Get Instant Access
to This Blueprint

Security icon

Demonstrate Data Protection by Design for IT Systems

Claiming to take privacy seriously isn’t enough; it’s time to show your work.

  • The most direct way for an organization to demonstrate their commitment to privacy is to develop a full-scale privacy program.
  • However, going from zero to hero just isn’t realistic for smaller organizations who need a more incremental approach to privacy and data protection, but one that still shows they take these issues seriously.

Our Advice

Critical Insight

  1. Data protection by design (DPbD) can be the foundation of a full privacy program.
    • It’ll be a light implementation, but the controls you use for data protection will serve later as building blocks for something larger and more formally laid out.
  2. Privacy by design (PbD) and DPbD are not how-to guides.
    • Rather, they provide a functional way of understanding abstract principles, so exactly what each principle pair means will vary by organization and industry.

Impact and Result

  • While a full-scale privacy program is nice to have, it is not absolutely necessary to demonstrate commitment to privacy and data protection.
  • By planning for data protection by design in your IT systems, you will be able to determine what controls are necessary and then account for privacy protection at every step of the data lifecycle.
  • By following this approach, you will also be laying the foundation for a complete privacy program to develop, but with the advantage of knowing that your program is tactically addressing the privacy constraints your organization faces.

Demonstrate Data Protection by Design for IT Systems Research & Tools

Start here – read the Executive Brief

Read our concise Executive Brief to find out why you should implement a data protection by design program, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

1. Determine what data protection by design means for you

Discover how data protection by design relates to the privacy by design framework and how to use regulations to crystalize what data protection by design means for your organization.

2. Plan for IT-system data protection by design implementation

Implement the principles of data protection by design for your IT systems and use governance effectively to fill any gaps in preexisting systems.


Member Testimonials

After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve. See our top member experiences for this blueprint and what our clients have to say.

10.0/10


Overall Impact

$7,799


Average $ Saved

5


Average Days Saved

Client

Experience

Impact

$ Saved

Days Saved

Heilind Electronics, Inc.

Guided Implementation

10/10

$7,799

5

Alan was able to focus in on our needs and quickly provide solutions during the call. He also followed up with additional materials to support our ... Read More

About Info-Tech

Info-Tech Research Group is the world’s fastest-growing information technology research and advisory company, proudly serving over 30,000 IT professionals.

We produce unbiased and highly relevant research to help CIOs and IT leaders make strategic, timely, and well-informed decisions. We partner closely with IT teams to provide everything they need, from actionable tools to analyst guidance, ensuring they deliver measurable results for their organizations.

MEMBER RATING

10.0/10
Overall Impact

$7,799
Average $ Saved

5
Average Days Saved

After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.

Read what our members are saying

What Is a Blueprint?

A blueprint is designed to be a roadmap, containing a methodology and the tools and templates you need to solve your IT problems.

Each blueprint can be accompanied by a Guided Implementation that provides you access to our world-class analysts to help you get through the project.

Need Extra Help?
Speak With An Analyst

Get the help you need in this 2-phase advisory process. You'll receive 4 touchpoints with our researchers, all included in your membership.

Guided Implementation 1: Determine what data protection by design means for you
  • Call 1: Data Protection Planning
  • Call 2: Assessing Risk and Privacy Issues

Guided Implementation 2: Plan for IT-system data protection by design implementation
  • Call 1: Practical DPbD
  • Call 2: Demonstrating DPbD

Author

Logan Rohde

Contributors

  • Paul Withers, PGC, Data Protection Manager at Walsall Metropolitan Borough Council
  • Patrick Lo, CISSP, CIPP/C, CEO at Privacy Horizon Inc.
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019