Regulations like the California Consumer Privacy Act (CCPA) and the General Data Protection Regulation (GDPR) have triggered a convergence of third party risk management and data privacy.
The complexity of navigating the nuances of each regulation and the operational challenges for third party relationships has generated considerable dialog within the Shared Assessments Program Privacy working group. As participants networked this past year to share ideas, best practices and pain points, the committee initiated a set of Privacy White Papers to help industry peers navigate and provide checklists to map their progress.
Monitoring the ongoing changes to interpretation of CCPA has felt like a moving target for organizations working to develop readiness plans or incorporate CCPA into their existing third party risk management program. For GDPR, the focus has shifted from readiness and preparedness to maintaining compliance and addressing themes from enforcement actions. While similar in some aspects of data privacy obligations, there are differences between the two regulations as it relates to third party risk management.
Terminology matters. Maps typically have legends to help users with directions, and distance markers to gauge the length of the journey ahead. Defining readiness and compliance plans has felt overwhelming due to conflicting terminology and different enforcement dates. Terminology in third party relationships can differ by the type of data privacy regulation or jurisdiction. CCPA shifted the terminology by defining business model relationships by what they are “not” vs. what they “are.” A starting point for third party risk management is to understand the business model and type of engagements with third party relationships.
Vendors that provide tangible goods are easier to exclude from some of the CCPA consumer privacy scope but are still important in your supply chain due diligence process. The category of who the set of service providers that may need to assist a business’s effort for CCPA readiness and compliance is based not only on the data collected or discloses, but the type of service being formed.
Within the California Consumer Privacy Act (CCPA) Implications for Third Party Risk Management white paper, we outline each of the key components of CCPA, with comparisons to GDPR, to assist organizations with gaining a clear understanding of the obligations of each party.
Data privacy regulations start with a basic understanding of the type of personal information that has been collected, used, processed or disclosed. Within CCPA and GDPR that are different obligations between parties including the types of disclosures that may be required under each jurisdiction.
Both sets of privacy regulations have defined different requirements for responding to an individual’s data access requests. Managing the data governance and data inventories for what data is in the control of the business or the outsourcer, and what is in the control of the service provider or data processor is a critical component in assessing the risk of the third party relationship.
Integration into Third Party Risk Management Programs
Charting a map forward for any new compliance program requires guideposts, landmarks and milestones along the way. As organizations conduct readiness and compliance plans for addressing each regulation’s unique requirements, they will identify deliverables that may need to be incorporated into their third party risk management program’s policies, standards, and procedures. Within the White Paper and Guidelines, the team has identified key fundamental areas of focus that may include:
- Processes to manage and respond to access requests
- Processes to address due diligence and contractual oversight
- Data breach risk mitigation
- Reviews of vendor classification structures
- Updates to TRPM program structures and components
GDPR provides a very prescriptive approach to what is required in the data processor contract and in the Article 28 obligations. The GDPR White Paper will summarize these requirements as it relates to data privacy oversight in third party relationships with background information and checklists to incorporate into existing programs to maintain compliance.
CCPA created a new fork in the road for third party risk management – by outlining the concept of a certification process to take steps to affirm that a particular entity is classified as a service provider. That process is not just a “once and done” process, but an ongoing process to confirm ongoing understanding of the obligations the service provider must adhere to, and the restrictions and limitations for the use of the data of California residents. As part of the release of the White Paper, the Shared Assessments Working Group outlined a sequence of steps to define and structure a vendor certification process using the tools in your own TPRM program and within the Shared Assessments Program Toolkit and thought leadership papers.
While a compass is an old school tool to keep you charted on your course, leveraging lessons learned and best practices from third party risk practitioners are your virtual peer “GPS” resources in today’s dynamic landscape.
The Shared Assessments Program Privacy working group has released two sets of resources to help organizations understand the Third Party Risk Management Program implications of each of these important privacy regulations.
The Data Privacy Guidelines and Tools are designed to assist organizations in their planning for identifying, tracking and monitoring data collection, retention and use in Third Party Relationships. These insights have been summarized into the following resources:
CCPA Data Privacy Tools
- CCPA White Paper
- Summary chart of the TPRM impacts to program components
- CCPA: Third Party Data Governance Checklist
- CCPA: Readiness and Implementation Checklist for TPRM Programs
- CCPA: Digital Marketing and Online Privacy Service Provider Checklist
GDPR Data Privacy Tools
- GDPR White Paper
- Summary chart of the TPRM impacts to program components
- GDPR: Third Party Data Governance Checklist
- GDPR: Readiness and Implementation Checklist for TPRM Programs
- GDPR: Digital Marketing and Online Privacy Service Provider Checklist
- GDPR: Contractual Obligations Checklist
- GDPR: Due Diligence Artifacts Checklist
Understanding the Shared Assessments Third Party Data Privacy Tools
The Privacy Guidelines are being made available as thought leadership resources to both members and non-members. They supplement and work in conjunction with the Shared Assessments Third Data Party Privacy Tools, a component in the Third Party Risk Management Toolkit.
The Third Party Privacy Tools within the TPRM Toolkit provide an Implementation Guide which is a primer for understanding how to address privacy risk in third party relationships. The Privacy tools include templates to scope and evaluation a third party privacy assessment with privacy controls based on specific privacy jurisdictions. The Data Privacy Tools include the Target Data Tracker (TDT) a tool that can be used to document key information about data classification, data governance, locations, and fourth party relationships throughout the vendor management lifecycle.
You’re Only As Strong As Your Weakest Link
There’s never a more vital time to start thinking seriously about the security posture of your organisation and extended enterprise. DVV Solutions are here to help with a range of services and solutions proven to improve your ability to assess, analyse and manage more Third-Party cyber and data privacy risk domains. For more advice and information on any Third-Party risk challenge you have:
Call Us: +44 (0) 161 476 8700
Contact Us: Complete our Contact Form, or
Learn more about What We Do
About The Shared Assessments Program
As the trusted source in third party risk, the member-driven Shared Assessments Program has been setting the standard in third party risk assessments since 2005. Shared Assessments Program members work together to build and disseminate best practices, building resources that give all third party risk management stakeholders a faster, more rigorous, more efficient means of conducting security, privacy and business resiliency control assessments. Learn more at www.sharedassessments.org.
This article was originally published by Shared Assessments and is shared with their kind permission.