4. Operations: Data Assessment Flashcards
What function do data assessments fulfill?
- Inventory, manage, and track PI
- Determine the impact organizational systems and processes will have on privacy
What are the different types and functions of data assessments?
- Privacy Impact Assessment (PIA) - enterprise risk management function
- Data Protection Impact Assessment (DPIA) - compliance function
- Data Mapping Assessment (Data Inventory) - internal audit function
What is data?
A strategic asset, the lifeblood of organizations.
What is the role of data governance?
It can:
1. Improve client value
2. Increase profitability
3. Manage risk
4. Deliver transformative initiates
What is data governance defined as by the Data Managment Association (DAMA)?
The planning, oversight, and control over management of data and the use of data and data-related sources.
What does a data governance framework provide?
A holistic approach to collecting, managing, securing, and storing data.
What should data governance cover?
DAMA envisions data management as a wheel with data governance as a hub for:
1. Data Architecture - overall structure of data & data-related resources
2. Data Modeling and Design - analysis, design, building, testing, and maintenace
3. Data Storage and Operations - structured physical data assess storage deployment and management
4. Data Security - privacy, confidentiality and appropriate access
5. Data Integration and Interoperability - Aquisition, extraction, transformation, movement, delivery, replication, federation, virtualization, and operational support
6. Documents and Content - storing, protecting, indexing and enabling access to data found in unstructured sources and making this data available for integration
7. Reference and Master Data - Shared data management to reduce redundance
8. Data Warehousing and Business Intelligence - analytical data management and processing
9. Metadata - Collection, categorization, maintenance, integration, control, and management
10. Data Quality - definition, monitoring, data maintenance integrity, and data quality
What are the common data governance roles?
- Strategic: data steering committee formed by C-level individuals
- Managerial: data owners responsible for data domain or asset
- Operational: data stewards - subject matter experts accountable for the day-to-day management of data
What is a data inventory of data map?
- Identifies data as it moves across various systems
- Indicates how data is shared
- Identifies inconsistent data versions
- Enables identification and mitigation of data disparities
- Serves to identify the most and least valuable data
- Reveal how data is accessed, used, and stored.
What are the benefits of a data inventory?
- Identifies risks
- Reduces penalty - demonstrates that the company has an established system of recording and organizing the data inventory
- Resource allocation - prioritize resources, efforts, risk assessments, and current policy in response to incidents
Who is responsible for the data inventory?
Privacy function and/or IT
What is the GDPR requirement under Article 30?
Maintain detailed records of processing activities. Records must include:
1. Name and contact detail of processor/controller/DPO
2. Name and contact of any joint controllers
3. Purpose for processing
4. Categories of PI and data subjects
5. Categories of recipients
6. International data transfers
7. Safeguards for exceptional transfers
8. Retention periods for the various categories of PI
9. Description of the technical and organizational security measures
Is it required to disclose the detailed record processing to the data protection authority?
Yes, unless the controller or processor employs fewer than 250 people, the processing is occasional, does not include sensitive data, and is not likely to result in a risk for the rights and freedoms of the individual.
What is one starting point to a data processing inventory project?
- Identifying and interviewing all known data owners.
(Data custodians may be separate from data owners)
- Reach out to IT to obtain list of database administrators who should have schemas of the databases of varying kinds.
- Teams responsible for backups and business continuity should know what data is retained and what should be restored.
- The software team should have a list of all software used in the organization.
- The compliance team should have would have details of the personal data.
- Administrators that answer data subject access requests would also have information about personal data sources.
Does nonpersonal data need to be identified in a data inventory?
Anonymous data outside the scope of the GDPR does need to be identified.
Implementing a new process means that revised or new applications or systems must thoroughly document the personal data they are processing, this will keep the data inventory from becoming outdated.
What additional data should be included in a data inventory?
- Security
- Data retention periods
- Who has access to the data
- To whom is data disclosed
- Legal basis for processing the data.
What is a privacy assessment?
A compliance measurement.
What do privacy assessments measure?
An organization’s compliance with laws, regulations, adopted standards, and internal policies and procedures.
What is the scope of a privacy assessment?
It may include:
1. Education and awareness
2. Monitoring and reporting to the regulatory environment
3. Data systems and process assessments
4. Risk assessments
5. Incident response
6. Contracts
7. Remediation
8. Program assurance including audits
Who conducts a privacy assessment?
It may be conducted internally through the audit function, DPO, a business function or externally by a third party.
Why is a privacy assessment conducted?
In response to a security or privacy event or at the request of an enforcment authority.
What is a privacy impact assessment (PIA)?
An analysis of the privacy risk associated with processing personal information in relation to a project, product or service.
What should a PIA accomplish?
Should suggest or provide remedial actions or mitigations necessary to avoid or minimize risks.
How are the PIA requirements determined?
They emanate from industry codes, organizational policy, laws, regulations, or supervisory authority.
What can PIA help facilitate?
Privacy by Design (PbD) - building privacy directly into technology, systems, and practices at the design phase.
When should a PIA be completed?
Early:
- During the ideation stage or scoping of a project, product or service that involves the collection of PI
- New or revised industry standards, organizational policies, or laws or regulations.
- When the organization create new privacy risks through changes to methods by which PI is handled.
What business processes might trigger a PIA?
- Re-identification
- Conversion of paper record to electronic format
- Significant merging, matching, and manipulation of multiple databases
- Application of user-authentication technology to publicly accessible system
- System management changes involving new technologies
- Retiring of systems
- Incorporation of PI obtained from commercial or public sources into existing databases
- Interagency exchanges or uses of PI
- Alteration of business processes (new collection, use, and disclosure of PI)
- Alteration of the character of PI
- Implementation of projects using third-party service providers
What is an express PIA?
A small questionnaire that assesses the need for a full and more comprehensive PIA.