News
Commentary
8/3/2004
04:32 PM
Commentary
Commentary
Commentary
Connect Directly
RSS
E-Mail
50%
50%

The Privacy Lawyer: It's Time To Build A Data Map

Building a data map will help your company deal with the challenges of tracking information that comes into your business, Parry Aftab says.

One of the biggest challenges faced by privacy or compliance professionals is tracking information that comes into the company--how it's used, for what purposes, and who has access to that information. Without that knowledge, no one can be sure the company is in compliance with contracts, applicable law, or its risk-management plans.

Building a data map will help your company deal with this challenge.

To determine what information is collected and stored by the company, a "data inventory" or "data audit" must be conducted. Once the information and access points and use are determined, a flow chart is created mapping information flow. This is generally called a data map and is crucial to compliance and strategic planning.

Each privacy or compliance professional thinks the grass is always greener at other companies. Smaller organizations have fewer points of data inflow, but also fewer resources to gather the requisite information. Larger companies have more resources, but vastly more access points and conduits for information flow. Surprisingly, they also have less knowledge about how other units, divisions, and companies within their corporate structure can access and use the information. So, in this case at least, the grass is always in need of watering, chemicals, and care, no matter what the size of the company you're working with. No one has an easy job when data compliance and mapping are involved.

The initial questions to answer for your data audit are the easy ones:

  • What kinds of data are you collecting?


  • How is it being collected and input?


  • Why was it collected?


  • Were special conditions on its use established at any time?


  • How and where is it stored? What software and hardware are used in its storage?


  • How can the data be accessed? What software and hardware are used in its access?


  • Who has access to it by authority and by ability?


  • For what purpose do they have access?


  • Where are those who have access to the data? Do they work from a corporate location, on the road, or from home or shared offices?


  • If laptops are involved, what security measures are taken for their loss or for theft of data?


  • How is authority to access the data controlled, supervised, or reviewed?


  • Are there backups? How and where are they stored? Answer the same questions posed above about backups.


  • Who can make changes to data, how, and for what purpose?


  • Can the data be transmitted? In bulk or only on an individual basis?


  • How is all of this logged or documented? Where are the logs or documents stored?


  • How are they accessed? How are those logs flagged to show unusual transactions?


  • Who receives those flagged logs?


  • Is any of this data available on PDA, palmheld devices, or handheld devices? If so, what security measures are taken for their loss or for theft of data?


  • What firewalls, software, and encryption systems are used?


  • Who has access to those?


  • Who receives reports of any intrusions or attempted intrusions to those systems?

Other questions, often unasked, can be the most telling. They include:

• Are you logging discussion groups, message boards or other communication methods at your Web site? Think about all the input options at your Web site --site registrations, E-commerce, and newsletter signups. Do you collect E-mail addresses? What kinds of forms are used? Do they collect information in data streams? Are cookies or data-tracking technologies used? Any downloadables?

• If you attend trade shows or job fairs, do you collect business cards from conference attendees? Are your employees asked to update databases and contact lists with new business-card information? Do you use relationship programs to help pair needs with existing relationships for networking purposes?

• Do you have a customer-service help line or product-warranty service line? What information is collected and how is it used? For contests, giveaways, or sweepstakes, or for sharing or cross-marketing deals with magazines, advertisers, or affiliates? Do you use coupons? How are they processed and redeemed? Rebates? Special consumer offers?

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
The Business of Going Digital
The Business of Going Digital
Digital business isn't about changing code; it's about changing what legacy sales, distribution, customer service, and product groups do in the new digital age. It's about bringing big data analytics, mobile, social, marketing automation, cloud computing, and the app economy together to launch new products and services. We're seeing new titles in this digital revolution, new responsibilities, new business models, and major shifts in technology spending.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest - July 22, 2014
Sophisticated attacks demand real-time risk management and continuous monitoring. Here's how federal agencies are meeting that challenge.
Flash Poll
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
A UBM Tech Radio episode on the changing economics of Flash storage used in data tiering -- sponsored by Dell.
Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.