Need a Repeatable Data
Privacy Process?
Design, Build, and Automate Your Data Privacy Process
The Journey Starts Here:
The Data Privacy Process Design s a 3 phase approach to properly and successfully extend a proven repeatable process throughout your organization,
Phase 01
Design Data Privacy
Process
- Process Implementation Plan, Questionnaires, etc.
- Initial Process Design & Workflow including SOP, Obfuscation Guide, Data Flow Diagrams, etc.
- Onboarding of Pilot applications
- Process Communications & Go-Live
- Define Metrics for Reporting
Team
- Architect and Engineers, Customer Success Manager, and Subject Matter Experts (as needed)
Timing
- Starts Immediately
Phase 02
Build Data Privacy
Factory
- Identify and obfuscate sensitive data in the target database and validate the results with the client
- Develop custom algorithms as needed
- Document what was accomplished and lessons learned
- Track defined metrics
Team
- Architect and Engineers, Customer Success Manager, and Subject Matter Experts (as needed)
Timing
- 2-3 months after Phase 1 begins
Phase 03
Automate Data Privacy
Factory
- Review existing automation/scheduling process
- Provide and implement Automation framework Blueprint
- Integrate with existing workflow tools such as ServiceNow, Jira, Jenkins, etc.
Team
- Architect and Engineers, Customer Success Manager, and Subject Matter Experts (as needed)
Timing
- starts when Phase 2 ends
The Journey Starts Here:
The Data Privacy Process Design s a 3 phase approach to properly and successfully extend a proven repeatable process throughout your organization,
Year 01
Protect 101
- Name
- Phone Number
- Birth Data & Other data
- Credit Card Number
- Bank Account Number
- Internal Sequence Key
- Custom fields
- Customer ID
- SSN/National Identifiers
- Account Number
We use your masking tool or our masking tool
Year 02
Automate and Extend
- Employee ID
- Corproate ID
- Salary Benefits
- Family Data
- Manager Data
- Cost Center Data
- HR (termination, personnel issues)
We will then work on automating your current masking process and extend what is masked
Year 03
Proactive Risk Identification and Management
- Vendor Data
- Security Identifiers (CUSIP, ISIN, SEDOL)
- Other Identifiers (NAV, Type of Security)
- Assets/holding
- Comment Fields
- Name
- Number
- Activity (account balances, transactions, trade data)
- Financial (price, quantity, legal fees, vendor payments)
We will then mask this data while discovering other PII locations using the C2 Discover.
The Journey Starts Here:
The Cloud Data Landscape Package a fixed-price engagement based on the number and size of your database and can be customized to handle larger-scale environments
Interview
Understand the client’s current cloud strategy and cloud deployment
You can secure the data before stakeholders have access, eliminating the risk of making sensitive data vulnerable and speeding up the process of developing and testing software.
Inventory
Creat a comprehensive landscape of all the private data contained in the databases using C2 Discover
You can secure the data before stakeholders have access, eliminating the risk of making sensitive data vulnerable and speeding up the process of developing and testing software.
Results
Perform an analysis on the inventory and identify potential cost-savings, optimizations, risk areas actions in a report
You can secure the data before stakeholders have access, eliminating the risk of making sensitive data vulnerable and speeding up the process of developing and testing software.