17. 17
Data
Personal
Data
Protect Data from loss,
damage or breach
Make data and its
contents visible
Make data searchable
Place controls around
Data
Ensure continual
application of controls
18. MappedTasks for Good Governance
ProvideVisibility &Take Mitigating Action Respond to SAR Respond to Breach Backup & Available
Unstructured Data
Disposition
Structured Data
Disposition
Infrastructure Mapping
Application Mapping
Structured Data Mapping
Subject
Access
Request
(SAR)
Process Mapping
Data Access
Monitoring
Data
Protection &
Availability
BC & BU
Strategy
Tech Consulting –
VeritasTraditional
Business Consulting –
Veritas or Partners
Process
Data
Application
Infrastructure
44. Data
Personal
Data
Protect Data from loss,
damage or breach
Make data and its
contents visible
Make data searchable
Place controls around
Data
Ensure continual
application of controls
Tactical wins for meeting strict data privacy regulations