At this point in the book, you have learned how to build privacy into data, tooling, and business review processes. Chapters 3 and 4 dove deep into data management once data enters the company, by classifying and cataloging it using automation and metadata. Chapter 5 offered scalable privacy techniques for data sharing, given how much online computing and commerce deals with data transfers.
You will have also understood how to scale those architectures and processes as your company grows. You will have also understood how to operationalize your privacy tooling and processes, since companies cannot keep throwing hardware, software and staff at these issues. Chapter 6 aimed to repurpose the traditional privacy review process by front-loading it into an advisory and consultative capacity. Using automation, companies can build in privacy for their features rather than bolting it on after the fact.