SlideShare a Scribd company logo
www.iapp.org
Thursday, April 25, 2019
Time: 8:00–9:00 a.m. PT
11:00 a.m.–noon ET
5:00–6:00 p.m. CET
Bridging the Privacy Office with IT
www.iapp.org
Welcome and Introductions
Host:
Dimitri Sirota
CEO, Founder
BigID
Panelists:
2
Dave Cohen
CIPP/E, CIPP/US
Knowledge Manager
IAPP
Blake Brannon
VP, Product
OneTrust
www.iapp.org
Privacy is a Global Problem
3
Personal Information Protection and
Electronic Documents Act (PIPEDA)
Protection of Personal Information
Act 2013 (POPI)
General Data Privacy Law
(LGPD) 2018
The Privacy Protection
Act (PPA) 2017
Personal Data
Protection Act (PDPA)
2012
Personal Information
Protection Act (PIPA) 2011
Personal Information
Security Specification
2018
Act on Protection of
Personal Information
(APPI) 2017
Australia Privacy Principles
2014
General Data Protection Regulation
(GDPR 2016)
Personal Data
Protection Bill 2018
Federal Data Protection Law 2000
Data Protection in Act (pending)
California Consumer Privacy
Act (CCPA) 2018
www.iapp.org
Global Privacy Program Initiatives
4
www.iapp.org
Data Map Architecture: What, Why, How
5
Purpose & Legal Basis of Processing
Controller, Processor
Countries of Data Subjects Involved
Data Elements Processes
Parties who access
Classification of Data
Storage Locations
Servers, Applications, IP Addresses
Tables & Columns in Database
Data Map Details
LEGAL
BUSINESS
TECHNICAL
www.iapp.org
Building a Data Map In Practice
6
Assessment / Surveys
Purpose & Legal Basis of Processing
Controller, Processor
Countries of Data Subjects Involved
Data Elements Processes
Parties who Access Data
Classification of Data
Storage Locations
Servers, Applications, IP Addresses
Tables & Columns in Database
Data Map Details
Integrate with
Systems You Know
Scan and Discover
Salesforce
Marketo
Zendesk
Etc.
www.iapp.org7
Storage of the Data Map Model Equally Important
www.iapp.org8
Visualize the Flow of Data and Transfers
www.iapp.org9
Leverage the Data Map to Automate DSARs
www.iapp.org10
Easily Export Article 30 ROPA Reports
www.iapp.org
Data Map Model – Examples
11
Find all data from Data Subject &
Delete
Look at the data elements stored in
the system and classification (e.g.
email address)
Update your systems Vendor list.
Customer Exercises Deletion Request
What is the business risk associated with
using system A from Vendor B?
Vendor changes a subprocess. New
transfers exist.
Purpose of processing limits what needs
to be done to the data
Vendors using data need to be included
in fulfilling processing request
Each RoP in your system needs to
reflect the inherited linking of the
vendors transfers become the
processing activities transfers
Context of use matters. (e.g. clinical
trial database vs marketing)
Consent when given, did not
disclose Vendor B
Example Typical Behavior Business Context
www.iapp.org
Managing Consumer & Data Subject Access Requests
12
Data
Subject
Multi-lingual
Dynamic Routing
1 Click Hosting
Auto Email
Verification
Request
Intake Form
Validation
& Triage
Encrypted Messaging Portal
Validate Identity
Route Request
Template
Responses
& Subtasks
Record
Keeping
& Metrics
Request Extension
Delete Request
Fulfill Request
3rd Party ITSM or
Case Mgmt
Integration
Documentation
Calculate Costs
Generate Reports
Fulfillment with
Targeted Data
Discovery
Automatically
Discover Data
from Targeted
Systems
www.iapp.org
Managing Consumer & Data Subject Access Requests
13
DSAR Request
Received
ASSETS
Data Map
VENDORS
PROCESSING
ACTIVITIES
Assign
Manual
Tasks
Assign
Manual
Tasks
Assign
Manual
Tasks
Assign
Manual
Tasks
www.iapp.org
Data Matters to Privacy
Can’t protect what you can’t find
15
www.iapp.org16
Privacy Revolves Around Knowing Your Data
Personal Data Rights Require Personal Data Insights
What Data Do I Have Where
Who Does The Data Belong To
What Data Is At Risk
Where Is The Data Going
When Can I Use The Data
16
www.iapp.org17
Petabyte Scale Data Agnostic Identity Aware Can Find PI & PII
Permission & Purpose No Data
Duplication
De-risk & De-ID Bridge IT & Business
Requires New Approach to Data Discovery
On-prem or Cloud, Micro-service, API-first
17
www.iapp.org18
Middleware Cloud / SaaSMessagingApplications
Structured
Databases
Big Data & NoSQL
Unstructured File
Shares
Files
That Can Span Any Data or Application
Span Silos, Bridge BUs, Cross Regions
18
www.iapp.org19
Need to Look Beyond Classification Based Discovery
RegX Pattern Matching Can’t Meet Today’s Privacy Needs
To Find Contextual
PI vs Just PII
To Correlate By
Person
Vs Just Classify
To Automate
Privacy
Data Operations
To Resolve One
Person from
Another
To Look Across
All Data
19
www.iapp.org20
Needs to be ML Based & Deployable on Prem or Cloud
Can Correlate, Classify, Catalog
Mine Machine Manage
Agentless
Any data type
Cloud
Analysis
Reporting
API
20
www.iapp.org21
Needs to be Enterprise Ready
Flexible & Secure Deployment
Docker with Kubernetes
RBAC with Scoping Credential
Externalization
No Data CopyingPre-built 3rd Party
Orchestrations
On-prem
or Cloud Deployment
API-firstAny Data /
Any Language
21
www.iapp.org22
Use Case:
Classify By Categories, Data Source, Location & App
Automatically Inventory & Map All
Data By Person, Type, Server,
Application, Location, etc., without
Copying or Duplicating
22
www.iapp.org23
Use Case:
Classify Data by Person for GDPR & CCPA Data Rights
Patent-pending Correlation-led
Classification Automatically Indexes
Data By Person for Right-to-be-
forgotten
23
www.iapp.org24
Use Case:
Apply Labels Using Microsoft AIP Framework
Label Files Using AIP Automatically
Based on Classified & Categorized Data
24
www.iapp.org25
Use Case:
Set Policies Around Data Movement & Compliance
Monitor and Detect Data Transfer,
Misuse or Policy Violations
25
www.iapp.org26
Use Case:
Simplify Breach Response Investigation
Quickly Determine Exactly What and
Whose Data was Compromised in Case
of a Breach to Minimize the Impact
26
www.iapp.org27
Use Case:
Data Access Insights & Protection
Identified Over-permissioned Files and
File Shares
27
www.iapp.org
Data Mapping Integration
28
www.iapp.org
Integrate the privacy office with IT
● CSV-import
● API in future
● Validate policies based on PI
Use Case: BigID & OneTrust Data Inventory and Mapping
29
www.iapp.org
Host:
Dimitri Sirota
CEO, Founder
BigID
Info@bigid.com
Panelists:
30
Dave Cohen
CIPP/E, CIPP/US
Knowledge Manager
IAPP
dave@iapp.org
Blake Brannon
VP, Product
OneTrust
bbrannon@onetrust.com
Questions and Answers
www.iapp.org
Thank You
to our
Sponsor
Speakers and Participants
31
www.iapp.org
32
Web Conference
Participant Feedback Survey
Please take this quick (2 minute) survey to let us know how satisfied you
were with this program and to provide us with suggestions for future
improvement.
Click here:
https://www.questionpro.com/t/AOhP6ZeNFx
Thank you in advance!
For more information: www.iapp.org
www.iapp.org
Attention IAPP Certified Privacy Professionals:
This IAPP web conference may be applied toward the continuing privacy education
(CPE) requirements of your CIPP/US, CIPP/E, CIPP/G, CIPP/C, CIPT or CIPM
credential worth 1.0 credit hours. IAPP-certified professionals who are the named
participant of the registration will automatically receive credit. If another certified
professional has participated in the program but is not the named participant then
the individual may submit for credit by submitting the continuing education
application form here: CPE credit application.
Continuing Legal Education Credits:
The IAPP provides certificates of attendance to web conference attendees.
Certificates must be self-submitted to the appropriate jurisdiction for
continuing education credits. Please consult your specific governing body’s
rules and regulations to confirm if a web conference is an eligible format
for attaining credits. Each IAPP web conference offers either 60 or 90 minutes of
programming.
33
www.iapp.org
For questions on this or other
IAPP Web Conferences or recordings
or to obtain a copy of the slide presentation please contact:
Dave Cohen, CIPP/E, CIPP/US
Knowledge Manager
International Association of Privacy Professionals (IAPP)
dave@iapp.org
603.427.9221
34

More Related Content

What's hot

OneTrust Sponsored Coffee Break
OneTrust Sponsored Coffee BreakOneTrust Sponsored Coffee Break
OneTrust Sponsored Coffee Break
MediaPost
 
Personal Data Protection in Indonesia
Personal Data Protection in IndonesiaPersonal Data Protection in Indonesia
Personal Data Protection in Indonesia
Eryk Budi Pratama
 
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
PECB
 
Data Protection Officer Dashboard | GDPR
Data Protection Officer Dashboard | GDPRData Protection Officer Dashboard | GDPR
Data Protection Officer Dashboard | GDPR
Corporater
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...
IT Governance Ltd
 
Common Practice in Data Privacy Program Management
Common Practice in Data Privacy Program ManagementCommon Practice in Data Privacy Program Management
Common Practice in Data Privacy Program Management
Eryk Budi Pratama
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by Qualsys
Qualsys Ltd
 
Project plan for ISO 27001
Project plan for ISO 27001Project plan for ISO 27001
Project plan for ISO 27001
technakama
 
Data classification-policy
Data classification-policyData classification-policy
Data classification-policy
Coi Xay
 
Data protection
Data protectionData protection
Data protection
RaviPrashant5
 
Data Classification Presentation
Data Classification PresentationData Classification Presentation
Data Classification PresentationDerroylo
 
Sailpoint Online Training on IAM overview
Sailpoint Online Training on IAM overviewSailpoint Online Training on IAM overview
Sailpoint Online Training on IAM overview
ITJobZone.biz
 
ISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptxISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptx
Dr Madhu Aman Sharma
 
Introduction to Data Governance
Introduction to Data GovernanceIntroduction to Data Governance
Introduction to Data Governance
John Bao Vuu
 
DMBOK 2.0 and other frameworks including TOGAF & COBIT - keynote from DAMA Au...
DMBOK 2.0 and other frameworks including TOGAF & COBIT - keynote from DAMA Au...DMBOK 2.0 and other frameworks including TOGAF & COBIT - keynote from DAMA Au...
DMBOK 2.0 and other frameworks including TOGAF & COBIT - keynote from DAMA Au...
Christopher Bradley
 
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdf
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdfTru_Shiralkar_Gen AI Sec_ ISACA 2024.pdf
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdf
Trupti Shiralkar, CISSP
 
Microsoft 365 Compliance
Microsoft 365 ComplianceMicrosoft 365 Compliance
Microsoft 365 Compliance
David J Rosenthal
 
An Overview of GDPR
An Overview of GDPR An Overview of GDPR
An Overview of GDPR
The Pathway Group
 
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
DATAVERSITY
 
Governance Risk and Compliance for SAP
Governance Risk and Compliance for SAPGovernance Risk and Compliance for SAP
Governance Risk and Compliance for SAP
PECB
 

What's hot (20)

OneTrust Sponsored Coffee Break
OneTrust Sponsored Coffee BreakOneTrust Sponsored Coffee Break
OneTrust Sponsored Coffee Break
 
Personal Data Protection in Indonesia
Personal Data Protection in IndonesiaPersonal Data Protection in Indonesia
Personal Data Protection in Indonesia
 
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
 
Data Protection Officer Dashboard | GDPR
Data Protection Officer Dashboard | GDPRData Protection Officer Dashboard | GDPR
Data Protection Officer Dashboard | GDPR
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...
 
Common Practice in Data Privacy Program Management
Common Practice in Data Privacy Program ManagementCommon Practice in Data Privacy Program Management
Common Practice in Data Privacy Program Management
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by Qualsys
 
Project plan for ISO 27001
Project plan for ISO 27001Project plan for ISO 27001
Project plan for ISO 27001
 
Data classification-policy
Data classification-policyData classification-policy
Data classification-policy
 
Data protection
Data protectionData protection
Data protection
 
Data Classification Presentation
Data Classification PresentationData Classification Presentation
Data Classification Presentation
 
Sailpoint Online Training on IAM overview
Sailpoint Online Training on IAM overviewSailpoint Online Training on IAM overview
Sailpoint Online Training on IAM overview
 
ISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptxISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptx
 
Introduction to Data Governance
Introduction to Data GovernanceIntroduction to Data Governance
Introduction to Data Governance
 
DMBOK 2.0 and other frameworks including TOGAF & COBIT - keynote from DAMA Au...
DMBOK 2.0 and other frameworks including TOGAF & COBIT - keynote from DAMA Au...DMBOK 2.0 and other frameworks including TOGAF & COBIT - keynote from DAMA Au...
DMBOK 2.0 and other frameworks including TOGAF & COBIT - keynote from DAMA Au...
 
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdf
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdfTru_Shiralkar_Gen AI Sec_ ISACA 2024.pdf
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdf
 
Microsoft 365 Compliance
Microsoft 365 ComplianceMicrosoft 365 Compliance
Microsoft 365 Compliance
 
An Overview of GDPR
An Overview of GDPR An Overview of GDPR
An Overview of GDPR
 
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
 
Governance Risk and Compliance for SAP
Governance Risk and Compliance for SAPGovernance Risk and Compliance for SAP
Governance Risk and Compliance for SAP
 

Similar to BigID, OneTrust, IAPP Webinar: Bridging the Privacy Office with IT

Fine grained root cause and impact analysis with CDAP Lineage
Fine grained root cause and impact analysis with CDAP LineageFine grained root cause and impact analysis with CDAP Lineage
Fine grained root cause and impact analysis with CDAP Lineage
Big Data Aplications Meetup
 
Don't think DevOps think Compliant Database DevOps
Don't think DevOps think Compliant Database DevOpsDon't think DevOps think Compliant Database DevOps
Don't think DevOps think Compliant Database DevOps
Red Gate Software
 
CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...
CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...
CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...
Jeff Kelly
 
Privacera Databricks CCPA Webinar Feb 2020
Privacera Databricks CCPA Webinar Feb 2020Privacera Databricks CCPA Webinar Feb 2020
Privacera Databricks CCPA Webinar Feb 2020
Privacera
 
Socitm Supplier Briefing London
Socitm Supplier Briefing LondonSocitm Supplier Briefing London
Socitm Supplier Briefing London
Socitm
 
Socitm Supplier Briefing London
Socitm Supplier Briefing LondonSocitm Supplier Briefing London
Socitm Supplier Briefing London
Socitm Briefings
 
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Steven Meister
 
Sergio Juarez, Elemica – “From Big Data to Value: The Power of Master Data Ma...
Sergio Juarez, Elemica – “From Big Data to Value: The Power of Master Data Ma...Sergio Juarez, Elemica – “From Big Data to Value: The Power of Master Data Ma...
Sergio Juarez, Elemica – “From Big Data to Value: The Power of Master Data Ma...
Elemica
 
TechWiseTV Workshop: Cisco DNA Center Assurance
TechWiseTV Workshop: Cisco DNA Center AssuranceTechWiseTV Workshop: Cisco DNA Center Assurance
TechWiseTV Workshop: Cisco DNA Center Assurance
Robb Boyd
 
Is Your Staff Big Data Ready? 5 Things to Know About What It Will Take to Suc...
Is Your Staff Big Data Ready? 5 Things to Know About What It Will Take to Suc...Is Your Staff Big Data Ready? 5 Things to Know About What It Will Take to Suc...
Is Your Staff Big Data Ready? 5 Things to Know About What It Will Take to Suc...CompTIA
 
Ai design sprint - Finance - Wealth management
Ai design sprint  - Finance - Wealth managementAi design sprint  - Finance - Wealth management
Ai design sprint - Finance - Wealth management
Chinmay Patel
 
Data Privacy & Governance in the Age of Big Data: Deploy a De-Identified Data...
Data Privacy & Governance in the Age of Big Data: Deploy a De-Identified Data...Data Privacy & Governance in the Age of Big Data: Deploy a De-Identified Data...
Data Privacy & Governance in the Age of Big Data: Deploy a De-Identified Data...
Amazon Web Services
 
Explainability for Natural Language Processing
Explainability for Natural Language ProcessingExplainability for Natural Language Processing
Explainability for Natural Language Processing
Yunyao Li
 
Five Trends in Real Time Applications
Five Trends in Real Time ApplicationsFive Trends in Real Time Applications
Five Trends in Real Time Applications
confluent
 
3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences
3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences
3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences
Jean-Michel Franco
 
INTERFACE by apidays 2023 - Identifying Business Risks from API Legal Agreeme...
INTERFACE by apidays 2023 - Identifying Business Risks from API Legal Agreeme...INTERFACE by apidays 2023 - Identifying Business Risks from API Legal Agreeme...
INTERFACE by apidays 2023 - Identifying Business Risks from API Legal Agreeme...
apidays
 
What is the future of data strategy?
What is the future of data strategy?What is the future of data strategy?
What is the future of data strategy?
Denodo
 
[Strata NYC 2019] Turning big data into knowledge: Managing metadata and data...
[Strata NYC 2019] Turning big data into knowledge: Managing metadata and data...[Strata NYC 2019] Turning big data into knowledge: Managing metadata and data...
[Strata NYC 2019] Turning big data into knowledge: Managing metadata and data...
Kaan Onuk
 
GDPR- The Buck Stops Here
GDPR-  The Buck Stops HereGDPR-  The Buck Stops Here
GDPR- The Buck Stops Here
Kellyn Pot'Vin-Gorman
 

Similar to BigID, OneTrust, IAPP Webinar: Bridging the Privacy Office with IT (20)

Fine grained root cause and impact analysis with CDAP Lineage
Fine grained root cause and impact analysis with CDAP LineageFine grained root cause and impact analysis with CDAP Lineage
Fine grained root cause and impact analysis with CDAP Lineage
 
Don't think DevOps think Compliant Database DevOps
Don't think DevOps think Compliant Database DevOpsDon't think DevOps think Compliant Database DevOps
Don't think DevOps think Compliant Database DevOps
 
CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...
CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...
CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...
 
Privacera Databricks CCPA Webinar Feb 2020
Privacera Databricks CCPA Webinar Feb 2020Privacera Databricks CCPA Webinar Feb 2020
Privacera Databricks CCPA Webinar Feb 2020
 
Socitm Supplier Briefing London
Socitm Supplier Briefing LondonSocitm Supplier Briefing London
Socitm Supplier Briefing London
 
Socitm Supplier Briefing London
Socitm Supplier Briefing LondonSocitm Supplier Briefing London
Socitm Supplier Briefing London
 
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
 
Sergio Juarez, Elemica – “From Big Data to Value: The Power of Master Data Ma...
Sergio Juarez, Elemica – “From Big Data to Value: The Power of Master Data Ma...Sergio Juarez, Elemica – “From Big Data to Value: The Power of Master Data Ma...
Sergio Juarez, Elemica – “From Big Data to Value: The Power of Master Data Ma...
 
TechWiseTV Workshop: Cisco DNA Center Assurance
TechWiseTV Workshop: Cisco DNA Center AssuranceTechWiseTV Workshop: Cisco DNA Center Assurance
TechWiseTV Workshop: Cisco DNA Center Assurance
 
Is Your Staff Big Data Ready? 5 Things to Know About What It Will Take to Suc...
Is Your Staff Big Data Ready? 5 Things to Know About What It Will Take to Suc...Is Your Staff Big Data Ready? 5 Things to Know About What It Will Take to Suc...
Is Your Staff Big Data Ready? 5 Things to Know About What It Will Take to Suc...
 
Ai design sprint - Finance - Wealth management
Ai design sprint  - Finance - Wealth managementAi design sprint  - Finance - Wealth management
Ai design sprint - Finance - Wealth management
 
Data Privacy & Governance in the Age of Big Data: Deploy a De-Identified Data...
Data Privacy & Governance in the Age of Big Data: Deploy a De-Identified Data...Data Privacy & Governance in the Age of Big Data: Deploy a De-Identified Data...
Data Privacy & Governance in the Age of Big Data: Deploy a De-Identified Data...
 
Explainability for Natural Language Processing
Explainability for Natural Language ProcessingExplainability for Natural Language Processing
Explainability for Natural Language Processing
 
Five Trends in Real Time Applications
Five Trends in Real Time ApplicationsFive Trends in Real Time Applications
Five Trends in Real Time Applications
 
3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences
3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences
3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences
 
INTERFACE by apidays 2023 - Identifying Business Risks from API Legal Agreeme...
INTERFACE by apidays 2023 - Identifying Business Risks from API Legal Agreeme...INTERFACE by apidays 2023 - Identifying Business Risks from API Legal Agreeme...
INTERFACE by apidays 2023 - Identifying Business Risks from API Legal Agreeme...
 
Tom Kunz
Tom KunzTom Kunz
Tom Kunz
 
What is the future of data strategy?
What is the future of data strategy?What is the future of data strategy?
What is the future of data strategy?
 
[Strata NYC 2019] Turning big data into knowledge: Managing metadata and data...
[Strata NYC 2019] Turning big data into knowledge: Managing metadata and data...[Strata NYC 2019] Turning big data into knowledge: Managing metadata and data...
[Strata NYC 2019] Turning big data into knowledge: Managing metadata and data...
 
GDPR- The Buck Stops Here
GDPR-  The Buck Stops HereGDPR-  The Buck Stops Here
GDPR- The Buck Stops Here
 

More from BigID Inc

BigID Consent Governance
BigID Consent Governance  BigID Consent Governance
BigID Consent Governance
BigID Inc
 
Collibra Data Citizen '19 - Bridging Data Privacy with Data Governance
Collibra Data Citizen '19 - Bridging Data Privacy with Data Governance Collibra Data Citizen '19 - Bridging Data Privacy with Data Governance
Collibra Data Citizen '19 - Bridging Data Privacy with Data Governance
BigID Inc
 
BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data Discovery to...
BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data  Discovery to...BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data  Discovery to...
BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data Discovery to...
BigID Inc
 
BigID DataSheet: Data Access Intelligence
BigID DataSheet: Data Access IntelligenceBigID DataSheet: Data Access Intelligence
BigID DataSheet: Data Access Intelligence
BigID Inc
 
BigID Data Sheet: LGPD Compliance Automated
BigID Data Sheet: LGPD Compliance AutomatedBigID Data Sheet: LGPD Compliance Automated
BigID Data Sheet: LGPD Compliance Automated
BigID Inc
 
BigID Data Sheet HIPAA Data Security & Privacy
BigID Data Sheet HIPAA Data Security & Privacy BigID Data Sheet HIPAA Data Security & Privacy
BigID Data Sheet HIPAA Data Security & Privacy
BigID Inc
 
BigID Datasheet: CCPA Data Rights Automation
BigID Datasheet: CCPA Data Rights AutomationBigID Datasheet: CCPA Data Rights Automation
BigID Datasheet: CCPA Data Rights Automation
BigID Inc
 
BigID Data Sheet: GDPR Compliance
BigID Data Sheet: GDPR ComplianceBigID Data Sheet: GDPR Compliance
BigID Data Sheet: GDPR Compliance
BigID Inc
 
BigID Data sheet: Consent Governance & Orchestration
BigID Data sheet: Consent Governance & OrchestrationBigID Data sheet: Consent Governance & Orchestration
BigID Data sheet: Consent Governance & Orchestration
BigID Inc
 
BigID Data Sheet: Data subject rights
BigID Data Sheet: Data subject rightsBigID Data Sheet: Data subject rights
BigID Data Sheet: Data subject rights
BigID Inc
 
BigID Data Sheet: Master Your Customer Data Without MDM
BigID Data Sheet: Master Your Customer Data Without MDMBigID Data Sheet: Master Your Customer Data Without MDM
BigID Data Sheet: Master Your Customer Data Without MDM
BigID Inc
 
BigID Data Sheet: Enterprise Privacy Management
BigID Data Sheet: Enterprise Privacy ManagementBigID Data Sheet: Enterprise Privacy Management
BigID Data Sheet: Enterprise Privacy Management
BigID Inc
 
BigID Data Sheet: Smart Data Labeling and Tagging
BigID Data Sheet: Smart Data Labeling and TaggingBigID Data Sheet: Smart Data Labeling and Tagging
BigID Data Sheet: Smart Data Labeling and Tagging
BigID Inc
 
BigID IAPP webinar on data-driven enterprise privacy management
BigID IAPP webinar on data-driven enterprise privacy managementBigID IAPP webinar on data-driven enterprise privacy management
BigID IAPP webinar on data-driven enterprise privacy management
BigID Inc
 

More from BigID Inc (14)

BigID Consent Governance
BigID Consent Governance  BigID Consent Governance
BigID Consent Governance
 
Collibra Data Citizen '19 - Bridging Data Privacy with Data Governance
Collibra Data Citizen '19 - Bridging Data Privacy with Data Governance Collibra Data Citizen '19 - Bridging Data Privacy with Data Governance
Collibra Data Citizen '19 - Bridging Data Privacy with Data Governance
 
BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data Discovery to...
BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data  Discovery to...BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data  Discovery to...
BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data Discovery to...
 
BigID DataSheet: Data Access Intelligence
BigID DataSheet: Data Access IntelligenceBigID DataSheet: Data Access Intelligence
BigID DataSheet: Data Access Intelligence
 
BigID Data Sheet: LGPD Compliance Automated
BigID Data Sheet: LGPD Compliance AutomatedBigID Data Sheet: LGPD Compliance Automated
BigID Data Sheet: LGPD Compliance Automated
 
BigID Data Sheet HIPAA Data Security & Privacy
BigID Data Sheet HIPAA Data Security & Privacy BigID Data Sheet HIPAA Data Security & Privacy
BigID Data Sheet HIPAA Data Security & Privacy
 
BigID Datasheet: CCPA Data Rights Automation
BigID Datasheet: CCPA Data Rights AutomationBigID Datasheet: CCPA Data Rights Automation
BigID Datasheet: CCPA Data Rights Automation
 
BigID Data Sheet: GDPR Compliance
BigID Data Sheet: GDPR ComplianceBigID Data Sheet: GDPR Compliance
BigID Data Sheet: GDPR Compliance
 
BigID Data sheet: Consent Governance & Orchestration
BigID Data sheet: Consent Governance & OrchestrationBigID Data sheet: Consent Governance & Orchestration
BigID Data sheet: Consent Governance & Orchestration
 
BigID Data Sheet: Data subject rights
BigID Data Sheet: Data subject rightsBigID Data Sheet: Data subject rights
BigID Data Sheet: Data subject rights
 
BigID Data Sheet: Master Your Customer Data Without MDM
BigID Data Sheet: Master Your Customer Data Without MDMBigID Data Sheet: Master Your Customer Data Without MDM
BigID Data Sheet: Master Your Customer Data Without MDM
 
BigID Data Sheet: Enterprise Privacy Management
BigID Data Sheet: Enterprise Privacy ManagementBigID Data Sheet: Enterprise Privacy Management
BigID Data Sheet: Enterprise Privacy Management
 
BigID Data Sheet: Smart Data Labeling and Tagging
BigID Data Sheet: Smart Data Labeling and TaggingBigID Data Sheet: Smart Data Labeling and Tagging
BigID Data Sheet: Smart Data Labeling and Tagging
 
BigID IAPP webinar on data-driven enterprise privacy management
BigID IAPP webinar on data-driven enterprise privacy managementBigID IAPP webinar on data-driven enterprise privacy management
BigID IAPP webinar on data-driven enterprise privacy management
 

Recently uploaded

May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
Adele Miller
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Globus
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Neo4j
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
Shane Coughlan
 
Enterprise Software Development with No Code Solutions.pptx
Enterprise Software Development with No Code Solutions.pptxEnterprise Software Development with No Code Solutions.pptx
Enterprise Software Development with No Code Solutions.pptx
QuickwayInfoSystems3
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
Łukasz Chruściel
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
AI Genie Review: World’s First Open AI WordPress Website Creator
AI Genie Review: World’s First Open AI WordPress Website CreatorAI Genie Review: World’s First Open AI WordPress Website Creator
AI Genie Review: World’s First Open AI WordPress Website Creator
Google
 
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket ManagementUtilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
Donna Lenk
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Mind IT Systems
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
Pro Unity Game Development with C-sharp Book
Pro Unity Game Development with C-sharp BookPro Unity Game Development with C-sharp Book
Pro Unity Game Development with C-sharp Book
abdulrafaychaudhry
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
rickgrimesss22
 
Introduction to Pygame (Lecture 7 Python Game Development)
Introduction to Pygame (Lecture 7 Python Game Development)Introduction to Pygame (Lecture 7 Python Game Development)
Introduction to Pygame (Lecture 7 Python Game Development)
abdulrafaychaudhry
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
Fermin Galan
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
Boni García
 
Text-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptx
Text-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptxText-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptx
Text-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptx
ShamsuddeenMuhammadA
 

Recently uploaded (20)

May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
 
Enterprise Software Development with No Code Solutions.pptx
Enterprise Software Development with No Code Solutions.pptxEnterprise Software Development with No Code Solutions.pptx
Enterprise Software Development with No Code Solutions.pptx
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
AI Genie Review: World’s First Open AI WordPress Website Creator
AI Genie Review: World’s First Open AI WordPress Website CreatorAI Genie Review: World’s First Open AI WordPress Website Creator
AI Genie Review: World’s First Open AI WordPress Website Creator
 
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket ManagementUtilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
Pro Unity Game Development with C-sharp Book
Pro Unity Game Development with C-sharp BookPro Unity Game Development with C-sharp Book
Pro Unity Game Development with C-sharp Book
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
 
Introduction to Pygame (Lecture 7 Python Game Development)
Introduction to Pygame (Lecture 7 Python Game Development)Introduction to Pygame (Lecture 7 Python Game Development)
Introduction to Pygame (Lecture 7 Python Game Development)
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
 
Text-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptx
Text-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptxText-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptx
Text-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptx
 

BigID, OneTrust, IAPP Webinar: Bridging the Privacy Office with IT

  • 1.
  • 2. www.iapp.org Thursday, April 25, 2019 Time: 8:00–9:00 a.m. PT 11:00 a.m.–noon ET 5:00–6:00 p.m. CET Bridging the Privacy Office with IT
  • 3. www.iapp.org Welcome and Introductions Host: Dimitri Sirota CEO, Founder BigID Panelists: 2 Dave Cohen CIPP/E, CIPP/US Knowledge Manager IAPP Blake Brannon VP, Product OneTrust
  • 4. www.iapp.org Privacy is a Global Problem 3 Personal Information Protection and Electronic Documents Act (PIPEDA) Protection of Personal Information Act 2013 (POPI) General Data Privacy Law (LGPD) 2018 The Privacy Protection Act (PPA) 2017 Personal Data Protection Act (PDPA) 2012 Personal Information Protection Act (PIPA) 2011 Personal Information Security Specification 2018 Act on Protection of Personal Information (APPI) 2017 Australia Privacy Principles 2014 General Data Protection Regulation (GDPR 2016) Personal Data Protection Bill 2018 Federal Data Protection Law 2000 Data Protection in Act (pending) California Consumer Privacy Act (CCPA) 2018
  • 6. www.iapp.org Data Map Architecture: What, Why, How 5 Purpose & Legal Basis of Processing Controller, Processor Countries of Data Subjects Involved Data Elements Processes Parties who access Classification of Data Storage Locations Servers, Applications, IP Addresses Tables & Columns in Database Data Map Details LEGAL BUSINESS TECHNICAL
  • 7. www.iapp.org Building a Data Map In Practice 6 Assessment / Surveys Purpose & Legal Basis of Processing Controller, Processor Countries of Data Subjects Involved Data Elements Processes Parties who Access Data Classification of Data Storage Locations Servers, Applications, IP Addresses Tables & Columns in Database Data Map Details Integrate with Systems You Know Scan and Discover Salesforce Marketo Zendesk Etc.
  • 8. www.iapp.org7 Storage of the Data Map Model Equally Important
  • 9. www.iapp.org8 Visualize the Flow of Data and Transfers
  • 10. www.iapp.org9 Leverage the Data Map to Automate DSARs
  • 12. www.iapp.org Data Map Model – Examples 11 Find all data from Data Subject & Delete Look at the data elements stored in the system and classification (e.g. email address) Update your systems Vendor list. Customer Exercises Deletion Request What is the business risk associated with using system A from Vendor B? Vendor changes a subprocess. New transfers exist. Purpose of processing limits what needs to be done to the data Vendors using data need to be included in fulfilling processing request Each RoP in your system needs to reflect the inherited linking of the vendors transfers become the processing activities transfers Context of use matters. (e.g. clinical trial database vs marketing) Consent when given, did not disclose Vendor B Example Typical Behavior Business Context
  • 13. www.iapp.org Managing Consumer & Data Subject Access Requests 12 Data Subject Multi-lingual Dynamic Routing 1 Click Hosting Auto Email Verification Request Intake Form Validation & Triage Encrypted Messaging Portal Validate Identity Route Request Template Responses & Subtasks Record Keeping & Metrics Request Extension Delete Request Fulfill Request 3rd Party ITSM or Case Mgmt Integration Documentation Calculate Costs Generate Reports Fulfillment with Targeted Data Discovery Automatically Discover Data from Targeted Systems
  • 14. www.iapp.org Managing Consumer & Data Subject Access Requests 13 DSAR Request Received ASSETS Data Map VENDORS PROCESSING ACTIVITIES Assign Manual Tasks Assign Manual Tasks Assign Manual Tasks Assign Manual Tasks
  • 15. www.iapp.org Data Matters to Privacy Can’t protect what you can’t find 15
  • 16. www.iapp.org16 Privacy Revolves Around Knowing Your Data Personal Data Rights Require Personal Data Insights What Data Do I Have Where Who Does The Data Belong To What Data Is At Risk Where Is The Data Going When Can I Use The Data 16
  • 17. www.iapp.org17 Petabyte Scale Data Agnostic Identity Aware Can Find PI & PII Permission & Purpose No Data Duplication De-risk & De-ID Bridge IT & Business Requires New Approach to Data Discovery On-prem or Cloud, Micro-service, API-first 17
  • 18. www.iapp.org18 Middleware Cloud / SaaSMessagingApplications Structured Databases Big Data & NoSQL Unstructured File Shares Files That Can Span Any Data or Application Span Silos, Bridge BUs, Cross Regions 18
  • 19. www.iapp.org19 Need to Look Beyond Classification Based Discovery RegX Pattern Matching Can’t Meet Today’s Privacy Needs To Find Contextual PI vs Just PII To Correlate By Person Vs Just Classify To Automate Privacy Data Operations To Resolve One Person from Another To Look Across All Data 19
  • 20. www.iapp.org20 Needs to be ML Based & Deployable on Prem or Cloud Can Correlate, Classify, Catalog Mine Machine Manage Agentless Any data type Cloud Analysis Reporting API 20
  • 21. www.iapp.org21 Needs to be Enterprise Ready Flexible & Secure Deployment Docker with Kubernetes RBAC with Scoping Credential Externalization No Data CopyingPre-built 3rd Party Orchestrations On-prem or Cloud Deployment API-firstAny Data / Any Language 21
  • 22. www.iapp.org22 Use Case: Classify By Categories, Data Source, Location & App Automatically Inventory & Map All Data By Person, Type, Server, Application, Location, etc., without Copying or Duplicating 22
  • 23. www.iapp.org23 Use Case: Classify Data by Person for GDPR & CCPA Data Rights Patent-pending Correlation-led Classification Automatically Indexes Data By Person for Right-to-be- forgotten 23
  • 24. www.iapp.org24 Use Case: Apply Labels Using Microsoft AIP Framework Label Files Using AIP Automatically Based on Classified & Categorized Data 24
  • 25. www.iapp.org25 Use Case: Set Policies Around Data Movement & Compliance Monitor and Detect Data Transfer, Misuse or Policy Violations 25
  • 26. www.iapp.org26 Use Case: Simplify Breach Response Investigation Quickly Determine Exactly What and Whose Data was Compromised in Case of a Breach to Minimize the Impact 26
  • 27. www.iapp.org27 Use Case: Data Access Insights & Protection Identified Over-permissioned Files and File Shares 27
  • 29. www.iapp.org Integrate the privacy office with IT ● CSV-import ● API in future ● Validate policies based on PI Use Case: BigID & OneTrust Data Inventory and Mapping 29
  • 30. www.iapp.org Host: Dimitri Sirota CEO, Founder BigID Info@bigid.com Panelists: 30 Dave Cohen CIPP/E, CIPP/US Knowledge Manager IAPP dave@iapp.org Blake Brannon VP, Product OneTrust bbrannon@onetrust.com Questions and Answers
  • 32. www.iapp.org 32 Web Conference Participant Feedback Survey Please take this quick (2 minute) survey to let us know how satisfied you were with this program and to provide us with suggestions for future improvement. Click here: https://www.questionpro.com/t/AOhP6ZeNFx Thank you in advance! For more information: www.iapp.org
  • 33. www.iapp.org Attention IAPP Certified Privacy Professionals: This IAPP web conference may be applied toward the continuing privacy education (CPE) requirements of your CIPP/US, CIPP/E, CIPP/G, CIPP/C, CIPT or CIPM credential worth 1.0 credit hours. IAPP-certified professionals who are the named participant of the registration will automatically receive credit. If another certified professional has participated in the program but is not the named participant then the individual may submit for credit by submitting the continuing education application form here: CPE credit application. Continuing Legal Education Credits: The IAPP provides certificates of attendance to web conference attendees. Certificates must be self-submitted to the appropriate jurisdiction for continuing education credits. Please consult your specific governing body’s rules and regulations to confirm if a web conference is an eligible format for attaining credits. Each IAPP web conference offers either 60 or 90 minutes of programming. 33
  • 34. www.iapp.org For questions on this or other IAPP Web Conferences or recordings or to obtain a copy of the slide presentation please contact: Dave Cohen, CIPP/E, CIPP/US Knowledge Manager International Association of Privacy Professionals (IAPP) dave@iapp.org 603.427.9221 34