Build Business-Aligned Privacy Programs for Higher Education Institutions
Embed privacy by design into your business processes and protect high-risk personal data.
Book This Workshop
Higher education institutions are under increased pressure to ensure personal data protection for students and faculty in the new digital era, especially to protect sensitive information.
- Privacy teams are struggling to obtain sufficient resources and budget.
- Privacy policies often ineffectively convey how institutions use data, which creates confusion.
- It takes a long time to make changes and implement new policies and procedures.
Create a clear path toward privacy by taking a quantitative, risk-based approach.
- Use a phase-based, cumulative approach to gradually build a data privacy program.
- Complete a set of targeted deliverables that will help you understand and govern the lifecycle of the data in your organization.
- Establish metrics and an implementation plan to operationalize your data privacy program.
Book Your Workshop
Onsite Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn’t enough, we offer low-cost onsite delivery of our Project Workshops. We take you through every phase of your project and ensure that you have a road map in place to complete your project successfully.
Book NowModule 1: Collect Privacy Requirements
The Purpose
- Identify the driving forces behind the privacy program.
- Understand privacy governance.
- Assign ownership of privacy.
Key Benefits Achieved
Privacy requirements documented and privacy governance structure established.
Activities: | Outputs: | |
---|---|---|
1.1 | Define and Document Drivers |
|
1.2 | Establish Privacy Governance Structure |
|
1.3 | Build Privacy RACI |
|
1.4 | Define Personal Data Scope |
|
1.5 | Build Risk Map |
|
Module 2: Conduct a Privacy Gap Analysis
The Purpose
- Understand the methodology behind the Data Process Mapping Tool
- Assess risks and map out your data breach response process
- Work through the threshold assessment and DPIA process
Key Benefits Achieved
Privacy program gap areas identified
Activities: | Outputs: | |
---|---|---|
2.1 | Conduct interviews and complete Data Process Mapping Tool |
|
2.2 | Compare compliance and regulatory requirements with current privacy practices of the organization |
|
2.3 | Identify gap areas |
|
2.4 | Review the DPIA process and identify whether threshold assessment or full DPIA is required |
|
Module 3: Build the Privacy Roadmap
The Purpose
- Identify where high-priority gaps exist in current privacy practices
- Tie cost, effort, risk, and alignment values to each of the relevant privacy gap-closing initiatives
- Further refine resourcing estimates
Key Benefits Achieved
Gap initiatives identified and prioritized
Activities: | Outputs: | |
---|---|---|
3.1 | Complete business unit gap analysis; consolidate inputs from interviews |
|
3.2 | Apply variables to privacy initiatives |
|
3.3 | Create a visual privacy roadmap |
|
3.4 | Define and refine the effort map; validate costing and resourcing |
|
Module 4: Implement and Operationalize
The Purpose
- Complete the roadmap
- Establish metrics that map to the needs of the organization
- Implement and integrate metrics into operations
Key Benefits Achieved
Privacy program roadmap completed
Activities: | Outputs: | |
---|---|---|
4.1 | Review Info-Tech’s privacy metrics and select relevant metrics for the privacy program |
|
4.2 | Operationalize metrics |
|
4.3 | Input all outputs from into the Data Privacy Report |
|
4.4 | Summarize and build an executive presentation |
|
4.5 | Set checkpoints and drive continuous improvement |
|