Data processing systems for measuring privacy maturity within an organization

ABSTRACT

A privacy compliance measurement system, according to particular embodiments, is configured to determine compliance with one or more privacy compliance requirements by an organization or sub-group of the organization. In various embodiments, the system is configured to determine a privacy maturity rating for each of a plurality of sub-groups within an organization. In some embodiments, the privacy maturity rating is based at least in part on: (1) a frequency of risks or issues identified with Privacy Impact Assessments (PIAs) performed or completed by the one or sub-groups; (2) a relative training level of members of the sub-groups with regard to privacy related matters; (3) a breadth and amount of personal data collected by the sub-groups; and/or (4) etc. In various embodiments, the system is configured to automatically modify one or more privacy campaigns based on the determined privacy maturity ratings.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No. 16/363,454, filed Mar. 25, 2019, which is a continuation of U.S. patent application Ser. No. 16/042,642, filed Jul. 23, 2018, now U.S. Pat. No. 10,242,228, issued Mar. 26, 2019, which is a continuation-in-part of U.S. patent application Ser. No. 15/619,251, filed Jun. 9, 2017, now U.S. Pat. No. 10,032,172, issued Jul. 24, 2018, which is a continuation-in-part of U.S. patent application Ser. No. 15/254,901, filed Sep. 1, 2016, now U.S. Pat. No. 9,729,583, issued Aug. 8, 2017, which claims priority to U.S. Provisional Patent Application Ser. No. 62/360,123, filed Jul. 8, 2016; U.S. Provisional Patent Application Ser. No. 62/353,802, filed Jun. 23, 2016; and U.S. Provisional Patent Application Ser. No. 62/348,695, filed Jun. 10, 2016; the disclosures of all of the above-referenced patent applications are hereby incorporated herein by reference in their entirety.

TECHNICAL FIELD

This disclosure relates to, among other things, data processing systems and methods for retrieving data regarding a plurality of privacy campaigns, using that data to assess a relative risk associated with the respective data privacy campaigns, providing an audit schedule for each campaign, measuring privacy requirement compliance across a plurality of privacy campaigns, determining respective privacy maturity ratings for one or more groups within an organization, and processing the relevant data.

BACKGROUND

Over the past years, privacy and security policies, and related operations have become increasingly important. Breaches in security, leading to the unauthorized access of personal data (which may include sensitive personal data) have become more frequent among companies and other organizations of all sizes. Such personal data may include, but is not limited to, personally identifiable information (PII), which may be information that directly (or indirectly) identifies an individual or entity. Examples of PII include names, addresses, dates of birth, social security numbers, and biometric identifiers such as a person's fingerprints or picture. Other personal data may include, for example, customers' Internet browsing habits, purchase history, or even their preferences (e.g., likes and dislikes, as provided or obtained through social media). While not all personal data may be sensitive, in the wrong hands, this kind of information may have a negative impact on the individuals or entities whose sensitive personal data is collected, including identity theft and embarrassment. Not only would this breach have the potential of exposing individuals to malicious wrongdoing, the fallout from such breaches may result in damage to reputation, potential liability, and costly remedial action for the organizations that collected the information and that were under an obligation to maintain its confidentiality and security. These breaches may result in not only financial loss, but loss of credibility, confidence, and trust from individuals, stakeholders, and the public.

In order to reduce the risks associated with obtaining, storing, and using personal data, private companies and other organizations have begun to train their employees to properly handle personal data. However, such training efforts may be implemented inconsistently, which may, in turn, result in the inconstant implementation of proper procedures for handling personal data. Accordingly, there is a need for improved systems and methods for evaluating the privacy maturity of particular individuals and/or groups of individuals within an organization.

SUMMARY

A computer-implemented data processing method for measuring a particular business unit within an organization's compliance with one or more privacy requirements, according to particular embodiments, comprises: (1) receiving, by one or more processors, a request to measure a privacy maturity of the particular business unit; and (2) in response to receiving the request, retrieving, by one or more processors, from a privacy compliance system, an electronic record comprising information associated with one or more privacy impact assessments submitted by the particular business unit, wherein the privacy compliance system digitally stores the electronic record associated with the one or more privacy impact assessments and the electronic record comprises: (a) one or more types of personal data collected as part of one or more privacy campaigns for which the privacy impact assessment was performed; (b) a subject from which the personal data was collected; (c) a storage location of the personal data; and (d)one or more access permissions associated with the personal data. In any embodiment described herein, the method may further comprise: (1) determining, by one or more processors, one or more identified issues with the one or more privacy impact assessments; (2) determining, by one or more processors, based at least in part on the one or more privacy impact assessments, information associated with privacy campaign data collected as part of the one or more privacy campaigns; (3) receiving, by one or more processors, training data associated with one or more individuals associated with the particular business unit; (4) generating, by one or more processors, a privacy maturity report for the particular business unit based at least in part on the one or more identified issues, the information associated with the privacy campaign data, and the training data; and (5) displaying, by one or more processors, the privacy maturity report on a display screen associated with a computing device.

A computer-implemented data processing method for measuring a particular organization's compliance with one or more requirements associated with one or more pieces of computer code originating from the particular organization, in some embodiments, comprises: (1) determining, by one or more processors, for each of the one or more pieces of computer code, one or more respective storage locations; (2) electronically obtaining, by one or more processors, each of the one or more pieces of computer code based on the one or more respective storage locations; (3) automatically electronically analyzing each of the one or more pieces of computer code to determine one or more privacy-related attributes of each of the one or more pieces of computer code, each of the privacy-related attributes indicating one or more types of privacy campaign data that the computer code collects or accesses; (4) retrieving, by one or more processors, for at least one individual associated with the organization, privacy training data comprising an amount of privacy training received by the at least one individual; (5) determining, by one or more processors, based at least in part on the one or more types of privacy campaign data that the computer code collects or accesses and the privacy training data, a privacy maturity score for the particular organization; and (6) displaying, by one or more processors, the privacy maturity score on a display screen associated with a computing device.

A computer-implemented data processing method for measuring a privacy maturity of a sub-group within an organization, according to particular embodiments, comprises: (1) determining, by one or more processors, a number of issues identified by one or more privacy impact assessments performed on each of a plurality of privacy campaigns undertaken by the sub-group; and (2) determining, by one or more processors, from a privacy compliance system, information associated with privacy campaign data collected as part each of the plurality of privacy campaigns, wherein the privacy compliance system digitally stores an electronic record associated with each of the plurality of privacy campaigns and the electronic record comprises: (a) one or more types of personal data collected as part of each of the plurality of privacy campaigns; (b) a subject from which the personal data was collected; (c) a storage location of the personal data; and (d) one or more access permissions associated with the personal data. In further embodiments, the method comprises: (1) receiving, by one or more processors, training data associated with one or more individuals associated with the particular sub-group; (2) determining, by one or more processors, a privacy maturity for the particular sub-group based at least in part on the number of issues identified by the one or more privacy impact assessments, the information associated with privacy campaign data, and the training data; and (3) displaying, by one or more processors, the privacy maturity on a display screen associated with a computing device.

BRIEF DESCRIPTION OF THE DRAWINGS

Various embodiments of a system and method for privacy compliance measurement are described below. In the course of this description, reference will be made to the accompanying drawings, which are not necessarily drawn to scale, and wherein:

FIG. 1 depicts a privacy compliance measurement system according to particular embodiments.

FIG. 2 is a schematic diagram of a computer (such as the privacy compliance measurement server 110, or one or more remote computing devices 130) that is suitable for use in various embodiments of the privacy compliance measurement system shown in FIG. 1.

FIG. 3 is a flow chart showing an example of a process performed by a Privacy Compliance Measurement Module according to particular embodiments.

FIG. 4 is a flow chart showing an example of a process performed by a Privacy Campaign Modification Module.

FIGS. 5-13 depict exemplary screen displays and graphical user interfaces (GUIs) according to various embodiments of the system, which may display information associated with the system or enable access to or interaction with the system by one or more users.

DETAILED DESCRIPTION

Various embodiments now will be described more fully hereinafter with reference to the accompanying drawings. It should be understood that the invention may be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art. Like numbers refer to like elements throughout.

Overview

A privacy compliance measurement system, according to various embodiments, is configured to determine compliance with one or more privacy compliance requirements by an organization or sub-group of the organization (e.g., one or more business groups or units within the organization). In particular embodiments, the system is configured to determine compliance with the one or more privacy compliance requirements based on, for example: (1) a frequency of risks or issues identified with Privacy Impact Assessments (PIAs) performed or completed by the one or more business units; (2) a relative training level of members of the one or more business units with regard to privacy related matters; (3) a breadth and amount of personal data collected by the one or more business units; and/or (4) any other suitable information related to the one or more business units' collection and storage of personal data.

In particular embodiments, the system is configured to determine a privacy maturity score (e.g., privacy maturity level) for a particular business unit that may, for example, be based at least in part on: (1) a percentage of PIAs associated with the particular business unit that the system identifies as having a high, medium, or low number of issues; (2) a total number of PIAs performed by the particular business unit; (3) a number of privacy campaigns initiated by the particular business unit; (4) an amount of personal data collected and stored by the particular business unit; (5) a number of individuals within the particular business unit who have received formal privacy training; (6) a number of individuals within the particular business unit who have received a privacy-related professional certification; and/or (7) any other suitable factor. In various embodiments, the system is configured to enable a user to customize the one or more factors upon which the privacy maturity score is determined.

In particular embodiments, the privacy compliance measurement system may be implemented in the context of any suitable privacy compliance system that is configured to ensure compliance with one or more legal or industry standards related to the collection and storage of private information. In particular embodiments, a particular organization or sub-group may initiate a privacy campaign as part of its business activities.

In various embodiments, a privacy campaign may include any undertaking by a particular organization (e.g., such as a project or other activity) that includes the collection, entry, and/or storage (e.g., in memory) of any privacy information or personal data associated with one or more individuals. This personal data may include, for example, for an individual: (1) name; (2) address; (3) telephone number; (4) e-mail address; (5) social security number; (6) information associated with one or more credit accounts (e.g., credit card numbers); (7) banking information; (8) location data; (9) internet search history; (10) account data; and (11) any other suitable personal information discussed herein.

As generally discussed above, a particular organization may be required to implement operational policies and processes to comply with one or more legal requirements in handling such personal data. A particular organization may further take steps to comply with one or more industry best practices. In particular embodiments, these operational policies and processes may include, for example: (1) storing personal data in a suitable location; (2) limiting access to the personal data to only suitable individuals or entities within the origination or external to the organization; (3) limiting a length of time for which the data will be stored; and (4) any other suitable policy to ensure compliance with any legal or industry guidelines. In particular embodiments, the legal or industry guidelines may vary based at least in part on, for example: (1) the type of data being stored; (2) an amount of data; (3) whether the data is encrypted; (4) etc.

For example, a particular organization's privacy compliance system may store information related to a plurality of privacy campaigns that the particular organization has undertaken. Each particular privacy campaign may include the receipt or entry and subsequent storage of personal data associated with one or more individuals as part of the privacy campaign. An exemplary privacy campaign, may, for example, include the collection and storage of the organization's employees' names, contact information, banking information, and social security numbers for use by the organization's accounting department for payroll purposes.

In particular embodiments, the system is configured to rate the privacy maturity of a particular organization or sub-group's execution of privacy campaigns in general. This may include, for example, rating the ability or likelihood of these organizations or sub-groups to comply with the legal and industry standards when initiating new privacy campaigns and participating in existing privacy campaigns. By rating the privacy maturity of a particular organization or sub-group, the system may enable privacy officers, administrators, or the system to identify those organizations or sub-groups whose privacy campaigns may require additional auditing or modification to ensure compliance with any legal or industry guidelines.

Exemplary Technical Platforms

As will be appreciated by one skilled in the relevant field, the present invention may be, for example, embodied as a computer system, a method, or a computer program product. Accordingly, various embodiments may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, particular embodiments may take the form of a computer program product stored on a computer-readable storage medium having computer-readable instructions (e.g., software) embodied in the storage medium. Various embodiments may take the form of web-implemented computer software. Any suitable computer-readable storage medium may be utilized including, for example, hard disks, compact disks, DVDs, optical storage devices, and/or magnetic storage devices.

Various embodiments are described below with reference to block diagrams and flowchart illustrations of methods, apparatuses (e.g., systems), and computer program products. It should be understood that each block of the block diagrams and flowchart illustrations, and combinations of blocks in the block diagrams and flowchart illustrations, respectively, can be implemented by a computer executing computer program instructions. These computer program instructions may be loaded onto a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions which execute on the computer or other programmable data processing apparatus create means for implementing the functions specified in the flowchart block or blocks.

These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner such that the instructions stored in the computer-readable memory produce an article of manufacture that is configured for implementing the function specified in the flowchart block or blocks. The computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions that execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart block or blocks.

Accordingly, blocks of the block diagrams and flowchart illustrations support combinations of mechanisms for performing the specified functions, combinations of steps for performing the specified functions, and program instructions for performing the specified functions. It should also be understood that each block of the block diagrams and flowchart illustrations, and combinations of blocks in the block diagrams and flowchart illustrations, can be implemented by special purpose hardware-based computer systems that perform the specified functions or steps, or combinations of special purpose hardware and other hardware executing appropriate computer instructions.

Example System Architecture

FIG. 1 is a block diagram of a Privacy Compliance Measurement System 100 according to a particular embodiment. In various embodiments, the Privacy Compliance Measurement System 100 is part of a Privacy Compliance System, or a plurality of Privacy Compliance Systems, which may each be associated with a respective particular organization. In various embodiments, each particular Privacy Compliance System may be associated with a respective particular organization and be configured to manage one or more privacy campaigns, projects, or other activities associated with the particular organization. In some embodiments, the Privacy Compliance Measurement System 100 is configured to interface with at least a portion of each respective organization's Privacy Compliance System in order to determine and/or measure a privacy maturity of the organization or one or more sub-groups within the organization (e.g., one or more business groups).

As may be understood from FIG. 1, the Privacy Compliance Measurement System 100 includes one or more computer networks 115, a Privacy Compliance Measurement Server 110, a Privacy Compliance Server 120, one or more remote computing devices 130 (e.g., a desktop computer, laptop computer, tablet computer, etc.), and one or more databases 140. In particular embodiments, the one or more computer networks 115 facilitate communication between the Privacy Compliance Measurement Server 110, Privacy Compliance Server 120, one or more remote computing devices 130 (e.g., a desktop computer, laptop computer, tablet computer, etc.), and one or more databases 140.

The one or more computer networks 115 may include any of a variety of types of wired or wireless computer networks such as the Internet, a private intranet, a public switch telephone network (PSTN), or any other type of network. The communication link between the Privacy Compliance Measurement Server 110 and the one or more databases 140 may be, for example, implemented via a Local Area Network (LAN) or via the Internet.

FIG. 2 illustrates a diagrammatic representation of a computer 200 that can be used within the Privacy Compliance Measurement System 100, for example, as a client computer (e.g., one or more remote computing devices 130 shown in FIG. 1), or as a server computer (e.g., Privacy Compliance Measurement Server 110 shown in FIG. 1). In particular embodiments, the computer 200 may be suitable for use as a computer within the context of the Privacy Compliance Measurement System 100 that is configured to facilitate measurement of a particular organization's privacy maturity as it relates to one or more privacy campaigns.

In particular embodiments, the computer 200 may be connected (e.g., networked) to other computers in a LAN, an intranet, an extranet, and/or the Internet. As noted above, the computer 200 may operate in the capacity of a server or a client computer in a client-server network environment, or as a peer computer in a peer-to-peer (or distributed) network environment. The Computer 200 may be a personal computer (PC), a tablet PC, a set-top box (STB), a Personal Digital Assistant (PDA), a cellular telephone, a web appliance, a server, a network router, a switch or bridge, or any other computer capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that computer. Further, while only a single computer is illustrated, the term “computer” shall also be taken to include any collection of computers that individually or jointly execute a set (or multiple sets) of instructions to perform any one or more of the methodologies discussed herein.

An exemplary computer 200 includes a processing device 202, a main memory 204 (e.g., read-only memory (ROM), flash memory, dynamic random access memory (DRAM) such as synchronous DRAM (SDRAM) or Rambus DRAM (RDRAM), etc.), static memory 206 (e.g., flash memory, static random access memory (SRAM), etc.), and a data storage device 218, which communicate with each other via a bus 232.

The processing device 202 represents one or more general-purpose processing devices such as a microprocessor, a central processing unit, or the like. More particularly, the processing device 202 may be a complex instruction set computing (CISC) microprocessor, reduced instruction set computing (RISC) microprocessor, very long instruction word (VLIW) microprocessor, or processor implementing other instruction sets, or processors implementing a combination of instruction sets. The processing device 202 may also be one or more special-purpose processing devices such as an application specific integrated circuit (ASIC), a field programmable gate array (FPGA), a digital signal processor (DSP), network processor, or the like. The processing device 202 may be configured to execute processing logic 226 for performing various operations and steps discussed herein.

The computer 120 may further include a network interface device 208. The computer 200 also may include a video display unit 210 (e.g., a liquid crystal display (LCD) or a cathode ray tube (CRT)), an alphanumeric input device 212 (e.g., a keyboard), a cursor control device 214 (e.g., a mouse), and a signal generation device 216 (e.g., a speaker).

The data storage device 218 may include a non-transitory computer-accessible storage medium 230 (also known as a non-transitory computer-readable storage medium or a non-transitory computer-readable medium) on which is stored one or more sets of instructions (e.g., software instructions 222) embodying any one or more of the methodologies or functions described herein. The software instructions 222 may also reside, completely or at least partially, within main memory 204 and/or within processing device 202 during execution thereof by computer 200—main memory 204 and processing device 202 also constituting computer-accessible storage media. The software instructions 222 may further be transmitted or received over a network 115 via network interface device 208.

While the computer-accessible storage medium 230 is shown in an exemplary embodiment to be a single medium, the term “computer-accessible storage medium”, and similar terms, such as “non-transitory computer-readable medium”, should be understood to include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that store the one or more sets of instructions. Such terms should also be understood to include any medium that is capable of storing, encoding or carrying a set of instructions for execution by the computer and that cause the computer to perform any one or more of the methodologies of the present invention. Such terms should accordingly be understood to include, but not be limited to, solid-state memories, optical and magnetic media, etc.

Exemplary System Platform

Various embodiments of a privacy compliance measurement system may be implemented in the context of any suitable privacy compliance system. For example, the privacy compliance measurement system may be implemented to determine the privacy maturity of a particular organization or sub-group of the organization related to the collection and storage of personal data by those organizations or sub-groups. The system may, for example, be configured to measure the privacy maturity of the organization based on an overall handling of privacy campaigns by the organization. Various aspects of the system's functionality may be executed by certain system modules, including a Privacy Compliance Measurement Module 300 and Privacy Campaign Modification Module 400. These modules are discussed in greater detail below. Although these modules are presented as a series of steps, it should be understood in light of this disclosure that various embodiments of the various modules described herein may perform the steps described below in an order other than in which they are presented. In other embodiments, any module described herein may omit certain steps described below. In still other embodiments, any module described herein may perform steps in addition to those described.

Privacy Compliance Measurement Module

In particular embodiments, a Privacy Compliance Measurement Module 300 is configured to measure the privacy maturity of a particular organization or sub-group within the organization. As described above, the privacy maturity may include the organization's or sub-group's acumen for adhering to one or more privacy compliance requirements.

Turning to FIG. 3, in particular embodiments, when executing the Privacy Compliance Measurement Module 300, the system begins, at Step 310, by receiving a request to measure the privacy maturity of a particular organization or sub-group of the organization, which may, for example, be based on the organization's historical compliance with one or more privacy requirements in addition to a likelihood of continued compliance. As may be understood in light of this disclosure, a particular organization or sub-group may obtain, use, store, and/or transfer (e.g., among sub-groups within the organization) personal data, including sensitive personal data as part of a privacy campaign. The organization may further implement operational policies and processes that strive to comply with industry best practices and legal requirements in the handling of that personal data. In various embodiments, the operational policies and processes may include performing privacy impact assessments by the organization and/or one or more sub-groups within the organization.

In particular embodiments, the privacy maturity rating (e.g., numerical score or text score, such as “excellent” or “poor”) of the organization or sub-group may include a rating related to the organization or sub-group's compliance with the industry best practices and/or legal requirements related to the handling of personal data. In various embodiments, the privacy maturity rating may comprise a privacy maturity rating (e.g., relative rating) based on a particular scale (e.g., from 0-10, from 0-100, a percentage rating, etc.). In some embodiments, the privacy maturity rating may be further based on a likelihood of continued compliance with such legal and industry requirements, which the system may determine, for example, based on one or more attributes of the organization and/or its individual members. In particular embodiments, the privacy maturity rating may be based at least in part on, for example: (1) one or more issues or risks identified in privacy assessments submitted by the particular business unit; (2) a size and type of personal data used by the business unit; (3) a training level on various privacy issues of one or more members of the business unit; and/or (4) any other suitable factor. In further embodiments, the privacy maturity rating may be accompanied by a report that includes a number of identified issues in one or more privacy impact assessments submitted by the organization or sub-group.

Continuing to Step 320, the system retrieves information associated with one or more privacy impact assessments submitted by the organization or sub-group of the organization. In particular embodiments, the system may retrieve the information associated with the one or more privacy impact assessments in response to the request to measure the privacy maturity of the particular organization or sub-group received at Step 310. As may be understood in light of this disclosure, when initiating a new privacy campaign (e.g., any undertaking by a particular organization or sub-group that includes the collection, entry, and/or storage of any privacy information or personal data associated with one or more individuals), a particular organization may complete or perform a privacy impact assessment for the privacy campaign. An organization or sub-group may further complete or perform a privacy impact assessment for an existing privacy campaign.

In various embodiments, the privacy campaign may be associated with an electronic data structure comprising privacy campaign data. In particular embodiments, the privacy campaign data comprises a description of the privacy campaign, one or more types of personal data related to the campaign, a subject from which the personal data is collected as part of the privacy campaign, a storage location of the personal data (e.g., including a physical location of physical memory on which the personal data is stored), one or more access permissions associated with the personal data, and/or any other suitable data associated with the privacy campaign.

An exemplary privacy campaign, project, or other activity may include, for example: (1) the implementation of new hardware and/or software for storing and accessing personal data; (2) the implementation of a data sharing initiative where two or more organizations seek to pool and/or link one or more sets of personal data; (3) implantation of a proposal to identify people in a particular group or demographic and initiate a course of action; (4) using existing personal data for a new purpose; and/or (5) the consolidation of information held by separate parts of a particular organization. In still other embodiments, the particular privacy campaign, project or other activity may include any other privacy campaign, project, or other activity discussed herein, or any other suitable privacy campaign, project, or activity.

During a privacy impact assessment for a particular privacy campaign, a privacy impact assessment system may ask one or more users (e.g., one or more individuals associated with the particular organization or sub-group that is undertaking the privacy campaign) a series of privacy impact assessment questions regarding the particular privacy campaign and then store the answers to these questions in the system's memory, or in memory of another system, such as a third-party computer system.

Such privacy impact assessment questions may include questions regarding, for example: (1) what type of data is to be collected as part of the campaign; (2) who the data is to be collected from; (3) where the data is to be stored; (4) who will have access to the data; (5) how long the data will be kept before being deleted from the system's memory or archived; and/or (6) any other relevant information regarding the campaign. In various embodiments, a privacy impact assessment system may determine a relative risk and/or potential issues with a particular privacy campaign as it related to the collection and storage of personal data. For example, the system may be configured to identify a privacy campaign as being “High” risk, “Medium” risk, or “Low” risk based at least in part on answers submitted to the questions listed above. For example, a Privacy Impact Assessment that revealed that credit card numbers would be stored without encryption for a privacy campaign would likely cause the system to determine that the privacy campaign was high risk.

Continuing at Step 330, the system is configured to determine one or more identified risks with the one or more submitted privacy impact assessments. As may be understood in light of this disclosure, the system may be configured to determine one or more identified risks based on, for example: (1) one or more risks or issues identified as part of a review of a particular privacy impact assessment or privacy campaign performed by one or more third party regulators; (2) one or more issues or risks identified as part of a particular privacy impact assessment prior to initiation of a particular privacy campaign (e.g., by one or more other members of the organization or sub-group, by a system configured for identifying such issues or risks, etc.); (3) one or more issues or risks identified for an existing privacy campaign; and/or (4) etc.

In various embodiments, the one or more issues or risks may include, for example, that: (1) unnecessary personal data is to be collected as part of the privacy campaign; (2) personal data is to be stored in a manner that fails to meet one or more particular legal requirements or best industry practices; (3) personal data is to be stored in a non-suitable location; (4) access to the personal data will be available to too many individuals or entities within the origination, or external to the organization; and/or (5) any other potential issue or risk that may arise or that may have been identified based on a proposed collection and storage of personal data that makes up part of the privacy campaign.

Continuing to Step 340, the system determines, based at least in part on the one or more privacy impact assessments submitted by the organization or sub-group, information associated with privacy campaign data collected by the organization or sub-group. In various embodiments, the information associated with privacy campaign data collected by the organization or sub-group may include, for example: (1) a total number of privacy impact assessments performed or completed by the organization or sub-group; (2) a number of privacy campaigns undertaken or currently in effect that were initiated by the organization or sub-group; (3) an amount of personal data collected as part of those privacy campaigns; (4) a type of the personal data collected; (5) a volume of personal data transferred by the organization or sub-group (e.g., both within the organization or sub-group and externally to third parties, other sub-groups within the organization, etc.); and/or (6) any other suitable information related to privacy campaign data collected by the organization or sub-group or the organization or sub-group's other privacy campaign activities.

In various embodiments, the system is configured to substantially automatically track an amount of data received as part of any particular privacy campaign associated with the organization or sub-group as well as a volume of personal data transferred by the organization or sub-group. The system may, for example, track and store, in memory, a running total of privacy campaign data collected on behalf of a particular organization or subgroup. In such embodiments, the system may be configured to retrieve such information for use in determining the privacy maturity of the subgroup without having to determine the amount on--the-fly. The system may, for example, continuously track personal data collection and transfer in substantially real-time. In this way, the system may be configured to conserve processing power that would otherwise be required to determine a total amount of personal data collected and/or transferred at the time that the system is measuring privacy maturity. The system may be configured to store information related to the amount and volume of personal data collected and transferred in any suitable database. In particular embodiments, the system is further configured to associate, in memory, the collected and/or transferred data with a particular privacy campaign for which it was collected and/or transferred.

Returning to Step 350, the system continues by receiving training data associated with one or more individuals associated with the organization or sub-group. In particular embodiments, the training data may include, for example, training data associated with any suitable member of the organization or sub-group. In various embodiments, the training data comprises training data associated with one or more privacy officers within the sub-group (e.g., one or more individuals tasked with overseeing one or more privacy campaigns undertaken by the organization or sub-group). In still other embodiments, the training data comprises training data associated with any individual that has at least partially completed or performed a privacy impact assessment for the organization or sub-group. In still other embodiments, the training data includes training data for every member of a particular organization or sub-group (e.g., all employees within a Marketing business unit that have access to personal data collected as part of one or more privacy campaigns).

In various embodiments, the system is configured to retrieve the training data from memory. In such embodiments, the system is configured to maintain a database (e.g., in memory) of training data for each of a plurality of employees and other individuals associated with a particular organization or sub-group (e.g., business unit). In various embodiments, the system is configured to receive input, by any suitable individual, of updated training data for particular individuals associated with the organization or sub-group. For example, the system may receive a listing of one or more individuals who have received a particular privacy certification within the organization or sub-group.

In any embodiment described herein, the training data may include, for example: (1) a number or percentage of individuals within the organization or sub-group who have completed one or more privacy trainings (e.g., viewed one or more privacy videos, attended one or more privacy training sessions, etc.); (2) a number or percentage of individuals within the organization or sub-group who have completed one or more privacy-related quizzes or tests indicating knowledge of proper procedures relating to the collection and storage of personal data; (3) a number or percentage of individuals within the organization or sub-group who have attended one or more privacy events (e.g., internal privacy events within the organization or external privacy events put on by one or more third parties) such as a privacy conference or seminar; (4) a number or percentage of individuals within the organization or sub-group that are members of the International Association of Privacy Professionals (IAPP) or other privacy professional association; (5) a number or percentage of individuals within the organization or sub-group that hold one or more certifications related to privacy (e.g., CIPP certification, CIPT certification; CIPM certification, etc.), for example, through one or more privacy professional organizations (e.g., such as IAPP); (6) a number or percentage of individuals within the organization or sub-group that have received formal privacy training; (7) a number or percentage of individuals within the organization or sub-group that utilize one or more available mobile training modules or communication portals as part of a privacy campaign; and/or (8) any other suitable training data related to particular individuals' aptitude and training for following legal requirements and best industry practices related to the collection and storage of personal data and other privacy information.

In particular embodiments, as may be understood in light of this disclosure, the training data associated with particular individuals may impact a particular organization's privacy maturity in that a level of knowledge of the individuals involved with initiating and maintaining privacy campaigns for the organization may affect the organization's effectiveness and consistency in complying with legal and industry privacy requirements. For example, an individual with more training and experience may be less likely to mistakenly assign a particular type of personal data to be stored in an improper location than an individual with no training or experience.

Continuing to Step 360, the system generates and displays a privacy maturity report for the organization or sub-group based at least in part on the one or more identified issues or risks, the information associated with the privacy campaign data, and the training data. In various embodiments, the system is configured to display the privacy maturity report on a computing device via a suitable graphical user interface. In various embodiments, the privacy maturity report may be calculated using a suitable formula. In such embodiments, the system is configured to weigh the factors discussed above in any suitable manner. For example, the system may place higher weight on previous issues found in submitted privacy assessments by a particular organization when determining privacy maturity. In still other embodiments, the system may be configured to give a higher weight to a total amount of personal data handled by the organization (e.g., because, for example, an organization that has experience handling a large amount of personal data may be better equipped to follow legal and industry guidelines).

In various embodiments, the system is configured to assign a privacy maturity score to the particular organization or sub-group. The privacy maturity score may enable users of the privacy compliance measurement system to compare one or more organization's privacy maturity based on their relative respective scores. In this way, for example, a particular organization may be able to determine which business groups within the organization require, for example: (1) additional training in privacy matters; (2) additional oversight of their associated privacy campaigns; (3) etc.

Although the Privacy Compliance Measurement Module 300 is described above in reference to generating a privacy maturity report in response to a request to measure privacy maturity, it should be understood that any embodiment of the system described herein may measure privacy maturity of particular business groups or other sub-groups within an organization substantially automatically. For example, in any embodiment described herein, the system may be configured to substantially automatically measure a particular group's privacy maturity according to a particular schedule (e.g., weekly, monthly, quarterly, annually, every certain number of years, and/or according to any other suitable review schedule). In particular embodiments, the system is configured to substantially automatically measure a particular group's privacy maturity based at least in part on a type of privacy campaign, project, or other activity that the group undertakes that relates to the collection and storage of personal data.

Privacy Assessment Modification Module

In particular embodiments, a Privacy Assessment Modification Module 400 is configured to modify one or more aspects related to one or more privacy campaigns of a particular sub-group within an organization based at least in part on the sub-group's privacy maturity. For example, the system may, in various embodiments, initiate stricter review standards or oversight for those sub-groups with relatively low privacy maturity scores. In another example, the system may automatically generate or distribute electronic training materials to members of a sub-group with a low privacy maturity score.

In particular embodiments, modifying one or more aspects of one or more privacy campaigns of various sub-groups within an organization may conserve resources related to reviewing and analyzing privacy impact assessments and privacy campaigns for the organization as a whole. Turning to FIG. 4, in particular embodiments, when executing the Privacy Assessment Modification Module 400, the system begins, at Step 410, by retrieving one or more privacy maturity reports for one or more sub-groups within an organization. In particular embodiments, the system is configured to retrieve the one or more privacy maturity reports from memory. In various embodiments, the one or more privacy maturity reports may have been produced using the Privacy Maturity Measurement Module 300 described above. In various embodiments, the system is configured to retrieve one or more privacy maturity reports for one or more sub-groups within the organization for which the organization desires to compare privacy maturity.

Continuing to Step 420, the system modifies one or more privacy campaigns related to at least one of the one or more sub-groups based at least in part on the one or more privacy maturity reports. In particular embodiments, the system is configured to substantially automatically modify any suitable privacy assessment aspect related to the at least one of the one or more sub-groups. For example, a particular privacy campaign initiated by the at least one sub-group may include a particular privacy audit schedule (e.g., weekly, monthly, annually, etc.). In various embodiments, the privacy audit may be substantially automatically performed by a system according to the schedule in order to review the personal data collection and storage procedures utilized by the particular privacy campaign.

In this example, the system may be configured to modify the audit schedule based on the one or more privacy maturity reports by increasing the frequency of the privacy audits in response to determining that the at least one sub-group has a lower privacy maturity score than other sub-groups within the organization. In this way, the system may allocate limited resources (e.g., computing resources) to auditing and assessing those privacy campaigns that have been initiated and are maintained and run by sub-groups within the organization that are more likely to have an issue or run afoul of one or more legal requirements or best industry practices relating to personal data collection and storage.

In particular embodiments, the system is configured to substantially automatically trigger a review of at least one aspect of at least one privacy campaign associated with at least one sub-group within the organization based on the one or more privacy maturity reports. For example, the system may determine, based on the one or more privacy maturity reports, that the at least one-subgroup has a large number of associated privacy campaigns and a high privacy maturity score. However, the system may further determine that the at least one sub-group, in its privacy campaigns, has a large crossover of personal data stored as part of the various privacy campaigns, and often utilizes data storage techniques that exceed legal and industry requirements. In such embodiments, the system may substantially automatically modify one or more aspects of the privacy campaigns to meet but not exceed a particular legal or industry standard. In such embodiments, the system may, for example, be configured to: (1) limit redundancy of stored data (e.g., which may conserve memory) across privacy campaigns that collect similar data; (2) eliminate unnecessary data permission limitations; and/or (3) take any other action which may limit privacy campaign data recall times, storage size, transfer time, etc.

Exemplary User Experience

In exemplary embodiments of a privacy compliance measurement system, a user may access a privacy compliance system, for example: (1) to initiate a new privacy campaign; (2) to perform or complete a privacy impact assessment; (3) to review one or more privacy maturity reports; (4) to provide one or more metrics to customize a determination of privacy maturity; and/or (5) take any other action related to the privacy compliance system. For example, a user that is part of a particular business group within an organization (e.g., an IT group) may access the system to initiate a privacy impact assessment that the system may later use as part of a determination regarding a privacy maturity of the particular business group. FIGS. 5-13 depict exemplary screen displays of a privacy compliance system and a privacy compliance measurement system according to particular embodiments. As may be understood from these figures in light of this disclosure, a privacy compliance system may provide access to the privacy compliance system (e.g., to an individual associated with an organization) via one or more GUIs with which the individual may: (1) initiate a new privacy campaign, project, or other activity; (2) modify an existing privacy campaign; (3) view privacy maturity data, etc.

The one or more GUIs may enable the individual to, for example, provide information such as: (1) a description of the campaign; (2) the personal data to be collected as part of the campaign; (3) who the personal data relates to; (4) where the personal data is to be stored; and (5) who will have access to the indicated personal data, etc. Various embodiments of a system for implementing and auditing a privacy campaign are described in U.S. patent application Ser. No. 15/169,643, filed May 31, 2016 entitled “Data Processing Systems and Methods for Operationalizing Privacy Compliance and Assessing the Risk of Various Respective Privacy Campaigns”, which is hereby incorporated by reference herein in its entirety. In particular embodiments, the system is further configured to provide access to a privacy compliance measurement system via one or more GUIs that enable the user to view and compare privacy maturity data for one or more business groups within an organization. These exemplary screen displays and user experiences according to particular embodiments are described more fully below.

A. FIG. 5: Initiating a New Privacy Campaign, Project, or Other Activity

FIG. 5 illustrates an exemplary screen display with which a user associated with an organization (e.g., or a sub-group or business unit within the organization) may initiate a new privacy campaign, project, or other activity. As may be understood in light of this disclosure, data entered during the initiation of a new privacy campaign may be utilized by the system when determining a privacy maturity of the organization. As may be further understood from this disclosure, training data about the user, or any user that is part of the organization or has any input into the initiation of a particular privacy campaign on behalf of the organization may be received by the system for use in the privacy compliance measurement process described above with respect to Step 350 of the Privacy Compliance Measurement Module 300.

As shown in FIG. 5, a description entry dialog 800 may have several fillable/editable fields and/or drop-down selectors. In this example, the user may fill out the name of the campaign (e.g., project or activity) in the Short Summary (name) field 805, and a description of the campaign in the Description field 810. The user may enter or select the name of the business group (or groups) that will be accessing personal data for the campaign in the Business Group field 815 (i.e., the “Internet” business group in this example). The user may select the primary business representative responsible for the campaign (i.e., the campaign's owner), and designate him/herself, or designate someone else to be that owner by entering that selection through the Someone Else field 820. Similarly, the user may designate him/herself as the privacy office representative owner for the campaign, or select someone else from the second Someone Else field 825.

At any point, a user assigned as the owner may also assign others the task of selecting or answering any question related to the campaign. The user may also enter one or more tag words associated with the campaign in the Tags field 830. After entry, the tag words may be used to search for campaigns, or used to filter for campaigns (for example, under Filters 845). The user may assign a due date for completing the campaign entry, and turn reminders for the campaign on or off. The user may save and continue, or assign and close.

In example embodiments, some of the fields may be filled in by a user, with suggest-as-you-type display of possible field entries (e.g., Business Group field 815), and/or may include the ability for the user to select items from a drop-down selector (e.g., drop-down selectors 840 a, 840 b, 840 c). The system may also allow some fields to stay hidden or unmodifiable to certain designated viewers or categories of users. For example, the purpose behind a campaign may be hidden from anyone who is not the chief privacy officer of the company, or the retention schedule may be configured so that it cannot be modified by anyone outside of the organization's' legal department.

In various embodiments, when initiating a new privacy campaign, project, or other activity (e.g., or modifying an existing one), the user associated with the organization may set a Due Date 835 that corresponds to a date by which the privacy campaign needs to be approved by a third-party regulator (e.g., such that the campaign may be approved prior to launching the campaign externally and/or beginning to collect data as part of the campaign). In various embodiments, the system may limit the proximity of a requested Due Date 835 to a current date based on a current availability of third-party regulators and/or whether the user has requested expedited review of the particular privacy campaign.

B. FIG. 6: Collaborator Assignment Notification and Description Entry

Moving to FIG. 6, in example embodiments, if another business representative (owner), or another privacy office representative has been assigned to the campaign (e.g., John Doe in FIG. 5), the system may send a notification (e.g., an electronic notification) to the assigned individual, letting them know that the campaign has been assigned to him/her. FIG. 6 shows an example notification 900 sent to John Doe that is in the form of an email message. The email informs him that the campaign “Internet Usage Tracking” has been assigned to him, and provides other relevant information, including the deadline for completing the campaign entry and instructions to log in to the system to complete the campaign (data flow) entry (which may be done, for example, using a suitable “wizard” program). The user that assigned John ownership of the campaign may also include additional comments 905 to be included with the notification 900. Also included may be an option to reply to the email if an assigned owner has any questions.

In this example, if John selects the hyperlink Privacy Portal 910, he is able to access the system, which displays a landing page 915. The landing page 915 displays a Getting Started section 920 to familiarize new owners with the system, and also display an “About This Data Flow” section 930 showing overview information for the campaign. As may be understood in light of this disclosure, in response to accessing the Privacy Portal 910 for the particular privacy campaign by John Doe, the system may collect, receive, or otherwise retrieve training data associated with John Doe. In various embodiments, because John Doe may be contributing to the privacy campaign by providing information about various aspects of the privacy campaign, John Doe's training data may become relevant to the privacy maturity of the particular campaign as well as to the organization responsible for the campaign.

C. FIG. 7: What Personal Data is Collected

FIG. 7 depicts an exemplary screen display that shows a type of personal data that is collected as part of a particular campaign, in addition to a purpose of collecting such data, and a business need associated with the collection. As described in this disclosure, information entered during the initiation of a privacy campaign may be utilized by the system in order to determine a privacy maturity of a particular privacy campaign, organization, sub-group of the organization, or any other suitable entity or undertaking.

As shown in FIG. 7, after the first phase of campaign addition (i.e., description entry phase), the system may present the user (who may be a subsequently assigned business representative or privacy officer associated with the organization) with a dialog 1000 from which the user may enter in the type of personal data being collected.

For example, in FIG. 7, the user may select from Commonly Used 1005 selections of personal data that will be collected as part of the privacy campaign. This may include, for example, particular elements of an individual's contact information (e.g., name, address, email address), Financial/Billing Information (e.g., credit card number, billing address, bank account number), Online Identifiers (e.g., IP Address, device type, MAC Address), Personal Details (Birthdate, Credit Score, Location), or Telecommunication Data (e.g., Call History, SMS History, Roaming Status). The System 100 is also operable to pre-select or automatically populate choices—for example, with commonly-used selections 1005, some of the boxes may already be checked. The user may also use a search/add tool 1010 to search for other selections that are not commonly used and add another selection. Based on the selections made, the system may present the user with more options and fields. For example, in response to the user selecting “Subscriber ID” as personal data associated with the campaign, the user may be prompted to add a collection purpose under the heading Collection Purpose 1015, and the user may be prompted to provide the business reason why a Subscriber ID is being collected under the “Describe Business Need” heading 1020.

D. FIG. 8: Who Personal Data is Collected From

FIG. 8 depicts a screen display that shows who personal data is collected from in the course of the privacy campaign. As discussed herein, particular privacy campaigns may collect personal data from different individuals, and guidelines may vary for privacy campaigns based on particular individuals about whom data is collected. Laws may, for example, allow an organization to collect particular personal data about their employees that they are unable to collect about customers, and so on. In various embodiments, a particular business unit's privacy maturity may depend upon who the business unit is collecting personal data from. For example, in response to determining that a business unit collects data from a wide range of individuals including minors and members of various legal jurisdictions (e.g., across different countries), the system may rate the business unit as having a low privacy maturity score where members of the business unit are not particularly highly trained regarding the handing of these particular types of personal data.

As shown in the example of FIG. 8, the system may be configured to enable an organization user to enter and select information regarding who the personal data is gathered from as part of the privacy campaign. As noted above, the personal data may be gathered from, for example, one or more subjects. In the exemplary “Collected From” dialog 1100, an organization user may be presented with several selections in the “Who Is It Collected From” section 1105. These selections may include whether the personal data is to be collected from an employee, customer, or other entity as part of the privacy campaign. Any entities that are not stored in the system may be added by the user. The selections may also include, for example, whether the data will be collected from a current or prospective subject (e.g., a prospective employee may have filled out an employment application with his/her social security number on it). Additionally, the selections may include how consent was given, for example, through an end user license agreement (EULA), on-line Opt-in prompt, implied consent, or an indication that the user is not sure. Additional selections may include whether the personal data was collected from a minor, and/or where the subject is located.

E. FIG. 9: Where is the Personal Data Stored

FIG. 9 depicts a screen display that shows where and how personal data is stored as part of the privacy campaign (e.g., on what physical server and in what location, using what encryption, etc.). As may be understood in light of this disclosure, particular privacy campaigns may collect different types of personal data, and storage guidelines may vary for privacy campaigns based on particular types of personal data collected and stored (e.g., more sensitive personal data may have higher encryption requirements, etc.). As may be understood in light of this disclosure, the system may be configured to substantially automatically modify one or more aspects of a particular privacy campaign in response to determining that a privacy maturity score of a particular business group or sub-group of an organization associated with the privacy campaign is too low. For example, regarding personal information storage, the system may substantially automatically modify a type of encryption used to store personal data (e.g., to a stronger level of encryption) where a particular business group has a relatively low privacy maturity score. In this way, the system may, for example, alleviate or otherwise prevent exposure to potential fines or other sanctions as a result of insufficiently protecting collected data (e.g., by failing to meet one or more legal standards).

FIG. 9 depicts an example “Storage Entry” dialog screen 1200, which is a graphical user interface that an organization user may use to indicate where particular sensitive information is to be stored within the system as part of a particular privacy campaign. From this section, a user may specify, in this case for the Internet Usage History campaign, the primary destination of the personal data 1220 and how long the personal data is to be kept 1230. The personal data may be housed by the organization (in this example, an entity called “Acme”) or a third party. The user may specify an application associated with the personal data's storage (in this example, ISP Analytics), and may also specify the location of computing systems (e.g., one or more physical servers) that will be storing the personal data (e.g., a Toronto data center). Other selections indicate whether the data will be encrypted and/or backed up.

In various embodiments, the system also allows the user to select whether the destination settings are applicable to all the personal data of the campaign, or just select data (and if so, which data). As shown in FIG. 9, the organization user may also select and input options related to the retention of the personal data collected for the campaign (e.g., How Long Is It Kept 1230). The retention options may indicate, for example, that the campaign's personal data should be deleted after a pre-determined period of time has passed (e.g., on a particular date), or that the campaign's personal data should be deleted in accordance with the occurrence of one or more specified events (e.g., in response to the occurrence of a particular event, or after a specified period of time passes after the occurrence of a particular event), and the user may also select whether backups should be accounted for in any retention schedule. For example, the user may specify that any backups of the personal data should be deleted (or, alternatively, retained) when the primary copy of the personal data is deleted.

In particular embodiments, the system is configured to prompt the user to provide additional information when indicating where particular sensitive information is to be stored as part of the particular privacy campaign. For example, where the user is part of a business group with a relatively low maturity score, the system may be configured to prompt the user to provide additional information regarding where, how, and how long personal data will be stored as part of the privacy campaign. In some embodiments, the system may automatically generate recommendations to store the personal data in a location other than a location initially entered by the user.

F. FIG. 10: Who and Which Systems Have Access to Personal Data

FIG. 10 depicts an exemplary screen display that shows who and which systems have access to personal data that is stored as part of the privacy campaign (e.g., what individuals, business groups, etc. have access to the personal data.). As may be understood in light of this disclosure, particular privacy campaigns may require different individuals, groups, or systems within an organization to access personal data to use it for the purpose for which it was collected (e.g., to run payroll, billing purposes, etc.). As may be understood in light of this disclosure, the system may be configured to substantially automatically modify one or more aspects of a particular privacy campaign in response to determining that a privacy maturity score of a particular business group or sub-group of an organization associated with the privacy campaign is too low or very high. For example, regarding who has access to personal data that is stored as part of the privacy campaign, the system may substantially automatically modify one or more permissions for the data to further limit access or remove limitations. In this way, the system may, for example, eliminate unnecessary data permission limitations

FIG. 10 depicts an example Access entry dialog screen 1300 that an organization user may use to input various access groups that have permission to access particular personal data that makes up part of the privacy campaign. As part of the process of adding a campaign or data flow, the user may specify particular access groups in the “Who Has Access” section 1305 of the dialog screen 1300. In the example shown, the Customer Support, Billing, and Governments groups within the organization may be able to access the Internet Usage History personal data collected by the organization as part of the privacy campaign. Within each of these access groups, the user may select the type of each group, the format in which the personal data may be provided, and whether the personal data is encrypted. The access level of each group may also be entered. The user may add additional access groups via the Add Group button 1310.

G: FIG. 11: Campaign Inventory Page

After new campaigns have been added, for example using the exemplary processes explained in regard to FIGS. 5-10, the users of the system may view their respective campaign or campaigns, depending on whether they have access to the campaign and the type of access system they have to the system. The chief privacy officer, or another privacy office representative, for example, may be the only user that may view all campaigns. A regulator may be limited to viewing only those campaigns that they have been tasked to review. A listing of all of the campaigns within the system may be viewed on, for example, inventory page 1500 (see below).

FIG. 11 depicts an example embodiment of an inventory page 1500 that may be generated by the system. The inventory page 1500 may be represented in a graphical user interface. Each of the graphical user interfaces (e.g., webpages, dialog boxes, etc.) presented in this application may be, in various embodiments, an HTML-based page capable of being displayed on a web browser (e.g., Firefox, Internet Explorer, Google Chrome, Opera, etc.), or any other computer-generated graphical user interface operable to display information, including information having interactive elements (e.g., an iOS, Mac OS, Android, Linux, or Microsoft Windows application). The webpage displaying the inventory page 1500 may include typical features such as a scroll-bar, menu items, as well as buttons for minimizing, maximizing, and closing the webpage. The inventory page 1500 may be accessible to the organization's chief privacy officer, or any other of the organization's personnel having the need, and/or permission, to view personal data.

Still referring to FIG. 11, inventory page 1500 may display one or more campaigns listed in the column heading Data Flow Summary 1505, as well as other information associated with each campaign, as described herein. Some of the exemplary listed campaigns include Internet Usage History 1510 (e.g., described above with respect to FIGS. 4-9), Customer Payment Information, Call History Log, Cellular Roaming Records, etc. A campaign may represent, for example, a business operation that the organization is engaged in and may require the use of personal data, which may include the personal data of a customer. In the campaign Internet Usage History 1510, for example, a marketing department may need customers' on-line browsing patterns to run certain types of analytics.

The inventory page 1500 may also display the status of each campaign, as indicated in column heading Status 1515. Exemplary statuses may include “Pending Review”, which means the campaign has not been approved yet, “Approved,” meaning the personal data associated with that campaign has been approved, “Audit Needed,” which may indicate that a privacy audit of the personal data associated with the campaign is needed, and “Action Required,” meaning that one or more individuals associated with the campaign must take some kind of action related to the campaign (e.g., completing missing information, responding to an outstanding message, etc.). In certain embodiments, the approval status of the various campaigns relates to approval by one or more third-party regulators as described herein.

The inventory page 1500 of FIG. 11 may list the “source” from which the personal data associated with a campaign originated, under the column heading “Source” 1520. As an example, the campaign “Internet Usage History” 1510 may include a customer's IP address or MAC address. For the example campaign “Employee Reference Checks”, the source may be a particular employee.

The inventory page 1500 of FIG. 11 may also list the “destination” of the personal data associated with a particular campaign under the column heading Destination 1525. Personal data may be stored in any of a variety of places, for example, in one or more databases 140 that are maintained by a particular entity at a particular location. Different custodians may maintain one or more of the different storage devices. By way of example, referring to FIG. 10, the personal data associated with the Internet Usage History campaign 1510 may be stored in a repository located at the Toronto data center, and the repository may be controlled by the organization (e.g., Acme corporation) or another entity, such as a vendor of the organization that has been hired by the organization to analyze the customer's internet usage history. Alternatively, storage may be with a department within the organization (e.g., its marketing department).

On the inventory page 1500, the Access heading 1530 may show the number of transfers that the personal data associated with a campaign has undergone. This may, for example, indicate how many times the data has been accessed by one or more authorized individuals or systems.

The column with the heading Audit 1535 shows the status of any privacy audits associated with the campaign. Privacy audits may be pending, in which an audit has been initiated but yet to be completed. The audit column may also show for the associated campaign how many days have passed since a privacy audit was last conducted for that campaign. (e.g., 140 days, 360 days). If no audit for a campaign is currently required, an “OK” or some other type of indication of compliance (e.g., a “thumbs up” indicia) may be displayed for that campaign's audit status. The audit status, in various embodiments, may refer to whether the privacy campaign has been audited by a third-party regulator or other regulator as required by law or industry practice or guidelines. As discussed above, in any embodiment described herein, the system may be configured to substantially automatically adjust an audit schedule for one or more privacy campaigns associated with a particular organization based at least in part on that organization's privacy maturity.

The example inventory page 1500 may comprise a filter tool, indicated by Filters 1545, to display only the campaigns having certain information associated with them. For example, as shown in FIG. 11, under Collection Purpose 1550, checking the boxes “Commercial Relations,” “Provide Products/Services”, “Understand Needs,” “Develop Business & Ops,” and “Legal Requirement” will result the display under the Data Flow Summary 1505 of only the campaigns that meet those selected collection purpose requirements.

From example inventory page 1500, a user may also add a campaign by selecting (i.e., clicking on) Add Data Flow 1555. Once this selection has been made, the system initiates a routine (e.g., a wizard) to guide the user in a phase-by-phase manner through the process of creating a new campaign. An example of the multi-phase GUIs in which campaign data associated with the added privacy campaign may be input and associated with the privacy campaign record is described in FIGS. 5-10 above.

From the example inventory page 1500, a user may view the information associated with each campaign in more detail, or edit the information associated with each campaign. To do this, the user may, for example, click on or select the name of the campaign (i.e., click on Internet Usage History 1510). As another example, the user may select a button displayed on the screen indicating that the campaign data is editable (e.g., edit button 1560).

H. FIG. 12: Privacy Maturity Report Overview

FIG. 12 depicts an exemplary privacy maturity report overview 1600 that includes privacy maturity information for a plurality of Business Groups 1605 within an organization. As may be understood from this figure, the system is configured to display, via a GUI such as the GUI shown in FIG. 12, privacy maturity data for each of a plurality of business groups within an organization. As may be understood from this disclosure, in still other embodiments, the system may be configured to display privacy maturity data for a particular privacy campaign, a group of related privacy campaigns, an entire organization, a group of organizations or sub-groups, etc.

As shown in FIG. 12, the privacy maturity report overview 1600 includes a Maturity Score 1610 for each of the plurality of Business Groups 1605, as well as a Maturity Score delta Δ 1615, which may include, for example, a change in privacy maturity rating for the respective business group. In particular embodiments, the system is configured to determine a maturity score using the Privacy Compliance Measurement Module 300 described above. In various embodiments, the change in privacy maturity may represent, for example, a change in privacy maturity score since the most recent privacy maturity report was generated by the system. In other embodiments, the Maturity Score delta A 1615 may represent a change in privacy maturity score over any relevant period of time (e.g., day-to-day, etc.). As a particular example, the privacy maturity score of a group may increase following attendance of a privacy conference by members of the group.

In particular embodiments, the privacy maturity report overview 1600 includes an indication of whether there has been action taken by the system relating to a particular business group's privacy maturity, via an “Action Taken?” 1620 indicia. As may be understood from this figure and this disclosure, the system may be configured to substantially automatically modify one or more aspects of one or more particular privacy campaigns based at least in part on the privacy maturity of a particular business group associated with the one or more privacy campaigns. In such embodiments, the system is configured to notify one or more individuals, via the privacy maturity report overview 1600 interface that action has been taken. The one or more individuals may then, for example, request more detail about the privacy maturity report and action taken by selecting a suitable “More Detail” indicia 1625.

I. FIG. 13: Overall Privacy Maturity of a Particular Business Group

FIG. 13 depicts a privacy maturity report 1700 for a particular business group (e.g., the Internet Business Group) from FIG. 12. In the embodiment shown in this figure, the user interface may indicate relative weighting factors used in the determination of the privacy maturity score for the particular business group. These factors, described above with respect to the Privacy Compliance Measurement Module 300 may include, for example: (1) “Frequency of Identified Risks for Submitted PIAs” (Privacy Impact Assessments) 1705; (2) “Relative Training Level of Members of Business Group” 1710; and (3) “Breadth and Amount of Personal Data Collected by Business Group” 1715. As shown in this figure, the privacy maturity report 1700 may indicate whether these particular factors were “High,” “Medium,” or “Low.” In particular embodiments, the report further includes the Privacy Maturity Score 1720 for the business group. In particular embodiments, the system is configured to determine the maturity score based on the three factors listed above. In some embodiments, the system is configured to use a weighted average, which may, for example, assign a particular weighting to each factor and determine an average maturity score based on whether the factor is determined by the system to be “High”, “Medium”, or “Low”. In some embodiments, the system is configured to enable a user to provide customized weighting factors for each of these categories of factors. In other embodiments, the system is configured to enable a user to supply to the system a weighting factor for any suitable factor described herein or any other suitable factor when determining a privacy maturity score.

Alternative Embodiments

Various embodiments of the privacy compliance measurement systems described herein may include features in addition to those described above. Exemplary alternative embodiments are described below.

Automatic Implementation of Privacy Campaign, Project, or Other Activity for Business Groups with High Privacy Maturity

In embodiments in which a privacy campaign (e.g., or project or other activity) requires third-party, privacy office, or other approval prior to implementation, the system may be configured to substantially automatically implement the privacy campaign in response to determining that the privacy maturity score of the business group initiating the privacy campaign exceeds a particular threshold. For example, in response to determining that a business group has a privacy maturity score above a certain threshold amount, the system may be configured to automatically initiate a new privacy campaign for the business group by beginning to collect the personal data as directed by the campaign. In this way, the system may be configured to conserve computing and other resources by avoiding a full audit of a privacy campaign prior to initiation for those business groups that are unlikely to initiate a privacy campaign that includes one or more issues or risks (e.g., because the business group has a relatively high privacy maturity).

Automatic Modification and Flagging of One or More Privacy Campaigns in Response to Determination that a Particular Business Group has Low Privacy Maturity

In particular embodiments, such as those described above, the system may determine that a particular business group or other sub-group of an organization has a privacy maturity score below a threshold amount. In such embodiments, the system may be configured to substantially automatically modify one or more privacy campaigns associated with the particular business group to, for example: (1) increase a level of encryption used on stored personal data; (2) further limit access to stored personal data; (3) decrease an amount of time for which personal data is stored; and/or (4) take any other suitable additional precaution with respect to the personal data collected and stored as part of the one or more privacy campaigns to reduce a likelihood that the campaign may run afoul of one or more legal or industry standards for the collection and storage of personal data.

In various embodiments, in addition to automatically modifying the one or more privacy campaigns, the system may automatically flag the one or more privacy campaigns for further review or audit. In such embodiments, the system may be configured to: (1) maintain the modifications until the audit or review occurs; (2) receive an indication that the audit or review has been completed and the original aspects of the one or more privacy campaigns were sufficient to meet or exceed relevant legal or industry standards; and (3) in response to receiving the indication, reverting the modified aspects of the one or more privacy campaigns to their defaults.

Privacy Maturity Determination Based on Public Record and Other Data Scans

In any embodiment of the system described herein, a particular organization may undertake one or more privacy campaigns, processing activities, or other activities that collect, store, and otherwise process data (e.g., personal data). These processing activities may be undertaken by particular groups within the particular organization (e.g., sub groups, groups of individuals, etc.).

In light of the above, the system may use one or more techniques described herein in combination with one or more additional suitable factors, to electronically calculate or otherwise determine a privacy maturity of a particular group of individuals (e.g., organization) within an organization.

In various embodiments, the system may, for example, determine a privacy maturity of a particular group of individuals based on any technique described herein in addition to, for example: (1) the nature of the sensitive information collected bas part of a processing activity undertaken by the group of individuals; (2) the location in which the information is stored as part of such a processing activity (e.g., as part of a piece of computer software published by the group of individuals) (3) the number of individuals who have access to the information collected and/or stored by such a processing activity; (4) the length of time that the data will be stored by (5) the individuals whose sensitive information will be stored; (6) the country of residence of the individuals whose sensitive information will be stored; and/or (7) any other suitable factor related to the collection, processing and/or storage of data (e.g., personal data) by any processing activity undertaken by the group of individuals.

In particular embodiments, the system may, for example, be configured to calculate a privacy maturity score for a particular individual, group of individuals, departments, etc. within an organization. The system may then, in various embodiments, use the privacy maturity score in order to calculate a risk rating or other risk score for a particular piece of software or other service initiated by the group of individuals.

In various embodiments, the system may, for example: (1) analyze one or more pieces of publicly available data associated with the one or more individuals that make up the group for which privacy maturity is being evaluated: and (2) calculate the privacy maturity score for the group (e.g., business unit) based on the analyzed one or more pieces of publicly available data. In particular embodiments, the system is configured to analyze one or more pieces of the group's published applications of software available to one or more customers to detect one or more privacy disclaimers associated with the published applications. The system may then, for example, be configured to use one or more text matching techniques to determine whether the one or more privacy disclaimers contain one or more pieces of language required by one or more prevailing industry or legal requirements related to data privacy. The system may, for example, be configured to assign a relatively high privacy maturity score to a group whose published software includes required privacy disclaimers, and configured to assign a relatively low privacy maturity score to group whose software does not include such disclaimers.

In another example, the system may be configured to analyze one or more websites associated with the group (e.g., one or more websites that host one or more pieces of computer code or software made available by the group) for one or more privacy notices, one or more blog posts, one or more preference centers, and/or one or more control centers. The system may, for example, calculate the privacy maturity score based at least in part on a presence of one or more suitable privacy notices, one or more contents of one or more blog posts on the group site (e.g., whether the group site has one or more blog posts directed toward user privacy), a presence of one or more preference or control centers that enable visitors to the site to opt in or out of certain data collection policies (e.g., cookie policies, etc.), etc.

In particular other embodiments, the system may be configured to determine whether the particular group (e.g., or any of its members) holds one or more security certifications. The one or more security certifications may include, for example: (1) system and organization control (SOC); (2) International Organization for Standardization (ISO); (3) Health Insurance Portability and Accountability ACT (HIPPA); (4) etc. In various embodiments, the system is configured to access one or more public databases of security certifications to determine whether the particular group or any suitable number of its individual members holds any particular certification. The system may then determine the privacy maturity score based on whether the group or its members hold one or more security certifications (e.g., the system may calculate a relatively higher score depending on one or more particular security certifications held by members of the group or business unit). The system may be further configured to scan a group website for an indication of the one or more security certifications.

In various embodiments, the system may be further configured to analyze on or more credit bureau databases, one or more government or industry certification body databases, one or more vendor membership databases, or other suitable databases to determine whether the particular group belongs to or is associated with one or more organizations that may indicate a particular awareness and attention to one or more privacy issues (e.g., one or more issues related to the collection, storage, and/or processing of personal data).

In still other embodiments, the system is configured to analyze one or more social networking sites (e.g., LinkedIn, Facebook, etc.) and/or one or more business related job sites (e.g., one or more job-posting sites, one or more corporate websites, etc.). The system may, for example, use social networking and other data to identify one or more employee titles of the business unit, one or more job roles for one or more employees in the group, one or more job postings for the for the business unit (e.g., group), etc. The system may then analyze the one or more job titles, postings, listings, roles, etc. to determine whether the group has or is seeking one or more employees that have a role associated with data privacy or other privacy concerns. In this way, the system may determine whether the group is particularly focused on privacy or other related activities. The system may then calculate a privacy maturity score based on such a determination (e.g., a vendor that has one or more employees whose roles or titles are related to privacy may receive a relatively higher privacy awareness score).

In particular embodiments, the system may be configured to calculate the privacy maturity score using one or more additional factors such as, for example: (1) public information associated with one or more events that the group or its members may be attending; (2) public information associated with one or more conferences that the group or its members have participated in or are planning to participate in; (3) etc. In some embodiments, the system may calculate a privacy maturity score based at least in part on one or more government relationships with the group. For example, the system may be configured to calculate a relatively high privacy maturity score for a group that has one or more contracts with one or more government entities (e.g., because an existence of such a contract may indicate that the group has passed one or more vetting requirements imposed by the one or more government entities).

In any embodiment described herein, the system may be configured to assign, identify, and/or determine a weighting factor for each of a plurality of factors used to determine a privacy maturity score for a particular entity, group, organization, or plurality of individuals. For example, when calculating the privacy maturity score, the system may assign a first weighting factor to whether the group has one or more suitable privacy notices posted on the vendor website, a second weighting factor to whether the group has one or more particular security certifications, etc. The system may, for example, assign one or more weighting factors using any suitable technique described herein with relation to risk rating determination. In some embodiments, the system may be configured to receive the one or more weighting factors (e.g., from a user). In other embodiments, the system may be configured to determine the one or more weighting factors based at least in part on a type of the factor.

In any embodiment described herein, the system may be configured to determine an overall risk rating for a particular group (e.g., particular piece of vendor software) based in part on the privacy maturity score. In other embodiments, the system may be configured to determine an overall risk rating for a particular group based on the privacy maturity rating in combination with one or more additional factors (e.g., one or more additional risk factors described herein). In any such embodiment, the system may assign one or more weighting factors or relative risk ratings to each of the privacy maturity score and other risk factors when calculating an overall risk rating. The system may then be configured to provide the risk score for the group, software, and/or service for use in calculating a risk of undertaking any particular processing activity that the group may undertake (e.g., in any suitable manner described herein).

CONCLUSION

Although embodiments above are described in reference to various privacy compliance measurement systems, it should be understood that various aspects of the system described above may be applicable to other privacy-related systems, or to other types of systems, in general.

While this specification contains many specific embodiment details, these should not be construed as limitations on the scope of any invention or of what may be claimed, but rather as descriptions of features that may be specific to particular embodiments of particular inventions. Certain features that are described in this specification in the context of separate embodiments may also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment may also be implemented in multiple embodiments separately or in any suitable sub-combination. Moreover, although features may be described above as acting in certain combinations and even initially claimed as such, one or more features from a claimed combination may in some cases be excised from the combination, and the claimed combination may be directed to a sub-combination or variation of a sub-combination.

Similarly, while operations are depicted in the drawings in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order, or that all illustrated operations be performed, to achieve desirable results. In certain circumstances, multitasking and parallel processing may be advantageous. Moreover, the separation of various system components in the embodiments described above should not be understood as requiring such separation in all embodiments, and it should be understood that the described program components and systems may generally be integrated together in a single software product or packaged into multiple software products.

Many modifications and other embodiments of the invention will come to mind to one skilled in the art to which this invention pertains having the benefit of the teachings presented in the foregoing descriptions and the associated drawings. While examples discussed above cover the use of various embodiments in the context of operationalizing privacy compliance and assessing risk of privacy campaigns, various embodiments may be used in any other suitable context. Therefore, it is to be understood that the invention is not to be limited to the specific embodiments disclosed and that modifications and other embodiments are intended to be included within the scope of the appended claims. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for the purposes of limitation. 

What is claimed is:
 1. A computer-implemented data processing method for measuring compliance of a particular organization with one or more requirements associated with one or more pieces of computer code originating from the particular organization, the method comprising: electronically obtaining, by one or more processors, each of the one or more pieces of computer code; automatically electronically analyzing each of the one or more pieces of computer code to determine one or more privacy-related attributes of each of the one or more pieces of computer code, each of the privacy-related attributes indicating one or more types of personal data that the computer code collects or accesses; in response to determining that the computer code has a particular one of the one or more privacy-related attributes, executing the steps of (i) electronically displaying one or more prompts to a first individual associated with the organization requesting that the first individual input information regarding the particular privacy-related attribute; (ii) receiving information regarding the particular privacy-related attribute from the first individual; and (iii) communicating the information regarding the particular privacy-related attribute to one or more second individuals associated with the organization for use in conducting a privacy assessment of the computer code; scanning one or more publicly-available data sources for one or more privacy notices for the particular organization; determining, by one or more processors, based at least in part on the one or more types of personal data that the computer code collects or accesses and the one or more privacy notices, a privacy maturity score for the particular organization indicating compliance of the organization with one or more privacy-related requirements; and displaying, by one or more processors, the privacy maturity score on a display screen associated with a computing device.
 2. The computer-implemented data processing method of claim 1, wherein the one or more privacy notices comprise one or more privacy disclaimers.
 3. The computer-implemented data processing method of claim 1, wherein the one or more privacy notices are associated with one or more websites associated with the particular organization.
 4. The computer-implemented data processing method of claim 3, further comprising: analyzing a website of the one or more websites associated with the particular organization to identify the one or more privacy notices; analyzing one or more contents of the one or more privacy notices; and electronically calculating the privacy maturity score based, at least in part, on the one or more contents of the one or more privacy notices.
 5. The computer-implemented data processing method of claim 4, further comprising: analyzing the one or more websites associated with the particular organization; identifying one or more industry certifications associated with the particular organization based on the analysis of the one or more websites; and electronically calculating the privacy maturity score by electronically calculating the privacy maturity score based, at least in part, on the identification of the one or more industry certifications.
 6. The computer-implemented data processing method of claim 1, further comprising: analyzing one or more public record databases associated with the particular organization; identifying one or more industry certifications associated with the particular organization from the one or more public record databases; and electronically calculating the privacy maturity score by electronically calculating the privacy maturity score based, at least in part, on the identification of the one or more industry certifications.
 7. The computer-implemented data processing method of claim 6, wherein analyzing the one or more public record databases comprises analyzing one or more social networking websites associated with the particular organization.
 8. The computer-implemented data processing method of claim 7, further comprising: determining one or more respective job titles of one or more employees of the particular organization; and calculating the privacy maturity score based, at least in part, on the one or more respective job titles of the one or more employees of the particular organization.
 9. The computer-implemented data processing method of claim 1 further comprising: receiving one or more privacy impact assessments associated with each of the one or more pieces of computer code; wherein determining the privacy maturity score for the particular organization comprises determining the privacy maturity score based at least in part on the one or more privacy impact assessments.
 10. The computer-implemented data processing method of claim 9, wherein the one or more privacy impact assessments are one or more privacy impact assessments performed prior to execution of the one or more pieces of computer code as part of a privacy campaign.
 11. A non-transitory computer-readable medium storing computer-executable instructions for determining a privacy maturity of a plurality of individuals associated with an organization, the non-transitory computer-readable medium storing computer-executable instructions for: electronically obtaining, by one or more processors, one or more pieces of computer code from one or more web sites associated with the plurality of individuals; automatically electronically analyzing each of the one or more pieces of computer code to determine one or more privacy-related attributes of each of the one or more pieces of computer code, each of the privacy-related attributes indicating one or more types of personal data that the computer code collects or accesses; in response to determining that the computer code has a particular one of the one or more privacy-related attributes, executing the steps of (i) electronically displaying one or more prompts to a first individual of the plurality of individuals requesting that the first individual input information regarding the particular privacy-related attribute; (ii) receiving information regarding the particular privacy-related attribute from the first individual; and (iii) communicating the information regarding the particular privacy-related attribute to one or more second individuals of the plurality of individuals for use in conducting a privacy assessment of the computer code; analyzing, by one or more processors, for at least one of the plurality of individuals, pieces of publicly available data associated with the at least one of the plurality of individuals, the pieces of publicly available data comprising one or more public record databases comprising one or more social network websites and one or more additional pieces of publicly available data selected from the group consisting of: one or more privacy disclaimers corresponding to the one or more pieces of computer code, and one or more privacy notices corresponding to the one or more websites associated with the plurality of individuals; determining, by one or more processors, based at least in part on the one or more types of personal data that the computer code collects or accesses and the pieces of publicly available data, a privacy maturity score for the plurality of individuals indicating compliance of the plurality of individuals with one or more privacy-related requirements; and displaying, by one or more processors, the privacy maturity score on a display screen associated with a computing device.
 12. The non-transitory computer-readable medium of claim 11, wherein the one or more websites associated the plurality of individuals comprise one or more websites that host the one or more pieces of computer code.
 13. The non-transitory computer-readable medium of claim 11, wherein: the pieces of publicly available data comprise the one or more privacy disclaimers associated with the one or more pieces of computer code; and the one or more privacy disclaimers associated with the one or more pieces of computer code comprise one or more privacy disclaimers associated with one or more software applications published by the plurality of individuals that are available to one or more customers of the plurality of individuals.
 14. The non-transitory computer-readable medium of claim 11, wherein: analyzing the pieces of publicly available data comprises analyzing one or more credit bureau databases; and the non-transitory computer-readable medium further stores computer-executable instructions for: accessing the one or more credit bureau databases; and determining one or more pieces of credit data associated with an organization to which the plurality of individuals belong.
 15. The non-transitory computer-readable medium of claim 11, wherein: the pieces of publicly available data comprise the one or more privacy disclaimers associated with the one or more pieces of computer code; and the non-transitory computer-readable medium further stores computer-executable instructions for: analyzing one or more contents of the one or more privacy disclaimers; and calculating the privacy maturity score based at least in part on the one or more contents of the one or more privacy disclaimers.
 16. The non-transitory computer-readable medium of claim 15, wherein the non-transitory computer-readable medium further stores computer-executable instructions for: determining whether the one or more contents of the one or more privacy disclaimers comprise one or more pieces of language required by one or more regulations; in response to determining that the one or more contents of the one or more privacy disclaimers comprise the one or more pieces of language, calculating a first privacy awareness score; and in response to determining that that the one or more contents of the one or more privacy disclaimers do not comprise the one or more pieces of language, calculating a second privacy awareness score.
 17. The non-transitory computer-readable medium of claim 11, wherein: the pieces of publicly available data comprise one or more security certifications associated with the plurality of individuals; the non-transitory computer-readable medium further stores computer-executable instructions for: determining whether the at least one of the plurality of individuals holds a particular security certification based on the pieces of publicly available data; and calculating the privacy maturity score based on whether the at least one of the plurality of individuals holds the particular security certification.
 18. The non-transitory computer-readable medium of claim 11, wherein the non-transitory computer-readable medium further stores computer-executable instructions for: analyzing a website associated with the one or more pieces of computer code to identify the one or more privacy notices; analyzing one or more contents of the one or more privacy notices; and determining the privacy maturity score by electronically calculating the privacy maturity score based, at least in part, on the one or more contents of the one or more privacy notices, wherein: the pieces of publicly available data comprise the one or more privacy notices associated with the one or more websites corresponding to the plurality of individuals.
 19. The non-transitory computer-readable medium of claim 11, wherein the pieces of publicly available data comprise the one or more privacy notices associated with the one or more websites associated with the plurality of individuals.
 20. A data processing system for determining a privacy maturity of a plurality of individuals, the system comprising: one or more computer processors; computer memory operatively coupled to the computer processor, wherein the data processing system comprises: means for electronically obtaining one or more pieces of computer code from the one or more websites associated with the plurality of individuals; means for automatically electronically analyzing each of the one or more pieces of computer code to determine one or more privacy-related attributes of each of the one or more pieces of computer code, each of the privacy-related attributes indicating one or more types of personal data that the computer code collects or accesses; means for, in response to determining that the computer code has a particular one of the one or more privacy-related attributes, executing the steps of (i) electronically displaying one or more prompts to a first individual requesting that the first individual input information regarding the particular privacy-related attribute; (ii) receiving information regarding the particular privacy-related attribute from the first individual; and (iii) communicating the information regarding the particular privacy-related attribute to one or more second individuals for use in conducting a privacy assessment of the computer code; means for analyzing, for at least one of the plurality of individuals, pieces of publicly available data associated with the at least one of the plurality of individuals, the pieces of publicly available data comprising one or more public record databases comprising one or more social network websites and one or more additional pieces of publicly available data selected from a group consisting of: one or more privacy disclaimers corresponding to the one or more pieces of computer code; and one or more privacy notices corresponding to the one or more websites associated with the plurality of individuals; means for determining, based at least in part on the one or more types of personal data that the computer code collects or accesses and the pieces of publicly available data, a privacy maturity score for the plurality of individuals indicating compliance of the plurality of individuals with one or more privacy-related requirements; and means for displaying privacy maturity score on a display screen associated with a computing device. 