SlideShare une entreprise Scribd logo
1  sur  24
Télécharger pour lire hors ligne
1
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
v © TRUSTe Inc., 2016
Metrics for Success: Quantifying
the Value of the Privacy Function
December 8, 2016
2
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
Today’s Speakers
Deidre Rodriguez
Director, Corporate Privacy Office
Anthem, Inc
Marcus Morissette
Global Privacy Officer
eBay
Kevin Trilli,
SVP Product,
TRUSTe
3
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
v © TRUSTe Inc., 2016
Privacy Metrics and Dashboard
Kevin Trilli, SVP Product, TRUSTe
4
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
• Speaker Intros
• Metrics and Privacy Organization
• Categories and types of Metrics
• Building / establishing a Monitoring Program
• Challenges and Recommendations
Agenda
5
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
v © TRUSTe Inc., 2016
Privacy Metrics
6
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
Purposes and Categories of Metrics
Target Audience Audience Purpose
Privacy Officer /
Privacy Manager
Internal • Program development
• Organizational Management
Executives / BOD Internal • Communicate overall risk
posture
• Resource requests
Auditors /
Regulators
External • Demonstrate program
accountability and effectiveness
• Transparency
7
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
• Initial stage is strategy planning and development
– Requires selecting and planning a set of program activities
– Establish required set of resources
• On-going management
– Program and goal management
– Resource utilization
– Gaps / program maturity velocity
CPO/Privacy Manager:
Program Establishment, Evolution and Budgeting
8
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
Example: Privacy Program Management
9
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
• Inbound inquiries to privacy team (tickets/advise/projects)
– % utilization
• Policies under management
–Reflective of external and internal laws, regs, policies  shows scope
• Assets under management
– Data processing applications and systems
• Projects (risk assessments, PIAs, etc)
– #, state, aging, response time
– risk issues identified and remediated
• Incidents (breach, data release, reg inquiries)
– #, type and risk levels, remediation plan
• All are mapped to each BU to show status across enterprise
–Includes HR, IT and Marketing functional groups as needed
CPO/Privacy Manager: Operational Management
10
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
Example: Risk Assessment and Remediation Metrics
11
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
• Privacy Program Overview / Budgeting
– Program to Goal (%)
– Overall Resource allocation
– Budget justification
• Risks
– Incidents
– Regulatory enquiries
– Related fines/investigations (vertical)
– Heat Map
Executive / BOD
12
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
• Derived from internal metrics/dashboard, but may need
sanitizing
• Have ready on-demand to demonstrate program
– Ideal: Technological system of record that can grow and aggregate
project/project
– Maintained for data integrity
• Basics:
– Database of data processing assets (#, classified by risk) with metadata
– Construction of key data transfers (EU, APEC)
– Consumer metrics (inquiries/disputes and resolution paths)
• Needs to accompanied by evidence/documentation
External Reporting
13
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
Example: Asset Inventory characterized by risk
14
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
v © TRUSTe Inc., 2016
Where to Start
15
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
• First socialize with stakeholders / execs
• Determine what matters most / scope
• Prioritize to get started
• Assess current capabilities
Starting a Monitoring Program
16
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
•Document your privacy program plan to get ready
–Will you need to develop emails or templates for use during monitoring
(announcement emails, SharePoint sites created, who will be responsible for
what)
–Determine where you will store data and who will have access
–Are there callouts/disclaimers that need to added to metrics?
–When will metrics be produced and by whom
–Stagger monitoring so that it will not create negative impact for the business
–Understand any reporting/monitoring that may be done in the business that will
have potential impact
–Write desktop procedure for how everything will happen A-Z
• Communicate across broader organization
Starting a Monitoring Program
17
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
v © TRUSTe Inc., 2016
Beginning to Monitor
18
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
•Identify lead that will be responsible for monitoring a specific piece of
work
•Put everything on the calendar
–Date you will start sending requests to business
–Date you will analyze data
–Date that you will document findings
–Date you will review metrics
–Date that you will release metrics
–Date corrective action plans will be due
–Any ongoing follow up or re-monitoring to ensure issue has been adequately
addressed
•Keep leadership informed of roll out and any changes to program that
may impact them
Beginning to Monitor
19
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
v © TRUSTe Inc., 2016
Continuing to Grow Monitoring
Program
20
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
•Continue to monitor risks and what matters most
•Identify plan to grow program
–What will be monitored next and why
–Doing it by risk is easiest to explain
–Continue to lobby for resources to expand program
•Continue to collect feedback on metrics
•Document all findings and do follow up on corrective action plans
–This enables you to show leadership the positive impact of your program (what
were you able to find and correct)
•Partner with Internal Audit
•Roll up data by quarter and produce annual metrics
Growing Monitoring Program
21
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
v © TRUSTe Inc., 2016
Challenges and Takeaways
22
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
• How to do actual job but also measure and
document
• Control of data sources that feed metrics
• Dealing with aspects of privacy
management that don’t have easy metrics
Challenges
23
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
v © TRUSTe Inc., 2016
Deidre Rodrigeuz Deidre.Rodriguez@anthem.com
Marcus Morissette mmorissette@ebay.com
Kevin Trilli ktrilli@truste.com
Contacts
24
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
v © TRUSTe Inc., 2016
Details of our 2017 Winter/Spring Webinar Series will be available shortly.
See http://www.truste.com/insightseries for all the 2016 Privacy Insight
Series and past webinar recordings.
Thank You!

Contenu connexe

En vedette

En vedette (7)

[Privacy Webinar Slides] Global Enforcement Priorities
[Privacy Webinar Slides] Global Enforcement Priorities[Privacy Webinar Slides] Global Enforcement Priorities
[Privacy Webinar Slides] Global Enforcement Priorities
 
2015 TRUSTe US Consumer Privacy Confidence Index – Infographic
2015 TRUSTe US Consumer Privacy Confidence Index – Infographic2015 TRUSTe US Consumer Privacy Confidence Index – Infographic
2015 TRUSTe US Consumer Privacy Confidence Index – Infographic
 
EU US Privacy Shield vs. GDPR Infographic from TRUSTe
EU US Privacy Shield vs. GDPR Infographic from TRUSTeEU US Privacy Shield vs. GDPR Infographic from TRUSTe
EU US Privacy Shield vs. GDPR Infographic from TRUSTe
 
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
 
What does the Proposed EU General Data Protection Regulation (GDPR) mean for ...
What does the Proposed EU General Data Protection Regulation (GDPR) mean for ...What does the Proposed EU General Data Protection Regulation (GDPR) mean for ...
What does the Proposed EU General Data Protection Regulation (GDPR) mean for ...
 
Build Features, Not Apps
Build Features, Not AppsBuild Features, Not Apps
Build Features, Not Apps
 
TEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkTEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of Work
 

Plus de TrustArc

TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
TrustArc
 

Plus de TrustArc (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
 
TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI Innovations
 
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
 
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
 
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
 
Nymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 States
 
CBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceCBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy Compliance
 
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfEverything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
 
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
 
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsPrivacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
 
Building Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsBuilding Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy Certifications
 
The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...
 
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
 
Artificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceArtificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI Governance
 
How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023
 
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act:  Using Consumer Data and Maintaining TrustThe Ultimate Balancing Act:  Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust
 

Dernier

一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理
Airst S
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
e9733fc35af6
 
PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptx
ca2or2tx
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
MollyBrown86
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
Airst S
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
JosephCanama
 

Dernier (20)

Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptx
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptx
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptx
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptx
 
Hely-Hutchinson v. Brayhead Ltd .pdf
Hely-Hutchinson v. Brayhead Ltd         .pdfHely-Hutchinson v. Brayhead Ltd         .pdf
Hely-Hutchinson v. Brayhead Ltd .pdf
 
PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptx
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
 
Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentation
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
 

Metrics for Success: Quantifying the Value of the Privacy Function [Webinar Slides]

  • 1. 1 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 v © TRUSTe Inc., 2016 Metrics for Success: Quantifying the Value of the Privacy Function December 8, 2016
  • 2. 2 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 Today’s Speakers Deidre Rodriguez Director, Corporate Privacy Office Anthem, Inc Marcus Morissette Global Privacy Officer eBay Kevin Trilli, SVP Product, TRUSTe
  • 3. 3 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 v © TRUSTe Inc., 2016 Privacy Metrics and Dashboard Kevin Trilli, SVP Product, TRUSTe
  • 4. 4 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 • Speaker Intros • Metrics and Privacy Organization • Categories and types of Metrics • Building / establishing a Monitoring Program • Challenges and Recommendations Agenda
  • 5. 5 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 v © TRUSTe Inc., 2016 Privacy Metrics
  • 6. 6 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 Purposes and Categories of Metrics Target Audience Audience Purpose Privacy Officer / Privacy Manager Internal • Program development • Organizational Management Executives / BOD Internal • Communicate overall risk posture • Resource requests Auditors / Regulators External • Demonstrate program accountability and effectiveness • Transparency
  • 7. 7 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 • Initial stage is strategy planning and development – Requires selecting and planning a set of program activities – Establish required set of resources • On-going management – Program and goal management – Resource utilization – Gaps / program maturity velocity CPO/Privacy Manager: Program Establishment, Evolution and Budgeting
  • 8. 8 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 Example: Privacy Program Management
  • 9. 9 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 • Inbound inquiries to privacy team (tickets/advise/projects) – % utilization • Policies under management –Reflective of external and internal laws, regs, policies  shows scope • Assets under management – Data processing applications and systems • Projects (risk assessments, PIAs, etc) – #, state, aging, response time – risk issues identified and remediated • Incidents (breach, data release, reg inquiries) – #, type and risk levels, remediation plan • All are mapped to each BU to show status across enterprise –Includes HR, IT and Marketing functional groups as needed CPO/Privacy Manager: Operational Management
  • 10. 10 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 Example: Risk Assessment and Remediation Metrics
  • 11. 11 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 • Privacy Program Overview / Budgeting – Program to Goal (%) – Overall Resource allocation – Budget justification • Risks – Incidents – Regulatory enquiries – Related fines/investigations (vertical) – Heat Map Executive / BOD
  • 12. 12 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 • Derived from internal metrics/dashboard, but may need sanitizing • Have ready on-demand to demonstrate program – Ideal: Technological system of record that can grow and aggregate project/project – Maintained for data integrity • Basics: – Database of data processing assets (#, classified by risk) with metadata – Construction of key data transfers (EU, APEC) – Consumer metrics (inquiries/disputes and resolution paths) • Needs to accompanied by evidence/documentation External Reporting
  • 13. 13 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 Example: Asset Inventory characterized by risk
  • 14. 14 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 v © TRUSTe Inc., 2016 Where to Start
  • 15. 15 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 • First socialize with stakeholders / execs • Determine what matters most / scope • Prioritize to get started • Assess current capabilities Starting a Monitoring Program
  • 16. 16 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 •Document your privacy program plan to get ready –Will you need to develop emails or templates for use during monitoring (announcement emails, SharePoint sites created, who will be responsible for what) –Determine where you will store data and who will have access –Are there callouts/disclaimers that need to added to metrics? –When will metrics be produced and by whom –Stagger monitoring so that it will not create negative impact for the business –Understand any reporting/monitoring that may be done in the business that will have potential impact –Write desktop procedure for how everything will happen A-Z • Communicate across broader organization Starting a Monitoring Program
  • 17. 17 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 v © TRUSTe Inc., 2016 Beginning to Monitor
  • 18. 18 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 •Identify lead that will be responsible for monitoring a specific piece of work •Put everything on the calendar –Date you will start sending requests to business –Date you will analyze data –Date that you will document findings –Date you will review metrics –Date that you will release metrics –Date corrective action plans will be due –Any ongoing follow up or re-monitoring to ensure issue has been adequately addressed •Keep leadership informed of roll out and any changes to program that may impact them Beginning to Monitor
  • 19. 19 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 v © TRUSTe Inc., 2016 Continuing to Grow Monitoring Program
  • 20. 20 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 •Continue to monitor risks and what matters most •Identify plan to grow program –What will be monitored next and why –Doing it by risk is easiest to explain –Continue to lobby for resources to expand program •Continue to collect feedback on metrics •Document all findings and do follow up on corrective action plans –This enables you to show leadership the positive impact of your program (what were you able to find and correct) •Partner with Internal Audit •Roll up data by quarter and produce annual metrics Growing Monitoring Program
  • 21. 21 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 v © TRUSTe Inc., 2016 Challenges and Takeaways
  • 22. 22 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 • How to do actual job but also measure and document • Control of data sources that feed metrics • Dealing with aspects of privacy management that don’t have easy metrics Challenges
  • 23. 23 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 v © TRUSTe Inc., 2016 Deidre Rodrigeuz Deidre.Rodriguez@anthem.com Marcus Morissette mmorissette@ebay.com Kevin Trilli ktrilli@truste.com Contacts
  • 24. 24 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 v © TRUSTe Inc., 2016 Details of our 2017 Winter/Spring Webinar Series will be available shortly. See http://www.truste.com/insightseries for all the 2016 Privacy Insight Series and past webinar recordings. Thank You!