There was a time in the not-too-distant past when a business – whether a credit card company, magazine publisher or consumer goods manufacturer – would bolster revenue by selling its customer list to firms in other industries. Your name, address and phone number were simply fungible assets to be traded in the marketplace. As we all know, that is not the case today. Every organization that maintains personally identifiable information (PII) for customers, employees or business partners is responsible for keeping information confidential and sharing only when authorized and appropriate.
Data privacy has come to the forefront of late due to new legislation aimed at protecting personal information, most notably the General Data Protection Regulation (GDPR) in Europe and the California Consumers Privacy Act (CCPA) in the U.S. Organizations are now charged with managing personal data in a more sophisticated manner than ever before. These laws require new procedures, such as informing consumers of their rights, disclosing usage upfront and providing or deleting copies when requested by the consumer. And this is only the beginning. States other than California are now crafting regulations that, if enacted, will further complicate the picture for holders of PII by introducing a multitude of similar regulations.
While data security is core to good data privacy, these new demands require more than ensuring systems are secure and data is protected from hackers and other bad actors. Enterprise data privacy, once a burden solely for organizations dealing with highly sensitive data, such as health care and financial service, is now of critical interest to any organization that maintains a repository of PII for any business reason. Data privacy is recognized today as more than a technical issue; privacy is – or should be – of critical interest to everyone in your organization.
Enterprises can take the following steps to enhance their privacy practice and better manage PII.
- Create a culture of privacy.
- Introduce and reinforce “privacy by design” as teams strategize new applications, products and uses for data. This means building privacy into the core architecture, testing and deployment of products and services. Make “privacy as a mindset” an enterprise expectation that holds everyone in the organization accountable when PII is concerned.
- Rebuild the culture by assessing and addressing behavior patterns of employees by leveraging tactics to create new neural pathways for behavior change. Increase personal accountability and responsibility by offering a structured, dual-pronged methodology that includes comprehensive training on the principles and individual’s duties related to privacy.
- Jumpstart the process of instilling a culture of privacy with workshops led by a professional. Curate and make available for continuous learning materials specific to global, evolving privacy best practices and create a privacy community of practice (CoP) described below.
- Manage your PII.
- The first step to managing your PII and ensuring your organization has instilled a culture of privacy is to assess your current situation. Do your employees understand their role in respect to the handling of PII? Are there procedures in place to review how PII is handled and distributed as systems are updated to meet new business needs? These questions are best answered with the assistance of professionals, whether from your own legal and risk staff or by enlisting outside help.
- Next, inventory your PII data, identifying where it is coming from, where it is stored and how it is used, both internally and when shared with partners and suppliers. For organizations using popular CRM tools, use software to scan the system and provide standard reports that minimize the inventory effort. For systems that are customized for a specific business need, conduct interviews with the appropriate subject matter experts.
- Once the PII inventory is complete, establish a data tagging schema that automatically tracks how data is sourced and used. Doing so not only helps address current privacy management practices, but it also allows the organization to readily address future regulatory requirements by providing a database that can be queried as needed to identify PII data flows that are subject to oversight.
- Build processes needed for a privacy practice.
- One of the key steps toward building a mature privacy practice is a data protection impact assessment (DPIA), which reviews new and updated uses of PII in an organization. It provides a comprehensive check of data usage for new system development, checks for any changes to use of PII and examines any new business processes with consideration of privacy at every level. A DPIA ensures that new sources, uses and distribution of data meet the organization’s privacy policies and comply with regulatory requirements.
- In addition to the DPIA, a breach response plan is key to the privacy practice. As many say, there are only two kinds of organizations: those that have experienced a privacy breach and those that don’t yet realize they’ve experienced a privacy breach. Critical to successfully navigating a breach is the breach response plan. Much like a disaster recovery plan, the breach response contains the who, what and when of actions taken after the unanticipated loss or transfer of PII data. Breach response plans should be industry specific to take into account various privacy regulations for handling PII data and breach notifications.
- Build a supporting organization.
- A privacy steering committee can provide guidance and comprehensive oversight to an organization’s approach to privacy. The steering committee should include leadership from the Legal, IT, Risk and Privacy offices with additional membership from key business functions with significant data privacy involvement (e.g. sales and marketing, customer experience, etc.).
- Establish a privacy office to develop and maintain a culture of privacy and signify to employees the importance of your “privacy by design” principles. Staff the privacy office with subject matter experts who are “privacy evangelists” and who can be resources for the privacy steering committee and for the organization as a whole.
- Establish a privacy community of practice (CoP) to focus on opening up the work of the privacy office to a broader audience – anyone can participate, regardless of their function or role. The community raises awareness and reminds employees about their personal responsibility regarding privacy.
The world of privacy is changing rapidly as organizations face a new regulatory landscape and individuals become more cognizant of their privacy rights. ISG helps enterprises understand their current situation as well as meet the needs of an evolving privacy environment. Talk to us!