we protect it. We have your data. We protect it. But you hold the - - PowerPoint PPT Presentation
we protect it. We have your data. We protect it. But you hold the - - PowerPoint PPT Presentation
We have your data, and we protect it. We have your data. We protect it. But you hold the key. COMPANY CONSUMER PORTAL DATA SOURCES DATA SUBJECT TOUCH POINTS INGEST SHOW ME MULTI-POS ALL DATA MY DATA CENTRALIZED DATA ECOMMERCE CHANGE
We have your data, and we protect it.
We have your data. We protect it. But you hold the key.
API SERVICES
COMPANY DATA SOURCES ANYTHING… ANALYTICS CRM/ERP ECOMMERCE MULTI-POS
CONSUMER PORTAL SHOW ME MY DATA
✓ View ✓ Fo Forge rget ✓ Co Conte ntest
CHANGE MY DATA CENTRALIZED DATA INGEST ALL DATA SECURE LEDGER FULFILL REQUESTS
DATA SUBJECT TOUCH POINTS
PHYSICAL & DIGITAL TOUCH POINTS
✓ Transf ransfer ✓ Co Cons nsent
AUDITABLE
CONSUMER TOUCHPOINTS PHYSICAL POS ECOMMERCE CALL CENTERS MOBILE APPS KIOSKS ANYWHERE… Regardless of where they come from, all Data Subjects are directed to your dedicated, branded portal: e.g. privacy.YourCompany.com
Canada Australia Japan US / California
- Country-specific changes
(e.g. Ireland’s 7 day response)
- Clarifications and Rulings
(e.g. Reporting Requirements, Data Portability)
Delete my personal data
Global opt-out AND Do Not Sell My Information
There is an existing breach notification law in CA
Privacy Policy Updates Breach Notifications Right to be Forgotten Right to Restriction of Processing Right to Object Automated Decision Making Notification of Collection
At or before the point of collection At or before the point of collection
Download my Data Does not require account to make a request
Not specified Does not require Account
Website language
Only privacy policy requirements Clear requirements
- n language for
home page
GDPR CCPA
✓
These are not built for the changing landscape of privacy: New legislation. Country-specific differences (e.g. Ireland) and clarifications in law, implementation or precedent.
✓
▪ ▪ ▪ ▪ ▪
✓ ✓ ✓ ✓ ✓ ✓
https://privacy.apple.com
[Link] May 25, 2018
ID Upload LDAP/AD/
SAML / OAUTH
3rd Party Services
Email/ SMS
Verification
CAPTCHA
✓ ✓ ✓ ✓
✓ Support deletion of specific data elements or groupings (Primary Action). ✓ “Delete All Data” is a Secondary Action ✓ Remind users of
Services they may lose Value they may lose (loyalty points)
✓ Encourage Anonymize
- ver Delete
✓ Realize conflict between absolute deletion of user data and ensuring they stay deleted ✓ Consider creating an API and/or automated routine to help catch “forgotten” data elements before you accidentally use them ✓ The API/routine should tie back to your Privacy Tasks to auto-alert data source owners to delete records ✓ Maintain deletion requests via 3rd parties to legitimately claim deletion of data
✓ Report: Request types, results, and response timeframes ✓ Lots of “gray area”: Remember to budget IT hours to scope and maintain adherence to changes in requirements
✓ ✓
TO: privacy@brand.com DATE: 5/25/18 SUBJECT: Request for data Hello, Please tell me the information you have on me as I would like the right to modify or delete some or all of it. Under the GDPR, you have
- ne month to comply.
Thanks, Nancy Melbourn Data Subject
TO: privacy@brand.com DATE: 5/25/18 SUBJECT: Request for data Hello, Please tell me the information you have on me as I would like the right to modify or delete some or all of it. Under the GDPR, you have
- ne month to comply.
Thanks, Nancy Melbourn
What kind of request is this exactly? How do I process it? Do I need to process it? I have 80 backend systems. How do I find her data in each? How do I deliver her data to her in a way she can understand it? How would I delete her data across all of those systems?
How will I respond to this in time?
How do I handle this in way that I can prove if we get sued
- r fined?
I just got 1,000 requests just like this. How do I manage all
- f those?
Is this really Nancy? Is it SPAM? Is it a fraud attempt?
DPO Data Subject
3 General Strategies
✓ ✓ ✓
3 General Strategies
✓ ✓ ✓ {# of systems} x {# of SARs} ≤ 50
/month
3 General Strategies
✓ ✓ ✓
PROS: Does not require copying data CONS: Processor-heavy: Puts on-demand, computational stress on all data sources Rigid: Schema embedded in multiple APIs
- Unpredictable. You never know what the API is
going to return Difficult to Sell Internally: Level of difficulty to add a system is relatively high
3 General Strategies
✓ ✓ ✓
Pros: Enables BI, AI and other “layers” to the Analysis stack (Similar to Blockchain) Eliminates stress on day-to-day business Data Lake Vs. Data Warehouse Capturing “rogue” data
Phase 1: AUTOMATE SARS
- Working with an API lets you render
any data element in an understandable format.
- Virtually eliminates ops overhead for
data ingestion and rendering
- Consider grouping data into
“functional areas” and data groupings.
- Maintain ability to supplement with
manual processes and CSV/file upload
Phase 2: Automate “Denies”
Phase 2: Automate “Denies”
Phase 3: Automate “Changes”
Costly, but worth it Will your tools support it? (e.g. Wordpress) Pre-built Integrations and “Connectors”
✓ ✓ ✓ ✓ ✓ ✓ ✓
Email: hello@Truyo.com Subject: Roadshow offer