SlideShare une entreprise Scribd logo
1  sur  3
Télécharger pour lire hors ligne
GAMABrief:
Beyond the Privacy Policy: Privacy Management in Seven Steps
With a national debate underway about the value of individual privacy and the protection of personal data, the importance of
updating your organization’s privacy policies and adopting a set of best practices has never been more crucial. But, privacy
compliance requires more than just drafting and posting a privacy policy.
The framework of laws and regulations governing how organizations may handle customer data is global, complex and dynamic.
In the United States, for example, an entity must comply with federal, state and local regulations, including a variety of industryspecific statutes, data breach notification laws, data retention laws, cookie tracking and do-not-track requirements and much
more. Brands going global will be subject to a laundry list of foreign regulations, notably including major restrictions on crossborder data transfers.
Complying with, and anticipating, the growing and tangled web of worldwide privacy regulations requires more than just an autogenerated privacy policy – it requires a complete privacy management system for your business.
To get your business privacy compliant, here are seven essential steps to developing a comprehensive privacy framework.
Step	
  One:	
  Assess
The first step requires your business to ask two questions: (1) what data do we collect, and (2) how are we using, storing and
transferring that data. A privacy audit by an independent third party can help identify data collection events, classify the sensitivity
of the data collected and ascertain who has access to the data and how securely the data is stored.
Step	
  Two:	
  Plan
Planning may be the single most important aspect of adopting a comprehensive privacy framework. This step calls for comparing
your organization’s current data privacy practices to applicable laws and regulations. A data privacy attorney can tell you which
laws apply to your specific business based on your industry, geography and the type of data you collect. In addition, privacy
counsel can advise you as to the trends in regulations around the globe to give you an idea of where the rules are headed. These
data privacy “best practices” represent a target for which an organization can strive.
After determining the applicable laws and industry best practices, it is necessary to decide on policies to help guide your
organization’s decision-making as it relates to personal data. What data will you collect? Who on your team will have access to
that data? How long will it be stored? Will you transfer it to third parties? Will you sell it to third parties?
To help with this, consider that the gap between data privacy best practices (i.e., where the regulations are headed), and your
organization’s current privacy practices, constitutes legal and business risk. As a formula,
Privacy	
  Best	
  Prac7ces	
  	
  -­‐	
  	
  Current	
  Privacy	
  Prac7ces	
  	
  =	
  RISK
Legal risk comes in the form of potential regulatory sanctions from administrative bodies, such as the Federal Trade Commission
(FTC), or litigation. Business risk manifests itself as loss of consumer confidence and trust. Both can be devastating to a business in
a consumer industry. In order to decide how you will handle personal data, you will need to determine how much risk your
business is truly willing to assume. Making this decision will allow you to craft organizational policies that can guide your business’
current and future actions. We refer to these overarching policies as a data privacy framework.

A  GAMA  White  Paper  produced  by  Brandon  Wiebe                                                                                          ©  2013.  Gagnier  Margossian  LLP.    All  rights  reserved.  
Step	
  Three:	
  DraA
Once you have decided on your organization’s privacy framework, you will need to commit these policies to writing. The written
framework should comprise a series of documents, each geared towards a different audience. A public-facing privacy policy – the
type of document most often associated with the term “privacy policy” – can help inform the consuming public about how you
handle personal data. Equally important are documents for employees, managers, vendors and partners. These documents will be
the guidebooks you can use when making decisions about how to get your business where it needs to be.
Step	
  Four:	
  Implement
Now that you have codified your data privacy framework, it’s time to implement changes to get your business into alignment with
your policies. A single manager dedicated to overseeing the implementation of these changes can make the process run
smoothly. Most growing organizations dealing with personal data will need to hire or retain an individual to act as Chief Privacy
Officer. The CPO can manage the implementation process by taking the identified deficiencies in privacy practices and breaking
them down into specific milestones and deliverables. For most businesses where the engineering, product and development
teams are often overtasked with bugs, fixes, improvements and releases, it is important have a C-level manager responsible for
prioritizing data privacy implementations or to have a strong relationship with outside privacy counsel.
Step	
  Five:	
  Disclose
It’s not enough to simply draft a series of policies if no one ever knows about them. As soon as possible, you should post your
public privacy policy to your website. If you’re a mobile business, it is imperative to post a tailored privacy policy to all ports (iOS,
Android, etc.) and iterations of your applications.
If you’re sending or receiving data to and from third party vendors or partners, you should disclose your policies to those
organizations, as well. It is often necessary to integrate your policies into your sales and vendor contracts, both to comply with
international data transfer regulations as well as to insulate your business from liability caused by the actions of any third party
vendors.
You should also disclose your policies to your managers and employees. Setting up regular employee trainings on data privacy is a
good way to ensure your team is on the same page and working towards the same goals.
Step	
  Six:	
  Grow
At its most fundamental level, business growth and development is a series of decisions made by executives, managers, engineers,
product developers, in-house counsel and other teams within an organization. Business success is often a calculus of assumed risk
weighed against potential reward. The purpose of a comprehensive privacy framework is to guide organizations in determining
how much privacy risk to assume. Now that your organization has a series of policies in place for how to handle personal data, it
is imperative to ensure that all decisions remain consistent with these policies. This will help mitigate unnecessary risk while at the
same time cultivating innovation.
By this point, your privacy framework will be imbued not only in your written policies, but also in your organization’s mission and
culture. A privacy-first culture can pilot your innovators to develop products that incorporate privacy by design. Privacy by design
simply means that your organization’s data privacy framework is built into your products and services at the most fundamental
level.
Step	
  Seven:	
  Rinse	
  &	
  Repeat
Two things are certain: your business will develop, expand and roll out new products and services as it grows, and governments
around the world will legislate new rules. The European Union, for example, is currently undergoing a major overhaul to its data
privacy program. Stateside, more state governments are enacting their own privacy regimes in the absence of meaningful federal
regulations. The FTC is wielding the full extent of its administrative power to crack down on organizations that are not meeting a
minimum threshold of privacy protection.
In order to maintain the privacy framework and culture your organization spent time and energy fostering, it is important to
repeat these privacy management steps regularly. Quarterly reassessments of privacy practices can identify updates to your
products or services that may not meet your own privacy standards. New regulations may also arise that require altering or
amending your data privacy framework.
Gagnier	
  Margossian	
  LLP	
  provides	
  comprehensive	
  data	
  privacy	
  solu7ons	
  for	
  businesses	
  of	
  all	
  sizes.	
  From	
  developing	
  a	
  
tailored	
  data	
  privacy	
  framework	
  &	
  draAing	
  policies	
  to	
  serving	
  as	
  an	
  organiza7on’s	
  CPO	
  and	
  privacy	
  manager,	
  we	
  offer	
  a	
  
broad	
  range	
  of	
  legal	
  &	
  consul7ng	
  services	
  aimed	
  at	
  geSng	
  and	
  keeping	
  your	
  organiza7on	
  privacy	
  compliant.

Internet
Intellectual Property
Privacy
Social Media
Technology
The Good Stuff

#nerdlawyers
Los Angeles

Sacramento

T: 415.766.4591
F: 909.972.1639
E: consult@gamallp.com

gamallp.com
@gamallp

San Francisco

Contenu connexe

Plus de Christina Gagnier

SEC Update: Virtual Organizations and the SEC - July 2017
SEC Update: Virtual Organizations and the SEC - July 2017SEC Update: Virtual Organizations and the SEC - July 2017
SEC Update: Virtual Organizations and the SEC - July 2017Christina Gagnier
 
Guide to Prospective European Union - United States Privacy Shield Program
Guide to Prospective European Union - United States Privacy Shield ProgramGuide to Prospective European Union - United States Privacy Shield Program
Guide to Prospective European Union - United States Privacy Shield ProgramChristina Gagnier
 
European Union Privacy Law - General Data Protection Regulation Checklist
European Union Privacy Law - General Data Protection Regulation ChecklistEuropean Union Privacy Law - General Data Protection Regulation Checklist
European Union Privacy Law - General Data Protection Regulation ChecklistChristina Gagnier
 
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...Christina Gagnier
 
Student Privacy Rights: In and Out of the Classroom
Student Privacy Rights: In and Out of the ClassroomStudent Privacy Rights: In and Out of the Classroom
Student Privacy Rights: In and Out of the ClassroomChristina Gagnier
 
Gender Issues: Creating a Safe Environment for All Students
Gender Issues: Creating a Safe Environment for All StudentsGender Issues: Creating a Safe Environment for All Students
Gender Issues: Creating a Safe Environment for All StudentsChristina Gagnier
 
ABC's of Privacy and Security
ABC's of Privacy and SecurityABC's of Privacy and Security
ABC's of Privacy and SecurityChristina Gagnier
 
Starting a Business: The Legal Details
Starting a Business: The Legal DetailsStarting a Business: The Legal Details
Starting a Business: The Legal DetailsChristina Gagnier
 
GAMABrief: What Every School Needs to Know About Copyright Law
GAMABrief: What Every School Needs to Know About Copyright LawGAMABrief: What Every School Needs to Know About Copyright Law
GAMABrief: What Every School Needs to Know About Copyright LawChristina Gagnier
 
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)Christina Gagnier
 
GAMABrief: Preparing for the Capital Gains Tax Hike
GAMABrief: Preparing for the Capital Gains Tax HikeGAMABrief: Preparing for the Capital Gains Tax Hike
GAMABrief: Preparing for the Capital Gains Tax HikeChristina Gagnier
 
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...Christina Gagnier
 
Revenge Porn: Posting Images Without Consent
Revenge Porn: Posting Images Without ConsentRevenge Porn: Posting Images Without Consent
Revenge Porn: Posting Images Without ConsentChristina Gagnier
 
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...Christina Gagnier
 
Seth's Law (AB 9) - Understanding "Cyber" Bullying
Seth's Law (AB 9) - Understanding "Cyber" BullyingSeth's Law (AB 9) - Understanding "Cyber" Bullying
Seth's Law (AB 9) - Understanding "Cyber" BullyingChristina Gagnier
 
Student Privacy Rights in the Classroom
Student Privacy Rights in the ClassroomStudent Privacy Rights in the Classroom
Student Privacy Rights in the ClassroomChristina Gagnier
 
Employees, Employers & Social Media
Employees, Employers & Social MediaEmployees, Employers & Social Media
Employees, Employers & Social MediaChristina Gagnier
 
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationChristina Gagnier
 
Gov 20 LA Presentation - Sex Drugs Rock and Code
Gov 20 LA Presentation - Sex Drugs Rock and CodeGov 20 LA Presentation - Sex Drugs Rock and Code
Gov 20 LA Presentation - Sex Drugs Rock and CodeChristina Gagnier
 

Plus de Christina Gagnier (20)

SEC Update: Virtual Organizations and the SEC - July 2017
SEC Update: Virtual Organizations and the SEC - July 2017SEC Update: Virtual Organizations and the SEC - July 2017
SEC Update: Virtual Organizations and the SEC - July 2017
 
Guide to Prospective European Union - United States Privacy Shield Program
Guide to Prospective European Union - United States Privacy Shield ProgramGuide to Prospective European Union - United States Privacy Shield Program
Guide to Prospective European Union - United States Privacy Shield Program
 
European Union Privacy Law - General Data Protection Regulation Checklist
European Union Privacy Law - General Data Protection Regulation ChecklistEuropean Union Privacy Law - General Data Protection Regulation Checklist
European Union Privacy Law - General Data Protection Regulation Checklist
 
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
 
Student Privacy Rights: In and Out of the Classroom
Student Privacy Rights: In and Out of the ClassroomStudent Privacy Rights: In and Out of the Classroom
Student Privacy Rights: In and Out of the Classroom
 
Gender Issues: Creating a Safe Environment for All Students
Gender Issues: Creating a Safe Environment for All StudentsGender Issues: Creating a Safe Environment for All Students
Gender Issues: Creating a Safe Environment for All Students
 
ABC's of Privacy and Security
ABC's of Privacy and SecurityABC's of Privacy and Security
ABC's of Privacy and Security
 
Starting a Business: The Legal Details
Starting a Business: The Legal DetailsStarting a Business: The Legal Details
Starting a Business: The Legal Details
 
GAMABrief: What Every School Needs to Know About Copyright Law
GAMABrief: What Every School Needs to Know About Copyright LawGAMABrief: What Every School Needs to Know About Copyright Law
GAMABrief: What Every School Needs to Know About Copyright Law
 
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)
 
GAMABrief: Preparing for the Capital Gains Tax Hike
GAMABrief: Preparing for the Capital Gains Tax HikeGAMABrief: Preparing for the Capital Gains Tax Hike
GAMABrief: Preparing for the Capital Gains Tax Hike
 
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...
 
Revenge Porn: Posting Images Without Consent
Revenge Porn: Posting Images Without ConsentRevenge Porn: Posting Images Without Consent
Revenge Porn: Posting Images Without Consent
 
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...
 
Seth's Law (AB 9) - Understanding "Cyber" Bullying
Seth's Law (AB 9) - Understanding "Cyber" BullyingSeth's Law (AB 9) - Understanding "Cyber" Bullying
Seth's Law (AB 9) - Understanding "Cyber" Bullying
 
Student Privacy Rights in the Classroom
Student Privacy Rights in the ClassroomStudent Privacy Rights in the Classroom
Student Privacy Rights in the Classroom
 
Employees, Employers & Social Media
Employees, Employers & Social MediaEmployees, Employers & Social Media
Employees, Employers & Social Media
 
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
 
Gov 20 LA Presentation - Sex Drugs Rock and Code
Gov 20 LA Presentation - Sex Drugs Rock and CodeGov 20 LA Presentation - Sex Drugs Rock and Code
Gov 20 LA Presentation - Sex Drugs Rock and Code
 
Social Media and the Law
Social Media and the LawSocial Media and the Law
Social Media and the Law
 

Dernier

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Dernier (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 

GAMABrief: Beyond the Privacy Policy: Privacy Management in Seven Steps

  • 1. GAMABrief: Beyond the Privacy Policy: Privacy Management in Seven Steps With a national debate underway about the value of individual privacy and the protection of personal data, the importance of updating your organization’s privacy policies and adopting a set of best practices has never been more crucial. But, privacy compliance requires more than just drafting and posting a privacy policy. The framework of laws and regulations governing how organizations may handle customer data is global, complex and dynamic. In the United States, for example, an entity must comply with federal, state and local regulations, including a variety of industryspecific statutes, data breach notification laws, data retention laws, cookie tracking and do-not-track requirements and much more. Brands going global will be subject to a laundry list of foreign regulations, notably including major restrictions on crossborder data transfers. Complying with, and anticipating, the growing and tangled web of worldwide privacy regulations requires more than just an autogenerated privacy policy – it requires a complete privacy management system for your business. To get your business privacy compliant, here are seven essential steps to developing a comprehensive privacy framework. Step  One:  Assess The first step requires your business to ask two questions: (1) what data do we collect, and (2) how are we using, storing and transferring that data. A privacy audit by an independent third party can help identify data collection events, classify the sensitivity of the data collected and ascertain who has access to the data and how securely the data is stored. Step  Two:  Plan Planning may be the single most important aspect of adopting a comprehensive privacy framework. This step calls for comparing your organization’s current data privacy practices to applicable laws and regulations. A data privacy attorney can tell you which laws apply to your specific business based on your industry, geography and the type of data you collect. In addition, privacy counsel can advise you as to the trends in regulations around the globe to give you an idea of where the rules are headed. These data privacy “best practices” represent a target for which an organization can strive. After determining the applicable laws and industry best practices, it is necessary to decide on policies to help guide your organization’s decision-making as it relates to personal data. What data will you collect? Who on your team will have access to that data? How long will it be stored? Will you transfer it to third parties? Will you sell it to third parties? To help with this, consider that the gap between data privacy best practices (i.e., where the regulations are headed), and your organization’s current privacy practices, constitutes legal and business risk. As a formula, Privacy  Best  Prac7ces    -­‐    Current  Privacy  Prac7ces    =  RISK Legal risk comes in the form of potential regulatory sanctions from administrative bodies, such as the Federal Trade Commission (FTC), or litigation. Business risk manifests itself as loss of consumer confidence and trust. Both can be devastating to a business in a consumer industry. In order to decide how you will handle personal data, you will need to determine how much risk your business is truly willing to assume. Making this decision will allow you to craft organizational policies that can guide your business’ current and future actions. We refer to these overarching policies as a data privacy framework. A  GAMA  White  Paper  produced  by  Brandon  Wiebe                                                                                          ©  2013.  Gagnier  Margossian  LLP.    All  rights  reserved.  
  • 2. Step  Three:  DraA Once you have decided on your organization’s privacy framework, you will need to commit these policies to writing. The written framework should comprise a series of documents, each geared towards a different audience. A public-facing privacy policy – the type of document most often associated with the term “privacy policy” – can help inform the consuming public about how you handle personal data. Equally important are documents for employees, managers, vendors and partners. These documents will be the guidebooks you can use when making decisions about how to get your business where it needs to be. Step  Four:  Implement Now that you have codified your data privacy framework, it’s time to implement changes to get your business into alignment with your policies. A single manager dedicated to overseeing the implementation of these changes can make the process run smoothly. Most growing organizations dealing with personal data will need to hire or retain an individual to act as Chief Privacy Officer. The CPO can manage the implementation process by taking the identified deficiencies in privacy practices and breaking them down into specific milestones and deliverables. For most businesses where the engineering, product and development teams are often overtasked with bugs, fixes, improvements and releases, it is important have a C-level manager responsible for prioritizing data privacy implementations or to have a strong relationship with outside privacy counsel. Step  Five:  Disclose It’s not enough to simply draft a series of policies if no one ever knows about them. As soon as possible, you should post your public privacy policy to your website. If you’re a mobile business, it is imperative to post a tailored privacy policy to all ports (iOS, Android, etc.) and iterations of your applications. If you’re sending or receiving data to and from third party vendors or partners, you should disclose your policies to those organizations, as well. It is often necessary to integrate your policies into your sales and vendor contracts, both to comply with international data transfer regulations as well as to insulate your business from liability caused by the actions of any third party vendors. You should also disclose your policies to your managers and employees. Setting up regular employee trainings on data privacy is a good way to ensure your team is on the same page and working towards the same goals. Step  Six:  Grow At its most fundamental level, business growth and development is a series of decisions made by executives, managers, engineers, product developers, in-house counsel and other teams within an organization. Business success is often a calculus of assumed risk weighed against potential reward. The purpose of a comprehensive privacy framework is to guide organizations in determining how much privacy risk to assume. Now that your organization has a series of policies in place for how to handle personal data, it is imperative to ensure that all decisions remain consistent with these policies. This will help mitigate unnecessary risk while at the same time cultivating innovation. By this point, your privacy framework will be imbued not only in your written policies, but also in your organization’s mission and culture. A privacy-first culture can pilot your innovators to develop products that incorporate privacy by design. Privacy by design simply means that your organization’s data privacy framework is built into your products and services at the most fundamental level. Step  Seven:  Rinse  &  Repeat Two things are certain: your business will develop, expand and roll out new products and services as it grows, and governments around the world will legislate new rules. The European Union, for example, is currently undergoing a major overhaul to its data privacy program. Stateside, more state governments are enacting their own privacy regimes in the absence of meaningful federal regulations. The FTC is wielding the full extent of its administrative power to crack down on organizations that are not meeting a minimum threshold of privacy protection.
  • 3. In order to maintain the privacy framework and culture your organization spent time and energy fostering, it is important to repeat these privacy management steps regularly. Quarterly reassessments of privacy practices can identify updates to your products or services that may not meet your own privacy standards. New regulations may also arise that require altering or amending your data privacy framework. Gagnier  Margossian  LLP  provides  comprehensive  data  privacy  solu7ons  for  businesses  of  all  sizes.  From  developing  a   tailored  data  privacy  framework  &  draAing  policies  to  serving  as  an  organiza7on’s  CPO  and  privacy  manager,  we  offer  a   broad  range  of  legal  &  consul7ng  services  aimed  at  geSng  and  keeping  your  organiza7on  privacy  compliant. Internet Intellectual Property Privacy Social Media Technology The Good Stuff #nerdlawyers Los Angeles Sacramento T: 415.766.4591 F: 909.972.1639 E: consult@gamallp.com gamallp.com @gamallp San Francisco