SlideShare a Scribd company logo
© 2017 TrustArc Inc Proprietary and Confidential Information
PRIVACY INSIGHT SERIES
Summer / Fall 2017 Webinar Program
PRIVACY INSIGHT SERIES
Building Your DPIA/PIA Program:
Tips & Case Studies
September 12, 2017
© 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
Today’s Speakers
Alexia Maas
SVP - General Counsel, Volvo Financial Services
Beth Sipula
Sr. Privacy Consultant, TrustArc
© 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
Today’s Agenda
• Welcome & Introductions
• GDPR compliance requirements
• Essential elements for building your program
• Recommendations for success
• Q&A
© 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
Poll Question
Do you have an internal PIA or DPIA process in place?
4%
4
TrustArc / Dimensional Research 2017
A. Yes
B. No
PRIVACY INSIGHT SERIES
Summer / Fall 2017 Webinar Program
© 2017 TrustArc Inc Proprietary and Confidential Information
GDPR Requirements for DPIAs
© 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
The EU GDPR – May 25, 2018 Deadline
Significant Compliance Requirements
6
© 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
GDPR Requirements for DPIAs (Articles 35 and 36)
Processing likely to
result in high risk
Article 35(1)
No
No DPIA Required
DPIA Required
• Systematic description of the processing
• Assessment of necessity and
proportionality
• Assessment of the risks to the rights and
freedoms of data subjects
• Measures to address the risks
Is residual risk high?
No
DPA Consult RequiredNo DPA Consult
Required
© 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
• The terms “PIA” and “DPIA” are used interchangeably by many
organizations. An organization may use a DPIA, even if a DPIA is
not required, to conduct an assessment to ensure the required data
protection controls are in place and to demonstrate compliance with
GDPR requirements.
• DPIAs are required of organizations acting as Data Controllers.
Data Processors may also use DPIAs to assess whether they are
processing data in a manner that supports the Controller in meeting
its compliance obligations under the GDPR.
• Both PIAs and DPIAs enable organizations to identify the controls
needed to address and reduce risk—be it a risk to the rights of
individuals, a compliance risk of the organization, or both.
PIAs and DPIAs: Similarities and Differences
© 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
• Automated-decision making with legal or similar significant effect
• Evaluation or scoring
• Systematic monitoring
• Sensitive data
• Data processed on a large scale
• Datasets that have been matched or combined
• Data concerning vulnerable subjects
• Data transfer across borders outside of the EU
• Innovative use or applying technological or organizational
solutions
• Where the processing itself prevents individuals from exercising a
right or using a service or a contract
Processing Likely to Result in High Risk – Key Criteria
Based on Article 29 Working Party Guidelines WP 248 (4 Apr 2017)
© 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
A. Less than 10
B. 11 - 50
C. 51-100
D. 100+
E. I have no idea
Poll Question #2
How many PIAs will your organization complete in
2017?
PRIVACY INSIGHT SERIES
Summer / Fall 2017 Webinar Program
© 2017 TrustArc Inc Proprietary and Confidential Information
Essential Elements for Building Your
Program
© 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
Build Your Program – 6 Essential Elements
Build
Establish, maintain
and evolve an
integrated privacy
and data governance
program aligned with
other data
management and
information risk
functions such as
security, IP, trade
secret protection and
e-discovery
Integrated
Governance
Identify stakeholders. Establish
program leadership and governance.
Define program mission, vision and
goals.
Risk
Assessment
Identify, assess and classify data-
related strategic, operational, legal
compliance and financial risks.
Resource
Allocation
Establish budgets. Define roles and
responsibilities. Assign competent
personnel.
Policies &
Standards
Develop policies, procedures and
guidelines to define and deploy
effective and sustainable governance
and controls for managing data-
related risks.
Processes Establish, manage, measure and
continually improve processes for
PIAs, vendor assessments, incident
management and breach notification,
complaint handling and individual
rights management.
Awareness &
Training
Communicate expectations. Provide
general & contextual training.
Learn and Evolve Over Time
© 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
1. Integrated Governance
Identify your key stakeholders: Establish program leadership and
governance. Define program mission, vision and goals.
Leverage relationships with key internal stakeholders (and build new ones) to
drive change and adoption
Key Stakeholders Key Area (examples)
IT/Security Responsible for data protection and securing
internal systems
Human Resources Responsible for HR data and systems
Marketing Responsible for services to customers (both
internal and external)
Legal Responsible for ensuring legal requirements are
met
Internal Audit Responsible for managing an audit trail
Procurement Responsible for vetting and contracting with
vendors and third parties
© 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
2. Risk Assessment
Identify and assess risk: Classify data-related strategic, operational,
legal compliance and financial risks.
Key Risks (examples)
Significant infrastructure or systems changes
New Product development where data is collected; changes to existing
products new uses for data collected
New regulations and compliance requirements (GDPR)
Mergers and acquisitions
New vendors and third party business partners
Ongoing HR related data requirements (example: employee monitoring)
© 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
3. Resource Allocation
Identify resource needs: Establish budgets. Define roles and
responsibilities. Assign knowledgeable and trained personnel.
Resource Needs to Consider
Executive Champion; “top down” support essential to success
Training and knowledgeable personnel needed to manage PIA/DPIA
process; Define roles and responsibilities
Systems needed to support the program; automation
New regulations and compliance requirements (monitoring)
Outside consulting and legal resources
© 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
4. Policies and Standards
Develop policies and standards: Procedures and guidelines
to define and deploy effective and sustainable governance and
controls for managing data-related risks.
• IT Security, Data Security
and Acceptable Use
• Privacy Notices and Policies
• Data Use, Retention and
Disposal
• Data Classification
• Marketing Operations
• Product Development
© 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
5. Processes
Establish, manage, measure and continually improve processes:
Ensure a unified approach to PIAs/DPIAs, vendor assessments,
incident management and breach notification, complaint handling and
individual rights management.
• One size does not fit all. Organizations should develop and follow a
process that makes sense for their size, type of processing, and
resources
• PIAs/DPIAs need to be conducted according to a documented process
to ensure consistency
• Documentation to demonstrate accountability is also critical (on
demand)
Build Assess Implement Manage Demonstrate
© 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
6. Awareness & Training
Communicate
expectations
Provide
general &
contextual
training
Embed in
established
training
cycles
PRIVACY INSIGHT SERIES
Summer / Fall 2017 Webinar Program
© 2017 TrustArc Inc Proprietary and Confidential Information
Recommendations
© 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
• Assign clearly defined roles for all stages
• Having an Executive “Champion” or Sponsor
• PIA/DPIA processes need to be simple, repeatable, concise, and they
need to map to the GDPR requirements
• One size does not fit all – consider the level of risk
– Also consider a process with traditional PIAs for all projects and EU
DPIAs for projects that trigger EU DP rules
• Build a robust process with scalability in mind
– Consider the system you are using, what it’ll take to make the
process more efficient and automate
• Over communicate and reinforce training at every opportunity
Recommendations for Success
© 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
Additional Resources
21
www.trustarc.com/resources
PRIVACY INSIGHT SERIES
Summer / Fall 2017 Webinar Program
© 2017 TrustArc Inc Proprietary and Confidential Information
Contacts
Alexia Maas alexia.maas@vfsco.com
Beth Sipula bsipula@trustarc.com
© 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
Privacy Insight Series – 2017 Calendar
23
www.trustarc.com/insightseries
PRIVACY INSIGHT SERIES
Summer / Fall 2017 Webinar Program
© 2017 TrustArc Inc Proprietary and Confidential Information
Thank You!
Register for the next webinar in our Series – October 11th
“Profiling, Big Data & Consent Under the GDPR”
For full Summer/Fall schedule and past webinar recordings
visit: http://www.trustarc.com/insightseries

More Related Content

What's hot

General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...
Cvent
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...
IT Governance Ltd
 
Debunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust SecurityDebunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust Security
Centrify Corporation
 
Data privacy impact assessment
Data privacy impact assessmentData privacy impact assessment
Data privacy impact assessment
Stephen Owen
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
IBM Security
 
PDPA 2010 at office (HairulHafiz)
PDPA 2010 at office (HairulHafiz)PDPA 2010 at office (HairulHafiz)
PDPA 2010 at office (HairulHafiz)
Hairul Hafiz Hasbullah
 
Physical Security
Physical SecurityPhysical Security
Physical Security
Kriscila Yumul
 
Introduction to GDPR
Introduction to GDPRIntroduction to GDPR
Introduction to GDPR
Priyab Satoshi
 
Data Security Explained
Data Security ExplainedData Security Explained
Data Security Explained
Happiest Minds Technologies
 
Everything you Need to Know about The Data Protection Officer Role
Everything you Need to Know about The Data Protection Officer Role Everything you Need to Know about The Data Protection Officer Role
Everything you Need to Know about The Data Protection Officer Role
HackerOne
 
GDPR
GDPRGDPR
Checklist for SMEs for GDPR compliance
Checklist for SMEs for GDPR complianceChecklist for SMEs for GDPR compliance
Checklist for SMEs for GDPR compliance
Sarah Fox
 
Gdpr presentation
Gdpr presentationGdpr presentation
Gdpr presentation
Iain Wicks MCIPR
 
Corporate security
Corporate securityCorporate security
Corporate security
Jarno Niemela
 
Threat Activity Groups - Dragos
Threat Activity Groups - Dragos Threat Activity Groups - Dragos
Threat Activity Groups - Dragos
Dragos, Inc.
 
GDPR and ISO 27001 - how to be compliant
GDPR and ISO 27001 - how to be compliantGDPR and ISO 27001 - how to be compliant
GDPR and ISO 27001 - how to be compliant
Ilesh Dattani
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
mateenzero
 
ISMS User_Awareness Training.pptx
ISMS User_Awareness Training.pptxISMS User_Awareness Training.pptx
ISMS User_Awareness Training.pptx
Mukesh Pant
 
Vulnerability Assessment
Vulnerability AssessmentVulnerability Assessment
Vulnerability Assessment
primeteacher32
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protection
sp_krishna
 

What's hot (20)

General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...
 
Debunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust SecurityDebunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust Security
 
Data privacy impact assessment
Data privacy impact assessmentData privacy impact assessment
Data privacy impact assessment
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 
PDPA 2010 at office (HairulHafiz)
PDPA 2010 at office (HairulHafiz)PDPA 2010 at office (HairulHafiz)
PDPA 2010 at office (HairulHafiz)
 
Physical Security
Physical SecurityPhysical Security
Physical Security
 
Introduction to GDPR
Introduction to GDPRIntroduction to GDPR
Introduction to GDPR
 
Data Security Explained
Data Security ExplainedData Security Explained
Data Security Explained
 
Everything you Need to Know about The Data Protection Officer Role
Everything you Need to Know about The Data Protection Officer Role Everything you Need to Know about The Data Protection Officer Role
Everything you Need to Know about The Data Protection Officer Role
 
GDPR
GDPRGDPR
GDPR
 
Checklist for SMEs for GDPR compliance
Checklist for SMEs for GDPR complianceChecklist for SMEs for GDPR compliance
Checklist for SMEs for GDPR compliance
 
Gdpr presentation
Gdpr presentationGdpr presentation
Gdpr presentation
 
Corporate security
Corporate securityCorporate security
Corporate security
 
Threat Activity Groups - Dragos
Threat Activity Groups - Dragos Threat Activity Groups - Dragos
Threat Activity Groups - Dragos
 
GDPR and ISO 27001 - how to be compliant
GDPR and ISO 27001 - how to be compliantGDPR and ISO 27001 - how to be compliant
GDPR and ISO 27001 - how to be compliant
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
ISMS User_Awareness Training.pptx
ISMS User_Awareness Training.pptxISMS User_Awareness Training.pptx
ISMS User_Awareness Training.pptx
 
Vulnerability Assessment
Vulnerability AssessmentVulnerability Assessment
Vulnerability Assessment
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protection
 

Similar to Building Your DPIA/PIA Program: Tips & Case Studies [TrustArc Webinar Slides]

Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...
Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...
Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...
TrustArc
 
Feb20 Webinar - Managing Risk and Pain of Vendor Management
Feb20 Webinar - Managing Risk and Pain of Vendor ManagementFeb20 Webinar - Managing Risk and Pain of Vendor Management
Feb20 Webinar - Managing Risk and Pain of Vendor Management
TrustArc
 
Strata NYC 2015 - Transamerica and INFA v1
Strata NYC 2015 - Transamerica and INFA v1Strata NYC 2015 - Transamerica and INFA v1
Strata NYC 2015 - Transamerica and INFA v1
Vishal Bamba
 
DGIQ 2018 Presentation: How to be successful in the post GDPR landscape – bui...
DGIQ 2018 Presentation: How to be successful in the post GDPR landscape – bui...DGIQ 2018 Presentation: How to be successful in the post GDPR landscape – bui...
DGIQ 2018 Presentation: How to be successful in the post GDPR landscape – bui...
DATUM LLC
 
Building a Strategy customers and Auditors Love
Building a Strategy customers and Auditors LoveBuilding a Strategy customers and Auditors Love
Building a Strategy customers and Auditors Love
jadams6
 
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Puneet Kukreja
 
Whos role is it anyway
Whos role is it anywayWhos role is it anyway
Whos role is it anyway
IRIS
 
Understanding New Technology and Security Risks as you respond to COVID-19
Understanding New Technology and Security Risks as you respond to COVID-19Understanding New Technology and Security Risks as you respond to COVID-19
Understanding New Technology and Security Risks as you respond to COVID-19
Emma Kelly
 
Workable Enteprise Data Governance
Workable Enteprise Data GovernanceWorkable Enteprise Data Governance
Workable Enteprise Data Governance
Bhavendra Chavan
 
Too much data and not enough analytics!
Too much data and not enough analytics!Too much data and not enough analytics!
Too much data and not enough analytics!
Emma Kelly
 
Learning From IG Experts In Healthcare & Beyond: How To Start An Information ...
Learning From IG Experts In Healthcare & Beyond: How To Start An Information ...Learning From IG Experts In Healthcare & Beyond: How To Start An Information ...
Learning From IG Experts In Healthcare & Beyond: How To Start An Information ...
Nick Inglis
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offer
Capgemini
 
General Data Protection Regulation: Where are we now?
General Data Protection Regulation: Where are we now?General Data Protection Regulation: Where are we now?
General Data Protection Regulation: Where are we now?
Leigh Hill
 
Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...
Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...
Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...
TrustArc
 
What You Don’t Know May Hurt You – Achieving Insight and Knowledge Discovery
What You Don’t Know May Hurt You – Achieving Insight and Knowledge DiscoveryWhat You Don’t Know May Hurt You – Achieving Insight and Knowledge Discovery
What You Don’t Know May Hurt You – Achieving Insight and Knowledge Discovery
Concept Searching, Inc
 
What CDOs Need to Know: Foundations of Data Governance
What CDOs Need to Know: Foundations of Data GovernanceWhat CDOs Need to Know: Foundations of Data Governance
What CDOs Need to Know: Foundations of Data Governance
DATAVERSITY
 
Unlocking Success Through Data Tips for Choosing the Right Data Collection Pa...
Unlocking Success Through Data Tips for Choosing the Right Data Collection Pa...Unlocking Success Through Data Tips for Choosing the Right Data Collection Pa...
Unlocking Success Through Data Tips for Choosing the Right Data Collection Pa...
Andrew Leo
 
Financial Services - New Approach to Data Management in the Digital Era
Financial Services - New Approach to Data Management in the Digital EraFinancial Services - New Approach to Data Management in the Digital Era
Financial Services - New Approach to Data Management in the Digital Era
accenture
 
Privacy Operations (PrivacyOps) Framework - Feroot Privacy
Privacy Operations (PrivacyOps) Framework - Feroot PrivacyPrivacy Operations (PrivacyOps) Framework - Feroot Privacy
Privacy Operations (PrivacyOps) Framework - Feroot Privacy
Ivan Tsarynny
 
PrivacyOps Framework
PrivacyOps FrameworkPrivacyOps Framework
PrivacyOps Framework
Feroot
 

Similar to Building Your DPIA/PIA Program: Tips & Case Studies [TrustArc Webinar Slides] (20)

Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...
Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...
Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...
 
Feb20 Webinar - Managing Risk and Pain of Vendor Management
Feb20 Webinar - Managing Risk and Pain of Vendor ManagementFeb20 Webinar - Managing Risk and Pain of Vendor Management
Feb20 Webinar - Managing Risk and Pain of Vendor Management
 
Strata NYC 2015 - Transamerica and INFA v1
Strata NYC 2015 - Transamerica and INFA v1Strata NYC 2015 - Transamerica and INFA v1
Strata NYC 2015 - Transamerica and INFA v1
 
DGIQ 2018 Presentation: How to be successful in the post GDPR landscape – bui...
DGIQ 2018 Presentation: How to be successful in the post GDPR landscape – bui...DGIQ 2018 Presentation: How to be successful in the post GDPR landscape – bui...
DGIQ 2018 Presentation: How to be successful in the post GDPR landscape – bui...
 
Building a Strategy customers and Auditors Love
Building a Strategy customers and Auditors LoveBuilding a Strategy customers and Auditors Love
Building a Strategy customers and Auditors Love
 
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
 
Whos role is it anyway
Whos role is it anywayWhos role is it anyway
Whos role is it anyway
 
Understanding New Technology and Security Risks as you respond to COVID-19
Understanding New Technology and Security Risks as you respond to COVID-19Understanding New Technology and Security Risks as you respond to COVID-19
Understanding New Technology and Security Risks as you respond to COVID-19
 
Workable Enteprise Data Governance
Workable Enteprise Data GovernanceWorkable Enteprise Data Governance
Workable Enteprise Data Governance
 
Too much data and not enough analytics!
Too much data and not enough analytics!Too much data and not enough analytics!
Too much data and not enough analytics!
 
Learning From IG Experts In Healthcare & Beyond: How To Start An Information ...
Learning From IG Experts In Healthcare & Beyond: How To Start An Information ...Learning From IG Experts In Healthcare & Beyond: How To Start An Information ...
Learning From IG Experts In Healthcare & Beyond: How To Start An Information ...
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offer
 
General Data Protection Regulation: Where are we now?
General Data Protection Regulation: Where are we now?General Data Protection Regulation: Where are we now?
General Data Protection Regulation: Where are we now?
 
Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...
Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...
Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...
 
What You Don’t Know May Hurt You – Achieving Insight and Knowledge Discovery
What You Don’t Know May Hurt You – Achieving Insight and Knowledge DiscoveryWhat You Don’t Know May Hurt You – Achieving Insight and Knowledge Discovery
What You Don’t Know May Hurt You – Achieving Insight and Knowledge Discovery
 
What CDOs Need to Know: Foundations of Data Governance
What CDOs Need to Know: Foundations of Data GovernanceWhat CDOs Need to Know: Foundations of Data Governance
What CDOs Need to Know: Foundations of Data Governance
 
Unlocking Success Through Data Tips for Choosing the Right Data Collection Pa...
Unlocking Success Through Data Tips for Choosing the Right Data Collection Pa...Unlocking Success Through Data Tips for Choosing the Right Data Collection Pa...
Unlocking Success Through Data Tips for Choosing the Right Data Collection Pa...
 
Financial Services - New Approach to Data Management in the Digital Era
Financial Services - New Approach to Data Management in the Digital EraFinancial Services - New Approach to Data Management in the Digital Era
Financial Services - New Approach to Data Management in the Digital Era
 
Privacy Operations (PrivacyOps) Framework - Feroot Privacy
Privacy Operations (PrivacyOps) Framework - Feroot PrivacyPrivacy Operations (PrivacyOps) Framework - Feroot Privacy
Privacy Operations (PrivacyOps) Framework - Feroot Privacy
 
PrivacyOps Framework
PrivacyOps FrameworkPrivacyOps Framework
PrivacyOps Framework
 

More from TrustArc

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc
 
TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc
 
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc
 
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
TrustArc
 
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
TrustArc
 
Nymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 States
TrustArc
 
CBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceCBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy Compliance
TrustArc
 
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfEverything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
TrustArc
 
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
TrustArc
 
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsPrivacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
TrustArc
 
Building Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsBuilding Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy Certifications
TrustArc
 
The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...
TrustArc
 
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
TrustArc
 
Artificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceArtificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI Governance
TrustArc
 

More from TrustArc (20)

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
 
TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI Innovations
 
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
 
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
 
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
 
Nymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 States
 
CBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceCBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy Compliance
 
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfEverything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
 
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
 
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsPrivacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
 
Building Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsBuilding Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy Certifications
 
The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...
 
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
 
Artificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceArtificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI Governance
 

Recently uploaded

From Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal EnvironmentsFrom Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal Environments
ssusera97a2f
 
The Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in ItalyThe Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in Italy
BridgeWest.eu
 
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee
 
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptxPatenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
ssuser559494
 
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdfXYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
bhavenpr
 
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersDefending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
HarpreetSaini48
 
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Massimo Talia
 
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdfV.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
bhavenpr
 
Incometax Compliance_PF_ ESI- June 2024
Incometax  Compliance_PF_ ESI- June 2024Incometax  Compliance_PF_ ESI- June 2024
Incometax Compliance_PF_ ESI- June 2024
EbizfilingIndia
 
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
osenwakm
 
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
CIkumparan
 
Energizing Communities, Fostering Growth, Sustaining Futures
Energizing Communities, Fostering Growth, Sustaining FuturesEnergizing Communities, Fostering Growth, Sustaining Futures
Energizing Communities, Fostering Growth, Sustaining Futures
USDAReapgrants.com
 
Tax Law Notes on taxation law tax law for 10th sem
Tax Law Notes on taxation law tax law for 10th semTax Law Notes on taxation law tax law for 10th sem
Tax Law Notes on taxation law tax law for 10th sem
azizurrahaman17
 
Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
MattGardner52
 
Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976
PelayoGilbert
 
What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...
lawyersonia
 
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
SKshi
 
fnaf lore.pptx ...................................
fnaf lore.pptx ...................................fnaf lore.pptx ...................................
fnaf lore.pptx ...................................
20jcoello
 
Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
seri bangash
 
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Syed Muhammad Humza Hussain
 

Recently uploaded (20)

From Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal EnvironmentsFrom Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal Environments
 
The Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in ItalyThe Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in Italy
 
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
 
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptxPatenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
 
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdfXYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
 
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersDefending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
 
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
 
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdfV.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
 
Incometax Compliance_PF_ ESI- June 2024
Incometax  Compliance_PF_ ESI- June 2024Incometax  Compliance_PF_ ESI- June 2024
Incometax Compliance_PF_ ESI- June 2024
 
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
 
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
 
Energizing Communities, Fostering Growth, Sustaining Futures
Energizing Communities, Fostering Growth, Sustaining FuturesEnergizing Communities, Fostering Growth, Sustaining Futures
Energizing Communities, Fostering Growth, Sustaining Futures
 
Tax Law Notes on taxation law tax law for 10th sem
Tax Law Notes on taxation law tax law for 10th semTax Law Notes on taxation law tax law for 10th sem
Tax Law Notes on taxation law tax law for 10th sem
 
Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
 
Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976
 
What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...
 
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
 
fnaf lore.pptx ...................................
fnaf lore.pptx ...................................fnaf lore.pptx ...................................
fnaf lore.pptx ...................................
 
Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
 
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
 

Building Your DPIA/PIA Program: Tips & Case Studies [TrustArc Webinar Slides]

  • 1. © 2017 TrustArc Inc Proprietary and Confidential Information PRIVACY INSIGHT SERIES Summer / Fall 2017 Webinar Program PRIVACY INSIGHT SERIES Building Your DPIA/PIA Program: Tips & Case Studies September 12, 2017
  • 2. © 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries Today’s Speakers Alexia Maas SVP - General Counsel, Volvo Financial Services Beth Sipula Sr. Privacy Consultant, TrustArc
  • 3. © 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries Today’s Agenda • Welcome & Introductions • GDPR compliance requirements • Essential elements for building your program • Recommendations for success • Q&A
  • 4. © 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries Poll Question Do you have an internal PIA or DPIA process in place? 4% 4 TrustArc / Dimensional Research 2017 A. Yes B. No
  • 5. PRIVACY INSIGHT SERIES Summer / Fall 2017 Webinar Program © 2017 TrustArc Inc Proprietary and Confidential Information GDPR Requirements for DPIAs
  • 6. © 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries The EU GDPR – May 25, 2018 Deadline Significant Compliance Requirements 6
  • 7. © 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries GDPR Requirements for DPIAs (Articles 35 and 36) Processing likely to result in high risk Article 35(1) No No DPIA Required DPIA Required • Systematic description of the processing • Assessment of necessity and proportionality • Assessment of the risks to the rights and freedoms of data subjects • Measures to address the risks Is residual risk high? No DPA Consult RequiredNo DPA Consult Required
  • 8. © 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries • The terms “PIA” and “DPIA” are used interchangeably by many organizations. An organization may use a DPIA, even if a DPIA is not required, to conduct an assessment to ensure the required data protection controls are in place and to demonstrate compliance with GDPR requirements. • DPIAs are required of organizations acting as Data Controllers. Data Processors may also use DPIAs to assess whether they are processing data in a manner that supports the Controller in meeting its compliance obligations under the GDPR. • Both PIAs and DPIAs enable organizations to identify the controls needed to address and reduce risk—be it a risk to the rights of individuals, a compliance risk of the organization, or both. PIAs and DPIAs: Similarities and Differences
  • 9. © 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries • Automated-decision making with legal or similar significant effect • Evaluation or scoring • Systematic monitoring • Sensitive data • Data processed on a large scale • Datasets that have been matched or combined • Data concerning vulnerable subjects • Data transfer across borders outside of the EU • Innovative use or applying technological or organizational solutions • Where the processing itself prevents individuals from exercising a right or using a service or a contract Processing Likely to Result in High Risk – Key Criteria Based on Article 29 Working Party Guidelines WP 248 (4 Apr 2017)
  • 10. © 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries A. Less than 10 B. 11 - 50 C. 51-100 D. 100+ E. I have no idea Poll Question #2 How many PIAs will your organization complete in 2017?
  • 11. PRIVACY INSIGHT SERIES Summer / Fall 2017 Webinar Program © 2017 TrustArc Inc Proprietary and Confidential Information Essential Elements for Building Your Program
  • 12. © 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries Build Your Program – 6 Essential Elements Build Establish, maintain and evolve an integrated privacy and data governance program aligned with other data management and information risk functions such as security, IP, trade secret protection and e-discovery Integrated Governance Identify stakeholders. Establish program leadership and governance. Define program mission, vision and goals. Risk Assessment Identify, assess and classify data- related strategic, operational, legal compliance and financial risks. Resource Allocation Establish budgets. Define roles and responsibilities. Assign competent personnel. Policies & Standards Develop policies, procedures and guidelines to define and deploy effective and sustainable governance and controls for managing data- related risks. Processes Establish, manage, measure and continually improve processes for PIAs, vendor assessments, incident management and breach notification, complaint handling and individual rights management. Awareness & Training Communicate expectations. Provide general & contextual training. Learn and Evolve Over Time
  • 13. © 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries 1. Integrated Governance Identify your key stakeholders: Establish program leadership and governance. Define program mission, vision and goals. Leverage relationships with key internal stakeholders (and build new ones) to drive change and adoption Key Stakeholders Key Area (examples) IT/Security Responsible for data protection and securing internal systems Human Resources Responsible for HR data and systems Marketing Responsible for services to customers (both internal and external) Legal Responsible for ensuring legal requirements are met Internal Audit Responsible for managing an audit trail Procurement Responsible for vetting and contracting with vendors and third parties
  • 14. © 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries 2. Risk Assessment Identify and assess risk: Classify data-related strategic, operational, legal compliance and financial risks. Key Risks (examples) Significant infrastructure or systems changes New Product development where data is collected; changes to existing products new uses for data collected New regulations and compliance requirements (GDPR) Mergers and acquisitions New vendors and third party business partners Ongoing HR related data requirements (example: employee monitoring)
  • 15. © 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries 3. Resource Allocation Identify resource needs: Establish budgets. Define roles and responsibilities. Assign knowledgeable and trained personnel. Resource Needs to Consider Executive Champion; “top down” support essential to success Training and knowledgeable personnel needed to manage PIA/DPIA process; Define roles and responsibilities Systems needed to support the program; automation New regulations and compliance requirements (monitoring) Outside consulting and legal resources
  • 16. © 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries 4. Policies and Standards Develop policies and standards: Procedures and guidelines to define and deploy effective and sustainable governance and controls for managing data-related risks. • IT Security, Data Security and Acceptable Use • Privacy Notices and Policies • Data Use, Retention and Disposal • Data Classification • Marketing Operations • Product Development
  • 17. © 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries 5. Processes Establish, manage, measure and continually improve processes: Ensure a unified approach to PIAs/DPIAs, vendor assessments, incident management and breach notification, complaint handling and individual rights management. • One size does not fit all. Organizations should develop and follow a process that makes sense for their size, type of processing, and resources • PIAs/DPIAs need to be conducted according to a documented process to ensure consistency • Documentation to demonstrate accountability is also critical (on demand) Build Assess Implement Manage Demonstrate
  • 18. © 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries 6. Awareness & Training Communicate expectations Provide general & contextual training Embed in established training cycles
  • 19. PRIVACY INSIGHT SERIES Summer / Fall 2017 Webinar Program © 2017 TrustArc Inc Proprietary and Confidential Information Recommendations
  • 20. © 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries • Assign clearly defined roles for all stages • Having an Executive “Champion” or Sponsor • PIA/DPIA processes need to be simple, repeatable, concise, and they need to map to the GDPR requirements • One size does not fit all – consider the level of risk – Also consider a process with traditional PIAs for all projects and EU DPIAs for projects that trigger EU DP rules • Build a robust process with scalability in mind – Consider the system you are using, what it’ll take to make the process more efficient and automate • Over communicate and reinforce training at every opportunity Recommendations for Success
  • 21. © 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries Additional Resources 21 www.trustarc.com/resources
  • 22. PRIVACY INSIGHT SERIES Summer / Fall 2017 Webinar Program © 2017 TrustArc Inc Proprietary and Confidential Information Contacts Alexia Maas alexia.maas@vfsco.com Beth Sipula bsipula@trustarc.com
  • 23. © 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries Privacy Insight Series – 2017 Calendar 23 www.trustarc.com/insightseries
  • 24. PRIVACY INSIGHT SERIES Summer / Fall 2017 Webinar Program © 2017 TrustArc Inc Proprietary and Confidential Information Thank You! Register for the next webinar in our Series – October 11th “Profiling, Big Data & Consent Under the GDPR” For full Summer/Fall schedule and past webinar recordings visit: http://www.trustarc.com/insightseries