SlideShare a Scribd company logo
1 of 28
Download to read offline
Underwritten by:
#AIIMYour Digital Transformation Begins with
Intelligent Information Management
Data Privacy for the IM Practitioner:
Practical Advice for
Preparedness and Prevention
Presented February 26, 2020
Note – the art of this
cover slide will change.
Data Privacy for the IM Practitioner:
Practical Advice for Preparedness and Prevention
An AIIM Webinar presented February 26, 2020
Underwritten by:
Today’s Speakers
Kevin Craine
Content Strategist, AIIM
Host of AIIM On Air
John Montaña, J.D., FIIM, FAI
VP, Information Governance at Access
CEO, Montaña & Associates an Access Company
Host: Theresa Resek, CIP
VP, Market Intelligence
AIIM
Underwritten by:
Kevin Craine
Content Strategist, AIIM
Host of AIIM On Air
Introducing our Speaker
Underwritten by:
Driving Demand for Data Privacy
• Data privacy is on the mind of
C-Suite leaders in all industries.
• No organization is safe from
potential cyber theft and intrusion.
• In 2019, 2.7 billion identity records
were exposed by hackers and
placed for sale on the internet.
• Legislation worldwide has become
increasingly strict.
• Expectations are ever-evolving.
• Perception is everything in the eyes
of the market.
Underwritten by:
Underwritten by:
Volume, Velocity, and Variety
• Organizations anticipate the volume of information
will grow from X to 4.5X in the coming year.
• Over 60% of that information sprawl is
unstructured.
• Organizations are embracing technologies and
approaches that automate governance and
compliance.
• According to AIIM research, 51% of organizations
say that they are planning to spend “more” or “a
lot more” on information governance over the next
18-24 months.
Underwritten by:
Inevitable and Costly
• Experts tell us that the question is
not IF it will happen, but WHEN.
• The chances of being struck by
lightning = one in a million.
• The chances of organizations getting
hacked this year = one in four.
• The average total cost of a single
data breach is estimated at nearly $4
million.
• That calculation can certainly be
much higher – legal expense, fines,
and penalties; the loss of goodwill in
the market.
Underwritten by:
Recommendations
Implement a formal approach.
Have a plan and stick to it.
Regularly (annually) review, evaluate, and update your plan as
needed.
Place the privacy and security of information on the front burner of
strategic concerns.
Underwritten by:
John Montaña, J.D., FIIM, FAI
VP, Information Governance at Access
CEO, Montaña & Associates an Access Company
Introducing our Speaker
Underwritten by:
You say that Legislators
don't understand how
large companies work.
What do you mean by
that?
Underwritten by:
Legislation is Created in a Silo
Just knowing
what’s there – it’s
a lot of law, in a
lot of places
Outright conflicts – minimum
retention requirements versus
maximum permissible retention
Interpreting
dated or
vague laws
IT configuration – how to
make it all work in a big IT
environment
Administrative complexity – how
to manage dozens or hundreds of
unique requirements
Underwritten by:
What are some of the
considerations that IIM
pros must deal with that
legislators miss in the mix?
Underwritten by:
Considerations for Applying Privacy Legislation
Applying Legislation to Today… Taking into Account Yesterday…
Legislation was written without consideration for:
• Back file of old IT systems and physical boxes of records
• Most IT systems available when the laws were written are not capable of applying
law
• Even if capable, they are often not configured in a manner that supports being
compliant
• Non-compliant implementations are difficult to undo
Underwritten by:
Let’s talk about specific steps
to build an effective privacy
plan. You say it’s important
to start with a thorough
understanding of the current
capabilities within the
enterprise. Isn’t that just
more “analysis paralysis?”
Underwritten by:
Utilize Project Management Principles
1 2 3
4 5
Develop a clearly written
initial project scope /
charter / documentation
Develop a high-level project
roadmap / framework
• What industry / data types you are trying to
apply “privacy” to
• What is the information life-cycle for PII / SI?
• Establish a timeline with realistic milestones
• Regularly adjust / incorporate PIA findings
Clearly establish roles /
responsibilities – decision
rights
• Chief Privacy Officer (CPO) / Data
Protection Officer (DPO)
• Privacy Office (PO)
Develop a communication /
marketing plan
Prepare a budget
Underwritten by:
Now that I’ve surveyed
the technical
environment...
what’s next?
What are some steps
to build a meaningful
project plan?
Underwritten by:
Building the Privacy Program
Core Components Review
Create inventory
of Personal
Information Banks
(PIBs)
Develop staff
education and
awareness training and
collateral and
Communication plan
Post Privacy Policy and
Principles on the
organization’s website
Develop Privacy Notice
signage and arrange
for posting in relevant
areas (such as those
with video capture)
Actually apply the
retention schedule and
purge data that is not
needed
Do not collect
unnecessary data
that is not required
or contains PII
Underwritten by:
Once I have a plan, I’ve
got to sell it...not only to
company executives, but
also other stakeholders
(regulatory boards). Can
you outline some success
tips for gaining support
and buy-in?
Underwritten by:
Building Relationships with Stakeholders
Stakeholders are - ALL Staff / Third Parties / Customers that contribute, come in contact with or are affected by PII / SI
• Customers
• Shareholders
• Steering CommitteeAssurance Groups – Legal, Audit,
Compliance, Risk HR
Operations – Sales, Marketing, R&D,
Field Workers etc.
Chief Privacy Officer (CPO) / Data Protection Officer (DPO) Third-Parties / Contractors
Regulatory Agencies
Privacy Office (PO)
Board of Directors / Executive Team
IT
Underwritten by:
What about getting
front-line workers
onboard to adapt and
use new and changed
systems and policies?
Underwritten by:
Privacy Training
Appropriately Train ALL staff
and Third-Parties
Types of training
Do not overcomplicate
Market your privacy program
• Train the trainer
• Executives are not exempt
• CBT
• Live / In-person
• Manuals / Guides
• Workshops
• Keep language simple/ keep
cultural differences in mind
• Recognize top performers
Frequency of the training
• Annual
• New Hire
• Incident Based
• Third party / Contractor
Test the Privacy Incident
Response Plan
• Send out mock phishing emails
• Where is more training needed
• Log results – training & testing
Everyone who belongs to, or works with, an organization is responsible to
protect the PII / SI of the company and associated stakeholders!
Underwritten by:
One thing that is certain,
the rate of change is not
going to slow down. How
can we design our privacy
programs so that they will
be flexible and adapt to
changes in regulations,
technologies and market
expectations?
Underwritten by:
ChangeLegislation
Preparing for the Only Constant: Change
Underwritten by:
How Organizations Can Successfully Move Forward
Level Set
Expectations
Understand Current
Capabilities
Make Your Case
Change Is Your Only
Constant
25 | Copyright © 2020 Access - Confidential
26 | Copyright © 2020 Access - Confidential
AccessCorp.com
877-345-3546
John Montaña
Vice President, Information Governance
john.montana@montana-associates.com
Underwritten by:
#AIIMYour Digital Transformation Begins with
Intelligent Information ManagementYour Digital Transformation begins with
Intelligent Information Management

More Related Content

What's hot

Digital Transformation: Moving Beyond Enterprise Content Management to Conten...
Digital Transformation: Moving Beyond Enterprise Content Management to Conten...Digital Transformation: Moving Beyond Enterprise Content Management to Conten...
Digital Transformation: Moving Beyond Enterprise Content Management to Conten...Zia Consulting
 
Roy Atkinson - Closing keynote
Roy Atkinson - Closing keynote Roy Atkinson - Closing keynote
Roy Atkinson - Closing keynote itSMF UK
 
What You Don't Know about Document Management, But Should - M-Files
What You Don't Know about Document Management, But Should - M-FilesWhat You Don't Know about Document Management, But Should - M-Files
What You Don't Know about Document Management, But Should - M-FilesMarcoTechnologies
 
How to get a HR system in place fast.
How to get a HR system in place fast.How to get a HR system in place fast.
How to get a HR system in place fast.CoreHR
 
Human Centred Business Transformation
Human Centred Business TransformationHuman Centred Business Transformation
Human Centred Business TransformationThoughtworks
 
TRU Snacks Webinar Series - Effective Technology for Managing a Remote Workforce
TRU Snacks Webinar Series - Effective Technology for Managing a Remote WorkforceTRU Snacks Webinar Series - Effective Technology for Managing a Remote Workforce
TRU Snacks Webinar Series - Effective Technology for Managing a Remote WorkforceCitrin Cooperman
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...CloudIDSummit
 
How To Choose The Right HR Software - 7 Steps To Success
How To Choose The Right HR Software - 7 Steps To SuccessHow To Choose The Right HR Software - 7 Steps To Success
How To Choose The Right HR Software - 7 Steps To SuccessCoreHR
 
Looking Ahead: Predictions for 2016 and Beyond
Looking Ahead: Predictions for 2016 and BeyondLooking Ahead: Predictions for 2016 and Beyond
Looking Ahead: Predictions for 2016 and BeyondRES
 
Creating an IT Revolution within your Organization - QuickBase, Inc. at CIO V...
Creating an IT Revolution within your Organization - QuickBase, Inc. at CIO V...Creating an IT Revolution within your Organization - QuickBase, Inc. at CIO V...
Creating an IT Revolution within your Organization - QuickBase, Inc. at CIO V...QuickBase, Inc.
 
Your Business Documents On Steroids
Your Business Documents On SteroidsYour Business Documents On Steroids
Your Business Documents On SteroidsAIIM International
 
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?centralohioissa
 
Flexible and Secure Workspaces for the Modern Enterprise
Flexible and Secure Workspaces for the Modern EnterpriseFlexible and Secure Workspaces for the Modern Enterprise
Flexible and Secure Workspaces for the Modern EnterpriseRES
 
Kiriworks - Driving Digital Healthcare Payer Transformation
Kiriworks - Driving Digital Healthcare Payer Transformation Kiriworks - Driving Digital Healthcare Payer Transformation
Kiriworks - Driving Digital Healthcare Payer Transformation Patrick Goetz
 
Inbound Marketing is the Answer - Leighton Interactive
Inbound Marketing is the Answer - Leighton InteractiveInbound Marketing is the Answer - Leighton Interactive
Inbound Marketing is the Answer - Leighton InteractiveMarcoTechnologies
 
Eliminate Data Entry with Document Scanning, Data Capture and Extraction - PS...
Eliminate Data Entry with Document Scanning, Data Capture and Extraction - PS...Eliminate Data Entry with Document Scanning, Data Capture and Extraction - PS...
Eliminate Data Entry with Document Scanning, Data Capture and Extraction - PS...MarcoTechnologies
 
De-Siloing Project Coordination: Why You Need to Prioritize The Employee Expe...
De-Siloing Project Coordination: Why You Need to Prioritize The Employee Expe...De-Siloing Project Coordination: Why You Need to Prioritize The Employee Expe...
De-Siloing Project Coordination: Why You Need to Prioritize The Employee Expe...Aggregage
 
William Diederich - Security Certifications: Are They Worth the Investment? A...
William Diederich - Security Certifications: Are They Worth the Investment? A...William Diederich - Security Certifications: Are They Worth the Investment? A...
William Diederich - Security Certifications: Are They Worth the Investment? A...centralohioissa
 

What's hot (20)

Digital Transformation: Moving Beyond Enterprise Content Management to Conten...
Digital Transformation: Moving Beyond Enterprise Content Management to Conten...Digital Transformation: Moving Beyond Enterprise Content Management to Conten...
Digital Transformation: Moving Beyond Enterprise Content Management to Conten...
 
Roy Atkinson - Closing keynote
Roy Atkinson - Closing keynote Roy Atkinson - Closing keynote
Roy Atkinson - Closing keynote
 
What You Don't Know about Document Management, But Should - M-Files
What You Don't Know about Document Management, But Should - M-FilesWhat You Don't Know about Document Management, But Should - M-Files
What You Don't Know about Document Management, But Should - M-Files
 
How to get a HR system in place fast.
How to get a HR system in place fast.How to get a HR system in place fast.
How to get a HR system in place fast.
 
Human Centred Business Transformation
Human Centred Business TransformationHuman Centred Business Transformation
Human Centred Business Transformation
 
The Modern ERP Landscape
The Modern ERP LandscapeThe Modern ERP Landscape
The Modern ERP Landscape
 
TRU Snacks Webinar Series - Effective Technology for Managing a Remote Workforce
TRU Snacks Webinar Series - Effective Technology for Managing a Remote WorkforceTRU Snacks Webinar Series - Effective Technology for Managing a Remote Workforce
TRU Snacks Webinar Series - Effective Technology for Managing a Remote Workforce
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
How To Choose The Right HR Software - 7 Steps To Success
How To Choose The Right HR Software - 7 Steps To SuccessHow To Choose The Right HR Software - 7 Steps To Success
How To Choose The Right HR Software - 7 Steps To Success
 
Looking Ahead: Predictions for 2016 and Beyond
Looking Ahead: Predictions for 2016 and BeyondLooking Ahead: Predictions for 2016 and Beyond
Looking Ahead: Predictions for 2016 and Beyond
 
Creating an IT Revolution within your Organization - QuickBase, Inc. at CIO V...
Creating an IT Revolution within your Organization - QuickBase, Inc. at CIO V...Creating an IT Revolution within your Organization - QuickBase, Inc. at CIO V...
Creating an IT Revolution within your Organization - QuickBase, Inc. at CIO V...
 
Your Business Documents On Steroids
Your Business Documents On SteroidsYour Business Documents On Steroids
Your Business Documents On Steroids
 
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
 
Flexible and Secure Workspaces for the Modern Enterprise
Flexible and Secure Workspaces for the Modern EnterpriseFlexible and Secure Workspaces for the Modern Enterprise
Flexible and Secure Workspaces for the Modern Enterprise
 
Kiriworks - Driving Digital Healthcare Payer Transformation
Kiriworks - Driving Digital Healthcare Payer Transformation Kiriworks - Driving Digital Healthcare Payer Transformation
Kiriworks - Driving Digital Healthcare Payer Transformation
 
Inbound Marketing is the Answer - Leighton Interactive
Inbound Marketing is the Answer - Leighton InteractiveInbound Marketing is the Answer - Leighton Interactive
Inbound Marketing is the Answer - Leighton Interactive
 
Eliminate Data Entry with Document Scanning, Data Capture and Extraction - PS...
Eliminate Data Entry with Document Scanning, Data Capture and Extraction - PS...Eliminate Data Entry with Document Scanning, Data Capture and Extraction - PS...
Eliminate Data Entry with Document Scanning, Data Capture and Extraction - PS...
 
The Business Impact of IT
The Business Impact of ITThe Business Impact of IT
The Business Impact of IT
 
De-Siloing Project Coordination: Why You Need to Prioritize The Employee Expe...
De-Siloing Project Coordination: Why You Need to Prioritize The Employee Expe...De-Siloing Project Coordination: Why You Need to Prioritize The Employee Expe...
De-Siloing Project Coordination: Why You Need to Prioritize The Employee Expe...
 
William Diederich - Security Certifications: Are They Worth the Investment? A...
William Diederich - Security Certifications: Are They Worth the Investment? A...William Diederich - Security Certifications: Are They Worth the Investment? A...
William Diederich - Security Certifications: Are They Worth the Investment? A...
 

Similar to [Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for Preparedness and Prevention

Role of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseRole of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseCGTI
 
TrustArc-Webinar-Slides-2022-03-01-Is Your Privacy Program Ready for a Fundin...
TrustArc-Webinar-Slides-2022-03-01-Is Your Privacy Program Ready for a Fundin...TrustArc-Webinar-Slides-2022-03-01-Is Your Privacy Program Ready for a Fundin...
TrustArc-Webinar-Slides-2022-03-01-Is Your Privacy Program Ready for a Fundin...TrustArc
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach riskLivingstone Advisory
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessJoel Cardella
 
Automated Compliance: How to Create an IG Program that Manages Itself
Automated Compliance: How to Create an IG Program that Manages ItselfAutomated Compliance: How to Create an IG Program that Manages Itself
Automated Compliance: How to Create an IG Program that Manages ItselfJim Merrifield, IGP, CIP
 
Data protection: Steps Organisations can take to ensure compliance
Data protection: Steps Organisations can take to ensure complianceData protection: Steps Organisations can take to ensure compliance
Data protection: Steps Organisations can take to ensure complianceEquiGov Institute
 
Evolution of Records Management in Law Firms
Evolution of Records Management in Law FirmsEvolution of Records Management in Law Firms
Evolution of Records Management in Law FirmsJim Merrifield, IGP, CIP
 
The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)Kirsty Donovan
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsRobert 'Bob' Reyes
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach CostResilient Systems
 
Meeting the cyber risk challenge
Meeting the cyber risk challengeMeeting the cyber risk challenge
Meeting the cyber risk challengeFERMA
 
2019 06-19 convince customerspartnersboard gdpr-compliant
2019 06-19 convince customerspartnersboard gdpr-compliant2019 06-19 convince customerspartnersboard gdpr-compliant
2019 06-19 convince customerspartnersboard gdpr-compliantTrustArc
 
Standing Up A Holistic And World Class Information Governance Program
Standing Up A Holistic And World Class Information Governance ProgramStanding Up A Holistic And World Class Information Governance Program
Standing Up A Holistic And World Class Information Governance ProgramRafael Moscatel CRM, IGP
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurityIT Governance Ltd
 
Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...Livingstone Advisory
 
Falcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data PrivacyFalcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data PrivacyFalcon.io
 
Cost benefit analysis vs confidentiality
Cost benefit analysis vs confidentialityCost benefit analysis vs confidentiality
Cost benefit analysis vs confidentialityPrithvi Ghag
 
IT Risk assessment and Audit Planning
IT Risk assessment and Audit PlanningIT Risk assessment and Audit Planning
IT Risk assessment and Audit Planninggoreankush1
 

Similar to [Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for Preparedness and Prevention (20)

Role of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseRole of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve Howse
 
TrustArc-Webinar-Slides-2022-03-01-Is Your Privacy Program Ready for a Fundin...
TrustArc-Webinar-Slides-2022-03-01-Is Your Privacy Program Ready for a Fundin...TrustArc-Webinar-Slides-2022-03-01-Is Your Privacy Program Ready for a Fundin...
TrustArc-Webinar-Slides-2022-03-01-Is Your Privacy Program Ready for a Fundin...
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach risk
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
 
Automated Compliance: How to Create an IG Program that Manages Itself
Automated Compliance: How to Create an IG Program that Manages ItselfAutomated Compliance: How to Create an IG Program that Manages Itself
Automated Compliance: How to Create an IG Program that Manages Itself
 
Data protection: Steps Organisations can take to ensure compliance
Data protection: Steps Organisations can take to ensure complianceData protection: Steps Organisations can take to ensure compliance
Data protection: Steps Organisations can take to ensure compliance
 
Evolution of Records Management in Law Firms
Evolution of Records Management in Law FirmsEvolution of Records Management in Law Firms
Evolution of Records Management in Law Firms
 
The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act Brings
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
 
Co3 rsc r5
Co3 rsc r5Co3 rsc r5
Co3 rsc r5
 
Meeting the cyber risk challenge
Meeting the cyber risk challengeMeeting the cyber risk challenge
Meeting the cyber risk challenge
 
2019 06-19 convince customerspartnersboard gdpr-compliant
2019 06-19 convince customerspartnersboard gdpr-compliant2019 06-19 convince customerspartnersboard gdpr-compliant
2019 06-19 convince customerspartnersboard gdpr-compliant
 
Standing Up A Holistic And World Class Information Governance Program
Standing Up A Holistic And World Class Information Governance ProgramStanding Up A Holistic And World Class Information Governance Program
Standing Up A Holistic And World Class Information Governance Program
 
CGI Final
CGI FinalCGI Final
CGI Final
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurity
 
Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...
 
Falcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data PrivacyFalcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data Privacy
 
Cost benefit analysis vs confidentiality
Cost benefit analysis vs confidentialityCost benefit analysis vs confidentiality
Cost benefit analysis vs confidentiality
 
IT Risk assessment and Audit Planning
IT Risk assessment and Audit PlanningIT Risk assessment and Audit Planning
IT Risk assessment and Audit Planning
 

More from AIIM International

Create, Capture, Collaborate - Your Content Drives Organizational Value
Create, Capture, Collaborate - Your Content Drives Organizational ValueCreate, Capture, Collaborate - Your Content Drives Organizational Value
Create, Capture, Collaborate - Your Content Drives Organizational ValueAIIM International
 
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...Meet the Expert Panel - 2021 State of the Intelligent Information Management ...
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...AIIM International
 
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...AIIM International
 
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...AIIM International
 
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence ChannelsAIIM International
 
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...AIIM International
 
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...AIIM International
 
[Webinar Slides] Your 2019 Information Management Resolution: Part Two
[Webinar Slides] Your 2019 Information Management Resolution: Part Two[Webinar Slides] Your 2019 Information Management Resolution: Part Two
[Webinar Slides] Your 2019 Information Management Resolution: Part TwoAIIM International
 
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...AIIM International
 
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...AIIM International
 
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...AIIM International
 
[Webinar Slides] Modern Problems Require Modern Solutions
[Webinar Slides] Modern Problems Require Modern Solutions[Webinar Slides] Modern Problems Require Modern Solutions
[Webinar Slides] Modern Problems Require Modern SolutionsAIIM International
 
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...AIIM International
 
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...AIIM International
 
[AIIM18] Intelligent Information Management – Platinum Hit? Or Just Backgroun...
[AIIM18] Intelligent Information Management – Platinum Hit? Or Just Backgroun...[AIIM18] Intelligent Information Management – Platinum Hit? Or Just Backgroun...
[AIIM18] Intelligent Information Management – Platinum Hit? Or Just Backgroun...AIIM International
 
[AIIM18] Killing Multiple Privacy Birds With One Stone: Meeting both US and E...
[AIIM18] Killing Multiple Privacy Birds With One Stone: Meeting both US and E...[AIIM18] Killing Multiple Privacy Birds With One Stone: Meeting both US and E...
[AIIM18] Killing Multiple Privacy Birds With One Stone: Meeting both US and E...AIIM International
 
[AIIM18] A "Modern Records Management" Case Study: how the compliance departm...
[AIIM18] A "Modern Records Management" Case Study: how the compliance departm...[AIIM18] A "Modern Records Management" Case Study: how the compliance departm...
[AIIM18] A "Modern Records Management" Case Study: how the compliance departm...AIIM International
 
[AIIM18] Welcome to the Digital Age, North Carolina Courts: Our Document Auto...
[AIIM18] Welcome to the Digital Age, North Carolina Courts: Our Document Auto...[AIIM18] Welcome to the Digital Age, North Carolina Courts: Our Document Auto...
[AIIM18] Welcome to the Digital Age, North Carolina Courts: Our Document Auto...AIIM International
 
[AIIM18] When Billions are at Stake: an ECM mega project at Bradesco Bank - A...
[AIIM18] When Billions are at Stake: an ECM mega project at Bradesco Bank - A...[AIIM18] When Billions are at Stake: an ECM mega project at Bradesco Bank - A...
[AIIM18] When Billions are at Stake: an ECM mega project at Bradesco Bank - A...AIIM International
 

More from AIIM International (20)

2022 IIM Infographic.pptx
2022 IIM Infographic.pptx2022 IIM Infographic.pptx
2022 IIM Infographic.pptx
 
Create, Capture, Collaborate - Your Content Drives Organizational Value
Create, Capture, Collaborate - Your Content Drives Organizational ValueCreate, Capture, Collaborate - Your Content Drives Organizational Value
Create, Capture, Collaborate - Your Content Drives Organizational Value
 
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...Meet the Expert Panel - 2021 State of the Intelligent Information Management ...
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...
 
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...
 
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...
 
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels
 
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...
 
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...
 
[Webinar Slides] Your 2019 Information Management Resolution: Part Two
[Webinar Slides] Your 2019 Information Management Resolution: Part Two[Webinar Slides] Your 2019 Information Management Resolution: Part Two
[Webinar Slides] Your 2019 Information Management Resolution: Part Two
 
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
 
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...
 
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...
 
[Webinar Slides] Modern Problems Require Modern Solutions
[Webinar Slides] Modern Problems Require Modern Solutions[Webinar Slides] Modern Problems Require Modern Solutions
[Webinar Slides] Modern Problems Require Modern Solutions
 
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...
 
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...
 
[AIIM18] Intelligent Information Management – Platinum Hit? Or Just Backgroun...
[AIIM18] Intelligent Information Management – Platinum Hit? Or Just Backgroun...[AIIM18] Intelligent Information Management – Platinum Hit? Or Just Backgroun...
[AIIM18] Intelligent Information Management – Platinum Hit? Or Just Backgroun...
 
[AIIM18] Killing Multiple Privacy Birds With One Stone: Meeting both US and E...
[AIIM18] Killing Multiple Privacy Birds With One Stone: Meeting both US and E...[AIIM18] Killing Multiple Privacy Birds With One Stone: Meeting both US and E...
[AIIM18] Killing Multiple Privacy Birds With One Stone: Meeting both US and E...
 
[AIIM18] A "Modern Records Management" Case Study: how the compliance departm...
[AIIM18] A "Modern Records Management" Case Study: how the compliance departm...[AIIM18] A "Modern Records Management" Case Study: how the compliance departm...
[AIIM18] A "Modern Records Management" Case Study: how the compliance departm...
 
[AIIM18] Welcome to the Digital Age, North Carolina Courts: Our Document Auto...
[AIIM18] Welcome to the Digital Age, North Carolina Courts: Our Document Auto...[AIIM18] Welcome to the Digital Age, North Carolina Courts: Our Document Auto...
[AIIM18] Welcome to the Digital Age, North Carolina Courts: Our Document Auto...
 
[AIIM18] When Billions are at Stake: an ECM mega project at Bradesco Bank - A...
[AIIM18] When Billions are at Stake: an ECM mega project at Bradesco Bank - A...[AIIM18] When Billions are at Stake: an ECM mega project at Bradesco Bank - A...
[AIIM18] When Billions are at Stake: an ECM mega project at Bradesco Bank - A...
 

Recently uploaded

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for Preparedness and Prevention

  • 1. Underwritten by: #AIIMYour Digital Transformation Begins with Intelligent Information Management Data Privacy for the IM Practitioner: Practical Advice for Preparedness and Prevention Presented February 26, 2020 Note – the art of this cover slide will change. Data Privacy for the IM Practitioner: Practical Advice for Preparedness and Prevention An AIIM Webinar presented February 26, 2020
  • 2. Underwritten by: Today’s Speakers Kevin Craine Content Strategist, AIIM Host of AIIM On Air John Montaña, J.D., FIIM, FAI VP, Information Governance at Access CEO, Montaña & Associates an Access Company Host: Theresa Resek, CIP VP, Market Intelligence AIIM
  • 3. Underwritten by: Kevin Craine Content Strategist, AIIM Host of AIIM On Air Introducing our Speaker
  • 4. Underwritten by: Driving Demand for Data Privacy • Data privacy is on the mind of C-Suite leaders in all industries. • No organization is safe from potential cyber theft and intrusion. • In 2019, 2.7 billion identity records were exposed by hackers and placed for sale on the internet. • Legislation worldwide has become increasingly strict. • Expectations are ever-evolving. • Perception is everything in the eyes of the market.
  • 6. Underwritten by: Volume, Velocity, and Variety • Organizations anticipate the volume of information will grow from X to 4.5X in the coming year. • Over 60% of that information sprawl is unstructured. • Organizations are embracing technologies and approaches that automate governance and compliance. • According to AIIM research, 51% of organizations say that they are planning to spend “more” or “a lot more” on information governance over the next 18-24 months.
  • 7. Underwritten by: Inevitable and Costly • Experts tell us that the question is not IF it will happen, but WHEN. • The chances of being struck by lightning = one in a million. • The chances of organizations getting hacked this year = one in four. • The average total cost of a single data breach is estimated at nearly $4 million. • That calculation can certainly be much higher – legal expense, fines, and penalties; the loss of goodwill in the market.
  • 8. Underwritten by: Recommendations Implement a formal approach. Have a plan and stick to it. Regularly (annually) review, evaluate, and update your plan as needed. Place the privacy and security of information on the front burner of strategic concerns.
  • 9. Underwritten by: John Montaña, J.D., FIIM, FAI VP, Information Governance at Access CEO, Montaña & Associates an Access Company Introducing our Speaker
  • 10. Underwritten by: You say that Legislators don't understand how large companies work. What do you mean by that?
  • 11. Underwritten by: Legislation is Created in a Silo Just knowing what’s there – it’s a lot of law, in a lot of places Outright conflicts – minimum retention requirements versus maximum permissible retention Interpreting dated or vague laws IT configuration – how to make it all work in a big IT environment Administrative complexity – how to manage dozens or hundreds of unique requirements
  • 12. Underwritten by: What are some of the considerations that IIM pros must deal with that legislators miss in the mix?
  • 13. Underwritten by: Considerations for Applying Privacy Legislation Applying Legislation to Today… Taking into Account Yesterday… Legislation was written without consideration for: • Back file of old IT systems and physical boxes of records • Most IT systems available when the laws were written are not capable of applying law • Even if capable, they are often not configured in a manner that supports being compliant • Non-compliant implementations are difficult to undo
  • 14. Underwritten by: Let’s talk about specific steps to build an effective privacy plan. You say it’s important to start with a thorough understanding of the current capabilities within the enterprise. Isn’t that just more “analysis paralysis?”
  • 15. Underwritten by: Utilize Project Management Principles 1 2 3 4 5 Develop a clearly written initial project scope / charter / documentation Develop a high-level project roadmap / framework • What industry / data types you are trying to apply “privacy” to • What is the information life-cycle for PII / SI? • Establish a timeline with realistic milestones • Regularly adjust / incorporate PIA findings Clearly establish roles / responsibilities – decision rights • Chief Privacy Officer (CPO) / Data Protection Officer (DPO) • Privacy Office (PO) Develop a communication / marketing plan Prepare a budget
  • 16. Underwritten by: Now that I’ve surveyed the technical environment... what’s next? What are some steps to build a meaningful project plan?
  • 17. Underwritten by: Building the Privacy Program Core Components Review Create inventory of Personal Information Banks (PIBs) Develop staff education and awareness training and collateral and Communication plan Post Privacy Policy and Principles on the organization’s website Develop Privacy Notice signage and arrange for posting in relevant areas (such as those with video capture) Actually apply the retention schedule and purge data that is not needed Do not collect unnecessary data that is not required or contains PII
  • 18. Underwritten by: Once I have a plan, I’ve got to sell it...not only to company executives, but also other stakeholders (regulatory boards). Can you outline some success tips for gaining support and buy-in?
  • 19. Underwritten by: Building Relationships with Stakeholders Stakeholders are - ALL Staff / Third Parties / Customers that contribute, come in contact with or are affected by PII / SI • Customers • Shareholders • Steering CommitteeAssurance Groups – Legal, Audit, Compliance, Risk HR Operations – Sales, Marketing, R&D, Field Workers etc. Chief Privacy Officer (CPO) / Data Protection Officer (DPO) Third-Parties / Contractors Regulatory Agencies Privacy Office (PO) Board of Directors / Executive Team IT
  • 20. Underwritten by: What about getting front-line workers onboard to adapt and use new and changed systems and policies?
  • 21. Underwritten by: Privacy Training Appropriately Train ALL staff and Third-Parties Types of training Do not overcomplicate Market your privacy program • Train the trainer • Executives are not exempt • CBT • Live / In-person • Manuals / Guides • Workshops • Keep language simple/ keep cultural differences in mind • Recognize top performers Frequency of the training • Annual • New Hire • Incident Based • Third party / Contractor Test the Privacy Incident Response Plan • Send out mock phishing emails • Where is more training needed • Log results – training & testing Everyone who belongs to, or works with, an organization is responsible to protect the PII / SI of the company and associated stakeholders!
  • 22. Underwritten by: One thing that is certain, the rate of change is not going to slow down. How can we design our privacy programs so that they will be flexible and adapt to changes in regulations, technologies and market expectations?
  • 24. Underwritten by: How Organizations Can Successfully Move Forward Level Set Expectations Understand Current Capabilities Make Your Case Change Is Your Only Constant
  • 25. 25 | Copyright © 2020 Access - Confidential
  • 26. 26 | Copyright © 2020 Access - Confidential AccessCorp.com 877-345-3546 John Montaña Vice President, Information Governance john.montana@montana-associates.com
  • 27.
  • 28. Underwritten by: #AIIMYour Digital Transformation Begins with Intelligent Information ManagementYour Digital Transformation begins with Intelligent Information Management