
This “how-to” GDPR video will focus on how to address your data while understanding privacy needs, and how to identify and map the personal data your privacy program will govern.
Austyn:
Steve:
1. What information types and metadata like the legal basis for processing must be captured?
2. In what form should the data be inventoried and/or mapped?
3. Is there already a data scanning tool in the organization that can be leveraged?
4. Can automation be applied to the process, alone or in combination with manually performed assessments?
5. How will the data inventory be maintained, and who will own the data inventory?
Austyn:
Steve:
Cyber security: it’s a business issue, not just an information technology issue.
Cyber security: it’s a business issue, not just an information technology issue.
Explore KPMG Cyber Security careers
Explore KPMG Cyber Security careers