Wiss & Company, LLP

How to Evolve Your Privacy & Data Protection Program

Checklist Part I: Building the Foundation

Safeguarding consumer trust and your company’s integrity requires a proactive journey to privacy and data protection. Each company is the guardian of its customers’ data, which means each company requires a comprehensive privacy roadmap to maintain compliance and foster a culture of trust. Elevating data privacy standards is more than a legal requirement; a company’s privacy and data protection program must be strategic to enhance brand loyalty and customer and employee satisfaction.

However, as privacy and data protection regulations continue to evolve, and customers demand more control over their data, many technology companies struggle to update their privacy and data protection compliance programs accordingly. With cyber threats growing more sophisticated, a well-structured corporate privacy roadmap is the first line of defense in preserving data integrity. Data privacy compliance is a journey — companies must always evolve and iterate on their programs. It is important to understand that 100% compliance is not the goal but rather developing an ongoing, overarching culture of compliance.

As technology companies embark on building a strong program foundation, one critical element to keep in mind — regardless of the maturity level of your current privacy & data protection program — is adopting a Data Protection ‘by Design’ and ‘by Default’ approach. Integrating privacy and data protection practices into processing activities at the onset of product or service development, IT development methodologies, and/or into vendor procurement policies helps proactively mitigate risk and close compliance gaps. It builds confidence that the data is managed responsibly and transparently, thereby reducing the risk of privacy breaches and unauthorized data access. Most regulations require organizations to implement robust privacy measures to avoid legal and financial fines, but Data Protection by Design and by Default helps to go beyond that. With this approach, organizations can foster trust with users and consumers by minimizing data collection, incorporating security measures into product or service design, and reducing the likelihood of privacy violations.

Have You Seen Any of These Red Flags?

Before getting started with our checklist, take a moment to think about whether your company has experienced any of the following scenarios, which may be a driver for change.

Common Gaps in Privacy & Data Protection Programs

While identifying privacy and/or data protection red flags may be straightforward, companies need to uncover the program gaps that may be leading to potentially problematic scenarios to resolve issues and strengthen their compliance. Here are four common compliance gaps to look for and address within your organization:

  1. Tracking technologies: Everyone loves a good cookie, but what happens when that cookie stores information about website and mobile app users that does not comply with user preferences or privacy laws? Companies, especially in the tech industry, continue to struggle with tracking technology (pixels, web beacons, and cookies) compliance. We regularly see companies fined for improperly using outdated tracking technologies, writing code that leaks data, and violating regulations. Data leakage can lead to a report of a data breach with regulators.
  2. Data collection and consent: Companies must balance their need to collect personal data with clear and informed consent. For U.S companies this is a challenge since not all laws have caught up with consumer expectations. However, as data usage becomes more intricate and globalized, user consent is one of the most pivotal areas of privacy compliance programs.
  3. Third-party data sharing: Regardless of where you operate, third-party data sharing compliance is necessary, and third-party due diligence is more important than ever. Most privacy regulations require companies to determine whether their vendors adhere to the same level of privacy and data protection standards in which the hiring company does. Vendor assessments and an understanding of inward and outward data flows identify potential risks and allow an organization to stop sharing data with a third- party efficiently when they have visibility into these two elements.
  4. Emerging technologies: Integrating innovative technologies like artificial intelligence (AI), Internet of Things (IoT), blockchain, and biometrics while maintaining privacy standards poses challenges in understanding the potential risks and implementing safeguards. These technologies require the tech industry to continuously reassess and update their privacy policies and practices to promote compliance and protect users’ personal data.

Once you establish a baseline of common, potential gaps, it’s time to think about how to evaluate your privacy and data protection compliance program. Not sure where to start? Our checklist can help you determine steps you can take to initiate or upgrade your program.

Building the Baseline Program

This first checklist serves as part one of a three-part series to help your technology company develop a privacy & data protection roadmap and prepare for enhanced regulator and stakeholder scrutiny — especially for those in the business-to-consumer category.

The items below represent baseline best practices for privacy and data protection compliance programs. This comprehensive list, while not inclusive of every single tactic your company can or should potentially implement, provides a starting point to build the foundation prior to tackling more complex activities.

Going Beyond the Groundwork

Using this first checklist can guide you as you build an optimized privacy and data protection program that helps restore trust with your stakeholders, employees, and customers. That trust is paramount for building organizational resiliency.

In our next checklist, Maturing the Program, we’ll provide guidance on how to evolve the steps from the foundational stage, looking at tactics such as establishing a Data Protection Committee and finetuning employee training programs. We’ll also share more insights around ongoing compliance monitoring because assessing compliance holistically across the organization on a regular basis is critical for developing and maintaining a resilient program.

If, after completing this first assessment, you would like support strengthening your data privacy compliance program, you may benefit from the help of an experienced third-party advisor.

Written[CM1]  by Hank Galligan and Karen Schuler. Copyright © 2023 BDO USA, P.C. All rights reserved. www.bdo.com


 [CM1]This footnote must be printed with any Alliance Firm re-use.

Exit mobile version