After introducing the 2019 Privacy Tech Adoption Report in part I of this blog post series and illustrating the differences in buying roles between the IT office and the privacy office in part II, we are pleased to share the final post of this series. Part III of this blog series will share the top three fastest growing tech tools, and outline how you can gain influencing power when it comes to product acquisition.
The increasing complexity of business in the digital world, coupled with a growing list of global privacy frameworks, has increased the need for organizations to adopt solutions that demonstrate compliance and are scalable and efficient. In fact, according to the report, 92% of organizations say need to demonstrate compliance is motivation for technology adoption. To help manage this complex regulatory landscape, privacy professionals have turned to tech tools. The top purchase plans for the next twelve months include a spread across 11 different product categories, but the fastest growing are data mapping / flow (24%), data discovery (23%), and assessment management (20%).
Why data mapping and data flow?
One of the most important steps to build and manage a data privacy program is to create an inventory of all of the personal data processing activities within a company. If an organization does not know the type of data they collect and how it’s shared, processed and stored; or the data inflows and outflows, it is difficult to know if they meet the requirements of the privacy frameworks that impact their business. It is also difficult to know where data resides
in order to be able to efficiently respond to situations where individuals may exercise their personal data rights, for example, data subject access requests (DSAR). As privacy and data protection regulations expand, companies need to demonstrate how they reduce and
manage risk. Building and maintaining a data inventory is an essential first step. The EU General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) are two examples of regulations which rely heavily on a comprehensive data inventory to support risk management, compliance reporting and responding to individual rights and DSARs.
Why personal data discovery?
With regulations like GDPR and CCPA, individuals have the right to request personal data collected on them. Anytime this happens, privacy professionals are forced to spend countless hours looking for personally identifiable information (PII) of customers, employees and partners. To alleviate these time-consuming activities, privacy pros are turning to privacy tech tools with the right integrations and automation in all the right places.
Why privacy program assessment and management?
No matter what industry you are in, the size of your organization, or the maturity of your privacy program, conducting regular privacy assessments is important to understand and ensure compliance. These assessments need to address a wide range of legal requirements and best practices and will help build an action plan to identify gaps and define and manage remediation activities. This solutions brief reviews some of the most common types of privacy assessments and provides tips and tools on how to automate and efficiently manage the process.
Discover how your peers are buying and deploying privacy technology by downloading the report.
Want to learn more? Join us for a web conference: “How Privacy Tech Is Bought and Deployed (2019)” – Tuesday, Oct. 15, 2019
Sit down and listen to privacy leaders discuss findings from this report, as well as how these findings illuminate what we are seeing in the market. Register for this webinar to learn:
- What technology is truly in use versus what is still far from the mainstream.
- Which tools are better suited to reside within the privacy office rather than being housed in IT or infosec.
- How technologies with built-in security applications fare against newer privacy-office-specific solutions.
Dave Cohen, CIPP/E, CIPP/US, Knowledge Manager, IAPP
Jedidiah Bracy, CIPP, Editorial Director, IAPP
Hilary Wandall, CIPP/E, CIPP/US, CIPM, FIP, SVP Privacy Intelligence and General Counsel, TrustArc