Operationalize Data Privacy for Durable Goods Manufacturing
Embed privacy by design into your business processes and protect high-risk personal data.
Book This Workshop
IT needs to gain a seat at the risk management table.
- Manufacturing IT feels less confident in its risk management effectiveness. IT has historically been excluded from risk conversations in this sector.
- OT and IT organizations often focus their attention within silos and miss the big picture needed for a synergistic approach regarding privacy and data protection practices.
- Budgets are strained and high-level skills are difficult to find and keep. Many manufacturers lack the expertise to manage data privacy risks effectively.
Help organizations establish and operationalize a robust privacy program.
- Document privacy requirements and establish privacy governance structure.
- Identify privacy program gap areas.
- Identify and prioritize gap initiatives.
- Complete the privacy program roadmap.
Book Your Workshop
Onsite Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn’t enough, we offer low-cost onsite delivery of our Project Workshops. We take you through every phase of your project and ensure that you have a road map in place to complete your project successfully.
Book NowModule 1: Collect Privacy Requirements
The Purpose
- Identify the driving forces behind the privacy program.
- Understand privacy governance.
- Assign ownership of privacy.
Key Benefits Achieved
- Privacy requirements documented and privacy governance structure established
Activities: | Outputs: | |
---|---|---|
1.1 | Define and document drivers. |
|
1.2 | Establish privacy governance structure. |
|
1.3 | Build a privacy RACI chart. |
|
1.4 | Define personal data scope and build a risk map. |
|
Module 2: Conduct a Privacy Gap Analysis
The Purpose
- Understand the methodology behind the Data Process Mapping Tool.
- Assess risks and map out your data breach response process.
- Work through the threshold assessment and DPIA process.
Key Benefits Achieved
- Privacy program gap areas identified
Activities: | Outputs: | |
---|---|---|
2.1 | Conduct interviews and complete the Data Process Mapping Tool. |
|
2.2 | Compare compliance and regulatory requirements with the current privacy practices of the organization. |
|
2.3 | Identify gap areas. |
|
2.4 | Review the DPIA process and identify whether threshold assessment or full DPIA is required. |
|
Module 3: Build the Privacy Roadmap
The Purpose
- Identify where high-priority gaps exist in current privacy practices.
- Tie cost, effort, risk, and alignment values to each of the relevant privacy gap-closing initiatives.
- Further refine resourcing estimates.
Key Benefits Achieved
- Gap initiatives identified and prioritized
Activities: | Outputs: | |
---|---|---|
3.1 | Complete business unit gap analysis; consolidate inputs from interviews. |
|
3.2 | Apply variables to privacy initiatives. |
|
3.3 | Create a visual privacy roadmap. |
|
3.4 | Define and refine the effort map; validate costing and resourcing. |
|
Module 4: Implement and Operationalize
The Purpose
- Complete the roadmap.
- Establish metrics that map to the needs of the organization.
- Implement and integrate metrics into operations.
Key Benefits Achieved
- Privacy program roadmap completed
Activities: | Outputs: | |
---|---|---|
4.1 | Review Info-Tech’s privacy metrics and select relevant metrics for the privacy program. |
|
4.2 | Operationalize metrics. |
|
4.3 | Input all outputs from into the Data Privacy Report. |
|
4.4 | Summarize and build an executive presentation. |
|
4.5 | Set checkpoints and drive continuous improvement. |
|