Regardless of the drawbacks to these different approaches to data privacy management, ignoring the avalanche of regulations isn’t an option. The third approach—implementing data privacy workflow management software—is most common today. It tries to address data privacy as a people-and-processes problem, but it fails to address the data part of the problem. In other words, these case or workflow management tools only deal with the “front end” of Data Privacy, leaving the “back end” activities—the hard part—to manual labor. For over 40 years, enterprises have been building and buying software to solve specific problems—so we’ve ended up with hundreds of customer-centric solutions—CRM, customer support, billing, customer feedback, self-service portals, churn prediction, credit scoring, fraud prevention, and on, and on—each with its own customer data. That means to fulfill a DSAR, you have to touch all these back end data sources.
To truly manage the complexity of data privacy and compliance requires a single, up-to-date, and complete view of every customer—regardless of how many siloed applications and databases that data comes from. A compliance management software solution must...…
- Provide access to a 360-degree view of the customer in real time to both the operational support staff and the actual customer
- Implement identity resolution algorithms to correlate customer records across systems and interactions, while the systems might have different customer identifiers.
- Enable the careful orchestration of data purging across underlying systems
- Allow a single point of customer consent no matter how many systems and databases are involved
- Fulfill the basic tenets and rights that data privacy regulations demand
- Enable rapid and even automated delivery of data to meet a DSAR
- Be flexible enough to adapt to the nuances of new data privacy regulations without requiring custom integrations and data warehousing
- Scale to tens of millions of customers, billions of customer data records, hundreds of systems and databases
- Not impact the critical operational systems of the enterprise
- And more than anything must maintain the security of every piece of customer information the enterprise possesses