Privacy Operation Life Cycle: Chapter 7 Sustain: Monitor and Audit Flashcards
Privacy Metrics
Reflect currency and value to org
Must add value by accurately reflecting the state of the business goals
Most popular metrics
Incident response
PIAs / DPIAs
Training and awareness
DSARs
Trend analysis
Time component: spot patterns, trend series
Cyclical component: regular fluctuations
Irregular component: remaining noise
Program Maturity Model (PMM)
- Ad Hoc: informal process
- Repeatable: procedures and process, not fully documented or covered
- Defined: fully documented, implemented, and cover all relevant aspects
- Managed: reviews are conducted to assess control effectiveness
- Optimized: regular review and feedback for continual improvement
Categories for Board report
- Defending the company
Number of incidents reported
Number of incidents actual
Number of reportable incidents
Attempted intrusions
Attempted DDOS attacks
Average investigation and response time - Complying with legal responsibilities and regulations
Complaints by data subjects
Data access requests
Rectification requests
Unsubscribe requests
Erasure requests
Stop processing requests
Data download requests - Advising the business
PIAs (with ave completion time)
DPIAs (with ave completion time)
Staff receiving privacy training (percent)
Additional categories for reporting
Number of staff
Budget
Number of products or services using PD
Total number of data subjects
Number of processors
Ratio of privacy to org employees
Ratio of privacy to Legal employees
Process with consumer vs employee data
GDPR mandated categories for reporting
DPIAs conducted
DSARs received
Complaints received
Data security incidents
How many elevated to notifications of DPAs
Monitor: types
Compliance: audits of collection, use, retention
Regulation: changes to law
Environment: internal and external factors
Training Data: by topic and employee
Monitor: forms
Tools: active scanning
Audits: internal/external
Breaches: tracking types, severity
Complaints: type and origin
Data retention: records management, retention risk
Controls: assessing the design and efficacy
HR: investigations related to compliance
Suppliers/Third parties
Audits
Evaluating the effectiveness of controls
Audit phases
Plan
Prepare
Audit
Reporting
Followup
Types of Privacy Program Metrics
Risk reduction metrics
Business enablement metrics
Data Enhancement metrics