© 2017 Meru Data LLC, All rights reserved

Privacy Teams

Organizations are recognizing that data privacy is not only about compliance It is also about reputation. Its also about earning the trust of customers to protect and use their personal data in a responsible manner. Our solution creates an actionable data inventory and map of data flows across your business process, helping you track sensitive data and documents. Its easy to create a single source for personal data – who has created it, who has access to it and where is it stored. 

With automated data mapping and continuous rules-based monitoring, Meru Data helps you show auditable compliance with regulatory requirements for handling personal data. You can minimize compliance risk and meet privacy regulations like GDPR and CCPA. The tool will also help you monitor and manage compliance on an ongoing basis. A well-crafted data inventory can serve multiple purposes. It provides the initial foundational understanding on which the compliance effort is managed, but can also be used to demonstrate and track compliance on an ongoing basis. It can be integrated with an organization’s privacy by design / privacy impact assessment processes so that new data initiatives, or material changes to existing practices, are also evaluated and tracked.

Most organizations rely on a vast network of third-party relationships – ranging from service providers, marketing partnerships and co-branded relationships, data brokers, and others. Regulations like GDPR, CCPA require organizations to identify third parties with whom personal information is shared, disclosed, or sold and, in some cases, to pass along consumer requests regarding their data to such third parties or otherwise coordinate with third parties about notices, opt-outs, and consumer data rights. Meru can help automate the vendor risk lifecycle for compliance with the GDPR, CCPA and other global privacy and security frameworks.

IT

Enhanced collaboration across different functions (Legal, Compliance, Security and IT) reduces time to implement and manage privacy and governance programs within the organization. Meru helps manage these handoffs through inbuilt work flows making it easy to collaborate and track progress.

It’s important to understand the risks inherent in personal data use within the organization, and the controls that are being applied to mitigate them. Our solutions give you better control over your compliance efforts with rich and intuitive dashboards that will allow you to track your governance program with predefined metrics.

Security

NIST Cybersecurity Framework suggests maintaining a good inventory of various sources of information in the organization. This involves identifying and cataloguing all the systems that an organization relies upon. Meru Data helps you build data maps automatically and to keep them current by seamlessly connecting to your cloud-based data sources. Create an up to date inventory of data collected, along with visual data flow maps of business processes. Our solution creates an actionable data inventory and map of data flows across your business process.  As part of the data mapping identifying systems that are most important or most sensitive, and identifying who within the organization manages access.
A comprehensive review of a company’s digital assets is also the first step in identifying which information is most important to protect and focus the organizations limited budget to safeguard their “Crown Jewels.” Information governance policies can help provide a clear picture of what information is on a network and what requires the most protection. Centralized management of policies to improve privacy and security will help focus organization efforts to maximize ROI. Restricting access of specific data to appropriate individuals enables targeted data encryption. For instance, data being held for document retention or litigation purposes will be protected differently from data for operational purposes. It can identify obsolete data that may be a cyber security liability.

Compliance and Legal

As we consider subject access requests for deletion its important to understand the retention schedules and legal hold requirements. The retention schedules provide details of the kinds of records your organization creates and manages, along with the legal requirements for retaining the data. Data mapping is also critical step in eDiscovery.An organization cannot preserve, collect, process, review, or produce information unless it is aware that it has that data. Knowing what data exists, where it is, and what custodians manage it is therefore a key step in litigation readiness.