PrivacyOps Certification

Course content

Create Account

Log in / Create account to save progress and earn badges

Module 14
PrivacyOps Certification
View course details →

The PrivacyOps platform envisions the adoption of effective data breach management in two maturity levels: Maturity Level 1 and Maturity Level 2.

Breach Management Automation – Maturity Level 1

The Breach Management Fulfillment Maturity Level.1 helps organizations manage personal data breaches in the following steps:

Step 1: Data breach intake assessment and incident reporting

The PrivacyOps platform enables organizations to build data breach assessment forms to determine the likelihood of impacts and risks an incident may cause to the data subject. It allows anyone who notices or is informed of a security incident to report itvia a self-service portal and incident assessment templates by including the details of the circumstances of the incident, its consequences, the date and time of the occurrence, discovery, and reporting of the incident, as well as the actual cause of the incident, among other relevant details. 

Step 2: Data Breach Management workbench

The PrivacyOps platform enables organizations to initiate a data breach management workflow within the data breach workbench when any internal or external security incident is reported. The data breach management workbench gathers incident details using incident assessment templates, assigns responsibilities, and manages regulatory requirements until its closure. 

Step 3: Data Breach Management Workspace

Every incident will go through the incident lifecycle in the data breach management workspace, enabling organizations to identify incident stages and associated tasks. It allows organizations to effectively verify, detect and analyze security incidents and remediate, notify and complete the data breach management lifecycle. 

Step 4: Documentation

Most privacy laws require organizations to document personal data breaches even if it is not required to be notified to the regulatory authority. Such documentation must consist of at least the facts relating to the breach, its effects and the remedial action taken. Dashboards and reports are critical within the data breach management solution, allowing organizations to capture statistics about similar incidents in an incident dashboard and generate a report capturing all incident details. 

Breach Management Automation – Maturity Level 2

The Breach Management Fulfillment Maturity Level.2 helps organizations manage the entire breach management lifecycle and fulfill their breach notification obligations through automation.

Organizations that have adopted Maturity level 2 of Breach Management Fulfillment manage the entire breach management lifecycle including all notification obligations through automation. Maturity level 2 has the following four steps:

Step 1: Scanning of data stores and auto-detection of impacted data subjects

The first step is scanning data stores and automatically identifying impacted individuals or data subjects. This involves:

(1) filter through all the data to identify and track individuals whose data has been compromised and discover insights about affected data subjects, and 

(2) extract contact information from the impacted data or linked data across the organization to optimize the notification process. 

With the use of automated People Data Graph technology, organizations can tightly define the pool of data subjects whose personal data has been breached. With the ability to quickly narrow the scope of who is impacted in case of a personal data breach, it becomes possible to limit which data subjects need to be notified, and deliver those notifications within strict reporting deadlines.

Step 2: Automated incident response

Once auto-detection of impacted data subjects has taken place, the PrivacyOps automation allows organizations to narrow down the incident’s scope further so that the incident response can be determined, depending on the jurisdiction where the incident has taken place. For example, a data breach incident of Protected Health Information of US residents would trigger a HIPPA violation and associated notification and remediation activities. 

Step 3: Automated Notifications

Once the incident response has been determined, the PrivacyOps automation allows organizations to make timely notifications using pre-built templates and prescribed notification formats. Notification requirements vary depending on the type of compromised personal data and the applicable data protection law. For example, the notification methods, entities to notify, notification timeframes, and notification formats may vary for each jurisdiction. However, the PrivacyOps platform uses jurisdictional research data to display correct notification templates and guidelines corresponding to the particular jurisdiction. 

Step 4: Documentation

The PrivacyOps platform helps organizations to maintain centralized audit trails of how the incident was managed and remediated and other incidents related documentation. Since dashboards and reports are critical within the data breach management solution, Maturity Level.2 allows organizations to capture statistics about similar incidents in an incident dashboard and generate a data breach executive report capturing all details associated with a particular incident. This ultimately enables organizations to demonstrate compliance with the applicable legal requirements.

Resources

Get in touch

info@securiti.ai
PO Box 13039,
Coyote CA 95013

Sitemap - XML Sitemap