SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Downloaden Sie, um offline zu lesen
1
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
v © TRUSTe Inc., 2016
Metrics for Success: Quantifying
the Value of the Privacy Function
December 8, 2016
2
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
Today’s Speakers
Deidre Rodriguez
Director, Corporate Privacy Office
Anthem, Inc
Marcus Morissette
Global Privacy Officer
eBay
Kevin Trilli,
SVP Product,
TRUSTe
3
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
v © TRUSTe Inc., 2016
Privacy Metrics and Dashboard
Kevin Trilli, SVP Product, TRUSTe
4
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
• Speaker Intros
• Metrics and Privacy Organization
• Categories and types of Metrics
• Building / establishing a Monitoring Program
• Challenges and Recommendations
Agenda
5
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
v © TRUSTe Inc., 2016
Privacy Metrics
6
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
Purposes and Categories of Metrics
Target Audience Audience Purpose
Privacy Officer /
Privacy Manager
Internal • Program development
• Organizational Management
Executives / BOD Internal • Communicate overall risk
posture
• Resource requests
Auditors /
Regulators
External • Demonstrate program
accountability and effectiveness
• Transparency
7
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
• Initial stage is strategy planning and development
– Requires selecting and planning a set of program activities
– Establish required set of resources
• On-going management
– Program and goal management
– Resource utilization
– Gaps / program maturity velocity
CPO/Privacy Manager:
Program Establishment, Evolution and Budgeting
8
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
Example: Privacy Program Management
9
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
• Inbound inquiries to privacy team (tickets/advise/projects)
– % utilization
• Policies under management
–Reflective of external and internal laws, regs, policies  shows scope
• Assets under management
– Data processing applications and systems
• Projects (risk assessments, PIAs, etc)
– #, state, aging, response time
– risk issues identified and remediated
• Incidents (breach, data release, reg inquiries)
– #, type and risk levels, remediation plan
• All are mapped to each BU to show status across enterprise
–Includes HR, IT and Marketing functional groups as needed
CPO/Privacy Manager: Operational Management
10
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
Example: Risk Assessment and Remediation Metrics
11
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
• Privacy Program Overview / Budgeting
– Program to Goal (%)
– Overall Resource allocation
– Budget justification
• Risks
– Incidents
– Regulatory enquiries
– Related fines/investigations (vertical)
– Heat Map
Executive / BOD
12
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
• Derived from internal metrics/dashboard, but may need
sanitizing
• Have ready on-demand to demonstrate program
– Ideal: Technological system of record that can grow and aggregate
project/project
– Maintained for data integrity
• Basics:
– Database of data processing assets (#, classified by risk) with metadata
– Construction of key data transfers (EU, APEC)
– Consumer metrics (inquiries/disputes and resolution paths)
• Needs to accompanied by evidence/documentation
External Reporting
13
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
Example: Asset Inventory characterized by risk
14
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
v © TRUSTe Inc., 2016
Where to Start
15
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
• First socialize with stakeholders / execs
• Determine what matters most / scope
• Prioritize to get started
• Assess current capabilities
Starting a Monitoring Program
16
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
•Document your privacy program plan to get ready
–Will you need to develop emails or templates for use during monitoring
(announcement emails, SharePoint sites created, who will be responsible for
what)
–Determine where you will store data and who will have access
–Are there callouts/disclaimers that need to added to metrics?
–When will metrics be produced and by whom
–Stagger monitoring so that it will not create negative impact for the business
–Understand any reporting/monitoring that may be done in the business that will
have potential impact
–Write desktop procedure for how everything will happen A-Z
• Communicate across broader organization
Starting a Monitoring Program
17
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
v © TRUSTe Inc., 2016
Beginning to Monitor
18
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
•Identify lead that will be responsible for monitoring a specific piece of
work
•Put everything on the calendar
–Date you will start sending requests to business
–Date you will analyze data
–Date that you will document findings
–Date you will review metrics
–Date that you will release metrics
–Date corrective action plans will be due
–Any ongoing follow up or re-monitoring to ensure issue has been adequately
addressed
•Keep leadership informed of roll out and any changes to program that
may impact them
Beginning to Monitor
19
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
v © TRUSTe Inc., 2016
Continuing to Grow Monitoring
Program
20
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
•Continue to monitor risks and what matters most
•Identify plan to grow program
–What will be monitored next and why
–Doing it by risk is easiest to explain
–Continue to lobby for resources to expand program
•Continue to collect feedback on metrics
•Document all findings and do follow up on corrective action plans
–This enables you to show leadership the positive impact of your program (what
were you able to find and correct)
•Partner with Internal Audit
•Roll up data by quarter and produce annual metrics
Growing Monitoring Program
21
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
v © TRUSTe Inc., 2016
Challenges and Takeaways
22
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
• How to do actual job but also measure and
document
• Control of data sources that feed metrics
• Dealing with aspects of privacy
management that don’t have easy metrics
Challenges
23
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
v © TRUSTe Inc., 2016
Deidre Rodrigeuz Deidre.Rodriguez@anthem.com
Marcus Morissette mmorissette@ebay.com
Kevin Trilli ktrilli@truste.com
Contacts
24
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2016
v © TRUSTe Inc., 2016
Details of our 2017 Winter/Spring Webinar Series will be available shortly.
See http://www.truste.com/insightseries for all the 2016 Privacy Insight
Series and past webinar recordings.
Thank You!

Weitere ähnliche Inhalte

Andere mochten auch

[Privacy Webinar Slides] Global Enforcement Priorities
[Privacy Webinar Slides] Global Enforcement Priorities[Privacy Webinar Slides] Global Enforcement Priorities
[Privacy Webinar Slides] Global Enforcement PrioritiesTrustArc
 
2015 TRUSTe US Consumer Privacy Confidence Index – Infographic
2015 TRUSTe US Consumer Privacy Confidence Index – Infographic2015 TRUSTe US Consumer Privacy Confidence Index – Infographic
2015 TRUSTe US Consumer Privacy Confidence Index – InfographicTrustArc
 
EU US Privacy Shield vs. GDPR Infographic from TRUSTe
EU US Privacy Shield vs. GDPR Infographic from TRUSTeEU US Privacy Shield vs. GDPR Infographic from TRUSTe
EU US Privacy Shield vs. GDPR Infographic from TRUSTeTrustArc
 
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe TrustArc
 
What does the Proposed EU General Data Protection Regulation (GDPR) mean for ...
What does the Proposed EU General Data Protection Regulation (GDPR) mean for ...What does the Proposed EU General Data Protection Regulation (GDPR) mean for ...
What does the Proposed EU General Data Protection Regulation (GDPR) mean for ...TrustArc
 
TEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkTEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkVolker Hirsch
 

Andere mochten auch (7)

[Privacy Webinar Slides] Global Enforcement Priorities
[Privacy Webinar Slides] Global Enforcement Priorities[Privacy Webinar Slides] Global Enforcement Priorities
[Privacy Webinar Slides] Global Enforcement Priorities
 
2015 TRUSTe US Consumer Privacy Confidence Index – Infographic
2015 TRUSTe US Consumer Privacy Confidence Index – Infographic2015 TRUSTe US Consumer Privacy Confidence Index – Infographic
2015 TRUSTe US Consumer Privacy Confidence Index – Infographic
 
EU US Privacy Shield vs. GDPR Infographic from TRUSTe
EU US Privacy Shield vs. GDPR Infographic from TRUSTeEU US Privacy Shield vs. GDPR Infographic from TRUSTe
EU US Privacy Shield vs. GDPR Infographic from TRUSTe
 
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
 
What does the Proposed EU General Data Protection Regulation (GDPR) mean for ...
What does the Proposed EU General Data Protection Regulation (GDPR) mean for ...What does the Proposed EU General Data Protection Regulation (GDPR) mean for ...
What does the Proposed EU General Data Protection Regulation (GDPR) mean for ...
 
Build Features, Not Apps
Build Features, Not AppsBuild Features, Not Apps
Build Features, Not Apps
 
TEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkTEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of Work
 

Mehr von TrustArc

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc
 
TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc
 
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc
 
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...TrustArc
 
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...TrustArc
 
Nymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesTrustArc
 
CBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceCBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceTrustArc
 
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfEverything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfTrustArc
 
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...TrustArc
 
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsPrivacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsTrustArc
 
Building Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsBuilding Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsTrustArc
 
The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...TrustArc
 
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdfTrustArc
 
Artificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceArtificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceTrustArc
 
How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023TrustArc
 
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act:  Using Consumer Data and Maintaining TrustThe Ultimate Balancing Act:  Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act: Using Consumer Data and Maintaining TrustTrustArc
 
The Cost of Privacy Teams: What Your Business Needs To Know
The Cost of Privacy Teams: What Your Business Needs To KnowThe Cost of Privacy Teams: What Your Business Needs To Know
The Cost of Privacy Teams: What Your Business Needs To KnowTrustArc
 
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdf
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdfTrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdf
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdfTrustArc
 

Mehr von TrustArc (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
 
TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI Innovations
 
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
 
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
 
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
 
Nymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 States
 
CBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceCBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy Compliance
 
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfEverything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
 
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
 
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsPrivacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
 
Building Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsBuilding Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy Certifications
 
The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...
 
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
 
Artificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceArtificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI Governance
 
How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023
 
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act:  Using Consumer Data and Maintaining TrustThe Ultimate Balancing Act:  Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust
 
The Cost of Privacy Teams: What Your Business Needs To Know
The Cost of Privacy Teams: What Your Business Needs To KnowThe Cost of Privacy Teams: What Your Business Needs To Know
The Cost of Privacy Teams: What Your Business Needs To Know
 
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdf
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdfTrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdf
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdf
 

Kürzlich hochgeladen

Conditions Restricting Transfer Under TPA,1882
Conditions Restricting Transfer Under TPA,1882Conditions Restricting Transfer Under TPA,1882
Conditions Restricting Transfer Under TPA,18822020000445musaib
 
PPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training CenterPPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training Centerejlfernandez22
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeBlayneRush1
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsAbdul-Hakim Shabazz
 
Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxBharatMunjal4
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementShubhiSharma858417
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaAbheet Mangleek
 
Presentation1.pptx on sedition is a good legal point
Presentation1.pptx on sedition is a good legal pointPresentation1.pptx on sedition is a good legal point
Presentation1.pptx on sedition is a good legal pointMohdYousuf40
 
Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.2020000445musaib
 
Illinois Department Of Corrections reentry guide
Illinois Department Of Corrections reentry guideIllinois Department Of Corrections reentry guide
Illinois Department Of Corrections reentry guideillinoisworknet11
 
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfWurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfssuser3e15612
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceMichael Cicero
 
Hungarian legislation made by Robert Miklos
Hungarian legislation made by Robert MiklosHungarian legislation made by Robert Miklos
Hungarian legislation made by Robert Miklosbeduinpower135
 
Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791BlayneRush1
 
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiBlayneRush1
 
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxSarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxAnto Jebin
 
citizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicablecitizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicableSaraSantiago44
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesritwikv20
 
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los AngelesAre There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los AngelesChesley Lawyer
 
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTSTHE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTSRoshniSingh312153
 

Kürzlich hochgeladen (20)

Conditions Restricting Transfer Under TPA,1882
Conditions Restricting Transfer Under TPA,1882Conditions Restricting Transfer Under TPA,1882
Conditions Restricting Transfer Under TPA,1882
 
PPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training CenterPPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training Center
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
 
Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptx
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreement
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in India
 
Presentation1.pptx on sedition is a good legal point
Presentation1.pptx on sedition is a good legal pointPresentation1.pptx on sedition is a good legal point
Presentation1.pptx on sedition is a good legal point
 
Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.
 
Illinois Department Of Corrections reentry guide
Illinois Department Of Corrections reentry guideIllinois Department Of Corrections reentry guide
Illinois Department Of Corrections reentry guide
 
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfWurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
 
Hungarian legislation made by Robert Miklos
Hungarian legislation made by Robert MiklosHungarian legislation made by Robert Miklos
Hungarian legislation made by Robert Miklos
 
Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791
 
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
 
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxSarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
 
citizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicablecitizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicable
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use cases
 
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los AngelesAre There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
 
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTSTHE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
 

Metrics for Success: Quantifying the Value of the Privacy Function [Webinar Slides]

  • 1. 1 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 v © TRUSTe Inc., 2016 Metrics for Success: Quantifying the Value of the Privacy Function December 8, 2016
  • 2. 2 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 Today’s Speakers Deidre Rodriguez Director, Corporate Privacy Office Anthem, Inc Marcus Morissette Global Privacy Officer eBay Kevin Trilli, SVP Product, TRUSTe
  • 3. 3 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 v © TRUSTe Inc., 2016 Privacy Metrics and Dashboard Kevin Trilli, SVP Product, TRUSTe
  • 4. 4 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 • Speaker Intros • Metrics and Privacy Organization • Categories and types of Metrics • Building / establishing a Monitoring Program • Challenges and Recommendations Agenda
  • 5. 5 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 v © TRUSTe Inc., 2016 Privacy Metrics
  • 6. 6 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 Purposes and Categories of Metrics Target Audience Audience Purpose Privacy Officer / Privacy Manager Internal • Program development • Organizational Management Executives / BOD Internal • Communicate overall risk posture • Resource requests Auditors / Regulators External • Demonstrate program accountability and effectiveness • Transparency
  • 7. 7 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 • Initial stage is strategy planning and development – Requires selecting and planning a set of program activities – Establish required set of resources • On-going management – Program and goal management – Resource utilization – Gaps / program maturity velocity CPO/Privacy Manager: Program Establishment, Evolution and Budgeting
  • 8. 8 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 Example: Privacy Program Management
  • 9. 9 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 • Inbound inquiries to privacy team (tickets/advise/projects) – % utilization • Policies under management –Reflective of external and internal laws, regs, policies  shows scope • Assets under management – Data processing applications and systems • Projects (risk assessments, PIAs, etc) – #, state, aging, response time – risk issues identified and remediated • Incidents (breach, data release, reg inquiries) – #, type and risk levels, remediation plan • All are mapped to each BU to show status across enterprise –Includes HR, IT and Marketing functional groups as needed CPO/Privacy Manager: Operational Management
  • 10. 10 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 Example: Risk Assessment and Remediation Metrics
  • 11. 11 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 • Privacy Program Overview / Budgeting – Program to Goal (%) – Overall Resource allocation – Budget justification • Risks – Incidents – Regulatory enquiries – Related fines/investigations (vertical) – Heat Map Executive / BOD
  • 12. 12 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 • Derived from internal metrics/dashboard, but may need sanitizing • Have ready on-demand to demonstrate program – Ideal: Technological system of record that can grow and aggregate project/project – Maintained for data integrity • Basics: – Database of data processing assets (#, classified by risk) with metadata – Construction of key data transfers (EU, APEC) – Consumer metrics (inquiries/disputes and resolution paths) • Needs to accompanied by evidence/documentation External Reporting
  • 13. 13 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 Example: Asset Inventory characterized by risk
  • 14. 14 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 v © TRUSTe Inc., 2016 Where to Start
  • 15. 15 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 • First socialize with stakeholders / execs • Determine what matters most / scope • Prioritize to get started • Assess current capabilities Starting a Monitoring Program
  • 16. 16 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 •Document your privacy program plan to get ready –Will you need to develop emails or templates for use during monitoring (announcement emails, SharePoint sites created, who will be responsible for what) –Determine where you will store data and who will have access –Are there callouts/disclaimers that need to added to metrics? –When will metrics be produced and by whom –Stagger monitoring so that it will not create negative impact for the business –Understand any reporting/monitoring that may be done in the business that will have potential impact –Write desktop procedure for how everything will happen A-Z • Communicate across broader organization Starting a Monitoring Program
  • 17. 17 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 v © TRUSTe Inc., 2016 Beginning to Monitor
  • 18. 18 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 •Identify lead that will be responsible for monitoring a specific piece of work •Put everything on the calendar –Date you will start sending requests to business –Date you will analyze data –Date that you will document findings –Date you will review metrics –Date that you will release metrics –Date corrective action plans will be due –Any ongoing follow up or re-monitoring to ensure issue has been adequately addressed •Keep leadership informed of roll out and any changes to program that may impact them Beginning to Monitor
  • 19. 19 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 v © TRUSTe Inc., 2016 Continuing to Grow Monitoring Program
  • 20. 20 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 •Continue to monitor risks and what matters most •Identify plan to grow program –What will be monitored next and why –Doing it by risk is easiest to explain –Continue to lobby for resources to expand program •Continue to collect feedback on metrics •Document all findings and do follow up on corrective action plans –This enables you to show leadership the positive impact of your program (what were you able to find and correct) •Partner with Internal Audit •Roll up data by quarter and produce annual metrics Growing Monitoring Program
  • 21. 21 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 v © TRUSTe Inc., 2016 Challenges and Takeaways
  • 22. 22 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 • How to do actual job but also measure and document • Control of data sources that feed metrics • Dealing with aspects of privacy management that don’t have easy metrics Challenges
  • 23. 23 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 v © TRUSTe Inc., 2016 Deidre Rodrigeuz Deidre.Rodriguez@anthem.com Marcus Morissette mmorissette@ebay.com Kevin Trilli ktrilli@truste.com Contacts
  • 24. 24 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2016 v © TRUSTe Inc., 2016 Details of our 2017 Winter/Spring Webinar Series will be available shortly. See http://www.truste.com/insightseries for all the 2016 Privacy Insight Series and past webinar recordings. Thank You!