2020   vrm expert reference guide
OneTrust Certification Program Reference Guide
Vendor Risk Management
Page 2
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
The training environment provided to you is only for use during the OneTrust Certification
Training Program. You will only have access to log in for the duration of training.
Training URL: training.onetrust.com
Please refer to your instructor for the password to your environment.
We recommend accessing the training environment in incognito/private browser mode.
OneTrust Certification Program Reference Guide
Support and Resources
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
OneTrust CertificationProgram ReferenceGuide
Prepared For:
OneTrust Certification Program Vendor Risk Management Expert Attendees
Disclaimer
No part of this document may be reproduced in any form without the written permission of the copyright
owner.
The contents of this document are subject to revision without notice due to continued progress in
methodology, design, and manufacturing. OneTrust LLC shall have no liability for any error or damage of
any kind resulting from the use of this document.
OneTrust products, content and materials are for informational purposes only and not for the purpose of
providing legal advice. You should contact your attorney to obtain advice with respect to any particular
issue. OneTrust materials do not guarantee compliance with applicable laws and regulations.
OneTrust Certification Program Reference Guide
Vendor Risk Management
Page 4
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
Introduction
Welcome to the OneTrust Certification Program Reference Guide, your comprehensive guide to
becoming a certified OneTrust privacy management professional.
OneTrust is the leading global software to operationalize data privacy compliance and Privacy by Design.
OneTrust automates privacy impact assessments and data mapping, identifies privacy risks, and enforces
risk management and control activities in an integrated and agile approach.
Our web-based software provides a central repository for privacy professionals to collaborate with
business groups, service providers and trusted advisors managing privacy risks across customer data,
employee data, and vendor data transfers.
The result is the ability to demonstrate accountability and compliance with EU’s data protection
requirements (GDPR, BCR, Privacy Shield), and globally across privacy jurisdictions and frameworks.
OneTrust Certification Program Reference Guide
Support and Resources
Page 5
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
OneTrust Certification Program Reference Guide
Vendor Risk Management
Page 6
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
Table of Contents
Support and Resources................................................................................................................. 7
1 Support Resources...................................................................................................................................7
Vendor Risk Management.......................................................................................................... 10
1 Terminology .......................................................................................................................................... 12
2 Security Standards/Frameworks ......................................................................................................... 14
3 Regulation Overview............................................................................................................................. 16
4 Execution in OneTrust ......................................................................................................................... 18
Glossary ....................................................................................................................................... 30
OneTrust Certification Program Reference Guide
Support and Resources
Page 7
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
Support and Resources
Support and Resources 7
1 Support Resources 8
1.1 Support Infrastructure 8
1.2 Support Documentation 9
1.3 Product Release Notes and Maintenance Notices 9
OneTrust Certification Program Reference Guide
Vendor Risk Management
Page 8
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
1 Support Resources
1.1 Support Infrastructure
Request Support on Tenant
Submit a support desk ticket directly to the OneTrust Support Team through your tenant.
1. To get help from OneTrust support personnel, click on the question mark icon in the top navigation
and click Get Help.
2. Click Contact Us at the bottom of the window. Enter a message, Click the Element (if applicable)
and click Send. A member of our Support team will get back to you shortly.
Contact the OneTrust Support Team
• Email: support@onetrust.com
• Phone: +1 (844) 900-0472
OneTrust Certification Program Reference Guide
Support and Resources
Page 9
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
1.2 Support Documentation
✓ Email support@onetrust.com from your work email if you have any issues with access to the support
portal (https://my.onetrust.com/s/) and documentation.
✓ Email your OneTrust Account Executive or sales@onetrust.com from your work email for access to
the support portal (https://my.onetrust.com/s/) and documentation.
1.3 Product Release Notes and Maintenance Notices
Product release notes and maintenance notices are available in the support portal:
https://my.onetrust.com/s/ under Product Updates at the top of the page.
Subscribe to Product Release Notes with the following steps:
1. Select All Groups at the bottom of the page
2. Click on the Product Updates group
3. Select Join Group on the right side, then Manage Notifications to set the frequency of how
often you receive updates via email
Subscribe to Maintenance Notices with the following steps:
1. Select System Status and Scheduled Maintenance at the bottom of the page
2. Click on Subscribe, and enter contact information
3. Click Subscribe to Alerts
OneTrust Certification Program Reference Guide
Vendor Risk Management
Page 10
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
Vendor Risk Management
Vendor Risk Management helps start and maintain a relationship with third-party service
providers through automated risk assessment, audit reporting, and by providing a centralized
location for all related documents, contracts, and historical data.
OneTrust Certification Program Reference Guide
Support and Resources
Page 11
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
Vendor Risk Management ...............................................................................................................7
1 Terminology..........................................................................................................................................12
2 Security Standards/Frameworks and Regulation Overview ............. Error! Bookmark not defined.
3 Execution in OneTrust........................................................................................................................18
OneTrust Certification Program Reference Guide
Vendor Risk Management
Page 12
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
1 Terminology
Security Standards/Frameworks
A series of documented processes that are used to define policies and procedures around the
implementation and ongoing management of information security controls in an enterprise environment.
Controls
Are safeguards or countermeasures to avoid, detect, counteract, or minimize security risks to
physical property, information, computer systems, or other assets.
Inventory
A list or collection vendors, assets and processing activities
Attribute
A characteristic and information ascribed to and about a Vendor
Vendor Record
A data record containing information about a vendor in the form of attributes.
Conditional Logic
Logic that can be added to an assessment that allows for a more seamless workflow, letting the
respondent skip/show questions that are not applicable based on responses from questions within
the questionnaire.
Rules Logic
Logic can be added to an assessment used to flag risks, automatically launch assessments based on
responses selected from specific questions.
Vendor
A person or company that sells and/or provides goods and services.
OneTrust Certification Program Reference Guide
Support and Resources
Page 13
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
Engagement
A single implementation, purchase of software, service(s) or solutions. An engagement does not have to be
tied to a contractual agreement.
Automation Rules
Are used to complete multiple actions based on one or more triggers to streamline the re-
assessment process and notify all stakeholders of the assessment taking place.
OneTrust Certification Program Reference Guide
Vendor Risk Management
Page 14
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
2 Security Standards/Frameworks
GAPP – Generally Accepted Privacy Principles
A framework intended to assist Chartered Accountants and Certified Public Accountants in
creating an effective privacy program for managing and preventing privacy risks.
The framework was developed through joint consultation between the Canadian Institute of
Chartered Accountants (CICA) and the American Institute of Certified Public
Accountants (AICPA).
AICPA TSC 2017 – The American Institute of Certified Public
Accountants (AICPA) – Trust Services Criteria (TSC) 2017
The framework presents control criteria for use in attestation or consulting engagements to
evaluate and report on controls over the security, availability, processing integrity, confidentiality, or
privacy over information and systems.
Issued by the AICPA Assurance Services Executive Committee (ASEC).
FedRAMP – The Federal Risk and Authorization Management
Program
A government-wide program that provides a standardized approach to security assessment,
authorization, and continuous monitoring for cloud products and services.
The governing bodies of FedRamp include: JAB, OMB, CIO Council, FedRAMP PIO, DHS, and NIST.
ISO 27001 – International Organization for Standardization (ISO)
27001
ISO 27001 formally known as ISO/IEC 27001:2005) is a specification for an information security
management system (ISMS).
Issued and maintained by International Organization for Standardization.
ISO 29001 – International Organization for Standardization 29001
OneTrust Certification Program Reference Guide
Support and Resources
Page 15
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
ISO 29001 defines the quality management system for product and service supply organizations for
the petroleum, petrochemical and natural gas industries.
NIST 800-171 – The National Institute of Standards and Technology
The NIST Special Publication 800-171 governs Controlled Unclassified Information (CUI) in Non-
Federal Information Systems and Organizations.
NIST SP 800-53 rev4 – The National Institute of Standards and
Technology
A framework catalog of security controls for federal information systems and organizations and
assessment procedures.
German Standard Data Protection Model
A framework designed to assist data protection authorities (DPA) in becoming transparent with
systematically verifying compliance to personal data protection law.
OneTrust Certification Program Reference Guide
Vendor Risk Management
Page 16
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
3 Regulation Overview
GDPR Importance
GDPR Articles 28, 29 and 32 require organizations to ensure their
third party vendors sufficiently safeguard their data.
Combined with third party data breaches increases the need to reduce vendor
risk and prioritize privacy compliance.
CCPA Importance
Under current California law, businesses are required to “implement
and maintain reasonable security procedures” and “to protect the personal
information from unauthorized access, destruction, use, modification
or disclosure.
The CCPA increases fines and penalties for violations of existing law so that
businesses are held responsible for safeguarding personal information
if the business chooses to collect it.
OneTrust Certification Program Reference Guide
Support and Resources
Page 17
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
Proprietary/Internal
Proprietary/Internal
Best Practices
Copyright © 2019 OneTrust LLC. 60
Manage Controls Library Review and add additional
security frameworks and
controls necessary for vendors
compliance.
Determine what the framework
is appropriate for
implementation.
Select the control that applies
to risk.
OneTrust Certification Program Reference Guide
Vendor Risk Management
Page 18
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
4 Execution in OneTrust
OneTrust Certification Program Reference Guide
Support and Resources
Page 19
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
4.1 Add Vendor Attribute
✓ Navigate to Vendor Management → Attribute Manger → Vendor Attributes
✓ Add text attribute “Vendor Website”
✓ Save the attribute
OneTrust Certification Program Reference Guide
Vendor Risk Management
Page 20
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
OneTrust Certification Program Reference Guide
Support and Resources
Page 21
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
OneTrust Certification Program Reference Guide
Vendor Risk Management
Page 22
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
4.2 Add Vendor and Services from Vendorpedia Exchange
✓ Navigate to Vendor Management → Vendorpedia: Exchange
✓ Add OneTrust to Vendors
✓ Select all products and services under OneTrust
✓ Add additional services under Salesforce vendor from Exchange
✓ Select Datorama and Einstein Analytics for Products/Services under Certificates tab of vendor
profile in Exchange
OneTrust Certification Program Reference Guide
Support and Resources
Page 23
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
OneTrust Certification Program Reference Guide
Vendor Risk Management
Page 24
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
OneTrust Certification Program Reference Guide
Support and Resources
Page 25
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
OneTrust Certification Program Reference Guide
Vendor Risk Management
Page 26
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
OneTrust Certification Program Reference Guide
Support and Resources
Page 27
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
OneTrust Certification Program Reference Guide
Vendor Risk Management
Page 28
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
4.3 Create Questionnaire
✓ Navigate to Vendor Management → Setup: Templates
✓ Create your own template named “Preliminary Vendor Assessment”
✓ Add a section named “General Vendor Information”
✓ Add an Inventory Question – “Vendor Name”
✓ Add an Attribute Question – “Vendor Website”
OneTrust Certification Program Reference Guide
Support and Resources
Page 29
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
OneTrust Certification Program Reference Guide
Vendor Risk Management
Page 30
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
OneTrust Certification Program Reference Guide
Support and Resources
Page 31
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
OneTrust Certification Program Reference Guide
Vendor Risk Management
Page 32
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
OneTrust Certification Program Reference Guide
Support and Resources
Page 33
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
4.4 Add Controls
✓ Navigate to Vendor Management → Vendors
✓ Click on the vendor RingCentral and go to the Assessments tab
✓ Open the “RingCentral Review” assessment
✓ Click on the Risk Flag in the top right corner → Find the ‘Controls’ tab → Click on ‘Add Control’
OneTrust Certification Program Reference Guide
Vendor Risk Management
Page 34
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
OneTrust Certification Program Reference Guide
Support and Resources
Page 35
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
4.5 Add Engagement
✓ Navigate to Vendor Management → Vendors
✓ Click on the vendor Salesforce and go to the Engagements tab
✓ Add Engagement
✓ Engagement Name – “Business Intelligence Implementation – Sales and Marketing”
✓ Start Date – Today’s Date
✓ End Date – One Year from Today’s Date
✓ Services – Einstein Analytics
✓ Engagement Internal Owner – Assign to Me
OneTrust Certification Program Reference Guide
Vendor Risk Management
Page 36
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
OneTrust Certification Program Reference Guide
Support and Resources
Page 37
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
4.6 Add Automation Rule
✓ Navigate to Vendor Management → Setup: Automation Rules
✓ Add a rule group called “Follow-up Vendor Assessments” and select Vendor rule type
✓ Add a Rule named “Yearly Vendor Re-assessment”
✓ Set the conditions → Last Completion Date – By Template → “Vendor Privacy Review”
✓ Action → Send Vendor Assessment → “Vendor Privacy Review”
✓ Set deadline, approver, and respondent
OneTrust Certification Program Reference Guide
Vendor Risk Management
Page 38
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
OneTrust Certification Program Reference Guide
Support and Resources
Page 39
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
4.7 Add Vendor Contract
✓ Navigate to Vendor Management → Vendors
✓ Click on the vendor Workday and go to the Documents tab
✓ Add Contract
✓ Contract Name – “Workday MSA”
✓ Contract Type – Master Service Agreement
✓ Date Created – Today’s Date
✓ Status – In Progress
OneTrust Certification Program Reference Guide
Vendor Risk Management
Page 40
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
OneTrust Certification Program Reference Guide
Support and Resources
Page 41
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
4.8 Create Custom Dashboard
✓ Navigate to Dashboards module
✓ Click Create New
✓ Dashboard Name – “Vendor Information”
✓ Visible Module – Vendor Management
✓ Select Template 2
✓ Add Widget displaying Vendors by Type
✓ Group By: Inventory → Vendors → Type
✓ Add Widget displaying Vendor Assessments by Stages
✓ Group By: Assessment → All Templates → Stages
OneTrust Certification Program Reference Guide
Vendor Risk Management
Page 42
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
OneTrust Certification Program Reference Guide
Support and Resources
Page 43
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
OneTrust Certification Program Reference Guide
Vendor Risk Management
Page 44
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
OneTrust Certification Program Reference Guide
Support and Resources
Page 45
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
OneTrust Certification Program Reference Guide
Vendor Risk Management
Page 46
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
Glossary
A
Adequacy Decision – A declaration made by the European Commission that a country outside of the EEU
offers an adequate level of protection, and therefore is acceptable for cross-border data transfers.
Affirmative Act – A clear action taken that indicates consent has been given, is not passive.
Asset – Anything that can store or process personal data. This can include an application, website, database,
or even a filing cabinet.
Asset Map – A visual map that shows the location of all assets.
Automated Decision Making – Making a decision or creating a profile based completely on technological
means without human involvement
B
Binding Corporate Rules (BCRs) – A set of strict and binding rules put in place by multinational companies
and organizations that describe how personal data must be processed and protected. This allows the
transfer of personal data outside the EEA, without having an Adequacy Decision. Data may be transferred
between countries but must remain within the organization.
Biometric Data – A “special category” of data relating to physical, physiological, or behavioral characteristics
of a person that can identify or confirm identity of a person.
C
California Consumer Protection Act (CCPA) – Signed into law in 2018, to be affective in 2020, this act
introduces new privacy rights for individuals living within the state of California. First sweeping privacy law in
the United States.
Cookies – A small text file that a website may drop on a user’s device for the sake of tracking certain
categories of information.
Cookies (1st
Party) – Cookies dropped by the website the user is visiting.
Cookies (3rd
Party) – Cookies dropped by a website or company different than the one the user is visiting.
Most commonly, targeting or social media cookies.
Cookies (Persistent) – Cookies that continue to live on a user’s device after they have left the website from
which the cookie was dropped.
OneTrust Certification Program Reference Guide
Support and Resources
Page 47
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
Cookies (Session) – Cookies that are no longer active after a user leaves a website or ends a session with
the website.
Consent – Any freely given, specific, informed and unambiguous indication that the data subject agrees to
specific processing. Consent must be as easy to withdraw as it is to give. Consent must be given through
Affirmative Action.
Controller – The entity that determines the purposes, conditions and means of the processing of personal
data.
D
Data Element – Pieces of collected information that together, build a complete look at Data.
Data Erasure – Also known as the Right to be Forgotten, it entitles the data subject to have the data
controller erase their personal data, stop further dissemination of the data, and potentially have third
parties stop processing of the data.
Data Portability – The requirement for controllers to provide the data subject with a copy of the data
they’ve provided to the controller. The provided data must be easy to read and can be given to the data
subject directly, or to another controller upon request.
Data Protection Officer (DPO) – An expert on data privacy who works independently within an
organization to ensure compliance with GDPR policies and procedures.
Data Protection Impact Assessment (DPIA) – An assessment required under GDPR, used to identify,
assess, and mitigate risks within an organization’s data processing policies and activities.
Data Subject – A natural person whose personal data is processed by a controller or processor.
Derogation – An exemption or exception from a law.
Directive – A legislative act that sets out a goal for all EU countries to achieve, but each country can meet
this goal in their own way, with their own national laws.
E
ePrivacy Directive – A directive passed in 2002 and amended in 2009 that addresses privacy regarding
digital communication, digital marketing, and cookies.
Encrypted Data – Personal data that is protected through technological measures to ensure that the data is
only accessible/readable by those with specified access.
OneTrust Certification Program Reference Guide
Vendor Risk Management
Page 48
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
European Data Protection Board (EDPB) – Formerly known as Article 29 Working Party (A29 WP), it is an
advisory body made up of DPAs from each EU member state and the European Commission.
F
Freely Given – Consent is considered freely given if the data subject is able to exercise a real choice, and
there are no risk significant negative consequences if they do not give consent.
G
General Data Protection Regulation (GDPR) – A regulation on data protection and privacy for all residents
of the European Economic Area. Passed in 2016, in effect in 2018.
Genetic Data – Data pertaining to unique information about the health or physiology of an individual.
I
Informed – Having all necessary information needed to make a conscious decision or giving consent.
M
Main Establishment – A location, chosen by the data controller, for a company or organization where it is
headquartered and therefore subject to any local laws or directives.
P
Personal Data – Any information related to a natural person or ‘Data Subject’, that can be used to directly or
indirectly identify the person.
Personal Data Breach – A breach of security leading to the accidental or unlawful access to, destruction,
misuse, etc. of personal data.
Processor – An entity that processes data on behalf of a Data Controller, considered a third party.
Privacy by Design (PbD) – A principle that calls for the inclusion of data protection from the onset of the
designing of systems, rather than as an addition.
Privacy Impact Assessment – A tool used to identify and reduce the privacy risks of organizations by
analyzing the personal data that are processed and the policies that are in place to protect the data.
Processing – Any activity performed on personal data, whether or not by automated means, including
collection, use, recording, etc.
Profiling – Any automated processing of personal data intended to evaluate, analyze, or predict data subject
behavior, is done without human interference.
OneTrust Certification Program Reference Guide
Support and Resources
Page 49
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
Pseudonymization – taking away key identifiers out of personal data so that alone, it cannot be attributed
to one single individual. The data is still not completely anonymous but is not identifiable without other
pieces of data.
R
Recipient – The entity to which the personal data is disclosed.
Records of Processing Activities (RoPA) – Each data controller must have a detailed record of all
processing activities that are acted upon data that they have collected. Sometimes called an “Article 30
Report.”
Regulation – A binding legislative act that must be applied in specifically spelled out ways, in its entirety,
across the European Union.
Restriction of Processing – A right of a data subject to limit the future processing of their stored personal
data.
Right to be Forgotten – Also known as Data Erasure, it entitles the data subject to have the data controller
erase their personal data, cease further dissemination of the data, and potentially have third parties cease
processing of the data.
Right to Access – Also known as Subject Access Right, it entitles the data subject to have access to and
information about the personal data that a controller has concerning them.
S
Specific – Consent cannot be gathered for broad or unspecified uses. The data subject must give consent for
specific and clearly spelled out uses and must be consulted if the use changes.
Supervisory Authority (SA) – A public authority which is established by a member state that oversees the
execution of GDPR regulations.
U
Unambiguous – Data subject consent must be the given affirmatively and without doubt. The data subject
must have clear understanding of what their data will be used for, and it must be obvious that the data
subject has consented to the particular processing.

More Related Content

PDF
Hyper-converged infrastructure
PDF
FortiGate 1500D Series Delivers High-Performance Next-Generation Firewall
PPTX
TLS - Transport Layer Security
PDF
SSL/TLS Handshake
PPTX
Database security
PPTX
Basic Cryptography unit 4 CSS
PPTX
Transport Layer Security (TLS)
PPTX
Data Encryption - Azure Storage Service
Hyper-converged infrastructure
FortiGate 1500D Series Delivers High-Performance Next-Generation Firewall
TLS - Transport Layer Security
SSL/TLS Handshake
Database security
Basic Cryptography unit 4 CSS
Transport Layer Security (TLS)
Data Encryption - Azure Storage Service

What's hot (20)

PPTX
Introduction to Azure Blueprints
PPTX
Transport layer security (tls)
PPTX
Introducing Azure SQL Database
PPTX
Authentication vs authorization
PPTX
VTU 6th Sem Elective CSE - Module 3 cloud computing
PPTX
Citrix adc technical overview
PPTX
Kerberos
PDF
Types of access control systems
PPTX
Dynamodb Presentation
PPTX
Domain 4 - Communications and Network Security
PPT
Internet security association and key management protocol (isakmp)
 
PDF
2020 dsar expert reference guide
PPT
X.509 Certificates
PDF
An Introduction to Kerberos
PDF
Alphorm.com Formation Microsoft Azure (AZ-900) : Les Fondamentaux
PPTX
Information Security (Digital Signatures)
PPTX
Transport Layer Security
PPTX
Cyber security
PDF
RSA SecurID Access
PPTX
Amazon Web Services and its Global Infrastructure.pptx
Introduction to Azure Blueprints
Transport layer security (tls)
Introducing Azure SQL Database
Authentication vs authorization
VTU 6th Sem Elective CSE - Module 3 cloud computing
Citrix adc technical overview
Kerberos
Types of access control systems
Dynamodb Presentation
Domain 4 - Communications and Network Security
Internet security association and key management protocol (isakmp)
 
2020 dsar expert reference guide
X.509 Certificates
An Introduction to Kerberos
Alphorm.com Formation Microsoft Azure (AZ-900) : Les Fondamentaux
Information Security (Digital Signatures)
Transport Layer Security
Cyber security
RSA SecurID Access
Amazon Web Services and its Global Infrastructure.pptx
Ad

Similar to 2020 vrm expert reference guide (20)

PDF
2020 dm expert reference guide
PPTX
OneTrust: Securing the Supply Chain: What Does Compliance Look Like?
PDF
The Trustable Technology Mark
PPTX
Eazy Digital - Insurtech Innovation Award 2024
PDF
Implementing and Auditing GDPR Series (8 of 10)
PPT
Escrow Presentation2010
PDF
Fleet Optimization Buyer's Guide
PPT
Escrow Presentation
PDF
Anti-Malvertising Guidelines
PDF
Insurance_Brochure_NextGen-Underwriting-Solution_06_2011
PDF
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...
PDF
Trustable Technology Mark (3 August 2018)
PDF
Problem And Purpose Of A Project
PDF
Structuring your organization for success with data analytics
PDF
Security Testing for Test Professionals
PDF
FFIEC and NIST: What You Need to Know About Two Prevalent New IT Security Com...
PDF
Brandon Consulting Overview
PDF
Trustable Tech mark (10 August 2018)
PDF
in-ra-service-brochure-December-23-noexp.pdf
PDF
Risk Advisory’s new narrative Mitigate risks effectively
2020 dm expert reference guide
OneTrust: Securing the Supply Chain: What Does Compliance Look Like?
The Trustable Technology Mark
Eazy Digital - Insurtech Innovation Award 2024
Implementing and Auditing GDPR Series (8 of 10)
Escrow Presentation2010
Fleet Optimization Buyer's Guide
Escrow Presentation
Anti-Malvertising Guidelines
Insurance_Brochure_NextGen-Underwriting-Solution_06_2011
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...
Trustable Technology Mark (3 August 2018)
Problem And Purpose Of A Project
Structuring your organization for success with data analytics
Security Testing for Test Professionals
FFIEC and NIST: What You Need to Know About Two Prevalent New IT Security Com...
Brandon Consulting Overview
Trustable Tech mark (10 August 2018)
in-ra-service-brochure-December-23-noexp.pdf
Risk Advisory’s new narrative Mitigate risks effectively
Ad

More from AnkitKumar250429 (6)

PDF
2020 cookies expert reference guide
PDF
2021 data discovery expert reference guide
PDF
Fundamentals of cyber_law_y_yivvt_ys
PDF
Ecommerce law compliances_u_easp898
PDF
Ipr cyberspace_0_q7qi_eny
PDF
Information technology act_gaipi_rog
2020 cookies expert reference guide
2021 data discovery expert reference guide
Fundamentals of cyber_law_y_yivvt_ys
Ecommerce law compliances_u_easp898
Ipr cyberspace_0_q7qi_eny
Information technology act_gaipi_rog

Recently uploaded (20)

PDF
Data Act Effective from September 2025: Here is a Guide to the Main Obligations
PDF
Types or Forms of Intellectual Property Rights (IPR )
PPTX
Company Law Shares and Debentures, Members
PPTX
HR Compliance Law applicable in India under HR Comp.
PDF
Winding Up of companies for Company Law journal
PPTX
The Balance of Power: Emergency Provisions in India
PDF
UNIT-3-COMPANIES ACT-2013.pdf (Applicable for India)
PDF
UNIT-7_ IPR_Final PPT.pdf (Applicable for India)
PDF
UNIT- 12_Applied Ethics_Unethical Practices in Business.pdf
PDF
UNIT-8_COMPETITION ACT-2002_DSS Final.pdf
PPTX
Database Management Systems - akash dbms - abar tomake - nitei-hbe - na hle h...
PPTX
Preamble_Masterclass_PPT_with_Notes.pptx
PDF
UNIT- 5 & 6_Industrial Relations PPT.pdf
PDF
UNIT-2- SALE OF GOODS ACT 1930.pdf (Applicable for India)
DOCX
NATIONAL BUILDING CODE OF THE PHILIPPINES SUMMARY
PPTX
Compliance with the Construction Work Design Management by Mah Sing Property ...
PPTX
toppdf_ sa understanding te1753419803952.pptx
PPT
Federalism lecture note power point for law
PDF
For-website-Sukumar-Baishya-FT-Order-7-2-2025.pdf
PDF
The Indian Contract Act, 1872 (Applicable for India)
Data Act Effective from September 2025: Here is a Guide to the Main Obligations
Types or Forms of Intellectual Property Rights (IPR )
Company Law Shares and Debentures, Members
HR Compliance Law applicable in India under HR Comp.
Winding Up of companies for Company Law journal
The Balance of Power: Emergency Provisions in India
UNIT-3-COMPANIES ACT-2013.pdf (Applicable for India)
UNIT-7_ IPR_Final PPT.pdf (Applicable for India)
UNIT- 12_Applied Ethics_Unethical Practices in Business.pdf
UNIT-8_COMPETITION ACT-2002_DSS Final.pdf
Database Management Systems - akash dbms - abar tomake - nitei-hbe - na hle h...
Preamble_Masterclass_PPT_with_Notes.pptx
UNIT- 5 & 6_Industrial Relations PPT.pdf
UNIT-2- SALE OF GOODS ACT 1930.pdf (Applicable for India)
NATIONAL BUILDING CODE OF THE PHILIPPINES SUMMARY
Compliance with the Construction Work Design Management by Mah Sing Property ...
toppdf_ sa understanding te1753419803952.pptx
Federalism lecture note power point for law
For-website-Sukumar-Baishya-FT-Order-7-2-2025.pdf
The Indian Contract Act, 1872 (Applicable for India)

2020 vrm expert reference guide

  • 2. OneTrust Certification Program Reference Guide Vendor Risk Management Page 2 Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential. The training environment provided to you is only for use during the OneTrust Certification Training Program. You will only have access to log in for the duration of training. Training URL: training.onetrust.com Please refer to your instructor for the password to your environment. We recommend accessing the training environment in incognito/private browser mode.
  • 3. OneTrust Certification Program Reference Guide Support and Resources Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential. OneTrust CertificationProgram ReferenceGuide Prepared For: OneTrust Certification Program Vendor Risk Management Expert Attendees Disclaimer No part of this document may be reproduced in any form without the written permission of the copyright owner. The contents of this document are subject to revision without notice due to continued progress in methodology, design, and manufacturing. OneTrust LLC shall have no liability for any error or damage of any kind resulting from the use of this document. OneTrust products, content and materials are for informational purposes only and not for the purpose of providing legal advice. You should contact your attorney to obtain advice with respect to any particular issue. OneTrust materials do not guarantee compliance with applicable laws and regulations.
  • 4. OneTrust Certification Program Reference Guide Vendor Risk Management Page 4 Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential. Introduction Welcome to the OneTrust Certification Program Reference Guide, your comprehensive guide to becoming a certified OneTrust privacy management professional. OneTrust is the leading global software to operationalize data privacy compliance and Privacy by Design. OneTrust automates privacy impact assessments and data mapping, identifies privacy risks, and enforces risk management and control activities in an integrated and agile approach. Our web-based software provides a central repository for privacy professionals to collaborate with business groups, service providers and trusted advisors managing privacy risks across customer data, employee data, and vendor data transfers. The result is the ability to demonstrate accountability and compliance with EU’s data protection requirements (GDPR, BCR, Privacy Shield), and globally across privacy jurisdictions and frameworks.
  • 5. OneTrust Certification Program Reference Guide Support and Resources Page 5 Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
  • 6. OneTrust Certification Program Reference Guide Vendor Risk Management Page 6 Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential. Table of Contents Support and Resources................................................................................................................. 7 1 Support Resources...................................................................................................................................7 Vendor Risk Management.......................................................................................................... 10 1 Terminology .......................................................................................................................................... 12 2 Security Standards/Frameworks ......................................................................................................... 14 3 Regulation Overview............................................................................................................................. 16 4 Execution in OneTrust ......................................................................................................................... 18 Glossary ....................................................................................................................................... 30
  • 7. OneTrust Certification Program Reference Guide Support and Resources Page 7 Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential. Support and Resources Support and Resources 7 1 Support Resources 8 1.1 Support Infrastructure 8 1.2 Support Documentation 9 1.3 Product Release Notes and Maintenance Notices 9
  • 8. OneTrust Certification Program Reference Guide Vendor Risk Management Page 8 Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential. 1 Support Resources 1.1 Support Infrastructure Request Support on Tenant Submit a support desk ticket directly to the OneTrust Support Team through your tenant. 1. To get help from OneTrust support personnel, click on the question mark icon in the top navigation and click Get Help. 2. Click Contact Us at the bottom of the window. Enter a message, Click the Element (if applicable) and click Send. A member of our Support team will get back to you shortly. Contact the OneTrust Support Team • Email: [email protected] • Phone: +1 (844) 900-0472
  • 9. OneTrust Certification Program Reference Guide Support and Resources Page 9 Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential. 1.2 Support Documentation ✓ Email [email protected] from your work email if you have any issues with access to the support portal (https://my.onetrust.com/s/) and documentation. ✓ Email your OneTrust Account Executive or [email protected] from your work email for access to the support portal (https://my.onetrust.com/s/) and documentation. 1.3 Product Release Notes and Maintenance Notices Product release notes and maintenance notices are available in the support portal: https://my.onetrust.com/s/ under Product Updates at the top of the page. Subscribe to Product Release Notes with the following steps: 1. Select All Groups at the bottom of the page 2. Click on the Product Updates group 3. Select Join Group on the right side, then Manage Notifications to set the frequency of how often you receive updates via email Subscribe to Maintenance Notices with the following steps: 1. Select System Status and Scheduled Maintenance at the bottom of the page 2. Click on Subscribe, and enter contact information 3. Click Subscribe to Alerts
  • 10. OneTrust Certification Program Reference Guide Vendor Risk Management Page 10 Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential. Vendor Risk Management Vendor Risk Management helps start and maintain a relationship with third-party service providers through automated risk assessment, audit reporting, and by providing a centralized location for all related documents, contracts, and historical data.
  • 11. OneTrust Certification Program Reference Guide Support and Resources Page 11 Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential. Vendor Risk Management ...............................................................................................................7 1 Terminology..........................................................................................................................................12 2 Security Standards/Frameworks and Regulation Overview ............. Error! Bookmark not defined. 3 Execution in OneTrust........................................................................................................................18
  • 12. OneTrust Certification Program Reference Guide Vendor Risk Management Page 12 Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential. 1 Terminology Security Standards/Frameworks A series of documented processes that are used to define policies and procedures around the implementation and ongoing management of information security controls in an enterprise environment. Controls Are safeguards or countermeasures to avoid, detect, counteract, or minimize security risks to physical property, information, computer systems, or other assets. Inventory A list or collection vendors, assets and processing activities Attribute A characteristic and information ascribed to and about a Vendor Vendor Record A data record containing information about a vendor in the form of attributes. Conditional Logic Logic that can be added to an assessment that allows for a more seamless workflow, letting the respondent skip/show questions that are not applicable based on responses from questions within the questionnaire. Rules Logic Logic can be added to an assessment used to flag risks, automatically launch assessments based on responses selected from specific questions. Vendor A person or company that sells and/or provides goods and services.
  • 13. OneTrust Certification Program Reference Guide Support and Resources Page 13 Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential. Engagement A single implementation, purchase of software, service(s) or solutions. An engagement does not have to be tied to a contractual agreement. Automation Rules Are used to complete multiple actions based on one or more triggers to streamline the re- assessment process and notify all stakeholders of the assessment taking place.
  • 14. OneTrust Certification Program Reference Guide Vendor Risk Management Page 14 Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential. 2 Security Standards/Frameworks GAPP – Generally Accepted Privacy Principles A framework intended to assist Chartered Accountants and Certified Public Accountants in creating an effective privacy program for managing and preventing privacy risks. The framework was developed through joint consultation between the Canadian Institute of Chartered Accountants (CICA) and the American Institute of Certified Public Accountants (AICPA). AICPA TSC 2017 – The American Institute of Certified Public Accountants (AICPA) – Trust Services Criteria (TSC) 2017 The framework presents control criteria for use in attestation or consulting engagements to evaluate and report on controls over the security, availability, processing integrity, confidentiality, or privacy over information and systems. Issued by the AICPA Assurance Services Executive Committee (ASEC). FedRAMP – The Federal Risk and Authorization Management Program A government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services. The governing bodies of FedRamp include: JAB, OMB, CIO Council, FedRAMP PIO, DHS, and NIST. ISO 27001 – International Organization for Standardization (ISO) 27001 ISO 27001 formally known as ISO/IEC 27001:2005) is a specification for an information security management system (ISMS). Issued and maintained by International Organization for Standardization. ISO 29001 – International Organization for Standardization 29001
  • 15. OneTrust Certification Program Reference Guide Support and Resources Page 15 Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential. ISO 29001 defines the quality management system for product and service supply organizations for the petroleum, petrochemical and natural gas industries. NIST 800-171 – The National Institute of Standards and Technology The NIST Special Publication 800-171 governs Controlled Unclassified Information (CUI) in Non- Federal Information Systems and Organizations. NIST SP 800-53 rev4 – The National Institute of Standards and Technology A framework catalog of security controls for federal information systems and organizations and assessment procedures. German Standard Data Protection Model A framework designed to assist data protection authorities (DPA) in becoming transparent with systematically verifying compliance to personal data protection law.
  • 16. OneTrust Certification Program Reference Guide Vendor Risk Management Page 16 Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential. 3 Regulation Overview GDPR Importance GDPR Articles 28, 29 and 32 require organizations to ensure their third party vendors sufficiently safeguard their data. Combined with third party data breaches increases the need to reduce vendor risk and prioritize privacy compliance. CCPA Importance Under current California law, businesses are required to “implement and maintain reasonable security procedures” and “to protect the personal information from unauthorized access, destruction, use, modification or disclosure. The CCPA increases fines and penalties for violations of existing law so that businesses are held responsible for safeguarding personal information if the business chooses to collect it.
  • 17. OneTrust Certification Program Reference Guide Support and Resources Page 17 Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential. Proprietary/Internal Proprietary/Internal Best Practices Copyright © 2019 OneTrust LLC. 60 Manage Controls Library Review and add additional security frameworks and controls necessary for vendors compliance. Determine what the framework is appropriate for implementation. Select the control that applies to risk.
  • 18. OneTrust Certification Program Reference Guide Vendor Risk Management Page 18 Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential. 4 Execution in OneTrust
  • 19. OneTrust Certification Program Reference Guide Support and Resources Page 19 Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential. 4.1 Add Vendor Attribute ✓ Navigate to Vendor Management → Attribute Manger → Vendor Attributes ✓ Add text attribute “Vendor Website” ✓ Save the attribute
  • 20. OneTrust Certification Program Reference Guide Vendor Risk Management Page 20 Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
  • 21. OneTrust Certification Program Reference Guide Support and Resources Page 21 Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
  • 22. OneTrust Certification Program Reference Guide Vendor Risk Management Page 22 Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential. 4.2 Add Vendor and Services from Vendorpedia Exchange ✓ Navigate to Vendor Management → Vendorpedia: Exchange ✓ Add OneTrust to Vendors ✓ Select all products and services under OneTrust ✓ Add additional services under Salesforce vendor from Exchange ✓ Select Datorama and Einstein Analytics for Products/Services under Certificates tab of vendor profile in Exchange
  • 23. OneTrust Certification Program Reference Guide Support and Resources Page 23 Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
  • 24. OneTrust Certification Program Reference Guide Vendor Risk Management Page 24 Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
  • 25. OneTrust Certification Program Reference Guide Support and Resources Page 25 Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
  • 26. OneTrust Certification Program Reference Guide Vendor Risk Management Page 26 Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
  • 27. OneTrust Certification Program Reference Guide Support and Resources Page 27 Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
  • 28. OneTrust Certification Program Reference Guide Vendor Risk Management Page 28 Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential. 4.3 Create Questionnaire ✓ Navigate to Vendor Management → Setup: Templates ✓ Create your own template named “Preliminary Vendor Assessment” ✓ Add a section named “General Vendor Information” ✓ Add an Inventory Question – “Vendor Name” ✓ Add an Attribute Question – “Vendor Website”
  • 29. OneTrust Certification Program Reference Guide Support and Resources Page 29 Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
  • 30. OneTrust Certification Program Reference Guide Vendor Risk Management Page 30 Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
  • 31. OneTrust Certification Program Reference Guide Support and Resources Page 31 Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
  • 32. OneTrust Certification Program Reference Guide Vendor Risk Management Page 32 Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
  • 33. OneTrust Certification Program Reference Guide Support and Resources Page 33 Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential. 4.4 Add Controls ✓ Navigate to Vendor Management → Vendors ✓ Click on the vendor RingCentral and go to the Assessments tab ✓ Open the “RingCentral Review” assessment ✓ Click on the Risk Flag in the top right corner → Find the ‘Controls’ tab → Click on ‘Add Control’
  • 34. OneTrust Certification Program Reference Guide Vendor Risk Management Page 34 Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
  • 35. OneTrust Certification Program Reference Guide Support and Resources Page 35 Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential. 4.5 Add Engagement ✓ Navigate to Vendor Management → Vendors ✓ Click on the vendor Salesforce and go to the Engagements tab ✓ Add Engagement ✓ Engagement Name – “Business Intelligence Implementation – Sales and Marketing” ✓ Start Date – Today’s Date ✓ End Date – One Year from Today’s Date ✓ Services – Einstein Analytics ✓ Engagement Internal Owner – Assign to Me
  • 36. OneTrust Certification Program Reference Guide Vendor Risk Management Page 36 Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
  • 37. OneTrust Certification Program Reference Guide Support and Resources Page 37 Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential. 4.6 Add Automation Rule ✓ Navigate to Vendor Management → Setup: Automation Rules ✓ Add a rule group called “Follow-up Vendor Assessments” and select Vendor rule type ✓ Add a Rule named “Yearly Vendor Re-assessment” ✓ Set the conditions → Last Completion Date – By Template → “Vendor Privacy Review” ✓ Action → Send Vendor Assessment → “Vendor Privacy Review” ✓ Set deadline, approver, and respondent
  • 38. OneTrust Certification Program Reference Guide Vendor Risk Management Page 38 Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
  • 39. OneTrust Certification Program Reference Guide Support and Resources Page 39 Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential. 4.7 Add Vendor Contract ✓ Navigate to Vendor Management → Vendors ✓ Click on the vendor Workday and go to the Documents tab ✓ Add Contract ✓ Contract Name – “Workday MSA” ✓ Contract Type – Master Service Agreement ✓ Date Created – Today’s Date ✓ Status – In Progress
  • 40. OneTrust Certification Program Reference Guide Vendor Risk Management Page 40 Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
  • 41. OneTrust Certification Program Reference Guide Support and Resources Page 41 Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential. 4.8 Create Custom Dashboard ✓ Navigate to Dashboards module ✓ Click Create New ✓ Dashboard Name – “Vendor Information” ✓ Visible Module – Vendor Management ✓ Select Template 2 ✓ Add Widget displaying Vendors by Type ✓ Group By: Inventory → Vendors → Type ✓ Add Widget displaying Vendor Assessments by Stages ✓ Group By: Assessment → All Templates → Stages
  • 42. OneTrust Certification Program Reference Guide Vendor Risk Management Page 42 Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
  • 43. OneTrust Certification Program Reference Guide Support and Resources Page 43 Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
  • 44. OneTrust Certification Program Reference Guide Vendor Risk Management Page 44 Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
  • 45. OneTrust Certification Program Reference Guide Support and Resources Page 45 Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
  • 46. OneTrust Certification Program Reference Guide Vendor Risk Management Page 46 Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential. Glossary A Adequacy Decision – A declaration made by the European Commission that a country outside of the EEU offers an adequate level of protection, and therefore is acceptable for cross-border data transfers. Affirmative Act – A clear action taken that indicates consent has been given, is not passive. Asset – Anything that can store or process personal data. This can include an application, website, database, or even a filing cabinet. Asset Map – A visual map that shows the location of all assets. Automated Decision Making – Making a decision or creating a profile based completely on technological means without human involvement B Binding Corporate Rules (BCRs) – A set of strict and binding rules put in place by multinational companies and organizations that describe how personal data must be processed and protected. This allows the transfer of personal data outside the EEA, without having an Adequacy Decision. Data may be transferred between countries but must remain within the organization. Biometric Data – A “special category” of data relating to physical, physiological, or behavioral characteristics of a person that can identify or confirm identity of a person. C California Consumer Protection Act (CCPA) – Signed into law in 2018, to be affective in 2020, this act introduces new privacy rights for individuals living within the state of California. First sweeping privacy law in the United States. Cookies – A small text file that a website may drop on a user’s device for the sake of tracking certain categories of information. Cookies (1st Party) – Cookies dropped by the website the user is visiting. Cookies (3rd Party) – Cookies dropped by a website or company different than the one the user is visiting. Most commonly, targeting or social media cookies. Cookies (Persistent) – Cookies that continue to live on a user’s device after they have left the website from which the cookie was dropped.
  • 47. OneTrust Certification Program Reference Guide Support and Resources Page 47 Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential. Cookies (Session) – Cookies that are no longer active after a user leaves a website or ends a session with the website. Consent – Any freely given, specific, informed and unambiguous indication that the data subject agrees to specific processing. Consent must be as easy to withdraw as it is to give. Consent must be given through Affirmative Action. Controller – The entity that determines the purposes, conditions and means of the processing of personal data. D Data Element – Pieces of collected information that together, build a complete look at Data. Data Erasure – Also known as the Right to be Forgotten, it entitles the data subject to have the data controller erase their personal data, stop further dissemination of the data, and potentially have third parties stop processing of the data. Data Portability – The requirement for controllers to provide the data subject with a copy of the data they’ve provided to the controller. The provided data must be easy to read and can be given to the data subject directly, or to another controller upon request. Data Protection Officer (DPO) – An expert on data privacy who works independently within an organization to ensure compliance with GDPR policies and procedures. Data Protection Impact Assessment (DPIA) – An assessment required under GDPR, used to identify, assess, and mitigate risks within an organization’s data processing policies and activities. Data Subject – A natural person whose personal data is processed by a controller or processor. Derogation – An exemption or exception from a law. Directive – A legislative act that sets out a goal for all EU countries to achieve, but each country can meet this goal in their own way, with their own national laws. E ePrivacy Directive – A directive passed in 2002 and amended in 2009 that addresses privacy regarding digital communication, digital marketing, and cookies. Encrypted Data – Personal data that is protected through technological measures to ensure that the data is only accessible/readable by those with specified access.
  • 48. OneTrust Certification Program Reference Guide Vendor Risk Management Page 48 Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential. European Data Protection Board (EDPB) – Formerly known as Article 29 Working Party (A29 WP), it is an advisory body made up of DPAs from each EU member state and the European Commission. F Freely Given – Consent is considered freely given if the data subject is able to exercise a real choice, and there are no risk significant negative consequences if they do not give consent. G General Data Protection Regulation (GDPR) – A regulation on data protection and privacy for all residents of the European Economic Area. Passed in 2016, in effect in 2018. Genetic Data – Data pertaining to unique information about the health or physiology of an individual. I Informed – Having all necessary information needed to make a conscious decision or giving consent. M Main Establishment – A location, chosen by the data controller, for a company or organization where it is headquartered and therefore subject to any local laws or directives. P Personal Data – Any information related to a natural person or ‘Data Subject’, that can be used to directly or indirectly identify the person. Personal Data Breach – A breach of security leading to the accidental or unlawful access to, destruction, misuse, etc. of personal data. Processor – An entity that processes data on behalf of a Data Controller, considered a third party. Privacy by Design (PbD) – A principle that calls for the inclusion of data protection from the onset of the designing of systems, rather than as an addition. Privacy Impact Assessment – A tool used to identify and reduce the privacy risks of organizations by analyzing the personal data that are processed and the policies that are in place to protect the data. Processing – Any activity performed on personal data, whether or not by automated means, including collection, use, recording, etc. Profiling – Any automated processing of personal data intended to evaluate, analyze, or predict data subject behavior, is done without human interference.
  • 49. OneTrust Certification Program Reference Guide Support and Resources Page 49 Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential. Pseudonymization – taking away key identifiers out of personal data so that alone, it cannot be attributed to one single individual. The data is still not completely anonymous but is not identifiable without other pieces of data. R Recipient – The entity to which the personal data is disclosed. Records of Processing Activities (RoPA) – Each data controller must have a detailed record of all processing activities that are acted upon data that they have collected. Sometimes called an “Article 30 Report.” Regulation – A binding legislative act that must be applied in specifically spelled out ways, in its entirety, across the European Union. Restriction of Processing – A right of a data subject to limit the future processing of their stored personal data. Right to be Forgotten – Also known as Data Erasure, it entitles the data subject to have the data controller erase their personal data, cease further dissemination of the data, and potentially have third parties cease processing of the data. Right to Access – Also known as Subject Access Right, it entitles the data subject to have access to and information about the personal data that a controller has concerning them. S Specific – Consent cannot be gathered for broad or unspecified uses. The data subject must give consent for specific and clearly spelled out uses and must be consulted if the use changes. Supervisory Authority (SA) – A public authority which is established by a member state that oversees the execution of GDPR regulations. U Unambiguous – Data subject consent must be the given affirmatively and without doubt. The data subject must have clear understanding of what their data will be used for, and it must be obvious that the data subject has consented to the particular processing.