Data Protocol Docs Logo

assessment

Data Sharing: Preventing Privacy Harms

For more on this topic, take the Course: Data Sharing

3 min read

Share this doc:


A company's growth, user engagement, feature development and monetization, and compliance are all linked to its ability to move data from point A to point B. So it's critical that there are clear privacy protections in place for data in motion.

Who can access your data?

Determine if you have the appropriate controls in place for a user or an automated process to safely access stored data. For each prompt, check the box to indicate which - if any - apply to your organization.

When implementing access control as a privacy tool, my organization:

To improve those access controls, my organization:

How do you minimize harm if the data is accessed?

Determine if you have plans in place to modify data and minimize harm if it is accessed. Check each best practice that applies.

To minimize harm if data is accessed, my organization:

Next Steps:

Review your answers for a snapshot of how your organization manages data access and minimizes associated harm.

Is there room to improve? As you prepare to make a plan, involve your colleagues and stakeholders from teams like legal, engineering, and product to ensure alignment.

For more on this topic, take the Course:


Data Protocol Course

Data Sharing

You will learn to prioritize data minimization, anonymization, and channel segmentation to protect data in motion while ensuring it is available when and how it is needed. Finally, you will learn how to quantify the impact of your efforts to manage privacy risk.

Share this doc:


Your privacy matters.

By clicking "Accept All", you are agreeing to Data Protocol's Cookie Policy.