Privacy Program Management Use Case Design

This topic explains the Privacy Program Management use case design.

Architecture Diagram

The following diagram shows the relationships between the applications in the Privacy Program Management use case and how they relate to applications in other use case.

Privacy Program Management architecture

Applications

The following table describes the use case applications.

Application

Description

Data Identification Assessment

The Data Identification Assessment questionnaire helps you inventory your information assets. The questionnaire targets the Applications application and contains questions to assist you in identifying personal or sensitive data.

Data Protection Impact Assessment

The Data Protection Impact Assessment questionnaire allows you to conduct data protection impact assessments (DPIAs) to further assess processing activities that have been initially determined to be high-risk due to the sensitivity of the data or the way the data is handled.

Data Protection Projects

The Data Protection Projects application acts as a central hub for scoping data protection projects based upon a number of processing activities, business processes, or information assets. Once relevant data has been added to the scope, you can generate targeted assessments to assess the privacy impact of the relevant data. Additionally, if you consider the tagged data to be sensitive enough to warrant such an action, the Data Protection Projects application provides you the ability to perform a Data Protection Impact Assessment.

Question Library

The Question Library application stores assessment questions that you can reference and copy into a questionnaire. Each question is stored as an individual record, and each record contains information including the question and answer text as well as information necessary to display and score the question. Depending on the solution that you have licensed, the Question Library contains a large set of pre-built questions by default. In addition, you can add new questions and store them in the Question Library.

For the Privacy Program Management use case, you can use the questions in the library as needed when creating a Privacy Impact Assessment, Data Identification Assessment, or Data Protection Impact Assessment.

Privacy Impact Assessment

As part of a data protection project, the Privacy Impact Assessment questionnaire allows you to assess the risk posed to your organization by how you collect, use, disclose, and secure users' personal information.

Regulatory Communications

The Regulatory Communications application stores all interactions – at a case level - that your organization may have with privacy regulators. The 2 privacy communications types are Privacy Risk Consultation and Data Breach Notification. This repository allows you to associate communications with specific processing activities, information assets, and individuals acting as the primary regulatory contact, as well as provide for follow-up to regulatory requests.

Personas and access roles

The following table describes the use case access roles.

Access Role

Description

DPM: Admin

The user responsible for installing and maintaining the use case. This role provides create, read, update, and delete rights to the use case.

DPM: Data Admin

The user responsible for ensuring data quality and data upkeep in the system. This role provides create, read, update, and delete rights to the use case.

DPM: Privacy Team

Members of your organization's data privacy team. This role provides a combination of create, update, and read rights to the use case.

DPM: Legal Team

Members of your organization's legal team. This role provides a combination of create, update, and read rights to the use case.

DPM: Data Protection Officers

Experts on data privacy who work independently to ensure that an entity is adhering to the policies and procedures set forth in applicable regulations. This role provides a combination of create, update, and read rights to the use case.

DPM: Data Custodians

Individuals within your organization who are responsible for managing the data subject information under their purview and ensuring that it is processed appropriately and responsibly. This role provides a combination of create, update, and read rights to the use case.

DPM: Regulators

Members of the regulatory body who need access to data in the system. This role provides read-only access to the use case.

DPM: Read Only

This role provides read-only access to the use case.

For a complete list of detailed, page-level access rights, see the Data Dictionary. For more information about the Data Dictionary, see Data Dictionary.

For a complete list of application record permission fields, including which user/groups fields populate the fields and where the fields inherit permissions from, see the Data Dictionary.

Dashboards

The following table describes the use case dashboards.

Dashboard

Description

Data Protection Officer (DPO)

Displays summary information about open regulatory communications, privacy impact assessments, and data identification assessments.

Only users assigned to the DPM: Data Protection Officers role can access the Data Protection Officer (DPO) dashboard.

Data Custodian

Displays summary information about open privacy impact assessments.

Only users assigned to the DPM: Data Custodian role can access the Data Custodian dashboard.

Privacy Program Management

Displays summary information about open regulatory communications, privacy impact assessments, and data identification assessments.

Only users assigned to the DPM Privacy Team, DPM: Legal Team, DPM: Admin, DPM: Data Admin, or DPM: Read Only roles can access the Privacy Program Management dashboard.

Data Feeds

For instructions on setting up the feeds, see Setting Up Privacy Program Management Data Feeds.

The following table describes the use case data feeds.

Data Feed

Description

Scope Data Protection Projects by Processing Activity

Allows you to auto-scope a data protection project by identifying the specific processing activities that you want to include. The feed gathers information assets, business processes, facilities, applications, devices, and third parties related to the selected processing activities and relates them to the data protection project.

Scope data protection projects by processing activity

Scope Data Protection Projects by Grouping

Allows you to auto-scope a data protection project by selecting the purpose or overall risk (or a combination of both) of the processing activities that you want include. Based on the attributes you select, the feed identifies all relevant processing activities, then gathers information assets, business processes, facilities, applications, devices, and third parties related to those processing activities and relates them to the data protection project.

Scope data protection projects by processing activity

Data Dictionary

The Privacy Program Management Data Dictionary contains configuration information for the use case.

You can obtain the Data Dictionary for the use case by contacting your Archer Account Representative.