ANALYSISMEMBER

From shadow IT to demonstrable DPIAs: Building visibility for modern privacy programs

A look at creating system-aware, defensible and survivable data protection impact assessments.

Published
Subscribe to IAPP Newsletters

Contributors:

Michael Moore

AIGP, CIPP/C, CIPP/E, CIPP/US, CIPM, CIPT, FIP

VP, Head of Legal and Privacy

Glean Technologies Inc.

Michael Bishop

CIPP/A, CIPP/E, CIPP/US, CIPM, CIPT, FIP

Legal Director

Resmed

Privacy practitioners have run data protection impact assessments across enough organizations to see the same pattern: the ideal state looks great, but the inputs arrive so slowly that the assessment goes stale before it's finished.  

Some environments can't even reveal a reliable system inventory, let alone knowledge of what personal data each one holds. 

On paper, a DPIA is a structured exercise: map processing operations, understand necessity and proportionality, identify risks to individuals' rights, implement controls. In practice, it feels like a half-finished jigsaw puzzle with no picture on the box. Without the whole picture, any DPIA becomes a patchwork rather than a map.

The practitioner's challenge is not whether to conduct DPIAs, but how to do them in a way that is system-aware, defensible to regulators, survivable for a small privacy team and doesn't create privacy fatigue across the organization. In addition to traditional "spreadsheet and checklist" approaches, newer tooling such as a software-as-a-service-aware data inventory and classification tools can do much of the legwork and greatly shorten the process and reduce burden on business partners who own the data systems. 

Tooling just speeds up visibility. The actual enforcement including a single sign-on policy, procurement controls and owner accountability is what keeps the map accurate.

Where does the organization's data sit, and is it visible?

Most DPIA headaches start with a deceptively simple step: identify where personal data lives. Environments typically fall into four buckets.

Official, IT-blessed SaaS. These are tools including customer relationship management, human resources information systems, marketing tools, collaboration suites, generally systems wired into single sign-on or centrally procured. Because these are formally approved tools, contracts and data protection assessments will be documented. 

Contributors:

Michael Moore

AIGP, CIPP/C, CIPP/E, CIPP/US, CIPM, CIPT, FIP

VP, Head of Legal and Privacy

Glean Technologies Inc.

Michael Bishop

CIPP/A, CIPP/E, CIPP/US, CIPM, CIPT, FIP

Legal Director

Resmed

MEMBER

Unlock this exclusive content and more

Join the IAPPAlready a member? Sign in

Membership opens up a world of resources

In-depth knowledge

From original research reports and daily news coverage to legislative trackers and infographics, we have the information you need to stay ahead of change.

A global network

Make valuable professional connections through more than 160 local IAPP KnowledgeNet chapters in 70 countries.

Access to the experts

Connect with top thinkers in privacy, AI governance and cybersecurity for fresh ideas and insights.

Learn what you get from membership