4: Privacy Operational Life Cycle: Assess: Data Assessments Flashcards
What is a data assessment?
inventory, manage and track information
determine the impact organizational systems and processes will have on privacy
Tools to help organizations identify privacy risks
Examples of data assessment tools?
PIA’s
DPIA (data protection impact assessments)
Data Inventories (aka data-mapping assessments)
Three Lines Model wrt enterprise risk management
1: Periodic privacy risk assessments
2:compliance or privacy function
3: internal audit function
Data Governance Framework
framework provides the approach to collect, manage, secure and store data
Ten Data management areas
- Data Architecture
- Data Modeling and Design
- Data Storage and Operations
- Data Security
- Data integration and interoperability
- Documents and content
- Reference and master data
- Data warehousing and BI
- Metadata
- Data quality
Data Governance within an organization (at what levels)?
Strategic - a data steering committee with C level individuals. Steers and approves corporate data strategy, data governance, and data policies
Managerial - data owners, business leads responsible for data domain or data asset. Accountable for delivering data
Operational - data stewards, SMEs in a data domain or data asset responsible for the day-to-day management
Required for Article 30 of GDPR
Purpose of a Data Inventory (Map)
Where does the data reside? how is it used? why is it important? how does it move across systems? how is it shared and organized? where is it physically located?
What should a Data Inventory include?
- the nature of the repository (context and purpose?)
- the owner of the repository
- legal entity of the processing
- volume of information in the repository
- format of the information
- use of the info
- data retention
- types of info
- where is it stored?
- where is it accessed?
- international transfers (where does the data flow)?
- whom is the data shared with?
- transfer mechanisms
Processing Activities (Art 30 GDPR)
- the name of the controller/processor, DPO or data protection rep
- name and contact of joint controllers
- purpose for processing
- categories of personal data and data subjects
- categories of recipients
- any international transfers to other countries
- safeguards for exceptions transfers of PI to third countries or international orgs
- retention periods
- general description of the technical and org security measures
How to gather info to create a data inventory
- identify and interview data owners, or functional leads if owners unknown
- records or data team (data custodians - holders of the data)
- digital marketing team
- corporate counsel team
- IT (DBA’s, back ups and continuity (what is retained, what needs to be restored))
- software team
- compliance team
- Administrator who handles DSARs
Gathering info for data inventory - other things to consider
- how is the data processed
- type of encryption used
- retention periods
- who has access
- who is it disclosed to
- legal basis for processing the data
Three types of assessments and impact assessments…
- Privacy assessment
- Privacy Impact Assessment
- Data Protection Impact Assessment
Privacy Assessment
- measuring compliance with laws, regulations, adopted standards, internal policies and procedures
- scope: education and awareness, monitoring and responding to regulatory environment; data, systems and process assessments; risk assessments; incident response; contracts; remediation; program assurance (incl audits)
- may be internal or external
Privacy Impact Assessment
analysis of privacy risks associated with processing PI in relation to a project, product or service
should suggest or provide remedial action or mitigations to avoid/reduce risks
PIAs help facilitate PbD
Best time for a PIA?
- early
- during the ideation or scoping stage
- with new or revised industry standards, org policies or laws and regs
- when new privacy risks are created with changes in handling of PI