SlideShare a Scribd company logo
1 of 24
Download to read offline
1
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
v © TRUSTe Inc., 2016
Metrics for Success: Quantifying
the Value of the Privacy Function
December 8, 2016
2
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
Today’s Speakers
Deidre Rodriguez
Director, Corporate Privacy Office
Anthem, Inc
Marcus Morissette
Global Privacy Officer
eBay
Kevin Trilli,
SVP Product,
TRUSTe
3
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
v © TRUSTe Inc., 2016
Privacy Metrics and Dashboard
Kevin Trilli, SVP Product, TRUSTe
4
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
• Speaker Intros
• Metrics and Privacy Organization
• Categories and types of Metrics
• Building / establishing a Monitoring Program
• Challenges and Recommendations
Agenda
5
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
v © TRUSTe Inc., 2016
Privacy Metrics
6
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
Purposes and Categories of Metrics
Target Audience Audience Purpose
Privacy Officer /
Privacy Manager
Internal • Program development
• Organizational Management
Executives / BOD Internal • Communicate overall risk
posture
• Resource requests
Auditors /
Regulators
External • Demonstrate program
accountability and effectiveness
• Transparency
7
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
• Initial stage is strategy planning and development
– Requires selecting and planning a set of program activities
– Establish required set of resources
• On-going management
– Program and goal management
– Resource utilization
– Gaps / program maturity velocity
CPO/Privacy Manager:
Program Establishment, Evolution and Budgeting
8
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
Example: Privacy Program Management
9
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
• Inbound inquiries to privacy team (tickets/advise/projects)
– % utilization
• Policies under management
–Reflective of external and internal laws, regs, policies  shows scope
• Assets under management
– Data processing applications and systems
• Projects (risk assessments, PIAs, etc)
– #, state, aging, response time
– risk issues identified and remediated
• Incidents (breach, data release, reg inquiries)
– #, type and risk levels, remediation plan
• All are mapped to each BU to show status across enterprise
–Includes HR, IT and Marketing functional groups as needed
CPO/Privacy Manager: Operational Management
10
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
Example: Risk Assessment and Remediation Metrics
11
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
• Privacy Program Overview / Budgeting
– Program to Goal (%)
– Overall Resource allocation
– Budget justification
• Risks
– Incidents
– Regulatory enquiries
– Related fines/investigations (vertical)
– Heat Map
Executive / BOD
12
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
• Derived from internal metrics/dashboard, but may need
sanitizing
• Have ready on-demand to demonstrate program
– Ideal: Technological system of record that can grow and aggregate
project/project
– Maintained for data integrity
• Basics:
– Database of data processing assets (#, classified by risk) with metadata
– Construction of key data transfers (EU, APEC)
– Consumer metrics (inquiries/disputes and resolution paths)
• Needs to accompanied by evidence/documentation
External Reporting
13
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
Example: Asset Inventory characterized by risk
14
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
v © TRUSTe Inc., 2016
Where to Start
15
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
• First socialize with stakeholders / execs
• Determine what matters most / scope
• Prioritize to get started
• Assess current capabilities
Starting a Monitoring Program
16
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
•Document your privacy program plan to get ready
–Will you need to develop emails or templates for use during monitoring
(announcement emails, SharePoint sites created, who will be responsible for
what)
–Determine where you will store data and who will have access
–Are there callouts/disclaimers that need to added to metrics?
–When will metrics be produced and by whom
–Stagger monitoring so that it will not create negative impact for the business
–Understand any reporting/monitoring that may be done in the business that will
have potential impact
–Write desktop procedure for how everything will happen A-Z
• Communicate across broader organization
Starting a Monitoring Program
17
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
v © TRUSTe Inc., 2016
Beginning to Monitor
18
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
•Identify lead that will be responsible for monitoring a specific piece of
work
•Put everything on the calendar
–Date you will start sending requests to business
–Date you will analyze data
–Date that you will document findings
–Date you will review metrics
–Date that you will release metrics
–Date corrective action plans will be due
–Any ongoing follow up or re-monitoring to ensure issue has been adequately
addressed
•Keep leadership informed of roll out and any changes to program that
may impact them
Beginning to Monitor
19
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
v © TRUSTe Inc., 2016
Continuing to Grow Monitoring
Program
20
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
•Continue to monitor risks and what matters most
•Identify plan to grow program
–What will be monitored next and why
–Doing it by risk is easiest to explain
–Continue to lobby for resources to expand program
•Continue to collect feedback on metrics
•Document all findings and do follow up on corrective action plans
–This enables you to show leadership the positive impact of your program (what
were you able to find and correct)
•Partner with Internal Audit
•Roll up data by quarter and produce annual metrics
Growing Monitoring Program
21
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
v © TRUSTe Inc., 2016
Challenges and Takeaways
22
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
• How to do actual job but also measure and
document
• Control of data sources that feed metrics
• Dealing with aspects of privacy
management that don’t have easy metrics
Challenges
23
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
v © TRUSTe Inc., 2016
Deidre Rodrigeuz Deidre.Rodriguez@anthem.com
Marcus Morissette mmorissette@ebay.com
Kevin Trilli ktrilli@truste.com
Contacts
24
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
v © TRUSTe Inc., 2016
Details of our 2017 Winter/Spring Webinar Series will be available shortly.
See http://www.truste.com/insightseries for all the 2016 Privacy Insight
Series and past webinar recordings.
Thank You!

More Related Content

Viewers also liked

[Privacy Webinar Slides] Global Enforcement Priorities
[Privacy Webinar Slides] Global Enforcement Priorities[Privacy Webinar Slides] Global Enforcement Priorities
[Privacy Webinar Slides] Global Enforcement PrioritiesTrustArc
 
2015 TRUSTe US Consumer Privacy Confidence Index – Infographic
2015 TRUSTe US Consumer Privacy Confidence Index – Infographic2015 TRUSTe US Consumer Privacy Confidence Index – Infographic
2015 TRUSTe US Consumer Privacy Confidence Index – InfographicTrustArc
 
EU US Privacy Shield vs. GDPR Infographic from TRUSTe
EU US Privacy Shield vs. GDPR Infographic from TRUSTeEU US Privacy Shield vs. GDPR Infographic from TRUSTe
EU US Privacy Shield vs. GDPR Infographic from TRUSTeTrustArc
 
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe TrustArc
 
What does the Proposed EU General Data Protection Regulation (GDPR) mean for ...
What does the Proposed EU General Data Protection Regulation (GDPR) mean for ...What does the Proposed EU General Data Protection Regulation (GDPR) mean for ...
What does the Proposed EU General Data Protection Regulation (GDPR) mean for ...TrustArc
 
TEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkTEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkVolker Hirsch
 

Viewers also liked (7)

[Privacy Webinar Slides] Global Enforcement Priorities
[Privacy Webinar Slides] Global Enforcement Priorities[Privacy Webinar Slides] Global Enforcement Priorities
[Privacy Webinar Slides] Global Enforcement Priorities
 
2015 TRUSTe US Consumer Privacy Confidence Index – Infographic
2015 TRUSTe US Consumer Privacy Confidence Index – Infographic2015 TRUSTe US Consumer Privacy Confidence Index – Infographic
2015 TRUSTe US Consumer Privacy Confidence Index – Infographic
 
EU US Privacy Shield vs. GDPR Infographic from TRUSTe
EU US Privacy Shield vs. GDPR Infographic from TRUSTeEU US Privacy Shield vs. GDPR Infographic from TRUSTe
EU US Privacy Shield vs. GDPR Infographic from TRUSTe
 
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
 
What does the Proposed EU General Data Protection Regulation (GDPR) mean for ...
What does the Proposed EU General Data Protection Regulation (GDPR) mean for ...What does the Proposed EU General Data Protection Regulation (GDPR) mean for ...
What does the Proposed EU General Data Protection Regulation (GDPR) mean for ...
 
Build Features, Not Apps
Build Features, Not AppsBuild Features, Not Apps
Build Features, Not Apps
 
TEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkTEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of Work
 

More from TrustArc

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc
 
TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc
 
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc
 
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...TrustArc
 
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...TrustArc
 
Nymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesTrustArc
 
CBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceCBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceTrustArc
 
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfEverything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfTrustArc
 
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...TrustArc
 
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsPrivacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsTrustArc
 
Building Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsBuilding Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsTrustArc
 
The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...TrustArc
 
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdfTrustArc
 
Artificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceArtificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceTrustArc
 
How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023TrustArc
 
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act:  Using Consumer Data and Maintaining TrustThe Ultimate Balancing Act:  Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act: Using Consumer Data and Maintaining TrustTrustArc
 
The Cost of Privacy Teams: What Your Business Needs To Know
The Cost of Privacy Teams: What Your Business Needs To KnowThe Cost of Privacy Teams: What Your Business Needs To Know
The Cost of Privacy Teams: What Your Business Needs To KnowTrustArc
 
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdf
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdfTrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdf
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdfTrustArc
 

More from TrustArc (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
 
TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI Innovations
 
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
 
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
 
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
 
Nymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 States
 
CBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceCBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy Compliance
 
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfEverything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
 
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
 
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsPrivacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
 
Building Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsBuilding Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy Certifications
 
The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...
 
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
 
Artificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceArtificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI Governance
 
How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023
 
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act:  Using Consumer Data and Maintaining TrustThe Ultimate Balancing Act:  Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust
 
The Cost of Privacy Teams: What Your Business Needs To Know
The Cost of Privacy Teams: What Your Business Needs To KnowThe Cost of Privacy Teams: What Your Business Needs To Know
The Cost of Privacy Teams: What Your Business Needs To Know
 
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdf
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdfTrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdf
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdf
 

Recently uploaded

Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791BlayneRush1
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A HistoryJohn Hustaix
 
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxSarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxAnto Jebin
 
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfWurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfssuser3e15612
 
Guide for Drug Education and Vice Control.docx
Guide for Drug Education and Vice Control.docxGuide for Drug Education and Vice Control.docx
Guide for Drug Education and Vice Control.docxjennysansano2
 
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los AngelesAre There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los AngelesChesley Lawyer
 
Illinois Department Of Corrections reentry guide
Illinois Department Of Corrections reentry guideIllinois Department Of Corrections reentry guide
Illinois Department Of Corrections reentry guideillinoisworknet11
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaAbheet Mangleek
 
Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxBharatMunjal4
 
Succession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeSuccession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeMelvinPernez2
 
PPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training CenterPPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training Centerejlfernandez22
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...shubhuc963
 
citizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicablecitizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicableSaraSantiago44
 
SecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfSecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfDrNiteshSaraswat
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeBlayneRush1
 
Alexis OConnell mugshot Lexileeyogi 512-840-8791
Alexis OConnell mugshot Lexileeyogi 512-840-8791Alexis OConnell mugshot Lexileeyogi 512-840-8791
Alexis OConnell mugshot Lexileeyogi 512-840-8791BlayneRush1
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementShubhiSharma858417
 
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTSTHE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTSRoshniSingh312153
 
Presentation1.pptx on sedition is a good legal point
Presentation1.pptx on sedition is a good legal pointPresentation1.pptx on sedition is a good legal point
Presentation1.pptx on sedition is a good legal pointMohdYousuf40
 
The Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxThe Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxAdityasinhRana4
 

Recently uploaded (20)

Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A History
 
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxSarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
 
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfWurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
 
Guide for Drug Education and Vice Control.docx
Guide for Drug Education and Vice Control.docxGuide for Drug Education and Vice Control.docx
Guide for Drug Education and Vice Control.docx
 
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los AngelesAre There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
 
Illinois Department Of Corrections reentry guide
Illinois Department Of Corrections reentry guideIllinois Department Of Corrections reentry guide
Illinois Department Of Corrections reentry guide
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in India
 
Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptx
 
Succession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeSuccession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil Code
 
PPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training CenterPPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training Center
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...
 
citizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicablecitizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicable
 
SecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfSecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdf
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
 
Alexis OConnell mugshot Lexileeyogi 512-840-8791
Alexis OConnell mugshot Lexileeyogi 512-840-8791Alexis OConnell mugshot Lexileeyogi 512-840-8791
Alexis OConnell mugshot Lexileeyogi 512-840-8791
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreement
 
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTSTHE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
 
Presentation1.pptx on sedition is a good legal point
Presentation1.pptx on sedition is a good legal pointPresentation1.pptx on sedition is a good legal point
Presentation1.pptx on sedition is a good legal point
 
The Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxThe Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptx
 

Metrics for Success: Quantifying the Value of the Privacy Function [Webinar Slides]

  • 1. 1 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 v © TRUSTe Inc., 2016 Metrics for Success: Quantifying the Value of the Privacy Function December 8, 2016
  • 2. 2 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 Today’s Speakers Deidre Rodriguez Director, Corporate Privacy Office Anthem, Inc Marcus Morissette Global Privacy Officer eBay Kevin Trilli, SVP Product, TRUSTe
  • 3. 3 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 v © TRUSTe Inc., 2016 Privacy Metrics and Dashboard Kevin Trilli, SVP Product, TRUSTe
  • 4. 4 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 • Speaker Intros • Metrics and Privacy Organization • Categories and types of Metrics • Building / establishing a Monitoring Program • Challenges and Recommendations Agenda
  • 5. 5 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 v © TRUSTe Inc., 2016 Privacy Metrics
  • 6. 6 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 Purposes and Categories of Metrics Target Audience Audience Purpose Privacy Officer / Privacy Manager Internal • Program development • Organizational Management Executives / BOD Internal • Communicate overall risk posture • Resource requests Auditors / Regulators External • Demonstrate program accountability and effectiveness • Transparency
  • 7. 7 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 • Initial stage is strategy planning and development – Requires selecting and planning a set of program activities – Establish required set of resources • On-going management – Program and goal management – Resource utilization – Gaps / program maturity velocity CPO/Privacy Manager: Program Establishment, Evolution and Budgeting
  • 8. 8 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 Example: Privacy Program Management
  • 9. 9 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 • Inbound inquiries to privacy team (tickets/advise/projects) – % utilization • Policies under management –Reflective of external and internal laws, regs, policies  shows scope • Assets under management – Data processing applications and systems • Projects (risk assessments, PIAs, etc) – #, state, aging, response time – risk issues identified and remediated • Incidents (breach, data release, reg inquiries) – #, type and risk levels, remediation plan • All are mapped to each BU to show status across enterprise –Includes HR, IT and Marketing functional groups as needed CPO/Privacy Manager: Operational Management
  • 10. 10 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 Example: Risk Assessment and Remediation Metrics
  • 11. 11 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 • Privacy Program Overview / Budgeting – Program to Goal (%) – Overall Resource allocation – Budget justification • Risks – Incidents – Regulatory enquiries – Related fines/investigations (vertical) – Heat Map Executive / BOD
  • 12. 12 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 • Derived from internal metrics/dashboard, but may need sanitizing • Have ready on-demand to demonstrate program – Ideal: Technological system of record that can grow and aggregate project/project – Maintained for data integrity • Basics: – Database of data processing assets (#, classified by risk) with metadata – Construction of key data transfers (EU, APEC) – Consumer metrics (inquiries/disputes and resolution paths) • Needs to accompanied by evidence/documentation External Reporting
  • 13. 13 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 Example: Asset Inventory characterized by risk
  • 14. 14 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 v © TRUSTe Inc., 2016 Where to Start
  • 15. 15 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 • First socialize with stakeholders / execs • Determine what matters most / scope • Prioritize to get started • Assess current capabilities Starting a Monitoring Program
  • 16. 16 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 •Document your privacy program plan to get ready –Will you need to develop emails or templates for use during monitoring (announcement emails, SharePoint sites created, who will be responsible for what) –Determine where you will store data and who will have access –Are there callouts/disclaimers that need to added to metrics? –When will metrics be produced and by whom –Stagger monitoring so that it will not create negative impact for the business –Understand any reporting/monitoring that may be done in the business that will have potential impact –Write desktop procedure for how everything will happen A-Z • Communicate across broader organization Starting a Monitoring Program
  • 17. 17 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 v © TRUSTe Inc., 2016 Beginning to Monitor
  • 18. 18 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 •Identify lead that will be responsible for monitoring a specific piece of work •Put everything on the calendar –Date you will start sending requests to business –Date you will analyze data –Date that you will document findings –Date you will review metrics –Date that you will release metrics –Date corrective action plans will be due –Any ongoing follow up or re-monitoring to ensure issue has been adequately addressed •Keep leadership informed of roll out and any changes to program that may impact them Beginning to Monitor
  • 19. 19 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 v © TRUSTe Inc., 2016 Continuing to Grow Monitoring Program
  • 20. 20 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 •Continue to monitor risks and what matters most •Identify plan to grow program –What will be monitored next and why –Doing it by risk is easiest to explain –Continue to lobby for resources to expand program •Continue to collect feedback on metrics •Document all findings and do follow up on corrective action plans –This enables you to show leadership the positive impact of your program (what were you able to find and correct) •Partner with Internal Audit •Roll up data by quarter and produce annual metrics Growing Monitoring Program
  • 21. 21 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 v © TRUSTe Inc., 2016 Challenges and Takeaways
  • 22. 22 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 • How to do actual job but also measure and document • Control of data sources that feed metrics • Dealing with aspects of privacy management that don’t have easy metrics Challenges
  • 23. 23 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 v © TRUSTe Inc., 2016 Deidre Rodrigeuz Deidre.Rodriguez@anthem.com Marcus Morissette mmorissette@ebay.com Kevin Trilli ktrilli@truste.com Contacts
  • 24. 24 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 v © TRUSTe Inc., 2016 Details of our 2017 Winter/Spring Webinar Series will be available shortly. See http://www.truste.com/insightseries for all the 2016 Privacy Insight Series and past webinar recordings. Thank You!