SlideShare a Scribd company logo
1 of 26
Download to read offline
1
© 2023 TrustArc Inc. Proprietary and Confidential Information.
Understanding the 3 Best Practices for DPIA Compliance
2
Speakers
Paul Iagnocco
Customer Enablement Lead and
Senior Privacy Consultant
TrustArc
Berta Balanzategui
European Senior Privacy &
Data Protection Counsel,
General Electric Company
Joanne Furtsch
Privacy Intelligence
Development Director
TrustArc
3
Legal Disclaimer
The information provided during this webinar does not,
and is not intended to, constitute legal advice.
Instead, all information, content, and materials presented
during this webinar are for general informational purposes only.
4
What, Why, When…
Getting Started…
Know Your Data…
Agenda
High-Risk Processing Activities Present?
Demonstrate Your Due Diligence…
How TrustArc Can Help?
Questions & Answers
5
What, Why, When…
6
Understanding Data Protection Impact Assessments
What…
is a DPIA?
A type of PIA
with a focus
on data protections.
Designed to assess risk
associated with
processing activities
posing a high risk
to individuals.
Why…
a DPIA?
Identify controls needed
to address
and reduce risk.
Ensure appropriate
data protections
are in place to
comply with GDPR.
When…
to use a DPIA?
Processing activities
present high- risk
to individuals.
Complete prior to
engaging in high risk
processing activities.
7
High Risk Processing of Personal Data –
10 Defined Conditions
8
High Risk Processing of Personal Data – 10 Defined Conditions (cont.)
9
Getting Started…
10
Preparation
• Meet with business risk officer to understand “risk
“appetite” and “risk tolerance.”
• Need to understand risk in the business culture,
strategy and corporate governance.
Risk Posture
• Start with internal functions that collect and
process S/PII
• Need to identify those business functions that
have been processing S/PII; Need specifics
Identify
internal/external
S/PII processing
• Determine if this is done using software or
spreadsheets
• Once identified, communicate the process to key
stakeholders
Format & Process
11
Know Your Data…
12
Complete Data Inventory
• Identify data flows, systems, and vendors
• Includes necessary information for completing
a DPIA
Business Processing
Activities & SMEs
• Information about the processing, data elements
involved and level of sensitivity
• Systems and 3rd parties involved
Record
• The origins and transfers of information
• The inherent risk of the processing activity
Analyze
13
High-Risk Business Processing Activities Discovered?
14
High-Risk Processing Activities Present?
15
Conducting a DPIA
• Develop and document DPIA methodology and
process
• Identify tools necessary for completing DPIAs
Build DPIA
Assessment
• Identify and engage stakeholders needed to
complete DPIAs
• Create awareness and communicate process
Complete DPIA
• Determine type of assessment needed
• Manage and report on remediation activities and
outcomes
Assess &
Remediate
16
Demonstrate Your Due Diligence…
17
Be Prepared to Demonstrate
• Need to determine who owns these
• Data Inventory: Need to complete GDPR Article 30 -
ROPAs
• DPIAs: Need to complete GDPR Article 35
Reporting:
data inventory & DPIAs
• Need to determine who owns these
• Need to draft & implement workflows: data
inventory, risk evaluation and DPIA
• Need to align on revalidations: frequency, updates
Current Efforts:
workflows &
revalidations
• Need to determine who owns this
• Store reports in a centralized location (sharedrive)
• Limit access to specific job functions
Centralized Privacy
Impact Depository
18
How TrustArc Can Help?
19
Data Inventory Development
Data Inventory Hub
Build a data
inventory and
record of
processing
utilizing
advanced
collaboration
features.
Perform data mapping, export pre-built
reports such as Article 30 or Business
Process reports.
20
Data Inventory Development (continued)
Data Inventory Hub
For areas of your data record
where you need human input,
send out configurable forms
via email.
21
Data Inventory Development (continued 2)
Risk Profile
Automatically score and evaluate
privacy risk metrics on existing
records including Systems,
Vendors, Company Affiliates,
and Internal Processes.
22
Data Inventory Development (continued 3)
Risk Profile
Generate automated follow
up actions for each record.
Know when your need to
conduct a DPIA/PIA or
Vendor Assessment.
Download and export
automated company
and vendor risk reports.
23
DPIA Management
Assessment Manager
End-to-End assessment management solution. Launch PIAs, Vendor Assessments, and more.
Automate reviewal, risk scoring, revalidation, notifications, action plan, and follow up tasks.
24
DPIA Management (continued)
Assessment Manager
Pre-Built Templates crafted by privacy
experts and thought leaders, completely
configurable in TrustArc’s Template
Editor. Upload any assessment and begin
automation today.
25
DPIA Management (continued 2)
Assessment Manager
Based on the responses to the questions…
• Conditional Questions: Reveal new questions
• Auto-Assessment: Assign a separate assessment
• Early Exit: Auto-Approve and end the assessment
• Approval Routing: Assign a specific approver
• Assign Tasks: Auto assign tasks
• Auto Emails: Auto assign emails
• Risk Scoring: Auto assign risk per question
Save time with no human effort required!
Most advanced assessment automation features on the market. Fully implement an
assessment process that will automate the existing manual reviewal, risk calculation, and task
delegation process.
26
26
Thank You!
See http://www.trustarc.com/insightseries for the 2023
Privacy Insight Series and past webinar recordings.
If you would like to learn more about how TrustArc can support you with privacy and
data security compliance, please reach out to sales@trustarc.com for a free demo.

More Related Content

Similar to TrustArc Webinar: DPIA Compliance

5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan
Resilient Systems
 

Similar to TrustArc Webinar: DPIA Compliance (20)

What is a data protection impact assessment? what are the essential stages to...
What is a data protection impact assessment? what are the essential stages to...What is a data protection impact assessment? what are the essential stages to...
What is a data protection impact assessment? what are the essential stages to...
 
What is a data protection impact assessment?
What is a data protection impact assessment?What is a data protection impact assessment?
What is a data protection impact assessment?
 
Avior Healthcare Security Compliance Webcast Final1
Avior Healthcare Security Compliance Webcast Final1Avior Healthcare Security Compliance Webcast Final1
Avior Healthcare Security Compliance Webcast Final1
 
Getting Ready for PCI DSS 3.0
Getting Ready for PCI DSS 3.0Getting Ready for PCI DSS 3.0
Getting Ready for PCI DSS 3.0
 
5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan
 
TrustedAgent GRC for Public Sector
TrustedAgent GRC for Public SectorTrustedAgent GRC for Public Sector
TrustedAgent GRC for Public Sector
 
TrustedAgent GRC for Public Sector
TrustedAgent GRC for Public SectorTrustedAgent GRC for Public Sector
TrustedAgent GRC for Public Sector
 
Data protection: Steps Organisations can take to ensure compliance
Data protection: Steps Organisations can take to ensure complianceData protection: Steps Organisations can take to ensure compliance
Data protection: Steps Organisations can take to ensure compliance
 
Introduction to data science
Introduction to data scienceIntroduction to data science
Introduction to data science
 
Vendor Cybersecurity Governance: Scaling the risk
Vendor Cybersecurity Governance: Scaling the riskVendor Cybersecurity Governance: Scaling the risk
Vendor Cybersecurity Governance: Scaling the risk
 
OCR HIPAA Audits…Will You Be Prepared?
OCR HIPAA Audits…Will You Be Prepared?OCR HIPAA Audits…Will You Be Prepared?
OCR HIPAA Audits…Will You Be Prepared?
 
nist_small_business_fundamentals_july_2019.pptx
nist_small_business_fundamentals_july_2019.pptxnist_small_business_fundamentals_july_2019.pptx
nist_small_business_fundamentals_july_2019.pptx
 
Role of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseRole of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve Howse
 
IT Risk assessment and Audit Planning
IT Risk assessment and Audit PlanningIT Risk assessment and Audit Planning
IT Risk assessment and Audit Planning
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber risk
 
BiznetGio Presentation Business Continuity
BiznetGio Presentation Business ContinuityBiznetGio Presentation Business Continuity
BiznetGio Presentation Business Continuity
 
5 Signs Your Privacy Management Program is Not Working for You
5 Signs Your Privacy Management Program is Not Working for You5 Signs Your Privacy Management Program is Not Working for You
5 Signs Your Privacy Management Program is Not Working for You
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Certification+: The Most Comprehensive Compliance Solution
Certification+: The Most Comprehensive Compliance SolutionCertification+: The Most Comprehensive Compliance Solution
Certification+: The Most Comprehensive Compliance Solution
 

More from TrustArc

TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
TrustArc
 

More from TrustArc (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
 
TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI Innovations
 
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
 
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
 
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
 
Nymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 States
 
CBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceCBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy Compliance
 
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfEverything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
 
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
 
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsPrivacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
 
Building Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsBuilding Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy Certifications
 
The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...
 
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
 
Artificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceArtificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI Governance
 
How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023
 
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act:  Using Consumer Data and Maintaining TrustThe Ultimate Balancing Act:  Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

TrustArc Webinar: DPIA Compliance

  • 1. 1 © 2023 TrustArc Inc. Proprietary and Confidential Information. Understanding the 3 Best Practices for DPIA Compliance
  • 2. 2 Speakers Paul Iagnocco Customer Enablement Lead and Senior Privacy Consultant TrustArc Berta Balanzategui European Senior Privacy & Data Protection Counsel, General Electric Company Joanne Furtsch Privacy Intelligence Development Director TrustArc
  • 3. 3 Legal Disclaimer The information provided during this webinar does not, and is not intended to, constitute legal advice. Instead, all information, content, and materials presented during this webinar are for general informational purposes only.
  • 4. 4 What, Why, When… Getting Started… Know Your Data… Agenda High-Risk Processing Activities Present? Demonstrate Your Due Diligence… How TrustArc Can Help? Questions & Answers
  • 6. 6 Understanding Data Protection Impact Assessments What… is a DPIA? A type of PIA with a focus on data protections. Designed to assess risk associated with processing activities posing a high risk to individuals. Why… a DPIA? Identify controls needed to address and reduce risk. Ensure appropriate data protections are in place to comply with GDPR. When… to use a DPIA? Processing activities present high- risk to individuals. Complete prior to engaging in high risk processing activities.
  • 7. 7 High Risk Processing of Personal Data – 10 Defined Conditions
  • 8. 8 High Risk Processing of Personal Data – 10 Defined Conditions (cont.)
  • 10. 10 Preparation • Meet with business risk officer to understand “risk “appetite” and “risk tolerance.” • Need to understand risk in the business culture, strategy and corporate governance. Risk Posture • Start with internal functions that collect and process S/PII • Need to identify those business functions that have been processing S/PII; Need specifics Identify internal/external S/PII processing • Determine if this is done using software or spreadsheets • Once identified, communicate the process to key stakeholders Format & Process
  • 12. 12 Complete Data Inventory • Identify data flows, systems, and vendors • Includes necessary information for completing a DPIA Business Processing Activities & SMEs • Information about the processing, data elements involved and level of sensitivity • Systems and 3rd parties involved Record • The origins and transfers of information • The inherent risk of the processing activity Analyze
  • 13. 13 High-Risk Business Processing Activities Discovered?
  • 15. 15 Conducting a DPIA • Develop and document DPIA methodology and process • Identify tools necessary for completing DPIAs Build DPIA Assessment • Identify and engage stakeholders needed to complete DPIAs • Create awareness and communicate process Complete DPIA • Determine type of assessment needed • Manage and report on remediation activities and outcomes Assess & Remediate
  • 16. 16 Demonstrate Your Due Diligence…
  • 17. 17 Be Prepared to Demonstrate • Need to determine who owns these • Data Inventory: Need to complete GDPR Article 30 - ROPAs • DPIAs: Need to complete GDPR Article 35 Reporting: data inventory & DPIAs • Need to determine who owns these • Need to draft & implement workflows: data inventory, risk evaluation and DPIA • Need to align on revalidations: frequency, updates Current Efforts: workflows & revalidations • Need to determine who owns this • Store reports in a centralized location (sharedrive) • Limit access to specific job functions Centralized Privacy Impact Depository
  • 19. 19 Data Inventory Development Data Inventory Hub Build a data inventory and record of processing utilizing advanced collaboration features. Perform data mapping, export pre-built reports such as Article 30 or Business Process reports.
  • 20. 20 Data Inventory Development (continued) Data Inventory Hub For areas of your data record where you need human input, send out configurable forms via email.
  • 21. 21 Data Inventory Development (continued 2) Risk Profile Automatically score and evaluate privacy risk metrics on existing records including Systems, Vendors, Company Affiliates, and Internal Processes.
  • 22. 22 Data Inventory Development (continued 3) Risk Profile Generate automated follow up actions for each record. Know when your need to conduct a DPIA/PIA or Vendor Assessment. Download and export automated company and vendor risk reports.
  • 23. 23 DPIA Management Assessment Manager End-to-End assessment management solution. Launch PIAs, Vendor Assessments, and more. Automate reviewal, risk scoring, revalidation, notifications, action plan, and follow up tasks.
  • 24. 24 DPIA Management (continued) Assessment Manager Pre-Built Templates crafted by privacy experts and thought leaders, completely configurable in TrustArc’s Template Editor. Upload any assessment and begin automation today.
  • 25. 25 DPIA Management (continued 2) Assessment Manager Based on the responses to the questions… • Conditional Questions: Reveal new questions • Auto-Assessment: Assign a separate assessment • Early Exit: Auto-Approve and end the assessment • Approval Routing: Assign a specific approver • Assign Tasks: Auto assign tasks • Auto Emails: Auto assign emails • Risk Scoring: Auto assign risk per question Save time with no human effort required! Most advanced assessment automation features on the market. Fully implement an assessment process that will automate the existing manual reviewal, risk calculation, and task delegation process.
  • 26. 26 26 Thank You! See http://www.trustarc.com/insightseries for the 2023 Privacy Insight Series and past webinar recordings. If you would like to learn more about how TrustArc can support you with privacy and data security compliance, please reach out to sales@trustarc.com for a free demo.