TrustArc Webinar - Mastering Data Inventory: The Foundation of Strong Privacy Compliance

TrustArc 0 views 10 slides Oct 02, 2025
Slide 1
Slide 1 of 10
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10

About This Presentation

A complete, accurate, and up-to-date data inventory isn’t just a regulatory requirement — it’s the cornerstone of an effective privacy program. Yet for many organizations, building and maintaining that inventory remains a challenge, especially in complex, fast-changing data environments.

Join...


Slide Content

© 2025 TrustArc Inc. Proprietary and Confidential Information.
Mastering Data Inventory:
The Foundation of Strong Privacy Compliance

2
Legal Disclaimer
The information provided during this webinar does
not, and is not intended to, constitute legal advice.
Instead, all information, content, and materials presented during
this webinar are for general informational purposes only.

3
Speakers
Kemi Spector
Global Privacy Manager
TrustArc
Joanne Furtsch
VP, Privacy Knowledge
TrustArc
Amanda DeLuke
CIPP/E, CIPM
Senior Data Privacy Manager
Higher Logic

Agenda

1.Why a Data Inventory?
2.Core Components of a Modern Data Inventory
3.Common Challenges & Pitfalls
4.Key Practices for Building & Maintaining a Data
Inventory
5.Looking Ahead

5
Why a Data Inventory?
Know Your Data
●Identify the data you collect, store, process, and share
●Defines privacy obligations (GDPR, CCPA, LGPD, localization)
●Demonstrate accountability (ROPA, PIAs, etc)
●Data subject rights requests
●Supports contractual relationships
Risk & Governance
●Reduces shadow IT
●Identify risks/vulnerabilities of over collection/retention
●Provide audit evidence to demonstrate accountability
●Supports incident response
AI and Beyond
●Drives responsible use of AI
●Supports transparency
●Align with broader business drivers and strategy

6
Core Components of a Modern Data Inventory
Data Elements &
Categories
Data Sources &
Collection Points
Data Processing
Activities
Data Flows &
Storage
Stakeholder &
Ownership
Security & Risk
Attributes
Regulator &
Contractual Context
Data Subject Rights
Support
Data Inventory

7
Common Challenges & Pitfalls
•Siloed systems and fragmented data ownership
•Keeping the inventory up to date in dynamic
environments
•Overlooking unstructured data (emails, shared
drives, collaboration tools)
•Unknown or unauthorized vendors
•Record Retention policy
•Aligning with your contractual commitments and
definitions
•What is “processing” ?

8
Key Practices for Building & Maintaining a Data Inventory
●Data Classifications
●Shared responsibility across privacy, security, GRC
●Leveraging automation and privacy tech tools
●Setting governance processes for regular reviews and updates
○How itʼs done from an audit perspective
●Aligning inventory management with incident response plans
●Data retention (tech data + overall process)
Using Data Inventory for Strategic Advantage
●Driving privacy-by-design in product development
●Enabling faster, more accurate responses to DSARs and regulatory inquiries
●Using inventory insights to inform data minimization and deletion programs
●Supporting AI governance and ethical data use initiatives
●Transparency
Some Examples
●How is this done in practice?

Looking Ahead
•Stricter privacy regulations are raising
expectations for detailed, accurate, and
continuously updated data inventories.

•Integration with cybersecurity frameworks to
enhance risk management, access controls, and
monitoring.

•Future trends: leveraging AI, automation, and risk
scoring to make inventories smarter, faster, and
more actionable.

10
Thank You!