Exciting news! Thirdera has been acquired by Cognizant.

Read More
Contact Us
neon blue triangle man sunglasses_2021-04 neon blue triangle man sunglasses_2021-04

Privacy Management

Compress the traditional project timeline with an accelerated Privacy Management implementation that boosts business maturity and generates tangible value in weeks. 

Blueprint Overview

3 WEEKS
arrow

Initiate & Plan

5 WEEKS
arrow

Execute

2 WEEKS
arrow

Deliver

2 WEEKS
arrow

Go-Live & Beyond

Initiate & Plan

3 WEEKS
arrow

Demo Vulnerability Response, collect requirements and deliver stories for acceptance.

8 HRS Product Owner
12 HRS Scrum Master
26 HRS Development Team
6 HRS Customer Stakeholders
6 HRS Acceptance Testers
Weekly hours by role

Execute

5 WEEKS
arrow

Configure Vulnerability Response as per best practice and customer requirements; continually show progress back to the customer and collect new requirements.

4 HRS Product Owner
8 HRS Scrum Master
48 HRS Development Team
3 HRS Customer Stakeholders
2 HRS Acceptance Testers
Weekly hours by role

Deliver

2 WEEKS
arrow

Provide functional and technical knowledge transfer and support customer acceptance testers.

12 HRS Product Owner
14 HRS Scrum Master
50 HRS Development Team
8 HRS Customer Stakeholders
16 HRS Acceptance Testers
Weekly hours by role

Go-Live & Beyond

2 WEEKS
arrow

Promote code to production and provide Hyper-Care.

4 HRS Product Owner
8 HRS Scrum Master
24 HRS Development Team
3 HRS Customer Stakeholders
2 HRS Acceptance Testers
Weekly hours by role

Thirdera Staffing

role icon

Engagement Manager

Responsible for providing leadership and direction to achieve growth and transformation.

role icon

Technical Lead

Analyses business requirements and provides system design while implementing system solutions.

role icon

Supporting Team as appropriate

Skilled resources will be assigned as needed to ensure the implementation meets your project objectives in the 10-week delivery timeframe.

angelo with briefcase pointing-2023-03 angelo with briefcase pointing-2023-03

Project Scope

Thirdera's Privacy Management Blueprint includes a robust list of deliverables to set your Risk program on course for long-term success. Guided by proven best practices, our team of advisory and technical experts configures and implements a solution best fit for your unique needs while establishing a foundation of knowledge to promote ongoing maturation. Key deliverables include:

Key deliverables include:

  • Setup/load initial listing of PII elements into the Information Object library
  • Load initial set of regulatory content
  • Setup/load initial listing of assets/services sat process personal data
  • Configure Privacy Screening Assessment and Privacy Impact Assessment, including methodologies and process
  • Configure Criticality Assessment and Privacy Risk Assessment, including methodologies and process
  • Configure forms, fields, and workflow for privacy records (processing activities)
  • Configure notifications, reports, and dashboards from templates
  • Setup Privacy Management workspace UI to provide concise user experience
  • Provide Functional Overview, Technical Knowledge Transfer, and UAT Support

Outcomes

 

Central Respository

Central repository of assets/services that handle PII, including the PII elements used by each
Icon-Approval

Dedicated Workflows

Dedicated workflow for managing those assets that process PII, including an intake process for reporting new ones
Icon-Approval

Defined Assessments

Defined assessments for screening, impact analysis, criticality, and risk assessment
Icon-Approval

Automated Control Generation

A library of privacy controls, including automated control generation based on assessment responses
Icon-Approval

Dedicated Workspace

Dedicated workspace to centralise privacy manager tasks and efforts
Icon-Approval

Data-Driven Analytics

Interactive dashboards and reporting to increase visibility and simplify privacy program management

Let's get started

 

Connect with our Security & Risk experts for a detailed look at what an assessment would look like at your organisation and how to improve your cyber resilience and Privacy Management processes. 

 

Get in touch