Building a data map will help your company deal with the challenges of tracking information that comes into your business, Parry Aftab says.
One of the biggest challenges faced by privacy or compliance professionals is tracking information that comes into the company--how it's used, for what purposes, and who has access to that information. Without that knowledge, no one can be sure the company is in compliance with contracts, applicable law, or its risk-management plans.
Building a data map will help your company deal with this challenge.
To determine what information is collected and stored by the company, a "data inventory" or "data audit" must be conducted. Once the information and access points and use are determined, a flow chart is created mapping information flow. This is generally called a data map and is crucial to compliance and strategic planning.
Each privacy or compliance professional thinks the grass is always greener at other companies. Smaller organizations have fewer points of data inflow, but also fewer resources to gather the requisite information. Larger companies have more resources, but vastly more access points and conduits for information flow. Surprisingly, they also have less knowledge about how other units, divisions, and companies within their corporate structure can access and use the information. So, in this case at least, the grass is always in need of watering, chemicals, and care, no matter what the size of the company you're working with. No one has an easy job when data compliance and mapping are involved.
The initial questions to answer for your data audit are the easy ones:
What kinds of data are you collecting?
How is it being collected and input?
Why was it collected?
Were special conditions on its use established at any time?
How and where is it stored? What software and hardware are used in its storage?
How can the data be accessed? What software and hardware are used in its access?
Who has access to it by authority and by ability?
For what purpose do they have access?
Where are those who have access to the data? Do they work from a corporate location, on the road, or from home or shared offices?
If laptops are involved, what security measures are taken for their loss or for theft of data?
How is authority to access the data controlled, supervised, or reviewed?
Are there backups? How and where are they stored? Answer the same questions posed above about backups.
Who can make changes to data, how, and for what purpose?
Can the data be transmitted? In bulk or only on an individual basis?
How is all of this logged or documented? Where are the logs or documents stored?
How are they accessed? How are those logs flagged to show unusual transactions?
Who receives those flagged logs?
Is any of this data available on PDA, palmheld devices, or handheld devices? If so, what security measures are taken for their loss or for theft of data?
What firewalls, software, and encryption systems are used?
Who has access to those?
Who receives reports of any intrusions or attempted intrusions to those systems?
Other questions, often unasked, can be the most telling. They include:
Are you logging discussion groups, message boards or other communication methods at your Web site? Think about all the input options at your Web site --site registrations, E-commerce, and newsletter signups. Do you collect E-mail addresses? What kinds of forms are used? Do they collect information in data streams? Are cookies or data-tracking technologies used? Any downloadables?
If you attend trade shows or job fairs, do you collect business cards from conference attendees? Are your employees asked to update databases and contact lists with new business-card information? Do you use relationship programs to help pair needs with existing relationships for networking purposes?
Do you have a customer-service help line or product-warranty service line? What information is collected and how is it used? For contests, giveaways, or sweepstakes, or for sharing or cross-marketing deals with magazines, advertisers, or affiliates? Do you use coupons? How are they processed and redeemed? Rebates? Special consumer offers?
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.