From shadow IT to demonstrable DPIAs: Building visibility for modern privacy programs

A look at creating system-aware, defensible and survivable data protection impact assessments.

Contributors:
Michael Moore
AIGP, CIPP/C, CIPP/E, CIPP/US, CIPM, CIPT, FIP
VP, Head of Legal and Privacy
Glean Technologies Inc.
Michael Bishop
CIPP/A, CIPP/E, CIPP/US, CIPM, CIPT, FIP
Legal Director
Resmed
Privacy practitioners have run data protection impact assessments across enough organizations to see the same pattern: the ideal state looks great, but the inputs arrive so slowly that the assessment goes stale before it's finished.
Some environments can't even reveal a reliable system inventory, let alone knowledge of what personal data each one holds.
On paper, a DPIA is a structured exercise: map processing operations, understand necessity and proportionality, identify risks to individuals' rights, implement controls. In practice, it feels like a half-finished jigsaw puzzle with no picture on the box. Without the whole picture, any DPIA becomes a patchwork rather than a map.
The practitioner's challenge is not whether to conduct DPIAs, but how to do them in a way that is system-aware, defensible to regulators, survivable for a small privacy team and doesn't create privacy fatigue across the organization. In addition to traditional "spreadsheet and checklist" approaches, newer tooling such as a software-as-a-service-aware data inventory and classification tools can do much of the legwork and greatly shorten the process and reduce burden on business partners who own the data systems.
Tooling just speeds up visibility. The actual enforcement including a single sign-on policy, procurement controls and owner accountability is what keeps the map accurate.
Where does the organization's data sit, and is it visible?
Most DPIA headaches start with a deceptively simple step: identify where personal data lives. Environments typically fall into four buckets.
Official, IT-blessed SaaS. These are tools including customer relationship management, human resources information systems, marketing tools, collaboration suites, generally systems wired into single sign-on or centrally procured. Because these are formally approved tools, contracts and data protection assessments will be documented.
Contributors:
Michael Moore
AIGP, CIPP/C, CIPP/E, CIPP/US, CIPM, CIPT, FIP
VP, Head of Legal and Privacy
Glean Technologies Inc.
Michael Bishop
CIPP/A, CIPP/E, CIPP/US, CIPM, CIPT, FIP
Legal Director
Resmed