Usually, there are three sources of risk:
The first is Third Parties – DPO needs to asses all Data Processors which have access or to which personal data is disclosed. It requires contractual protections with Data Processors and their Sub-Processors. Awareness what is the risk score of our Third Parties and acting to mitigate the risk is essential in avoiding the potential fines
The second is IT (and non-IT) Systems, where personal data is stored. Organization needs to be aware of which kinds of security measures were undertaken. If it is a Cloud system, the location of the data center can affect the risk score.
The third source of risk is, of course, Data Privacy Impact Assessment (DPIA) which needs to be conducted when there is a systematic and extensive evaluation of the personal aspects of an individual, including profiling; or processing of sensitive data on a large scale; or systematic monitoring of public areas on a large scale. Out of DIPA, many risks can rise and we need to be able to properly manage them.
The Risk Management module empowers your DPO with a high-level overview of risks associated with each processing activity, and to allow for a more detailed insight into residual risks behind a particular processing activity by means of linking it to a relevant data protection impact assessment.
Before assigning the risk to a processing activity, third party, or a system you will have to (re)define the risk methodology your organization is currently using. It is possible to adjust the risk matrix both by impact and probability. As well as define risk scores.
By having risk methodology in place and assigning risks to the key entities, the solution creates a Risk Register, which acts as a guideline for the management. It shows where the organization is vulnerable and what should be the next key steps in order to provide compliant personal data processing.
DPIA register allows business process owners to download the DPIA template, to do assessments, and upload the results back to Data Privacy Manager.
While Organizations have been busy collecting consents and putting together compliant Records of processing activities, the data removal remained overlooked, or maybe postponed? Most of the Organizations have by now documented data retention policies and have a good idea about how long they can keep the data. Data retention starts when one of the following scenarios happen: The initial purpose for data collection and processing has expired. Usually, a product or services contract with an individual has expired, an insurance policy has expired or individual stopped using a product or a service…