCPA Program Management Maturity TrustArc CCPA Solutions for Every Stage of Compliance Today’s Goals
  • 5. 5 CCPA Overview 5 California Consumer Privacy Act ● Passed in June 2018 and revised later in September ○ then revised in October 2019 ● Broadest privacy law in the U.S. ● Impacts any business with data on California consumers, households, or devices ● Regulations submitted to Office of Administrative Law ● Meanwhile, California Privacy Rights Act is on the November ballot Top Provisions of the CCPA ● Expanded scope: people and data ● Transparency and notice ● Individual rights and “Do not sell my personal data” ● Private right of action
  • 6. 6 California Privacy Rights Act - CPRA 6 ● Ballot initiative - https://www.caprivacy.org/ ● Definitions ○ Consent, contractor, share, sensitive personal information, and business definition amended regarding applicability within those sharing branding ● Rights ○ Correction and limit use and disclosure of SPI ● Third parties / service providers ○ Notice at collection, contractual obligations, requires levels or protection, cooperation on consumer requests, flowdown provisions ● Security ○ Explicit provisions, “reasonable” and “appropriate to the nature” of PI, annual audit of cybersecurity with submission to the Consumer Privacy Protection Agency
  • 7. 7 Transparency Individual Rights Third Party Management Risk Management (including security) Main Components of CCPA
  • 8. 8 Notice and data processing activities - online and in person, internal and external ● A business that collects a consumer’s personal information shall, ○ at or before the point of collection, ○ inform consumers as to the ■ the categories of personal information to be collected and ■ the purposes for which the categories of personal information shall be used. ● A business shall not collect additional categories of personal information or use personal information collected for additional purposes without providing the consumer with notice consistent with this section. Additional Elements ● Be informed of rights ● Reasonably accessible ● Clear and conspicuous link (do not sell) Transparency - Overview
  • 9. 9 Know the requirements Follow the requirements Update and Review Develop Process: Identify elements - online and offline, Provide notice, Quality checks, Update as needed, Review regularly Data inventory and practices Know Your Data Internal and External Notice https://www.w3.org/WAI/standards-guidelines/wcag/ Transparency - Compliance
  • 10. 10 Individual Rights - Overview Right to Know / Request Access Right to Non-discrimination Right to Opt OutRight to Delete Plus, portability (easily accessible format) and notice. CPRA adds right to correction.
  • 11. 11 Know Your Data ResponseIntake Develop Process: Intake, Internal Routing, Response (substance and form)Data inventory Individual Rights - Compliance
  • 12. 12 Third Party Management - Overview Service Provider definition ○ processes information on behalf of a business ○ to which the business discloses a consumer’s PI ○ for a business purpose ○ pursuant to a written contract ○ provided that the contract prohibits: ■ retaining, using, or disclosing the PI for any purpose, including commercial purposes, other than for the specific purpose of performing the services specified in the contract for the business Third party definition – anyone who is NOT ○ Under contract with restrictions on ■ Selling the PI ■ retaining, using, or disclosing the PI for any purpose, including commercial purposes, other than for the specific purpose of performing the services specified in the contract for the business ■ Retaining, using, or disclosing the information outside of the direct business relationship between the person and the business ○ Includes a certification of understanding the restrictions and will comply
  • 13. 13 Third Party Management - Compliance Identify Identify the third parties that interact with personal information, at some point along the information lifecycle Assess Assess risks associated with the third party, classify based on risk, identify mitigations in place Address Address actions needed by priority, assign responsibility, mitigate
  • 14. 14 Risk Management - Overview Notice / Awareness Processes & Controls Third PartiesPersonal Information Identify risks, Analyze risks, Evaluate / prioritize risks, Mitigate risks, Monitor effectiveness of controls, Review & Reassess
  • 15. 15 Platform Capabilities PRIVACY OUTCOMES Regulatory Insights and Monitoring Privacy Program Insights Risk Management Benchmarks and Planning Consent Management Privacy Rights Management Breach Response Audit and Assurance Compliance Monitoring Awareness Task Management and Action Plans Reporting DataCapture Applications External API’s KNOWLEDGE BASE Data Inventory Hub My Company Info Tracker Scans Intelligence System(IoP) Libraries TrustArc Privacy and Data Governance Accountability Framework Law and Regulatory Standards Repository INTELLIGENCE ENGINES Risk Management - Compliance TrustArc Data Privacy Management Platform Deep Intelligence + Complete Automation
  • 16. © 2019 TrustArc Inc Proprietary and Confidential Information CCPA Privacy Management Journey
  • 17. 17 Privacy Management Journey Predict and Prioritize • Privacy roles and team built • Management reviews formalized (int/ext) • Cross-functional process and automation in place • Real-time monitoring in place Managed Semi-Automated • Functional team identified • Procedures and processes implemented • Business communicates processes internally Defined Document Sharing • Some policies centrally managed in silos • Some procedures and processes • Leadership awareness but resources are limited Repeatable Usage & Expertise IncreaseEfficiency&Effectiveness Spreadsheets and Decentralized • Decentralized • Informal, inconsistent procedures and processes • Reactive • Leadership awareness limited Ad Hoc Continuous Improvement • Leadership engaged on privacy team outcomes • Continuous monitoring & risk assessments • Risk-aware enterprise and embedded controls • Remedial actions taken to ensure compliance Optimized Based on AICPA/CICA Privacy Maturity Model
  • 18. 18 Poll Question 18 Where are you in your CCPA privacy management journey? ● Ad Hoc ● Repeatable ● Defined ● Managed ● Optimized
  • 19. 19 Privacy Management Journey Predict and Prioritize Managed Semi-Automated Defined Document Sharing Repeatable Spreadsheets and Decentralized Ad Hoc Continuous Improvement Optimized Individual Rights Request Vendor Termination Client Request Potential Incident
  • 20. 20 Privacy Management Journey: Ad Hoc Spreadsheets and Decentralized • Decentralized • Informal, inconsistent procedures and processes • Reactive • Leadership awareness limited Ad Hoc *Based on AICPA/CICA Privacy Maturity Model Knowledge: Understand the internal and external environment and what data, jurisdictions, standards/rules, business activities apply and how. Begin to educate leaders and prioritize efforts. Main Goal Vendors, current practices, data, leader knowledge, priorities. Focus Area Document third parties and systems, conduct third party and company risk assessments, determine which requirements apply, assess preparedness, create policy and standard library, prioritize and track remediation activities. TrustArc
  • 23. 23 Privacy Management Journey: Repeatable Document Sharing • Some policies centrally managed in silos • Some procedures and processes • Leadership awareness but resources are limited Repeatable *Based on AICPA/CICA Privacy Maturity Model Build Components: Identify functions critical in a privacy program, begin to address gaps, enhance knowledge across select functions within organization. Main Goal Organizational data and internal policies, individual rights, consent and transparency, transborder data flow. Focus Area Data Inventory and DPIA assistance, outsourced Privacy Office, Enterprise Certification, APEC Privacy Recognition for Processors. TrustArc
  • 26. 26 Privacy Management Journey: Defined Semi-Automated • Functional team identified • Procedures and processes implemented • Business communicates processes internally Defined *Based on AICPA/CICA Privacy Maturity Model Operational Efficiency: Continue to address compliance issues and formalize the privacy program; identify opportunities to increase efficiency and scalability through automation. Establish a privacy culture and communicate externally. Main Goal Continue to close high priority gaps: DPIAs/PIAs, individual rights, transparency, third party management, incident response and breach, transborder data flow issues. Focus Area Document business processes, conduct DPIAs/PIAs, review third parties, review risks and track activities, manage individual rights. TrustArc
  • 29. 29 Privacy Management Journey: Managed Predict and Prioritize • Privacy roles and team built • Management reviews formalized (int/ext) • Cross-functional process and automation in place • Real-time monitoring in place Managed *Based on AICPA/CICA Privacy Maturity Model Consistency and wisdom. Run an effective and efficient privacy program; implement internal and external management/operational reviews. Main Goal Consistently manage processes to review and refresh program data; gather and make decisions based on program data. Focus Area Run automated assessments and refresh activities on a regular basis, review program metrics/report/adjust privacy program plan; Establish oversight, monitoring, and executive/board reporting supported by technology. TrustArc
  • 30. 30 Privacy Profile Demonstrate privacy compliance and accountability to customers, partners, and the public through participation in a TRUSTe Assurance Program Determine which Assurance Programs will mitigate your international data transfer risks Prepare to demonstrate compliance and accountability with Your Policy and Standards Library and Operational Templates Monitor and audit privacy compliance and accountability with Attestor
  • 31. 31 Privacy Management Journey: Optimized Continuous Improvement • Leadership engaged on privacy team outcomes • Continuous monitoring & risk assessments • Risk-aware enterprise and embedded controls • Remedial actions taken to ensure compliance Optimized *Based on AICPA/CICA Privacy Maturity Model Continuous Improvement: Review progress internally and compare with peers. Main Goal Regularly review and refine all privacy program component risks, goals, and activities. Compare results with other organizations, new expectations in the law or marketplace. Report and adjust. Focus Area Leverage results of technology-supported monitoring, benchmark against others, and make adjustments. TrustArc
  • 32. 32 The tech works for you...
  • 33. © 2019 TrustArc Inc Proprietary and Confidential Information Questions?
  • 34. © 2019 TrustArc Inc Proprietary and Confidential Information Thank You! See http://www.trustarc.com/insightseries for the 2020 Privacy Insight Series and past webinar recordings. If you would like to learn more about how TrustArc can support you with compliance, please reach out to sales@trustarc.com for a free demo.