Data Protocol Docs Logo

worksheet

Privacy Technology: Build vs Buy

For more on this topic, take the Course: Privacy Tech

2 min read

Share this doc:


It's important to map the necessary type of tooling to the potential privacy issues you need to address. Privacy tooling generally falls into three buckets: Know, Reduce, and Protect. Use this worksheet to help you consider this three-part framework as you plan for privacy tooling.

To determine the privacy technology you may need, look at your own organization, contemplate the problems or challenges you are solving for, and consider how a tool or approach might align with your goals around protecting data privacy. Consider which of the following questions have already been answered, and which you still need to. Do you already have tooling implemented to solve any of these problems?

Know: Inventory and Categorization

Discover and locate your sensitive data to determine if you have a method to fully account for where it comes from

Think about the data you collect... especially the most sensitive data. Can you answer the following questions?

Reduce: Data Minimization

Lessen the surface area via obfuscation and deletion

Think about tools and processes you have for data minimization. What methods, tools, or processes do you have in place to...

Protect: Access Control

Enforce privacy protection as you align business needs

Think about how you control access to data, specifically:

Next Steps

If you answered these questions easily and thoroughly, you and your organization may already have many tools and processes in place that protect data privacy. Reflect on anything that was difficult to answer, or that didn't reflect strong security practices. How can you drive change?

If answering the questions was challenging, your organization might benefit from implementing new privacy tooling. Before you decide whether to build or buy a solution, check off the following statements that apply to your organization:

If you checked off most or all of these boxes, you may need to look outside of your organization for adequate tooling. Building solutions in an organization with engineering teams with high turnover or that are very siloed is risky because these tools become difficult to scale and maintain.

Remember:

To make this decision, create a cross-functional team including engineering and technical program managers. Many teams will lean towards build, as it appears to be the path of least resistance. There can be limitations to homegrown solutions, so be sure to do a thorough and realistic analysis before starting down a solution path. When determining whether to build or buy, the right answer is specific to the needs of your organization's unique privacy risks.

For more on this topic, take the Course:


Data Protocol Course

Privacy Tech

You will learn about some of the key players in the privacy tooling space, the criteria you should use when shopping for solutions, and the pros and cons of building versus buying.

Share this doc:


Your privacy matters.

By clicking "Accept All", you are agreeing to Data Protocol's Cookie Policy.