- Brendan McCann, IT Security Manager, Epson Europe B.V.
- Privacy has become a hot-button issue for many organizations, with the introduction of the General Data Protection Regulation (GDPR) from the EU and the California Consumer Privacy Act (CCPA).
- The mishandling of personal data can result in serious financial consequences or reputational damage.
- Customers are becoming increasingly privacy-aware, with many demanding that the companies they engage with have demonstrable privacy practices.
- Most organizations have never operated with a privacy-first perspective – meaning that there are many gaps in the process to ensure personal data is handled appropriately.
- Organizations may think the security they have in place is sufficient to meet their privacy requirements, but privacy and security are two different functions.
- Operating with privacy first will reduce your sales cycle, increase employee effectiveness, and increase competitive advantage.
- Privacy should not be seen as a burden to organizations but instead as an opportunity. With a privacy program in place, you can meet customer demands while also working to better prevent and handle data breaches.
Impact and Result
- Don’t wait until a privacy incident occurs to force action – start building a privacy program now.
- Integrating privacy into the organization will ensure that personal data is only being collected for legitimate reasons while also helping to minimize the impact of a potential breach.
- Further, it will push the organization forward in terms of efficiency and customer trust, as there is growing privacy demand from all types of customers.
- Use Info-Tech’s Privacy Framework to understand your current state of privacy and to define what the target state looks like for the organization.
This guided implementation is a six call advisory process.
Guided Implementation #1 - Collect privacy requirements
Call #1 - Discuss different privacy organizational structures and determine best fit.
Call #2 - Document and discuss the requirements for the privacy program.
Guided Implementation #2 - Conduct a privacy gap analysis
Call #1 - Use Info-Tech’s Privacy Framework to identify and evaluate gaps within the organization.
Call #2 - Discuss critical initiatives and prioritize accordingly.
Guided Implementation #3 - Begin implementing the privacy program