11 Scaling, hiring, and considering regulations

 

This chapter covers

  • Creating a maturity model for privacy and data protection
  • Dimensions of privacy and data protection evolution
  • Privacy engineering skills to build your program
  • The regulatory climate that affects innovation and privacy regulation

At this point in the book, you have learned how to build privacy into data, tooling, and business review processes. Chapters 3 and 4 dove deep into data management once data enters the company, by classifying and cataloging it using automation and metadata. Chapter 5 offered scalable privacy techniques for data sharing, given how much online computing and commerce deals with data transfers.

You will have also understood how to scale those architectures and processes as your company grows. You will have also understood how to operationalize your privacy tooling and processes, since companies cannot keep throwing hardware, software and staff at these issues. Chapter 6 aimed to repurpose the traditional privacy review process by front-loading it into an advisory and consultative capacity. Using automation, companies can build in privacy for their features rather than bolting it on after the fact.

Given the energy around customer-facing compliance, chapters 7 through 9 took a deep dive around deletion, data export, and consent.

11.1 A maturity model for privacy engineering

11.1.1 Identification

11.1.2 Protection

11.1.3 Detection

11.1.4 Remediation

11.2 The privacy engineering domain and skills

11.3 Privacy and the regulatory climate

Summary