Operationalize Data Privacy for Durable Goods Manufacturing
Embed privacy by design into your business processes and protect high-risk personal data.
RETIRED CONTENT
Please note that the content on this page is retired. This content is not maintained and may contain information or links that are out of date.IT needs to gain a seat at the risk management table.
- Manufacturing IT feels less confident in its risk management effectiveness. IT has historically been excluded from risk conversations in this sector.
- OT and IT organizations often focus their attention within silos and miss the big picture needed for a synergistic approach regarding privacy and data protection practices.
- Budgets are strained and high-level skills are difficult to find and keep. Many manufacturers lack the expertise to manage data privacy risks effectively.
Help organizations establish and operationalize a robust privacy program.
- Document privacy requirements and establish privacy governance structure.
- Identify privacy program gap areas.
- Identify and prioritize gap initiatives.
- Complete the privacy program roadmap.
Book Your Workshop
Onsite Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn’t enough, we offer low-cost onsite delivery of our Project Workshops. We take you through every phase of your project and ensure that you have a road map in place to complete your project successfully.
Module 1: Collect Privacy Requirements
The Purpose
- Identify the driving forces behind the privacy program.
- Understand privacy governance.
- Assign ownership of privacy.
Key Benefits Achieved
- Privacy requirements documented and privacy governance structure established
Activities: | Outputs: | |
---|---|---|
1.1 | Define and document drivers. |
|
1.2 | Establish privacy governance structure. |
|
1.3 | Build a privacy RACI chart. |
|
1.4 | Define personal data scope and build a risk map. |
|
Module 2: Conduct a Privacy Gap Analysis
The Purpose
- Understand the methodology behind the Data Process Mapping Tool.
- Assess risks and map out your data breach response process.
- Work through the threshold assessment and DPIA process.
Key Benefits Achieved
- Privacy program gap areas identified
Activities: | Outputs: | |
---|---|---|
2.1 | Conduct interviews and complete the Data Process Mapping Tool. |
|
2.2 | Compare compliance and regulatory requirements with the current privacy practices of the organization. |
|
2.3 | Identify gap areas. |
|
2.4 | Review the DPIA process and identify whether threshold assessment or full DPIA is required. |
|
Module 3: Build the Privacy Roadmap
The Purpose
- Identify where high-priority gaps exist in current privacy practices.
- Tie cost, effort, risk, and alignment values to each of the relevant privacy gap-closing initiatives.
- Further refine resourcing estimates.
Key Benefits Achieved
- Gap initiatives identified and prioritized
Activities: | Outputs: | |
---|---|---|
3.1 | Complete business unit gap analysis; consolidate inputs from interviews. |
|
3.2 | Apply variables to privacy initiatives. |
|
3.3 | Create a visual privacy roadmap. |
|
3.4 | Define and refine the effort map; validate costing and resourcing. |
|
Module 4: Implement and Operationalize
The Purpose
- Complete the roadmap.
- Establish metrics that map to the needs of the organization.
- Implement and integrate metrics into operations.
Key Benefits Achieved
- Privacy program roadmap completed
Activities: | Outputs: | |
---|---|---|
4.1 | Review Info-Tech’s privacy metrics and select relevant metrics for the privacy program. |
|
4.2 | Operationalize metrics. |
|
4.3 | Input all outputs from into the Data Privacy Report. |
|
4.4 | Summarize and build an executive presentation. |
|
4.5 | Set checkpoints and drive continuous improvement. |
|