Privacy Management Accountability Framework-GDPR Edition
Privacy Management Accountability Framework-GDPR Edition
LEGEND: Activities mapped to GDPR to demonstrate compliance A Practical and Operational Structure for Complying with the World’s Privacy Requirements - Mapped to GDPR
Maintain Governance Structure Maintain Training and Awareness Program Respond to Requests and Complaints from Individuals
1 Ensure that there are individuals responsible for data privacy, accountable
management, and management reporting procedures 5 Provide ongoing training and awareness to promote compliance with the data
privacy policy and to mitigate operational risks 9 Maintain effective procedures for interactions with individuals about their
personal data
11
• Maintain documentation of data flows (e.g. between systems, • Use Privacy Shield as a data transfer mechanism • Maintain an acceptable use of information resources policy • Maintain a data-loss prevention strategy Maintain Data Privacy Breach Management Program
between processes, between countries) • Use regulator approval as a data transfer mechanism • Maintain procedures to restrict access to personal data • Conduct regular testing of data security posture Maintain an effective data privacy incident and breach management program
• Maintain documentation of the transfer mechanism used for • Use adequacy or one of the derogations (e.g. consent, (e.g. role-based access, segregation of duties) • Maintain a security certification (e.g. ISO)
cross-border data flows (e.g., model clauses, BCRs, regulator performance of a contract, public interest) as a data transfer
approvals) mechanism
PRIVACY MANAGEMENT ACTIVITIES
Maintain Internal Data Privacy Policy Manage Third-Party Risk
3 Maintain a data privacy policy that meets legal requirements and addresses
operational risk and risk of harm to individuals 7 Maintain contracts and agreements with third-parties and affiliates consistent
with the data privacy policy, legal requirements, and operational risk tolerance
• Maintain a data privacy incident/breach response plan
• Maintain a breach notification (to affected individuals) and
reporting (to regulators, credit agencies, law enforcement) protocol
•
•
•
Conduct periodic testing of data privacy incident/breach plan
Engage a breach response remediation provider
Engage a forensic investigation team
• Maintain a log to track data privacy incidents/breaches • Obtain data privacy breach insurance coverage
• Monitor and report data privacy incident/breach metrics
PRIVACY MANAGEMENT ACTIVITIES PRIVACY MANAGEMENT ACTIVITIES (e.g. nature of breach, risk, root cause)
• Maintain a data privacy policy • Document legal basis for processing personal data • Maintain data privacy requirements for third parties (e.g. clients, • Maintain a policy governing use of cloud providers
Monitor Data Handling Practices
12
• Maintain an employee data privacy policy • Integrate ethics into data processing (Codes of Conduct, vendors, processors, affiliates) • Maintain procedures to address instances of non-compliance
• Maintain an organizational code of conduct that includes privacy policies and other measures) • Maintain procedures to execute contracts or agreements with with contracts and agreements Verify operational practices comply with the data privacy policy and operational
all processors • Conduct due diligence around the data privacy and policies and procedures, and measure and report on their effectiveness
Embed Data Privacy Into Operations • Conduct due diligence around the data privacy and security security posture of existing vendors/processors
4 Maintain operational policies and procedures consistent with the data privacy
policy, legal requirements, and operational risk management objectives
posture of potential vendors/processors
• Conduct due diligence on third party data sources
• Maintain a vendor data privacy risk assessment process
• Review long-term contracts for new or evolving data privacy risks
PRIVACY MANAGEMENT ACTIVITIES
• Conduct self-assessments of privacy management • Engage a third party to conduct audits/assessments
• Conduct Internal Audits of the privacy program (i.e. operational • Monitor and report privacy management metrics
PRIVACY MANAGEMENT ACTIVITIES audit of the Privacy Office) • Maintain documentation as evidence to demonstrate compliance
Maintain Notices • Conduct ad-hoc walk-throughs and/or accountability
8
• Maintain policies/procedures for collection and use of sensitive • Integrate data privacy into hiring practices
Maintain notices to individuals consistent with the data privacy policy, legal • Conduct ad-hoc assessments based on external events, such • Maintain certifications, accreditations or data protection seals for
personal data (including biometric data) • Integrate data privacy into the organization’s use of social media
as complaints/breaches demonstrating compliance to regulators
• Maintain policies/procedures for collection and use of children • Integrate data privacy into Bring Your Own Device (BYOD) requirements, and operational risk tolerance
and minors’ personal data policies/procedures
13
• Maintain policies/procedures for maintaining data quality • Integrate data privacy into health & safety practices Track External Criteria
• Maintain policies/procedures for the de-identification of • Integrate data privacy into interactions with works councils PRIVACY MANAGEMENT ACTIVITIES Track new compliance requirements, expectations, and best practices
personal data • Integrate data privacy into practices for monitoring employees
• Maintain policies/procedures to review processing conducted • Integrate data privacy into use of CCTV/video surveillance • Maintain a data privacy notice • Provide notice in contracts and terms
wholly or partially by automated means • Integrate data privacy into use of geo-location (tracking and or • Provide data privacy notice at all points where personal data • Maintain scripts for use by employees to explain or provide the
• Maintain policies/procedures for secondary uses of personal data location) devices is collected data privacy notice
• Maintain policies/procedures for obtaining valid consent • Integrate data privacy into policies/procedures regarding access
PRIVACY MANAGEMENT ACTIVITIES
• Provide notice by means of on-location signage, posters • Maintain a privacy Seal or Trustmark on the website to
• Maintain policies/procedures for secure destruction of personal data to employees' company e-mail accounts • Provide notice in marketing communications (e.g. emails, increase customer trust • Identify ongoing privacy compliance requirements e.g., law, • Seek legal opinions regarding recent developments in law
• Integrate data privacy into use of cookies and tracking mechanisms • Integrate data privacy into e-discovery practices flyers, offers) case law, codes, etc. • Identify and manage conflicts in law
• Integrate data privacy into records retention practices • Integrate data privacy into conducting internal investigations • Maintain subscriptions to compliance reporting service/law firm • Document decisions around new requirements, including their
• Integrate data privacy into direct marketing practices • Integrate data privacy into practices for disclosure to and for law updates to stay informed of new developments implementation or any rationale behind decisions not to
• Integrate data privacy into e-mail marketing practices enforcement purposes • Attend/participate in privacy conferences, industry association, implement changes
• Integrate data privacy into telemarketing practices • Integrate data privacy into research practices (e.g. scientific and or think-tank events
• Integrate data privacy into digital advertising practices (e.g. online, historical research) • Record/report on the tracking of new laws, regulations,
mobile) amendments or other rule sources
The Nymity Privacy Management Accountability Framework(™) was developed based on Nymity’s global research on data privacy accountability.
The Framework is a comprehensive listing of over 130 Privacy Management Activities (PMAs) categorized into 13 Privacy Management Categories (PMCs).
UPDATED JANUARY 2019 Copyright © 2018 by Nymity Inc. All rights reserved. All text, images, logos, trademarks and information contained in this document are the intellectual property of Nymity Inc. unless otherwise indicated.
Reproduction, modification, transmission, use, or quotation of any content, including text, images, photographs etc., requires the prior written permission of Nymity Inc. Requests may be sent to [email protected].