What Is The Work Like in Data Protection and Privacy Management - Who Can Do This Work
What Is The Work Like in Data Protection and Privacy Management - Who Can Do This Work
Let us see what the work is and who the best professionals suited to perform the work:
1. Development of software, apps and user interfaces to ensure that the principles for
data protection and privacy are implemented at the front end and backend
Engineers, developers, including UI/UX teams, product managers - many of them continue to
utilise privacy knowledge in their existing roles while others later branch out as privacy
engineers once the company sets up a dedicated privacy team
This is the core work for compliance professionals, MBAs. Trained B.Com grads can do it too.
Organisations have a vertical called Governance, Risk and Compliance (GRC), Risk Advisory
or Risk Management which is involved in this work.
Privacy management and administrative work is the most resource-intensive work, involving
team members from various different teams.
This work involves strategy formation, planning, coordination, measurement, reporting and
management.
This can be performed by a professional from any background, i.e. CAs, CS, MBAs, lawyers,
HR managers, commerce students and grads, etc. if they are trained in this work
3. Administrative work:
● Creation and administration of internal policies, privacy notices, cookie policies, data
retention policy, etc.
● Record-keeping and data mapping
● Dealing with data subject access requests and reporting the authorities about
contentious issues and DSR non - compliance register
● Executing standardised data protection addendums for transfer of data, local and
international transfers
● Conducting inspections of all physical locations + devices (especially vulnerable
locations) where employees access personal data - here are some red flags
● Mentioning customer details over a phone call from the office cafeteria where others
can overhear you
● Writing passwords on stickies/post-its pasted on your work desk
● Leaving the work laptop unattended at home in an unlocked state (if client data is
accessible)
● Execution of data protection impact assessments - this work involves understanding
data flow through the following:
● Identification of which data is collected at different stages in the user’s lifecycle of an
app - e.g. Uber
● Internal business functions and teams through which data is passed, e.g. from
marketing to sales, to finance & billing, to delivery, to upselling, and back to marketing
(e.g. for success stories), etc.
● Products and services (softwares,apps, third party APIs used in the process) that pull
and push data,
● This includes third parties that data is shared with-
● Record of physical location where such data is stored throughout the lifecycle, and who
has control over such physical + cloud locations - this is very important because
businesses have moved to the cloud
● Cyber Security Assessments from Tech teams
Anyone can do this work, for example, here is a simple data flow diagram that shows how
information flows to different parties when a book is ordered:
7. Legal work - complex drafting, interventions during a negotiation, issuing a legal opinion,
working on disputes with third parties or regulators, arguing before regulatory authorities - this is
the only work that lawyers are specifically equipped to do