worksheet
Privacy Technology: Build vs Buy
Share this doc:
It's important to map the necessary type of tooling to the potential privacy issues you need to address. Privacy tooling generally falls into three buckets: Know, Reduce, and Protect. Use this worksheet to help you consider this three-part framework as you plan for privacy tooling.
To determine the privacy technology you may need, look at your own organization, contemplate the problems or challenges you are solving for, and consider how a tool or approach might align with your goals around protecting data privacy. Consider which of the following questions have already been answered, and which you still need to. Do you already have tooling implemented to solve any of these problems?
Know: Inventory and Categorization
Discover and locate your sensitive data to determine if you have a method to fully account for where it comes from
Think about the data you collect... especially the most sensitive data. Can you answer the following questions?
- How is the data collected (by what and/or who)?
- Why is the data being collected?
- How would you classify each type of data you collect? Is it a mix of less sensitive, quasi-sensitive, and highly sensitive data?
- Where is your data stored?
- How is the data being processed or used?
- How much risk is associated with each type of data you collect?
Reduce: Data Minimization
Lessen the surface area via obfuscation and deletion
Think about tools and processes you have for data minimization. What methods, tools, or processes do you have in place to...
- ensure you collect the least amount of data necessary to achieve your business needs?
- obfuscate or delete unnecessary data?
Protect: Access Control
Enforce privacy protection as you align business needs
Think about how you control access to data, specifically:
- Which authentication and/or authorization processes do you have in place for data to be accessed?
- Which authentication and/or authorization processes do you have in place for accessing sensitive data?
Next Steps
If you answered these questions easily and thoroughly, you and your organization may already have many tools and processes in place that protect data privacy. Reflect on anything that was difficult to answer, or that didn't reflect strong security practices. How can you drive change?
If answering the questions was challenging, your organization might benefit from implementing new privacy tooling. Before you decide whether to build or buy a solution, check off the following statements that apply to your organization:
If you checked off most or all of these boxes, you may need to look outside of your organization for adequate tooling. Building solutions in an organization with engineering teams with high turnover or that are very siloed is risky because these tools become difficult to scale and maintain.