Inventory
- Data Dictionary & Classification
- Digital Assets
- System Architecture
- Processes & Procedures
- Access Controls
- Collateral & Disclosures
- Consent
Evaluate
- Cyber Policy
- Privacy Policy
- Binding Corporate Rules
- 3rd Party Agreements
Diagnose
- Data Protection Impact Assessment
- Cyber Diagnostic
- Maturity Risk Scoring
- Gap Analysis
|
Train
- C-Suite Cyber Awareness
- GDPR Rule Interpretation
Establish
- Data Governance Framework
- Security Standards
- Conformed Privacy Policy
- Data Protection Office
- Record Keeping Guidelines
Design
- Risk Mitigation Strategy
- Remediation Roadmap
- Target Operating Model
- Enterprise Data Strategy
- Single View of the Client
- Enhanced Policies & Rules
- VOC/VOB initiatives
- Codes of Conduct program
Scope & Prioritize
- Process Re-engineering
- New Technology Initiatives
- Training Programs
|
Train
- Privacy-by-Design
- Risk Mitigation
- Codes of Conduct
- Data Stewardship & Enablement
- Cyber 101
Document
- Playbooks
- Data Processing & Data Journeys
- Security Controls
- Process Mapping
Rationalize & Normalize
- User Access
- Preferences & Subscriptions
- Data Integrations
Develop, Test & Roll out
- Technology Solutions
- Data Subject Rights Processes
- Analytics & Reporting
Conform
- Legal Agreements
- Customer Collateral & Disclosures
- Digital Assets
Manage
- Consent Acquisitions
- Incidents
- Data Subject Requests
- Compliance Reviews
|
Support
- Post-deployment Support
- Knowledge Transfer
Review
- Program Effectiveness
- Project/Initiative Audit
Monitor
- Codes of Conduct Certifications
- Data Subject Request Fulfillment
- Record Keeping Maintenance
- Incidents & Response
|