I relish the moment when someone says to me “It’s not like the regulations say that I must find every last entity. So why do I need to discover where my data can be found in order to achieve compliance? What I have is enough!”
Let’s start by understanding why these regulations came into effect. Essentially, organizations were not being careful enough with our information – yours, mine, our friends – despite embracing corporate security policies. These policies were not enough to prevent the news headlines that we’ve been accustomed to. And so, new regulations addressing data, the use of, it’s security and ownership, were created.
If we delve into the GDPR, there are two significant activities that must be undertaken:
- Make your best effort in your attempt to achieve compliance.
- Maintain that compliance through your continued best efforts.
by “taking into account the state of the art and the costs of implementation in relation to the risks and the nature of the personal data to be protected“.
In simple terms, to achieve compliance, there are 3 main tasks:
- Make every effort (and be able to demonstrate that) to discover all repositories of personal data.
- All repositories of personal data are mapped to the processes that utilize them, and those that are not used should be deleted.
- You have ‘legalized’ the remaining processes.
Again, in simple terms, to maintain compliance you must be able to show:
- That there is a continuous risk management process that encompasses the current data processing, the capability of the existing infrastructure, and the prevailing threat landscape.
- The implementation of additional ‘appropriate’ controls (as necessary).
- An acceptance by senior leadership (usually the Board of Directors) of the residual risk.
Point 3 above is key. The BoD can never use the phrase, “We didn’t know the data was there!” After all, they are ultimately accountable for the business, for the good and the bad.
The 1touch.io solution addresses the issues outlined above. We discover your unknown data which helps achieve and maintain this compliance, in the following ways:
- We find the lion’s share of your personal data in the initial discovery exercise – allows for immediate risk reduction;
- We help you map the personal data flow to business processes for subsequent legalization – achieve compliance;
- We ensure that your unauthorized personal data is not introduced – maintain compliance.
These three things provide ample evidence that you have met (or exceeded); 1) the demonstration of “state of the art and the costs of implementation“, 2) the necessary input into the risk management process, and 3) the BoD’s requirements to make appropriate decisions.
As you have probably understood, to truly understand what you do with your data, continuous visibility is paramount.