Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods

ABSTRACT

A data transfer analysis system is disclosed that analyzes data transfer log entries to determine whether a data transfer is authorized. The system determines information about the data assets involved in the data transfer (e.g., network address, geographical location, etc.) and uses a data map to determine if data transfers are authorized between the two data assets. If not, the system may take one or more actions, such as generating a notification, terminating the data transfer, restricting the access of the user that initiated the transfer, modifying network communications capabilities between the assets to prevent future transfers, and storing metadata that can be used to prevent future such transfers.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation-in-part of U.S. patent applicationSer. No. 17/101,253, filed Nov. 23, 2020, which is acontinuation-in-part of U.S. patent application Ser. No. 16/901,979,filed Jun. 15, 2020, now U.S. Pat. No. 10,848,523, issued Nov. 24, 2020,which is a continuation-in-part of U.S. patent application Ser. No.16/881,699, filed May 22, 2020, which claims priority from U.S.Provisional Patent Application Ser. No. 62/852,821, filed May 24, 2019,and is also a continuation-in-part of U.S. patent application Ser. No.16/820,208, filed Mar. 16, 2020, now U.S. Pat. No. 10,798,133, issuedOct. 6, 2020, which is a continuation-in-part of U.S. patent applicationSer. No. 16/656,835, filed Oct. 18, 2019, now U.S. Pat. No. 10,594,740,issued Mar. 17, 2020, which is continuation of U.S. patent applicationSer. No. 16/159,566, filed Oct. 12, 2018, now U.S. Pat. No. 10,454,973,issued Oct. 22, 2019, which claims priority from U.S. Provisional PatentApplication Ser. No. 62/572,096, filed Oct. 13, 2017, and also claimspriority from U.S. Provisional Patent Application Ser. No. 62/728,435,filed Sep. 7, 2018, and is also a continuation-in-part of U.S. patentapplication Ser. No. 16/055,083, filed Aug. 4, 2018, now U.S. Pat. No.10,289,870, issued May 14, 2019, which claims priority from U.S.Provisional Patent Application Ser. No. 62/547,530, filed Aug. 18, 2017,and is also a continuation-in-part of U.S. patent application Ser. No.15/996,208, filed Jun. 1, 2018, now U.S. Pat. No. 10,181,051, issuedJan. 15, 2019, which claims priority from U.S. Provisional PatentApplication Ser. No. 62/537,839, filed Jul. 27, 2017, and is also acontinuation-in-part of U.S. patent application Ser. No. 15/853,674,filed Dec. 22, 2017, now U.S. Pat. No. 10,019,597, issued Jul. 10, 2018,which claims priority from U.S. Provisional Patent Application Ser. No.62/541,613, filed Aug. 4, 2017, and is also a continuation-in-part ofU.S. patent application Ser. No. 15/619,455, filed Jun. 10, 2017, nowU.S. Pat. No. 9,851,966, issued Dec. 26, 2017, which is acontinuation-in-part of U.S. patent application Ser. No. 15/254,901,filed Sep. 1, 2016, now U.S. Pat. No. 9,729,583, issued Aug. 8, 2017,which claims priority from: (1) U.S. Provisional Patent Application Ser.No. 62/360,123, filed Jul. 8, 2016; (2) U.S. Provisional PatentApplication Ser. No. 62/353,802, filed Jun. 23, 2016; and (3) U.S.Provisional Patent Application Ser. No. 62/348,695, filed Jun. 10, 2016.The disclosures of all of the above patent applications and patents arehereby incorporated herein by reference in their entirety.

BACKGROUND

Over the past years, privacy and security policies, and relatedoperations have become increasingly important. Breaches in security,leading to the unauthorized access of personal data (which may includesensitive personal data) have become more frequent among companies andother organizations of all sizes. Such personal data may include, but isnot limited to, personally identifiable information (PII), which may beinformation that directly (or indirectly) identifies an individual orentity. Examples of PII include names, addresses, dates of birth, socialsecurity numbers, and biometric identifiers such as a person'sfingerprints or picture. Other personal data may include, for example,customers' Internet browsing habits, purchase history, or even theirpreferences (e.g., likes and dislikes, as provided or obtained throughsocial media).

Many organizations that obtain, use, and transfer personal data,including sensitive personal data, have begun to address these privacyand security issues. To manage personal data, many companies haveattempted to implement operational policies and processes that complywith legal and industry requirements. However, there is an increasingneed for improved systems and methods to manage personal data in amanner that complies with such policies.

Similarly, as individuals have become more aware of the risks associatedwith the theft or misuse of their personal data, they have soughtadditional tools to help them manage which entities process theirpersonal data. There is currently a need for improved tools that wouldallow individuals to minimize the number of entities that process theirpersonal data—especially entities that the individual doesn't activelydo business with.

Different jurisdictions around the world have different personal datahandling requirements with which companies dealing with private userdata must comply. Such organizations need to be aware of suchrequirements and have the ability to comply with them. Therefore, thereis an increasing need for systems and methods that facilitate theability of an organization to comply with personal data handlingrequirements.

SUMMARY

A method, according to various embodiments, may include identifying, bycomputing hardware and based on a first data transfer log entryrepresenting a completed data transfer between a first system and asecond system, a network address of the first system; identifying, bythe computing hardware and based on the network address of the firstsystem, a data map associated with the first system; determining, by thecomputing hardware and based on the data map, that the second system isnot authorized to perform data transfers with the first system; storing,by the computing hardware and in response to determining that the secondsystem not authorized to perform data transfers with the first system,metadata indicating that the second system not authorized to performdata transfers with the first system; detecting, by the computinghardware and based on a generation of a second data transfer log entry,a request to initiate a second data transfer between the first systemand the second system; determining, by the computing hardware and basedon analyzing the second data transfer log entry using the metadata, thatthe second system is not authorized to perform data transfers with thefirst system; transmitting, by the computing hardware, a firstinstruction to cancel the second data transfer; generating, by thecomputing hardware on a graphical user interface, a request to allow thesecond data transfer; receiving, by the computing hardware via thegraphical user interface, approval of the request to allow the seconddata transfer; and transmitting, by the computing hardware and inresponse to receiving the approval of the request to allow the seconddata transfer, a second instruction to initiate the second datatransfer.

In particular embodiments, generating the request to allow the seconddata transfer comprises: configuring, on the graphical user interface, afirst control element configured to generate an indication of theapproval of the request to allow the second data transfer and a secondcontrol element configured to generate an indication of a denial of therequest to allow the second data transfer; and transmitting a thirdinstruction to an application executed on a user device causing theapplication to present the graphical user interface on the user device.In particular embodiments, transmitting the second instruction toinitiate the second data transfer in response to receiving the approvalof the request to allow the second data transfer comprises transmittingthe second instruction to initiate the second data transfer in responseto a selection of the first control element. In particular embodiments,receiving the approval of the request to allow the second data transfercomprises detecting a state of an application executed on a user device,the state of the application comprising an indication of the approval ofthe request to allow the second data transfer. In particularembodiments, determining that the second system is not authorized toperform data transfers with the first system comprises: determining anetwork address of the second system; and determining that the networkaddress of the second system is associated with an unauthorized systembased on the data map. In particular embodiments, canceling the seconddata transfer comprises modifying a configuration of a network device toblock the second data transfer. In particular embodiments, transmittingthe second instruction to initiate the second data transfer comprisesmodifying the configuration of the network device to allow the seconddata transfer.

A system, according to various embodiments, may include: anon-transitory computer-readable medium storing instructions; andprocessing hardware communicatively coupled to the non-transitorycomputer-readable medium, wherein the processing hardware is configuredto execute the instructions and thereby perform operations comprising:detecting a completed data transfer between a first system and a secondsystem based on a data transfer log entry; determining a geographicallocation associated with the second system; determining that the secondsystem is not authorized to perform data transfers with the first systembased on a data map associated with the first system and thegeographical location; in response to determining that the second systemnot authorized to perform data transfers with the first system, storingmetadata indicating that the second system is not authorized to performdata transfers with the first system; detecting a state of a firstapplication, the state of the first application comprising a firstsystem parameter identifying the first system, a second system parameteridentifying the second system, and an indication of a request toinitiate a data transfer between the first system and the second system;generating a graphical user interface based on the state of the firstapplication and the metadata by: configuring a first control elementconfigured for generating an indication of an approval of the request toinitiate the data transfer, a second control element configured forgenerating an indication of a denial of the request to initiate the datatransfer, and a first display element configured for presenting anindication that the second system is not authorized to perform datatransfers with the first system, and excluding a second display elementconfigured for presenting an indication that the second system isauthorized to perform data transfers with the first system; transmittingan instruction to a second application executed on a user device causingthe second application to present the graphical user interface on theuser device; and in response to a selection of the second controlelement, initiating a responsive action to block the data transfer.

In particular embodiments, the data transfer log entry comprises domaininformation for the second system; and determining the geographicallocation associated with the second system is based on the domaininformation. In particular embodiments, the indication of the request toinitiate the data transfer comprises a second data transfer log entryidentifying the data transfer between the first system and the secondsystem. In particular embodiments, the responsive action comprisestransmitting an instruction to the first system to block data transferswith the second system. In particular embodiments, the responsive actioncomprises accessing the first system using an application programminginterface to modify a configuration of the first system to block datatransfers with the second system. In particular embodiments, storing themetadata comprises storing the metadata in an object record for thefirst system that is evaluated by the first system in response todetecting a data transfer request. In particular embodiments, theoperations further comprise, in response to the selection of the secondcontrol element, modifying access of a user associated with the datatransfer.

A non-transitory computer-readable medium, according to variousembodiments, may store computer-executable instructions that, whenexecuted by processing hardware, configure the processing hardware toperform operations including: detecting a completed data transferbetween a first system and a second system based on a data transfer logentry, the data transfer log entry composing a network address of thesecond system; determining a geographical location associated with thesecond system based on the network address of the second system;determining that the second system is not authorized to perform datatransfers with the first system based on a data map associated with thefirst system and the geographical location; in response to determiningthat the second system not authorized to perform data transfers with thefirst system, storing metadata indicating that the second system is notauthorized to perform data transfers with the first system; detecting astate of an application, the state of the application comprising a firstsystem parameter identifying the first system, a second system parameteridentifying the second system, and an indication of an initiation of adata transfer between the first system and the second system; inresponse to detecting the state of the application, determining that thesecond system is not authorized to perform data transfers with the firstsystem based on the state of the application and the metadata; and inresponse to determining that the second system is not authorized toperform data transfers with the first system, initiating a responsiveaction to reverse the data transfer.

In particular embodiments, determining the geographical locationcomprises performing a reverse network address look-up using the networkaddress of the second system to determine the geographical location. Inparticular embodiments, the indication of the initiation of the datatransfer comprises a second data transfer log entry identifying the datatransfer between the first system and the second system. In particularembodiments, the responsive action comprises transmitting an instructionto the second system to delete data received from the first system viathe data transfer. In particular embodiments, the responsive actioncomprises transmitting an instruction to the second system to block datatransfers with the first system. In particular embodiments, storing themetadata comprises storing the metadata in an object record for thesecond system that is evaluated by the second system in response todetecting a data transfer request.

A computer-implemented method for generating a visualization of one ormore data transfers between one or more data assets, comprising: (1)identifying one or more data assets associated with a particular entity;(2) analyzing the one or more data assets to identify one or more dataelements stored in the identified one or more data assets; (3) defininga plurality of physical locations and identifying, for each of theidentified one or more data assets, a respective particular physicallocation of the plurality of physical locations; (4) analyzing theidentified one or more data elements to determine one or more datatransfers between the one or more data systems in different particularphysical locations; (5) determining one or more regulations that relateto the one or more data transfers; and (6) generating a visualrepresentation of the one or more data transfers based at least in parton the one or more regulations.

A computer-implemented method for assessing a risk associated with oneor more data transfers between one or more data assets that comprises:(1) creating a data transfer record for a transfer of data between afirst asset in a first location and a second asset in a second location;(2) accessing a set of data transfer rules that are associated with thedata transfer record; (3) performing a data transfer assessment based atleast in part on applying the set of data transfer rules on the datatransfer record; (4) identifying one or more data transfer risksassociated with the data transfer record, based at least in part on thedata transfer assessment; (5) calculating a risk score for the datatransfer based at least in part on the one or more data transfer risksassociated with the data transfer record; (6) digitally storing the riskscore for the data transfer.

A computer-implemented data processing method for generating relativereadiness assessment data for an entity, according to variousembodiments, may include: determining, by one or more computerprocessors, a business sector associated with a particular entity;determining, by one or more computer processors, a jurisdictionassociated with the particular entity; obtaining, by one or morecomputer processors, a personal data management questionnaire for theparticular entity, the personal data management questionnaire for theparticular entity comprising a plurality of personal data managementquestions; determining, by one or more computer processors, a similarlysituated entity, wherein the similarly situated entity is associatedwith the business sector associated with the particular entity and withthe jurisdiction associated with the particular entity; obtaining, byone or more computer processors, a personal data managementquestionnaire for the similarly situated entity, the personal datamanagement questionnaire for the similarly situated entity comprising aplurality of personal data management questions; generating, by one ormore computer processors, an ontology mapping a first question of theplurality of personal data management questions of the personal datamanagement questionnaire for the particular entity to a first questionof the plurality of personal data management questions of the personaldata management questionnaire for the similarly situated entity;performing, by one or more computer processors using the ontology, acomparison of the first question of the plurality of personal datamanagement questions of the personal data management questionnaire forthe particular entity to the first question of the plurality of personaldata management questions of the personal data management questionnairefor the similarly situated entity; generating, by one or more computerprocessors, a relative readiness grade based at least in part on thecomparison of the first question of the plurality of personal datamanagement questions of the personal data management questionnaire forthe particular entity to the first question of the plurality of personaldata management questions of the personal data management questionnairefor the similarly situated entity; and presenting, by one or morecomputer processors in a user interface, an indication of the relativereadiness grade.

In particular embodiments, performing the comparison of the firstquestion of the plurality of personal data management questions of thepersonal data management questionnaire for the particular entity to thefirst question of the plurality of personal data management questions ofthe personal data management questionnaire for the similarly situatedentity comprises: determining that the particular entity does notimplement a first privacy control based at least in part on the firstquestion of the plurality of personal data management questions of thepersonal data management questionnaire for the particular entity; anddetermining that the similarly situated entity implements the firstprivacy control based at least in part on the first question of theplurality of personal data management questions of the personal datamanagement questionnaire for the similarly situated entity; andpresenting the indication of the relative readiness grade comprisespresenting an indication that the similarly situated entity implementsthe first privacy control and the particular entity does not implementthe first privacy control. In particular embodiments, the first privacycontrol is selected from a group consisting of: (a) a location at whichcollected personal data is stored; (b) a length of time for which thecollected personal data is stored; (c) a type of personal data collectedfrom a data subject; (d) a type of data subject from which personal datais collected; and (e) a multifactor user authentication requirement. Inparticular embodiments, obtaining the personal data managementquestionnaire for the particular entity comprises generating thepersonal data management questionnaire based at least in part on thebusiness sector associated with the particular entity and thejurisdiction associated with the particular entity. In particularembodiments, obtaining the personal data management questionnaire forthe particular entity further comprises: receiving a request to performa relative readiness assessment; at least partially in response toreceiving the request to perform the relative readiness assessment,generating a prompt to a user requesting an answer to the first questionof the plurality of personal data management questions of the personaldata management questionnaire for the particular entity; receiving theanswer to the first question of the plurality of personal datamanagement questions of the personal data management questionnaire forthe particular entity from the user; and populating the first questionof the plurality of personal data management questions of the personaldata management questionnaire for the particular entity with the answer.In particular embodiments, determining the business sector associatedwith the particular entity comprises determining the business sectorassociated with the particular entity based at least in part on a datamap associated with the particular entity; and determining thejurisdiction associated with the particular entity comprises determiningthe jurisdiction associated with the particular entity based at least inpart on the data map associated with the particular entity. Inparticular embodiments, the jurisdiction associated with the particularentity comprises one or more geographical territories.

A non-transitory computer-readable medium, according to variousembodiments, may store computer-executable instructions for: receiving,by one or more computer processors via a user interface, a request togenerate a relative readiness assessment for a particular entity; atleast partially in response to receiving the request to generate arelative readiness assessment for the particular entity, determining, byone or more computer processors, a business sector associated with theparticular entity and a jurisdiction associated with the particularentity; determining, by one or more computer processors, one or moresimilarly situated entities, wherein each of the one or more similarlysituated entities is associated with the business sector associated withthe particular entity and with the jurisdiction associated with theparticular entity; determining, by one or more computer processors,personal data management information for the particular entity, thepersonal data management information comprising privacy controlsimplemented by the particular entity; determining, by one or morecomputer processors, respective personal data management information foreach of the one or more similarly situated entities, the respectivepersonal data management information comprising respective privacycontrols implemented by a respective similarly situated entity of theone or more similarly situated entities; comparing, by one or morecomputer processors, the privacy controls implemented by the particularentity to the respective privacy controls implemented by each respectivesimilarly situated entity of the one or more similarly situatedentities; determining, by one or more computer processors based at leastin part on comparing the privacy controls implemented by the particularentity to the respective privacy controls implemented by each respectivesimilarly situated entity of the one or more similarly situatedentities, a relative readiness grade for the particular entity;generating, by one or more computer processors, a relative readinessreport comprising the relative readiness grade for the particularentity; and presenting, by one or more computer processors in a userinterface, relative readiness report.

In particular embodiments, comparing the privacy controls implemented bythe particular entity to the respective privacy controls implemented byeach respective similarly situated entity of the one or more similarlysituated entities comprises determining, for each privacy control of therespective privacy controls implemented by each respective similarlysituated entity of the one or more similarly situated entities whetherthere is a corresponding privacy control among the privacy controlsimplemented by the particular entity. In particular embodiments,determining the relative readiness grade for the particular entitycomprises determining a percentage of the privacy controls implementedby the particular entity that correspond to one or more respectiveprivacy controls implemented by each respective similarly situatedentity of the one or more similarly situated entities. In particularembodiments, determining the personal data management information forthe particular entity comprises obtaining a completed masterquestionnaire associated with the particular entity, wherein thecompleted master questionnaire comprises a plurality of questions, andwherein each question of the plurality of questions corresponds to arespective privacy control of the privacy controls implemented by theparticular entity. In particular embodiments, determining the respectivepersonal data management information for each of the one or moresimilarly situated entities comprises obtaining a respective completedmaster questionnaire associated with each respective similarly situatedentity of the one or more similarly situated entities, wherein eachrespective completed master questionnaire comprises a plurality ofquestions, and wherein each question of the plurality of questionscorresponds to a respective privacy control of the privacy controlsimplemented by the respective similarly situated entity. In particularembodiments, the relative readiness report comprises a subset of therespective personal data management information for each of the one ormore similarly situated entities; and generating the relative readinessreport comprises anonymizing the subset of the respective personal datamanagement information for each of the one or more similarly situatedentities.

A relative readiness assessment data processing system, according tovarious embodiments, may include: one or more computer processors;computer memory; and a non-transitory computer-readable medium storingcomputer-executable instructions that, when executed by the one or morecomputer processors, cause the one or more computer processors toperform operations comprising: receiving, by the one or more computerprocessors, an indication of a business sector associated with aparticular entity; determining, by the one or more computer processors,an indication of a jurisdiction associated with the particular entity;generating, by the one or more computer processors based at least inpart on the business sector associated with the particular entity andthe jurisdiction associated with the particular entity, a personal datamanagement questionnaire for the particular entity, the personal datamanagement questionnaire for the particular entity comprising aplurality of questions related to privacy data controls; receiving, bythe one or more computer processors, a completed personal datamanagement questionnaire for the particular entity, the completedpersonal data management questionnaire for the particular entitycomprising the plurality of questions related to privacy data controlsand respective answers to each question of the plurality of questionsrelated to privacy data controls; obtaining, by the one or more computerprocessors, an aggregated personal data management questionnaireassociated with a plurality of similarly situated entities, theaggregated personal data management questionnaire comprising a pluralityof aggregated questions related to privacy data controls and respectiveanswers to each question of the plurality of aggregated questionsrelated to privacy data controls, wherein each of the plurality ofsimilarly situated entities is associated with one or more of thebusiness sector associated with the particular entity and thejurisdiction associated with the particular entity; mapping, by the oneor more computer processors, one or more of the respective answers toeach question of the plurality of questions related to privacy datacontrols to one or more of the respective answers to each question ofthe plurality of aggregated questions related to privacy data controls;comparing, by the one or more computer processors, the mapped one ormore of the respective answers to each question of the plurality ofquestions related to privacy data controls to the one or more of therespective answers to each question of the plurality of aggregatedquestions related to privacy data controls; based at least in part onthe comparing of the mapped one or more of the respective answers toeach question of the plurality of questions related to privacy datacontrols to the one or more of the respective answers to each questionof the plurality of aggregated questions related to privacy datacontrols, determining, by the one or more computer processors, arelative readiness score for the particular entity; and presenting, bythe one or more computer processors in a user interface, an indicationof the relative readiness score.

In particular embodiments, the operations further comprise: for a firstquestion of the plurality of questions related to privacy data controls,determining whether an answer to the first question of the plurality ofquestions related to privacy data controls indicates that the particularentity implements a first privacy control; and for a first question ofthe plurality of aggregated questions related to privacy data controlsthat is mapped to the first question of the plurality of questionsrelated to privacy data controls, determining whether an answer to firstquestion of the plurality of aggregated questions indicates that one ormore of the plurality of similarly situated entities implements thefirst privacy control. In particular embodiments, the operations furthercomprise presenting, in the user interface: an indication that theparticular entity does not implement the first privacy control; and anindication that the one or more of the plurality of similarly situatedentities implements the first privacy control. In particularembodiments, the indication that the one or more of the plurality ofsimilarly situated entities implements the first privacy control doesnot identify the one or more of the plurality of similarly situatedentities. In particular embodiments, the operations further comprisepresenting, in the user interface: an indication that the particularentity implements the first privacy control; and an indication that theone or more of the plurality of similarly situated entities does notimplement the first privacy control. In particular embodiments, theindication that the one or more of the plurality of similarly situatedentities does not implement the first privacy control does not identifythe one or more of the plurality of similarly situated entities.

A data processing system for assessing the relative readiness of anentity, according to various embodiments, may include: user interfacemeans for receiving a request to generate a relative readinessassessment for a particular entity; first determination means for, atleast partially in response to receiving the request to generate arelative readiness assessment for the particular entity, determining abusiness sector associated with the particular entity and a jurisdictionassociated with the particular entity; second determination means for,at least partially in response to receiving the request to generate arelative readiness assessment for the particular entity, determining oneor more similarly situated entities, wherein each of the one or moresimilarly situated entities is associated with the business sectorassociated with the particular entity and with the jurisdictionassociated with the particular entity; first personal data managementinformation determination means for determining personal data managementinformation for the particular entity, the personal data managementinformation comprising privacy controls implemented by the particularentity; second personal data management information determination meansfor determining respective personal data management information for eachof the one or more similarly situated entities, the respective personaldata management information comprising respective privacy controlsimplemented by a respective similarly situated entity of the one or moresimilarly situated entities; privacy control comparison means forcomparing the privacy controls implemented by the particular entity tothe respective privacy controls implemented by each respective similarlysituated entity of the one or more similarly situated entities; relativereadiness grade determination means for determining a relative readinessgrade for the particular entity based at least in part on comparing theprivacy controls implemented by the particular entity to the respectiveprivacy controls implemented by each respective similarly situatedentity of the one or more similarly situated entities; and relativereadiness report generation means for generating a relative readinessreport comprising the relative readiness grade for the particularentity.

A computer-implemented data processing method for determining personaldata management documentation requirements, according to variousembodiments, may include: determining, by one or more computerprocessors, a first jurisdiction in which a particular entity operatesand a second jurisdiction in which the particular entity operates;determining, by one or more computer processors, a business sectorassociated with the particular entity; determining, by one or morecomputer processors based at least in part on the business sector andthe first jurisdiction, a first plurality of personal data managementdocumentation requirements; generating, by one or more computerprocessors, a first questionnaire comprising a first plurality ofquestions, wherein each question of the first plurality of questionscorresponds to a respective requirement of the first plurality ofpersonal data management documentation requirements; determining, by oneor more computer processors based at least in part on the businesssector and the second jurisdiction, a second plurality of personal datamanagement documentation requirements; generating, by one or morecomputer processors, a second questionnaire comprising a secondplurality of questions, wherein each question of the second plurality ofquestions corresponds to a respective requirement of the secondplurality of personal data management documentation requirements;generating, by one or more computer processors, an ontology mapping:each question of the first plurality of questions to a respectivequestion in a master questionnaire; and each question of the secondplurality of questions to a respective question in the masterquestionnaire; presenting, by one or more computer processors, themaster questionnaire to a user; receiving, by one or more computerprocessors, answers responsive to one or more questions in the masterquestionnaire from the user; storing, by one or more computerprocessors, the answers responsive to the one or more questions in themaster questionnaire; populating, by one or more computer processors,answers to one or more questions of the first plurality of questionswith respective answers responsive to the one or more questions in themaster questionnaire mapped to the one or more questions of the firstplurality of questions by the ontology; populating, by one or morecomputer processors, answers to one or more questions of the secondplurality of questions with respective answers responsive to the one ormore questions in the master questionnaire mapped to the one or morequestions of the second plurality of questions by the ontology;generating, by one or more computer processors, a first report based atleast in part on the answers to the one or more questions of the firstplurality of questions; and generating, by one or more computerprocessors, a second report based at least in part on the answers to theone or more questions of the second plurality of questions.

In particular embodiments, one or more of the answers responsive to theone or more questions in the master questionnaire comprise documentationassociated with one or more personal data controls. In particularembodiments, one or more of the one or more personal data controls isselected from a group consisting of: (a) a location at which collectedpersonal data is stored; (b) a length of time for which the collectedpersonal data is stored; (c) a type of personal data collected from adata subject; (d) a type of data subject from which personal data iscollected; and (e) a multifactor user authentication requirement. Inparticular embodiments, the method may include automaticallytransmitting the first report to a regulatory agency associated with thefirst jurisdiction. In particular embodiments, the first jurisdiction isa geographical territory. In particular embodiments, one or more of theanswers responsive to the one or more questions in the masterquestionnaire comprise a reference to documentation associated with oneor more personal data controls. In particular embodiments, the referenceto the documentation associated with one or more personal data controlscomprises a hyperlink.

A non-transitory computer-readable medium, according to variousembodiments, may store computer-executable instructions for: receiving,by one or more computer processors via a user interface, a request togenerate a regulatory compliance report for a first jurisdiction inwhich a particular entity operates; at least partially in response toreceiving the request to generate the regulatory compliance report forthe first jurisdiction, determining, by one or more computer processors,a business sector associated with the particular entity; determining, byone or more computer processors based at least in part on the businesssector and the first jurisdiction, a first regulatory compliancedocumentation requirement for the first jurisdiction; generating, by oneor more computer processors, a first questionnaire comprising a firstplurality of questions, wherein a first question of the first pluralityof questions corresponds to the first regulatory compliancedocumentation requirement for the first jurisdiction; generating, by oneor more computer processors, a master questionnaire comprising aplurality of master questions, wherein one or more questions of theplurality of master questions correspond to a respective regulatorycompliance documentation requirement; generating, by one or morecomputer processors, an ontology mapping the first question of the firstplurality of questions to a first question of the plurality of masterquestions; presenting, by one or more computer processors, the masterquestionnaire to a user; receiving, by one or more computer processorsvia the user interface, documentation responsive to the first questionof the plurality of master questions; populating, by one or morecomputer processors, a first answer to the first question of the firstplurality of questions with the documentation responsive to the firstquestion of the plurality of master questions based at least in part onthe mapping the first question of the first plurality of questions to afirst question of the plurality of master questions by the ontology;generating, by one or more computer processors, the regulatorycompliance report based at least in part on the first answer to thefirst question of the first plurality of questions comprising thedocumentation responsive to the first question of the plurality ofmaster questions; and presenting, by one or more computer processors onthe user interface, the regulatory compliance report.

In particular embodiments, the non-transitory computer-readable mediumfurther stores computer-executable instructions for: determining, by oneor more computer processors based at least in part on the businesssector and a second jurisdiction, a second regulatory compliancedocumentation requirement for the second jurisdiction; generating, byone or more computer processors, a second questionnaire comprising asecond plurality of questions, wherein a first question of the secondplurality of questions corresponds to the second regulatory compliancedocumentation requirement for the second jurisdiction; and modifying, byone or more computer processors, the ontology to map the second questionof the second plurality of questions to the first question of theplurality of master questions. In particular embodiments, thenon-transitory computer-readable medium further storescomputer-executable instructions for: receiving, by one or more computerprocessors via the user interface, an indication that the particularentity no longer operates in the first jurisdiction; and at leastpartially in response to receiving the indication that the particularentity no longer operates in the first jurisdiction, modifying, by oneor more computer processors, the ontology to remove the mapping of thefirst question of the first plurality of questions to the first questionof the plurality of master questions. In particular embodiments, thefirst regulatory compliance documentation requirement comprisesdocumentation associated with one or more controls on personal data. Inparticular embodiments, the non-transitory computer-readable mediumfurther stores computer-executable instructions for: receiving, by oneor more computer processors via the user interface, a user approval ofthe regulatory compliance report; and at least partially in response toreceiving the user approval of the regulatory compliance report,electronically transmitting the regulatory compliance report to aregulatory agency associated with the first jurisdiction. In particularembodiments, the non-transitory computer-readable medium further storescomputer-executable instructions for: receiving, by one or more computerprocessors via the user interface, a user approval of the regulatorycompliance report; and at least partially in response to receiving theuser approval of the regulatory compliance report, electronicallytransmitting the regulatory compliance report to a standardsorganization operating in the first jurisdiction.

A personal data management process documentation determination dataprocessing system, according to various embodiments, may include: one ormore computer processors; computer memory; and a non-transitorycomputer-readable medium storing computer-executable instructions that,when executed by the one or more computer processors, cause the one ormore computer processors to perform operations comprising: determining,by the one or more computer processors, a business sector associatedwith a particular entity, a first jurisdiction in which the particularentity operates, and a second jurisdiction in which the particularentity operates; determining, by the one or more computer processorsbased at least in part on the business sector and the firstjurisdiction, a first documentation requirement for the firstjurisdiction; determining, by the one or more computer processors basedat least in part on the business sector and the second jurisdiction, asecond documentation requirement for the second jurisdiction;generating, by the one or more computer processors, a firstquestionnaire comprising a first plurality of questions, wherein a firstquestion of the first plurality of questions corresponds to the firstdocumentation requirement for the first jurisdiction; generating, by theone or more computer processors, a second questionnaire comprising asecond plurality of questions, wherein a first question of the secondplurality of questions corresponds to the second documentationrequirement for the second jurisdiction; generating, by the one or morecomputer processors, an ontology mapping: the first question of thefirst plurality of questions to a first question in a masterquestionnaire; and the first question of the second plurality ofquestions to the first question in the master questionnaire; soliciting,by the one or more computer processors from a user, data responsive tothe first question in the master questionnaire; storing, the one or morecomputer processors, the data responsive to the first question in themaster questionnaire as an answer to the first question in the masterquestionnaire; populating, by the one or more computer processors usingthe ontology, an answer to the first question of the first plurality ofquestions with the answer to the first question in the masterquestionnaire; populating, by the one or more computer processors usingthe ontology, an answer to the first question of the second plurality ofquestions with the answer to the first question in the masterquestionnaire; generating, by the one or more computer processors, areport based at least in part on the answer to the first question of thefirst plurality of questions and the answer to the first question of thesecond plurality of questions; and presenting, by the one or morecomputer processors on a user interface, the report.

In particular embodiments, the operations further comprise: detecting,by the one or more computer processors, an indication that theparticular entity no longer operates in the second jurisdiction; and atleast partially in response to detecting the indication that theparticular entity no longer operates in the second jurisdiction,modifying, by the one or more computer processors, the ontology toremove the mapping of the first question of the second plurality ofquestions to the first question in the master questionnaire. Inparticular embodiments, the operations further comprise: detecting, bythe one or more computer processors, an indication that the particularentity has begun operating in a third jurisdiction; at least partiallyin response to detecting the indication that the particular entity hasbegun operating in the third jurisdiction: determining, by the one ormore computer processors based at least in part on the business sectorand the third jurisdiction, a third documentation requirement for thethird jurisdiction; generating, by the one or more computer processors,a third questionnaire comprising a third plurality of questions, whereina first question of the third plurality of questions corresponds to thethird documentation requirement for the third jurisdiction; modifying,by the one or more computer processors, the ontology to map the firstquestion of the third plurality of questions to the first question inthe master questionnaire. In particular embodiments, one or more of thefirst documentation requirement for the first jurisdiction and thesecond documentation requirement for the second jurisdiction comprisesdocumentation associated with compliance with an industry standardassociated with the business sector. In particular embodiments, one ormore of the first documentation requirement for the first jurisdictionand the second documentation requirement for the second jurisdictioncomprises documentation associated with a physical location of personaldata storage. In particular embodiments, each of the first jurisdictionand the second jurisdiction is a geographical territory.

A data processing system for determining required personal datamanagement process documentation, according to various embodiments, mayinclude: reception means for receiving a request to generate aregulatory compliance report for a first jurisdiction in which aparticular entity operates; business sector determination means for, atleast partially in response to receiving the request to generate theregulatory compliance report for the first jurisdiction, determining abusiness sector associated with the particular entity; compliancedocumentation requirement determination means for determining, based atleast in part on the business sector and the first jurisdiction, a firstregulatory compliance documentation requirement for the firstjurisdiction; questionnaire generation means for generating a firstquestionnaire comprising a first plurality of questions, wherein a firstquestion of the first plurality of questions corresponds to the firstregulatory compliance documentation requirement for the firstjurisdiction; master questionnaire generation means for generating amaster questionnaire comprising a plurality of master questions, whereinone or more questions of the plurality of master questions correspond toa respective regulatory compliance documentation requirement; ontologygeneration means for generating an ontology mapping the first questionof the first plurality of questions to a first question of the pluralityof master questions; questionnaire processing means for solicitingdocumentation responsive to the first question of the plurality ofmaster questions; questionnaire population means for populating a firstanswer to the first question of the first plurality of questions withthe documentation responsive to the first question of the plurality ofmaster questions based at least in part on the mapping the firstquestion of the first plurality of questions to a first question of theplurality of master questions by the ontology; and report generationmeans for generating the regulatory compliance report based at least inpart on the first answer to the first question of the first plurality ofquestions comprising the documentation responsive to the first questionof the plurality of master questions.

A computer-implemented data processing method for analyzing datatransfers, according to various embodiments, may include: accessing, byone or more computer processors, a data transfer log entry representinga data transfer between a particular data asset and a second system, thedata transfer log entry comprising a network address for the particulardata asset and a network address for the second system; determining, byone or more computer processors, an identity of the particular dataasset based at least in part on the network address for the particulardata asset; determining, by one or more computer processors, ageographical location of the second system based at least in part on thenetwork address for the second system; accessing, by one or morecomputer processors based at least in part on the identity of theparticular data asset, a data map associated with the particular dataasset; determining, by one or more computer processors based at least inpart on the data map, a plurality of authorized geographical locationsassociated with the particular data asset; comparing, by one or morecomputer processors, the geographical location of the second system tothe plurality of authorized geographical locations associated with theparticular data asset; determining, by one or more computer processorsbased at least in part on the comparison of the geographical location ofthe second system to the plurality of authorized geographical locationsassociated with the particular data asset, that the geographicallocation of the second system is an unauthorized geographical locationby determining that the geographical location of the second system isnot among the plurality of authorized geographical locations associatedwith the particular data asset; and at least partially in response todetermining that the geographical location of the second system is anunauthorized geographical location, generating, by one or more computerprocessors, a notification comprising an indication that thegeographical location of the second system is an unauthorizedgeographical location.

In particular embodiments, determining the identity of the particulardata asset based at least in part on the network address for theparticular data asset comprises performing a reverse network addresslook-up to obtain identifying information associated with the particulardata asset. In particular embodiments, the method further includesidentifying the data map associated with the particular data asset basedat least in part on the identifying information associated with theparticular data asset. In particular embodiments, determining thegeographical location of the second system based at least in part on thenetwork address for the second system comprises: performing a reversenetwork address look-up to obtain location identifying informationassociated with the second system; and determining the geographicallocation of the second system based at least in part on the locationidentifying information. In particular embodiments, the method mayfurther include, at least partially in response to determining that thegeographical location of the second system is an unauthorizedgeographical location, taking one or more actions to prevent futuretransfers of data between the particular data asset and the secondsystem. In particular embodiments, the data transfer between theparticular data asset and the second system has not yet been completed;and the method further comprises, at least partially in response todetermining that the geographical location of the second system is anunauthorized geographical location, taking one or more actions to stopthe data transfer between the particular data asset and the secondsystem before the data transfer has been completed. In particularembodiments, the network address for the particular data asset is an IPaddress and the network address for the second system is an IP address.

A non-transitory computer-readable medium, according to variousembodiments, may store computer-executable instructions for: receiving,at one or more computer processors, a data transfer log entryrepresenting a data transfer between a first system and a second system,the data transfer log entry comprising a network address for the firstsystem and a network address for the second system; determining, by oneor more computer processors based at least in part on the networkaddress for the first system, that the first system is a data assetassociated with a particular entity; determining, by one or morecomputer processors based at least in part on the network address forthe first system, a data asset identifier for the first system;determining, by one or more computer processors based at least in parton the network address for the second system, that the second system isnot associated with the particular entity; determining, by one or morecomputer processors based at least in part on the data asset identifierfor the first system, a data map associated with the first system;accessing, by one or more computer processors, the data map associatedwith the first system; analyzing, by one or more computer processors,the data map to determine whether the second system is authorized toperform data transfers with the first system; determining, by one ormore computer processors based at least in part on the analysis of thedata map, that the second system is not authorized to perform datatransfers with the first system; and at least partially in response todetermining that that the second system is not authorized to performdata transfers with the first system, taking, by one or more computerprocessors, one or more actions.

In particular embodiments, the non-transitory computer-readable mediumfurther stores computer-executable instructions for determining ageographical location for the second system based at least in part onthe network address for the second system. In particular embodiments,analyzing the data map to determine whether the second system isauthorized to perform data transfers with the first system comprisesdetermining whether the geographical location for the second system isincluded in the data map. In particular embodiments, determining, basedat least in part on the analysis of the data map, that the second systemis not authorized to perform data transfers with the first systemcomprises determining that the geographical location for the secondsystem is included in a plurality of unauthorized geographical locationsincluded in the data map. In particular embodiments, determining, basedat least in part on the analysis of the data map, that the second systemis not authorized to perform data transfers with the first systemcomprises determining that the geographical location for the secondsystem is not included in a plurality of authorized geographicallocations included in the data map. In particular embodiments,determining, based at least in part on the analysis of the data map,that the second system is not authorized to perform data transfers withthe first system comprises determining that the second system is notincluded in a plurality of authorized systems included in the data map.

A data transfer analysis data processing system, according to variousembodiments, may include: one or more computer processors; computermemory; and a non-transitory computer-readable medium storingcomputer-executable instructions that, when executed by the one or morecomputer processors, cause the one or more computer processors toperform operations comprising: detecting, at the one or more computerprocessors, an initiation of a data transfer between a data asset and asecond system by detecting a generation of a data transfer log entryindicating the data transfer between the data asset and the secondsystem, the data transfer log entry comprising an identifier of the dataasset and a network address for the second system; determining, by theone or more computer processors based at least in part on the networkaddress for the second system, a geographical location for the secondsystem; determining, by the one or more computer processors based atleast in part on the identifier of the data asset, a data map associatedwith the data asset; analyzing, by the one or more computer processors,the data map to determine whether the geographical location for thesecond system is among a plurality of geographical locations indicatedin the data map associated with the data asset; determining, by the oneor more computer processors based at least in part on the analysis ofthe data map, that the second system is not authorized to perform datatransfers with the data asset; at least partially in response todetermining that that the second system is not authorized to performdata transfers with the data asset, terminating, by the one or morecomputer processors, the data transfer between the data asset and thesecond system; and at least partially in response to determining thatthat the second system is not authorized to perform data transfers withthe data asset, generating, by the one or more computer processors, anotification that the data transfer between the data asset and thesecond system has been terminated.

In particular embodiments, the identifier of the data asset comprises anIP address of the data asset. In particular embodiments, determining thegeographical location for the second system comprises performing areverse network address look-up using the network address for the secondsystem. In particular embodiments, determining, based at least in parton the analysis of the data map, that the second system is notauthorized to perform data transfers with the data asset comprisesdetermining that the geographical location for the second system is notamong a listing of a plurality of authorized geographical locationsincluded in the data map. In particular embodiments, determining, basedat least in part on the analysis of the data map, that the second systemis not authorized to perform data transfers with the data assetcomprises determining that the geographical location for the secondsystem is among a listing of a plurality of unauthorized geographicallocations included in the data map. In particular embodiments, the dataasset is one of a transfer asset or a storage asset.

A data processing system for identifying potential transfers of data,according to various embodiments, may include: data transfer log entryreception means for receiving a data transfer log entry representing adata transfer between a first system and a second system, the datatransfer log entry comprising a network address for the first system anda network address for the second system; data asset determination meansfor determining, based at least in part on the network address for thefirst system, that the first system is a data asset associated with aparticular entity; data asset identification determination means fordetermining, based at least in part on the network address for the firstsystem, a data asset identifier for the first system; the data assetdetermination means for determining, based at least in part on thenetwork address for the second system, that the second system is notassociated with the particular entity; data map acquisition means fordetermining, based at least in part on the data asset identifier for thefirst system, a data map associated with the first system; data mapaccess means for accessing the data map associated with the firstsystem; data map analysis means for analyzing the data map to determinewhether the second system is authorized to perform data transfers withthe first system; data transfer authorization means for determining,based at least in part on the analysis of the data map, that the secondsystem is not authorized to perform data transfers with the firstsystem; and unauthorized data transfer response means for, at leastpartially in response to determining that that the second system is notauthorized to perform data transfers with the first system, taking oneor more actions.

The details of one or more embodiments of the subject matter describedin this specification are set forth in the accompanying drawings and thedescription below. Other features, aspects, and advantages of thesubject matter may become apparent from the description, the drawings,and the claims.

BRIEF DESCRIPTION OF THE DRAWINGS

Various embodiments of a data model generation and population system aredescribed below. In the course of this description, reference will bemade to the accompanying drawings, which are not necessarily drawn toscale, and wherein:

FIG. 1 depicts a data model generation and population system accordingto particular embodiments.

FIG. 2 is a schematic diagram of a computer (such as the data modelgeneration server 110, or data model population server 120) that issuitable for use in various embodiments of the data model generation andpopulation system shown in FIG. 1.

FIG. 3 is a flowchart showing an example of steps performed by a DataModel Generation Module according to particular embodiments.

FIGS. 4-10 depict various exemplary visual representations of datamodels according to particular embodiments.

FIG. 11 is a flowchart showing an example of steps performed by a DataModel Population Module.

FIG. 12 is a flowchart showing an example of steps performed by a DataPopulation Questionnaire Generation Module.

FIG. 13 is a process flow for populating a data inventory according to aparticular embodiment using one or more data mapping techniques.

FIGS. 14-25 depict exemplary screen displays and graphical userinterfaces (GUIs) according to various embodiments of the system, whichmay display information associated with the system or enable access to,or interaction with, the system by one or more users (e.g., to configurea questionnaire for populating one or more inventory attributes for oneor more data models, complete one or more assessments, etc.).

FIG. 26 is a flowchart showing an example of steps performed by anIntelligent Identity Scanning Module.

FIG. 27 is schematic diagram of network architecture for an intelligentidentity scanning system 2700 according to a particular embodiment.

FIG. 28 is a schematic diagram of an asset access methodology utilizedby an intelligent identity scanning system 2700 in various embodimentsof the system.

FIG. 29 is a flowchart showing an example of processes performed by aData Subject Access Request Fulfillment Module 2900 according to variousembodiments.

FIGS. 30-31 depict exemplary screen displays and graphical userinterfaces (GUIs) according to various embodiments of the system, whichmay display information associated with the system or enable access to,or interaction with, the system by one or more users (e.g., for thepurpose of submitting a data subject access request or other suitablerequest).

FIGS. 32-35 depict exemplary screen displays and graphical userinterfaces (GUIs) according to various embodiments of the system, whichmay display information associated with the system or enable access to,or interaction with, the system by one or more users (e.g., for thepurpose of flagging one or more risks associated with one or moreparticular questionnaire questions).

FIG. 36 is a flowchart showing an example of processes performed by aCross-Border Visualization Generation Module 3600 according to variousembodiments.

FIGS. 37-38 depict exemplary screen displays and graphical userinterfaces (GUIs) according to various embodiments of the system, whichmay display information associated with the system or enable access to,or interaction with, the system by one or more users (e.g., related tocross-border visualization).

FIG. 39 is a flowchart showing an example of processes performed by anAdaptive Execution on a Data Model Module 3900 according to variousembodiments.

FIG. 40 depicts an exemplary screen display and graphical user interface(GUI) according to various embodiments of the system, which may displayinformation associated with the system or enable access to, orinteraction with, the system by one or more users.

FIG. 41 is a flowchart showing an example of processes performed by anE-mail Scanning Module 4100 according to various embodiments.

FIG. 42 depicts an exemplary screen display and graphical user interface(GUI) according to various embodiments of the system, which may displayinformation associated with the system or enable access to, orinteraction with, the system by one or more users.

FIG. 43 is a flowchart showing an example of processes performed by aWebform Crawling Module 4300 according to various embodiments.

FIG. 44 is a flowchart showing an example of processes performed by aData Asset and Webform Management Module 4400 according to yet anotherembodiment.

FIG. 45 illustrates exemplary questionnaires and an ontology datastructure according to various embodiments.

FIG. 46 illustrates further exemplary questionnaires and anotherontology data structure according to various embodiments.

FIG. 47 is a flowchart showing an example of processes performed by aRelative Readiness Assessment Module according to various embodiments.

FIG. 48 is a flowchart showing an example of processes performed by aCompliance Documentation Collection Module according to variousembodiments.

FIG. 49 is a flowchart showing an example of processes performed by aData Transfer Analysis Module according to various embodiments.

DETAILED DESCRIPTION

Various embodiments now will be described more fully hereinafter withreference to the accompanying drawings. It should be understood that theinvention may be embodied in many different forms and should not beconstrued as limited to the embodiments set forth herein. Rather, theseembodiments are provided so that this disclosure will be thorough andcomplete, and will fully convey the scope of the invention to thoseskilled in the art. Like numbers refer to like elements throughout.

Overview

A data model generation and population system, according to particularembodiments, is configured to generate a data model (e.g., one or moredata models) that maps one or more relationships between and/or among aplurality of data assets utilized by a corporation or other entity(e.g., individual, organization, etc.) in the context, for example, ofone or more business processes. In particular embodiments, each of theplurality of data assets (e.g., data systems) may include, for example,any entity that collects, processes, contains, and/or transfers data(e.g., such as a software application, “internet of things” computerizeddevice, database, web site, data-center, server, etc.). For example, afirst data asset may include any software or device (e.g., server orservers) utilized by a particular entity for such data collection,processing, transfer, storage, etc.

As shown in FIGS. 4 and 5, in various embodiments, the data model maystore the following information: (1) the organization that owns and/oruses a particular data asset (a primary data asset, which is shown inthe center of the data model in FIG. 4); (2) one or more departmentswithin the organization that are responsible for the data asset; (3) oneor more software applications that collect data (e.g., personal data)for storage in and/or use by the data asset (e.g., or one or more othersuitable collection assets from which the personal data that iscollected, processed, stored, etc. by the primary data asset issourced); (4) one or more particular data subjects (or categories ofdata subjects) that information is collected from for use by the dataasset; (5) one or more particular types of data that are collected byeach of the particular applications for storage in and/or use by thedata asset; (6) one or more individuals (e.g., particular individuals ortypes of individuals) that are permitted to access and/or use the datastored in, or used by, the data asset; (7) which particular types ofdata each of those individuals are allowed to access and use; and (8)one or more data assets (destination assets) that the data istransferred to for other use, and which particular data is transferredto each of those data assets. As shown in FIGS. 6 and 7, the system mayalso optionally store information regarding, for example, which businessprocesses and processing activities utilize the data asset.

In particular embodiments, the data model stores this information foreach of a plurality of different data assets and may include linksbetween, for example, a portion of the model that provides informationfor a first particular data asset and a second portion of the model thatprovides information for a second particular data asset.

In various embodiments, the data model generation and population systemmay be implemented in the context of any suitable privacy managementsystem that is configured to ensure compliance with one or more legal orindustry standards related to the collection and/or storage of privateinformation. In various embodiments, a particular organization,sub-group, or other entity may initiate a privacy campaign or otheractivity (e.g., processing activity) as part of its business activities.In such embodiments, the privacy campaign may include any undertaking bya particular organization (e.g., such as a project or other activity)that includes the collection, entry, and/or storage (e.g., in memory) ofany personal data associated with one or more individuals. In particularembodiments, a privacy campaign may include any project undertaken by anorganization that includes the use of personal data, or any otheractivity that could have an impact on the privacy of one or moreindividuals.

In any embodiment described herein, personal data may include, forexample: (1) the name of a particular data subject (which may be aparticular individual); (2) the data subject's address; (3) the datasubject's telephone number; (4) the data subject's e-mail address; (5)the data subject's social security number; (6) information associatedwith one or more of the data subject's credit accounts (e.g., creditcard numbers); (7) banking information for the data subject; (8)location data for the data subject (e.g., their present or pastlocation); (9) internet search history for the data subject; and/or (10)any other suitable personal information, such as other personalinformation discussed herein. In particular embodiments, such personaldata may include one or more cookies (e.g., where the individual isdirectly identifiable or may be identifiable based at least in part oninformation stored in the one or more cookies).

In particular embodiments, when generating a data model, the system may,for example: (1) identify one or more data assets associated with aparticular organization; (2) generate a data inventory for each of theone or more data assets, where the data inventory comprises informationsuch as: (a) one or more processing activities associated with each ofthe one or more data assets, (b) transfer data associated with each ofthe one or more data assets (data regarding which data is transferredto/from each of the data assets, and which data assets, or individuals,the data is received from and/or transferred to, (c) personal dataassociated with each of the one or more data assets (e.g., particulartypes of data collected, stored, processed, etc. by the one or more dataassets), and/or (d) any other suitable information; and (3) populate thedata model using one or more suitable techniques.

In particular embodiments, the one or more techniques for populating thedata model may include, for example: (1) obtaining information for thedata model by using one or more questionnaires associated with aparticular privacy campaign, processing activity, etc.; (2) using one ormore intelligent identity scanning techniques discussed herein toidentify personal data stored by the system and map such data to asuitable data model, data asset within a data model, etc.; (3) obtaininginformation for the data model from a third-party application (or otherapplication) using one or more application programming interfaces (API);and/or (4) using any other suitable technique.

In particular embodiments, the system is configured to generate andpopulate a data model substantially on the fly (e.g., as the systemreceives new data associated with particular processing activities). Instill other embodiments, the system is configured to generate andpopulate a data model based at least in part on existing informationstored by the system (e.g., in one or more data assets), for example,using one or more suitable scanning techniques described herein.

As may be understood in light of this disclosure, a particularorganization may undertake a plurality of different privacy campaigns,processing activities, etc. that involve the collection and storage ofpersonal data. In some embodiments, each of the plurality of differentprocessing activities may collect redundant data (e.g., may collect thesame personal data for a particular individual more than once), and maystore data and/or redundant data in one or more particular locations(e.g., on one or more different servers, in one or more differentdatabases, etc.). In this way, a particular organization may storepersonal data in a plurality of different locations which may includeone or more known and/or unknown locations. By generating and populatinga data model of one or more data assets that are involved in thecollection, storage and processing of such personal data, the system maybe configured to create a data model that facilitates a straightforwardretrieval of information stored by the organization as desired. Forexample, in various embodiments, the system may be configured to use adata model in substantially automatically responding to one or more dataaccess requests by an individual (e.g., or other organization). In stillother embodiments, such data model generation and population may improvethe functionality of an entity's computing systems by enabling a morestreamlined retrieval of data from the system and eliminating redundantstorage of identical data. Various embodiments of a system forgenerating and populating a data model are described more fully below.

In particular embodiments, a Cross-Border Visualization GenerationSystem is configured to: (1) identify one or more data assets associatedwith a particular entity; (2) analyze the one or more data assets toidentify one or more data elements stored in the identified one or moredata assets; (3) define a plurality of physical locations and identify,for each of the identified one or more data assets, a respectiveparticular physical location of the plurality of physical locations; (4)analyze the identified one or more data elements to determine one ormore data transfers between the one or more data systems in differentparticular physical locations; (5) determine one or more regulationsthat relate to the one or more data transfers; and (6) generate a visualrepresentation of the one or more data transfers based at least in parton the one or more regulations.

In various embodiments, a Data Model Adaptive Execution System may beconfigured to take one or more suitable actions to remediate anidentified risk trigger in view of one or more regulations (e.g., one ormore legal regulations, one or more binding corporate rules, etc.). Forexample, in order to ensure compliance with one or more legal orindustry standards related to the collection and/or storage of privateinformation (e.g., personal data), an entity may be required to modifyone or more aspects of a way in which the entity collects, stores,and/or otherwise processes personal data (e.g., in response to a changein a legal or other requirement). In order to identify whether aparticular change or other risk trigger requires remediation, the systemmay be configured to assess a relevance of the risk posed by thepotential risk trigger and identify one or more processing activities ordata assets that may be affected by the risk.

The system may, for example: (1) identify and/or detect one or morepotential risk triggers; (2) assess and analyze the potential risktriggers to determine a relevance of the risk posed by the risktriggers; (3) use data modelling techniques to identify particularprocessing activities and/or data assets that may be affected by therisk; (4) determine based on a relevance of the risk and the affectedsystems/processes whether to take one or more actions; and (5) take asuitable action in response to the risk triggers, if necessary.

The risk triggers may include, for example a change in legal or industrystandards/regulations related to the collection, storage, and/orprocessing of personal data, a data breach, or any other suitable risktrigger. The suitable actions to remediate the risk may include, forexample, generating a report and providing it to a privacy officer orother individual, automatically modifying an encryption level ofparticular data stored by the system, quarantining particular data, etc.

In various embodiments, a system may be configured to substantiallyautomatically determine whether to take one or more actions in responseto one or more identified risk triggers (e.g., data breaches, changes inregulations, etc.). For example, the system may substantiallyautomatically determine a relevance of a risk posed by (e.g., a risklevel) the one or more potential risk triggers based at least in part onone or more previously-determined responses to similar risk triggers.This may include, for example, one or more previously determinedresponses for the particular entity that has identified the current risktrigger, one or more similarly situated entities, or any other suitableentity or potential trigger.

The system may, for example: (1) compare the potential risk trigger toone or more previous risks triggers experienced by the particular entityat a previous time; (2) identify a similar previous risk trigger (e.g.,one or more previous risk triggers related to a similar change inregulation, breach of data, type of issue identified, etc.); (3)determine the relevance of the current risk trigger based at least inpart on a determined relevance of the previous risk trigger; and (4)determine whether to take one or more actions to the current risktrigger based at least in part on one or more determined actions to takein response to the previous, similar risk trigger.

Similarly, in particular embodiments, the system may be configured tosubstantially automatically determine one or more actions to take inresponse to a current potential risk trigger based on one or moreactions taken by one or more similarly situated entities to one or moreprevious, similar risk triggers. For example, the system may beconfigured to: (1) compare the potential risk trigger to one or moreprevious risk triggers experienced by one or more similarly situatedentities at a previous time; (2) identify a similar previous risktrigger (e.g., one or more previous risk triggers related to a similarchange in regulation, breach of data, and/or type of issue identified,etc. from the one or more previous risk triggers experienced by the oneor more similarly-situated entities at the previous time; (3) determinethe relevance of the current risk trigger based at least in part on adetermined relevance of the previous risk trigger (e.g., a relevancedetermined by the one or more similarly situated entities); and (4)determine one or more actions to take in response to the current risktrigger based at least in part on one or more previously determinedactions to take in response to the previous, similar risk trigger (e.g.,one or more determined actions by the one or more similarly situatedentities at the previous time).

In particular embodiments, a Data Access Webform Crawling System isconfigured to: (1) identify a webform used to collect one or more piecesof personal data; (2) robotically complete the identified webform; (3)analyze the completed webform to determine one or more processingactivities that utilize the one or more pieces of personal datacollected by the webform; (4) identify a first data asset in the datamodel that is associated with the one or more processing activities; (5)modify a data inventory for the first data asset in the data model toinclude data associated with the webform; and (6) modify the data modelto include the modified data inventory for the first data asset.

In addition, various systems and computer-implemented methods aredescribed for: (1) analyzing electronic correspondence associated with adata subject (e.g., the emails within one or more email in-boxesassociated with the data subject); (2) based on the analysis,identifying one or more entities (e.g., corporate entities) that thatthe data subject does not actively do business with (e.g., as evidencedby the fact that the data subject no longer opens emails from theentity, or has set up a rule to automatically delete emails receivedfrom the entity); (3) in response to identifying the entity as an entitythat the data subject no longer actively does business with, at leastsubstantially automatically generating a data subject access requestand, optionally, automatically submitting the data subject accessrequest to the entity.

The system may, for example, be configured to determine whether the datasubject actively does business with a particular entity (e.g., purchasesproducts from, or uses one or more services from the entity) based atleast in part on one more determined interactions of the data subjectwith one or more e-mails, or other electronic correspondence, from theentity (e.g., whether the data subject reads the one or more e-mails,selects one or more links within the e-mails, deletes the e-mailswithout reading them, has set up a rule to auto-delete emails from theentity, has set up a rule to re-route emails from the entity to aparticular folder, or other location, designated for promotionalmaterials (e.g., unwanted promotional materials), and/or has set up arule to associate emails from the entity with metadata indicating thatthe correspondence is promotional in nature or should be re-routed orauto-deleted. The system may then substantially automatically generateand/or submit a data subject access request on behalf of the datasubject that includes a request to be forgotten (e.g., a request for theentity to delete some or all of the data subject's personal data thatthe entity is processing).

Technical Contributions of Various Embodiments

An entity that handles (e.g., collects, receives, transmits, stores,processes, shares, and/or the like) sensitive and/or personalinformation associated with particular individuals (e.g., personallyidentifiable information (PII) data, sensitive data, personal data,etc.) may be subject to various laws, regulations, and/or otherrequirements regarding the handling and of such information. Theserequirements may include restrictions on the jurisdictions and/or otherentities to which such data may be transmitted and/or from which suchdata may be received. An entity may also have other bases forrestricting the transfer of data, such as past (e.g., negative)experience, security and/or privacy recommendations, contractualrequirements, data subject preferences, etc. Data transfer restrictionsmay vary based on numerous criteria, such as the particular data assetsor systems involved in the transfer, the particular data subjectassociated with the data to be transferred, the data subject's locationor jurisdiction, the product or service involved, the type of data to betransferred, the applicable terms of service, etc. Given the vastnumbers of computing devices that any particular entity may operateand/or interact with, there is essentially an unlimited number ofcombinations of devices and circumstances that may be involved in anygiven data transfer. Therefore, it is very challenging for an entity tosystematically detect (e.g., past, ongoing, pending) data transfers anddetermine whether and how to apply data transfer restrictions to suchdata transfers and/or take other responsive actions. Determiningparticular interface elements to configure on interfaces associated withdata transfers and/or data transfer restrictions in response to variouspotentially triggering information can also be quite challenging.

Accordingly, various embodiments of the present disclosure overcome manyof the technical challenges associated with detecting a data transfer,determining whether a data transfer is authorized, determining whetherand how to apply data transfer restrictions, and determining otherrelated actions. Various embodiments of the present disclosure alsoovercome technical challenges related to configuring graphical userinterfaces, determining the various elements to include in suchinterfaces, and the responsive actions to take based on user interactionwith such interfaces. Specifically, various embodiments of thedisclosure are directed to a computational framework configured fordetecting a data transfer that triggers a systematic determination ofwhether the transfer is authorized based on various criteria. A datatransfer may be detected based on a data transfer log and/or a state ofan application executing on a computing device. The criteria used todetermine whether a data transfer restriction is to be applied to aparticular data transfer may include data associated with each systeminvolved in the transfer, such as network address, geographicallocation, applicable jurisdiction, associated system or network, etc.,and/or other data, such as a type of data involved in the transfer, auser initiating transfer, historical transfer data, etc. A data mapassociated with one of involved systems may be used to determine whetherthe transfer is authorized or not based on such criteria. A record ofthe application of a data transfer restriction may be generated andstored (e.g., as metadata) for use in addressing similar data transfers,thereby increasing the efficiency of systematically blocking orotherwise addressing future unauthorized data transfers. The system mayalso, or instead, in response to application state information,configure one or more navigational, control, and/or display elements ona graphical user interface that can be used to request approval for adata transfer or otherwise interact with a user regarding a datatransfer. Such elements may be configured to perform one or more actionswhen selected, such as allowing or denying a pending data transfer.

Accordingly, various embodiments of the disclosure provided herein aremore effective, efficient, timely, accurate, and faster in determiningdetecting data transfers, determining whether such transfers areauthorized, and taking steps to systematically address such datatransfers. Such steps include systematically identifying and enforcingapplicable data transfer restrictions, generating and using metadata toaddress similar data transfers, and identifying and configuring the mostapplicable graphical user interface elements for an interface that maypresented to a user as part of addressing a data transfer. The variousembodiments help ensure that appropriate data transfer safeguards areapplied in any of a wide variety of potential data transfer situations.This is especially advantageous for a modern entity that may operatemany computing devices, interact with many different data subjects, andhandle many different types of personal data across a wide variety ofproducts and jurisdictions. In facilitating the identification andapplication of appropriate data transfer restrictions, the variousembodiments of the present disclosure make major technical contributionsto improving the computational efficiency and reliability of variousprivacy management systems and procedures for restricting unauthorizeddata transfers and generating appropriate interfaces to address suchtransfers. This in turn translates to more computationally efficientsoftware systems. Further detail is now provided for different aspectsof various embodiments of the disclosure.

Exemplary Technical Platforms

As will be appreciated by one skilled in the relevant field, the presentinvention may be, for example, embodied as a computer system, a method,or a computer program product. Accordingly, various embodiments may takethe form of an entirely hardware embodiment, an entirely softwareembodiment, or an embodiment combining software and hardware aspects.Furthermore, particular embodiments may take the form of a computerprogram product stored on a computer-readable storage medium havingcomputer-readable instructions (e.g., software) embodied in the storagemedium. Various embodiments may take the form of web-implementedcomputer software. Any suitable computer-readable storage medium may beutilized including, for example, hard disks, compact disks, DVDs,optical storage devices, and/or magnetic storage devices.

Various embodiments are described below with reference to block diagramsand flowchart illustrations of methods, apparatuses (e.g., systems), andcomputer program products. It should be understood that each block ofthe block diagrams and flowchart illustrations, and combinations ofblocks in the block diagrams and flowchart illustrations, respectively,can be implemented by a computer executing computer programinstructions. These computer program instructions may be loaded onto ageneral purpose computer, special purpose computer, or otherprogrammable data processing apparatus to produce a machine, such thatthe instructions which execute on the computer or other programmabledata processing apparatus to create means for implementing the functionsspecified in the flowchart block or blocks.

These computer program instructions may also be stored in acomputer-readable memory that can direct a computer or otherprogrammable data processing apparatus to function in a particularmanner such that the instructions stored in the computer-readable memoryproduce an article of manufacture that is configured for implementingthe function specified in the flowchart block or blocks. The computerprogram instructions may also be loaded onto a computer or otherprogrammable data processing apparatus to cause a series of operationalsteps to be performed on the computer or other programmable apparatus toproduce a computer implemented process such that the instructions thatexecute on the computer or other programmable apparatus provide stepsfor implementing the functions specified in the flowchart block orblocks.

Accordingly, blocks of the block diagrams and flowchart illustrationssupport combinations of mechanisms for performing the specifiedfunctions, combinations of steps for performing the specified functions,and program instructions for performing the specified functions. Itshould also be understood that each block of the block diagrams andflowchart illustrations, and combinations of blocks in the blockdiagrams and flowchart illustrations, can be implemented by specialpurpose hardware-based computer systems that perform the specifiedfunctions or steps, or combinations of special purpose hardware andother hardware executing appropriate computer instructions.

Example System Architecture

FIG. 1 is a block diagram of a Data Model Generation and PopulationSystem 100 according to a particular embodiment. In various embodiments,the Data Model Generation and Population System 100 is part of a privacycompliance system (also referred to as a privacy management system), orother system, which may, for example, be associated with a particularorganization and be configured to aid in compliance with one or morelegal or industry regulations related to the collection and storage ofpersonal data. In some embodiments, the Data Model Generation andPopulation System 100 is configured to: (1) generate a data model basedon one or more identified data assets, where the data model includes adata inventory associated with each of the one or more identified dataassets; (2) identify populated and unpopulated aspects of each datainventory; and (3) populate the unpopulated aspects of each datainventory using one or more techniques such as intelligent identityscanning, questionnaire response mapping, APIs, etc.

As may be understood from FIG. 1, the Data Model Generation andPopulation System 100 includes one or more computer networks 115, a DataModel Generation Server 110, a Data Model Population Server 120, anIntelligent Identity Scanning Server 130, One or More Databases 140 orother data structures, one or more remote computing devices 150 (e.g., adesktop computer, laptop computer, tablet computer, smartphone, etc.),and One or More Third Party Servers 160. In particular embodiments, theone or more computer networks 115 facilitate communication between theData Model Generation Server 110, Data Model Population Server 120,Intelligent Identity Scanning Server 130, One or More Databases 140, oneor more remote computing devices 150 (e.g., a desktop computer, laptopcomputer, tablet computer, smartphone, etc.), and One or More ThirdParty Servers 160. Although in the embodiment shown in FIG. 1, the DataModel Generation Server 110, Data Model Population Server 120,Intelligent Identity Scanning Server 130, One or More Databases 140, oneor more remote computing devices 150 (e.g., a desktop computer, laptopcomputer, tablet computer, smartphone, etc.), and One or More ThirdParty Servers 160 are shown as separate servers, it should be understoodthat in other embodiments, one or more of these servers and/or computingdevices may comprise a single server, a plurality of servers, one ormore cloud-based servers, or any other suitable configuration. It shouldbe further understood that although any particular name given to anyparticular server in the course of this description should not beunderstood to imply any limit to any functionality that such a servermay provide to the system. For example, a scanning server may beimplemented along with one or more other servers to generate, automate,execute, and/or fulfill one or more data subject access requests.Similarly, a data model population server may be configured to executeone or more scanning steps described herein, etc.

The one or more computer networks 115 may include any of a variety oftypes of wired or wireless computer networks such as the Internet, aprivate intranet, a public switch telephone network (PSTN), or any othertype of network. The communication link between The Intelligent IdentityScanning Server 130 and the One or More Third Party Servers 160 may be,for example, implemented via a Local Area Network (LAN) or via theInternet. In other embodiments, the One or More Databases 140 may bestored either fully or partially on any suitable server or combinationof servers described herein.

FIG. 2 illustrates a diagrammatic representation of a computer 200 thatcan be used within the Data Model Generation and Population System 100,for example, as a client computer (e.g., one or more remote computingdevices 130 shown in FIG. 1), or as a server computer (e.g., Data ModelGeneration Server 110 shown in FIG. 1). In particular embodiments, thecomputer 200 may be suitable for use as a computer within the context ofthe Data Model Generation and Population System 100 that is configuredto generate a data model and map one or more relationships between oneor more pieces of data that make up the model.

In particular embodiments, the computer 200 may be connected (e.g.,networked) to other computers in a LAN, an intranet, an extranet, and/orthe Internet. As noted above, the computer 200 may operate in thecapacity of a server or a client computer in a client-server networkenvironment, or as a peer computer in a peer-to-peer (or distributed)network environment. The Computer 200 may be a personal computer (PC), atablet PC, a set-top box (STB), a Personal Digital Assistant (PDA), acellular telephone, a web appliance, a server, a network router, aswitch or bridge, or any other computer capable of executing a set ofinstructions (sequential or otherwise) that specify actions to be takenby that computer. Further, while only a single computer is illustrated,the term “computer” shall also be taken to include any collection ofcomputers that individually or jointly execute a set (or multiple sets)of instructions to perform any one or more of the methodologiesdiscussed herein.

An exemplary computer 200 includes a processing device 202, a mainmemory 204 (e.g., read-only memory (ROM), flash memory, dynamic randomaccess memory (DRAM) such as synchronous DRAM (SDRAM) or Rambus DRAM(RDRAM), etc.), static memory 206 (e.g., flash memory, static randomaccess memory (SRAM), etc.), and a data storage device 218, whichcommunicate with each other via a bus 232.

The processing device 202 represents one or more general-purposeprocessing devices such as a microprocessor, a central processing unit,or the like. More particularly, the processing device 202 may be acomplex instruction set computing (CISC) microprocessor, reducedinstruction set computing (RISC) microprocessor, very long instructionword (VLIW) microprocessor, or processor implementing other instructionsets, or processors implementing a combination of instruction sets. Theprocessing device 202 may also be one or more special-purpose processingdevices such as an application specific integrated circuit (ASIC), afield programmable gate array (FPGA), a digital signal processor (DSP),network processor, or the like. The processing device 202 may beconfigured to execute processing logic 226 for performing variousoperations and steps discussed herein.

The computer 120 may further include a network interface device 208. Thecomputer 200 also may include a video display unit 210 (e.g., a liquidcrystal display (LCD) or a cathode ray tube (CRT)), an alphanumericinput device 212 (e.g., a keyboard), a cursor control device 214 (e.g.,a mouse), and a signal generation device 216 (e.g., a speaker).

The data storage device 218 may include a non-transitorycomputer-accessible storage medium 230 (also known as a non-transitorycomputer-readable storage medium or a non-transitory computer-readablemedium) on which is stored one or more sets of instructions (e.g.,software instructions 222) embodying any one or more of themethodologies or functions described herein. The software instructions222 may also reside, completely or at least partially, within mainmemory 204 and/or within processing device 202 during execution thereofby computer 200—main memory 204 and processing device 202 alsoconstituting computer-accessible storage media. The softwareinstructions 222 may further be transmitted or received over a network115 via network interface device 208.

While the computer-accessible storage medium 230 is shown in anexemplary embodiment to be a single medium, the term“computer-accessible storage medium” should be understood to include asingle medium or multiple media (e.g., a centralized or distributeddatabase, and/or associated caches and servers) that store the one ormore sets of instructions. The term “computer-accessible storage medium”should also be understood to include any medium that is capable ofstoring, encoding or carrying a set of instructions for execution by thecomputer and that cause the computer to perform any one or more of themethodologies of the present invention. The term “computer-accessiblestorage medium” should accordingly be understood to include, but not belimited to, solid-state memories, optical and magnetic media, etc.

Exemplary System Platform

Various embodiments of a Data Model Generation and Population System 100may be implemented in the context of any suitable system (e.g., aprivacy compliance system). For example, the Data Model Generation andPopulation System 100 may be implemented to analyze a particular companyor other organization's data assets to generate a data model for one ormore processing activities, privacy campaigns, etc. undertaken by theorganization. In particular embodiments, the system may implement one ormore modules in order to at least partially ensure compliance with oneor more regulations (e.g., legal requirements) related to the collectionand/or storage of personal data. Various aspects of the system'sfunctionality may be executed by certain system modules, including aData Model Generation Module 300, Data Model Population Module 1100,Data Population Questionnaire Generation Module 1200, IntelligentIdentity Scanning Module 2600, Data Subject Access Request FulfillmentModule 2900, Cross-Border Visualization Generation Module 3600, AdaptiveExecution on a Data Model Module 3900, E-mail Scanning Module 4100,Webform Crawling Module 4300, and Data Asset and Webform ManagementModule 4400. These modules are discussed in greater detail below.

Although these modules are presented as a series of steps, it should beunderstood in light of this disclosure that various embodiments of theData Model Generation Module 300, Data Model Population Module 1100,Data Population Questionnaire Generation Module 1200, IntelligentIdentity Scanning Module 2600, Data Subject Access Request FulfillmentModule 2900, Cross-Border Visualization Generation Module 3600, AdaptiveExecution on a Data Model Module 3900, E-mail Scanning Module 4100,Webform Crawling Module 4300, and Data Asset and Webform ManagementModule 4400 described herein may perform the steps described below in anorder other than in which they are presented. In still otherembodiments, the Data Model Generation Module 300, Data Model PopulationModule 1100, Data Population Questionnaire Generation Module 1200,Intelligent Identity Scanning Module 2600, Data Subject Access RequestFulfillment Module 2900, Cross-Border Visualization Generation Module3600, Adaptive Execution on a Data Model Module 3900, E-mail ScanningModule 4100, Webform Crawling Module 4300, and Data Asset and WebformManagement Module 4400 may omit certain steps described below. Invarious other embodiments, the Data Model Generation Module 300, DataModel Population Module 1100, Data Population Questionnaire GenerationModule 1200, Intelligent Identity Scanning Module 2600, Data SubjectAccess Request Fulfillment Module 2900, Cross-Border VisualizationGeneration Module 3600, Adaptive Execution on a Data Model Module 3900,E-mail Scanning Module 4100, Webform Crawling Module 4300, and DataAsset and Webform Management Module 4400 may perform steps in additionto those described (e.g., such as one or more steps described withrespect to one or more other modules, etc.).

In particular embodiments, the steps that the system executes whenexecuting any of the modules described herein may be performed by anysuitable computer server or combination of computer servers (e.g., anysuitable computing device, server, or combination of computing deviceand/or server described herein).

Data Model Generation Module

In particular embodiments, a Data Model Generation Module 300 isconfigured to: (1) generate a data model (e.g., a data inventory) forone or more data assets utilized by a particular organization; (2)generate a respective data inventory for each of the one or more dataassets; and (3) map one or more relationships between one or moreaspects of the data inventory, the one or more data assets, etc. withinthe data model. In particular embodiments, a data asset (e.g., datasystem, software application, etc.) may include, for example, any entitythat collects, processes, contains, and/or transfers data (e.g., such asa software application, “internet of things” computerized device,database, website, data-center, server, etc.). For example, a first dataasset may include any software or device (e.g., server or servers)utilized by a particular entity for such data collection, processing,transfer, storage, etc.

In particular embodiments, a particular data asset, or collection ofdata assets, may be utilized as part of a particular data processingactivity (e.g., direct deposit generation for payroll purposes). Invarious embodiments, a data model generation system may, on behalf of aparticular organization (e.g., entity), generate a data model thatencompasses a plurality of processing activities. In other embodiments,the system may be configured to generate a discrete data model for eachof a plurality of processing activities undertaken by an organization.

Turning to FIG. 3, in particular embodiments, when executing the DataModel Generation Module 300, the system begins, at Step 310, bygenerating a data model for one or more data assets and digitallystoring the data model in computer memory. The system may, for example,store the data model in the One or More Databases 140 described above(or any other suitable data structure). In various embodiments,generating the data model comprises generating a data structure thatcomprises information regarding one or more data assets, attributes andother elements that make up the data model. As may be understood inlight of this disclosure, the one or more data assets may include anydata assets that may be related to one another. In particularembodiments, the one or more data assets may be related by virtue ofbeing associated with a particular entity (e.g., organization). Forexample, the one or more data assets may include one or more computerservers owned, operated, or utilized by the entity that at leasttemporarily store data sent, received, or otherwise processed by theparticular entity.

In still other embodiments, the one or more data assets may comprise oneor more third party assets which may, for example, send, receive and/orprocess personal data on behalf of the particular entity. These one ormore data assets may include, for example, one or more softwareapplications (e.g., such as Expensify to collect expense information,QuickBooks to maintain and store salary information, etc.).

Continuing to step 320, the system is configured to identify a firstdata asset of the one or more data assets. In particular embodiments,the first data asset may include, for example, any entity (e.g., system)that collects, processes, contains, and/or transfers data (e.g., such asa software application, “internet of things” computerized device,database, website, data-center, server, etc.). For example, the firstdata asset may include any software or device utilized by a particularorganization for such data collection, processing, transfer, etc. Invarious embodiments, the first data asset may be associated with aparticular processing activity (e.g., the first data asset may make upat least a part of a data flow that relates to the collection, storage,transfer, access, use, etc. of a particular piece of data (e.g.,personal data)). Information regarding the first data asset may clarify,for example, one or more relationships between and/or among one or moreother data assets within a particular organization. In a particularexample, the first data asset may include a software applicationprovided by a third party (e.g., a third party vendor) with which theparticular entity interfaces for the purpose of collecting, storing, orotherwise processing personal data (e.g., personal data regardingcustomers, employees, potential customers, etc.).

In particular embodiments, the first data asset is a storage asset thatmay, for example: (1) receive one or more pieces of personal data formone or more collection assets; (2) transfer one or more pieces ofpersonal data to one or more transfer assets; and/or (3) provide accessto one or more pieces of personal data to one or more authorizedindividuals (e.g., one or more employees, managers, or other authorizedindividuals within a particular entity or organization). In a particularembodiment, the first data asset is a primary data asset associated witha particular processing activity around which the system is configuredto build a data model associated with the particular processingactivity.

In particular embodiments, the system is configured to identify thefirst data asset by scanning a plurality of computer systems associatedwith a particular entity (e.g., owned, operated, utilized, etc. by theparticular entity). In various embodiments, the system is configured toidentify the first data asset from a plurality of data assets identifiedin response to completion, by one or more users, of one or morequestionnaires.

Advancing to Step 330, the system generates a first data inventory ofthe first data asset. The data inventory may comprise, for example, oneor more inventory attributes associated with the first data asset suchas, for example: (1) one or more processing activities associated withthe first data asset; (2) transfer data associated with the first dataasset (e.g., how and where the data is being transferred to and/orfrom); (3) personal data associated with the first data asset (e.g.,what type of personal data is collected and/or stored by the first dataasset; how, and from where, the data is collected, etc.); (4) storagedata associated with the personal data (e.g., whether the data is beingstored, protected and deleted); and (5) any other suitable attributerelated to the collection, use, and transfer of personal data. In otherembodiments, the one or more inventory attributes may comprise one ormore other pieces of information such as, for example: (1) the type ofdata being stored by the first data asset; (2) an amount of data storedby the first data asset; (3) whether the data is encrypted; (4) alocation of the stored data (e.g., a physical location of one or morecomputer servers on which the data is stored); etc. In particular otherembodiments, the one or more inventory attributes may comprise one ormore pieces of information technology data related to the first dataasset (e.g., such as one or more pieces of network and/or infrastructureinformation, IP address, MAC address, etc.).

In various embodiments, the system may generate the data inventory basedat least in part on the type of first data asset. For example,particular types of data assets may have particular default inventoryattributes. In such embodiments, the system is configured to generatethe data inventory for the first data asset, which may, for example,include one or more placeholder fields to be populated by the system ata later time. In this way, the system may, for example, identifyparticular inventory attributes for a particular data asset for whichinformation and/or population of data is required as the system buildsthe data model.

As may be understood in light of this disclosure, the system may, whengenerating the data inventory for the first data asset, generate one ormore placeholder fields that may include, for example: (1) theorganization (e.g., entity) that owns and/or uses the first data asset(a primary data asset, which is shown in the center of the data model inFIG. 4); (2) one or more departments within the organization that areresponsible for the first data asset; (3) one or more softwareapplications that collect data (e.g., personal data) for storage inand/or use by the first data asset (e.g., or one or more other suitablecollection assets from which the personal data that is collected,processed, stored, etc. by the first data asset is sourced); (4) one ormore particular data subjects (or categories of data subjects) thatinformation is collected from for use by the first data asset; (5) oneor more particular types of data that are collected by each of theparticular applications for storage in and/or use by the first dataasset; (6) one or more individuals (e.g., particular individuals ortypes of individuals) that are permitted to access and/or use the datastored in, or used by, the first data asset; (7) which particular typesof data each of those individuals are allowed to access and use; and (8)one or more data assets (destination assets) that the data istransferred to from the first data asset, and which particular data istransferred to each of those data assets.

As may be understood in light of this disclosure, the system may beconfigured to generate the one or more placeholder fields based at leastin part on, for example: (1) the type of the first data asset; (2) oneor more third party vendors utilized by the particular organization; (3)a number of collection or storage assets typically associated with thetype of the first data asset; and/or (4) any other suitable factorrelated to the first data asset, its one or more inventory attributes,etc. In other embodiments, the system may substantially automaticallygenerate the one or more placeholders based at least in part on ahierarchy and/or organization of the entity for which the data model isbeing built. For example, a particular entity may have a marketingdivision, legal department, human resources department, engineeringdivision, or other suitable combination of departments that make up anoverall organization. Other particular entities may have furthersubdivisions within the organization. When generating the data inventoryfor the first data asset, the system may identify that the first dataasset will have both an associated organization and subdivision withinthe organization to which it is assigned. In this example, the systemmay be configured to store an indication in computer memory that thefirst data asset is associated with an organization and a departmentwithin the organization.

Next, at Step 340, the system modifies the data model to include thefirst data inventory and electronically links the first data inventoryto the first data asset within the data model. In various embodiments,modifying the data model may include configuring the data model to storethe data inventory in computer memory, and to digitally associate thedata inventory with the first data asset in memory.

FIGS. 4 and 5 show a data model according to a particular embodiment. Asshown in these figures, the data model may store the followinginformation for the first data asset: (1) the organization that ownsand/or uses the first data asset; (2) one or more departments within theorganization that are responsible for the first data asset; (3) one ormore applications that collect data (e.g., personal data) for storage inand/or use by the first data asset; (4) one or more particular datasubjects that information is collected from for use by the first dataasset; (5) one or more collection assets from which the first assetreceives data (e.g., personal data); (6) one or more particular types ofdata that are collected by each of the particular applications (e.g.,collection assets) for storage in and/or use by the first data asset;(7) one or more individuals (e.g., particular individuals, types ofindividuals, or other parties) that are permitted to access and/or usethe data stored in or used by the first data asset; (8) which particulartypes of data each of those individuals are allowed to access and use;and (9) one or more data assets (destination assets) the data istransferred to for other use, and which particular data is transferredto each of those data assets. As shown in FIGS. 6 and 7, the system mayalso optionally store information regarding, for example, which businessprocesses and processing activities utilize the first data asset.

As noted above, in particular embodiments, the data model stores thisinformation for each of a plurality of different data assets and mayinclude one or more links between, for example, a portion of the modelthat provides information for a first particular data asset and a secondportion of the model that provides information for a second particulardata asset.

Advancing to Step 350, the system next identifies a second data assetfrom the one or more data assets. In various embodiments, the seconddata asset may include one of the one or more inventory attributesassociated with the first data asset (e.g., the second data asset mayinclude a collection asset associated with the first data asset, adestination asset or transfer asset associated with the first dataasset, etc.). In various embodiments, as may be understood in light ofthe exemplary data models described below, a second data asset may be aprimary data asset for a second processing activity, while the firstdata asset is the primary data asset for a first processing activity. Insuch embodiments, the second data asset may be a destination asset forthe first data asset as part of the first processing activity. Thesecond data asset may then be associated with one or more seconddestination assets to which the second data asset transfers data. Inthis way, particular data assets that make up the data model may defineone or more connections that the data model is configured to map andstore in memory.

Returning to Step 360, the system is configured to identify one or moreattributes associated with the second data asset, modify the data modelto include the one or more attributes, and map the one or moreattributes of the second data asset within the data model. The systemmay, for example, generate a second data inventory for the second dataasset that comprises any suitable attribute described with respect tothe first data asset above. The system may then modify the data model toinclude the one or more attributes and store the modified data model inmemory. The system may further, in various embodiments, associate thefirst and second data assets in memory as part of the data model. Insuch embodiments, the system may be configured to electronically linkthe first data asset with the second data asset. In various embodiments,such association may indicate a relationship between the first andsecond data assets in the context of the overall data model (e.g.,because the first data asset may serve as a collection asset for thesecond data asset, etc.).

Next, at Step 370, the system may be further configured to generate avisual representation of the data model. In particular embodiments, thevisual representation of the data model comprises a data map. The visualrepresentation may, for example, include the one or more data assets,one or more connections between the one or more data assets, the one ormore inventory attributes, etc.

In particular embodiments, generating the visual representation (e.g.,visual data map) of a particular data model (e.g., data inventory) mayinclude, for example, generating a visual representation that includes:(1) a visual indication of a first data asset (e.g., a storage asset), asecond data asset (e.g., a collection asset), and a third data asset(e.g., a transfer asset); (2) a visual indication of a flow of data(e.g., personal data) from the second data asset to the first data asset(e.g., from the collection asset to the storage asset); (3) a visualindication of a flow of data (e.g., personal data) from the first dataasset to the third data asset (e.g., from the storage asset to thetransfer asset); (4) one or more visual indications of a risk levelassociated with the transfer of personal data; and/or (5) any othersuitable information related to the one or more data assets, thetransfer of data between/among the one or more data assets, access todata stored or collected by the one or more data assets, etc.

In particular embodiments, the visual indication of a particular assetmay comprise a box, symbol, shape, or other suitable visual indicator.In particular embodiments, the visual indication may comprise one ormore labels (e.g., a name of each particular data asset, a type of theasset, etc.). In still other embodiments, the visual indication of aflow of data may comprise one or more arrows. In particular embodiments,the visual representation of the data model may comprise a data flow,flowchart, or other suitable visual representation.

In various embodiments, the system is configured to display (e.g., to auser) the generated visual representation of the data model on asuitable display device.

Exemplary Data Models and Visual Representations of Data Models (e.g.,Data Maps)

FIGS. 4-10 depict exemplary data models according to various embodimentsof the system described herein. FIG. 4, for example, depicts anexemplary data model that does not include a particular processingactivity (e.g., that is not associated with a particular processingactivity). As may be understood from the data model shown in thisfigure, a particular data asset (e.g., a primary data asset) may beassociated with a particular company (e.g., organization), ororganization within a particular company, sub-organization of aparticular organization, etc. In still other embodiments, the particularasset may be associated with one or more collection assets (e.g., one ormore data subjects from whom personal data is collected for storage bythe particular asset), one or more parties that have access to datastored by the particular asset, one or more transfer assets (e.g., oneor more assets to which data stored by the particular asset may betransferred), etc.

As may be understood from FIG. 4, a particular data model for aparticular asset may include a plurality of data elements. Whengenerating the data model for the particular asset, a system may beconfigured to substantially automatically identify one or more types ofdata elements for inclusion in the data model, and automaticallygenerate a data model that includes those identified data elements(e.g., even if one or more of those data elements must remainunpopulated because the system may not initially have access to a valuefor the particular data element). In such cases, the system may beconfigured to store a placeholder for a particular data element untilthe system is able to populate the particular data element with accuratedata.

As may be further understood from FIG. 4, the data model shown in FIG. 4may represent a portion of an overall data model. For example, in theembodiment shown in this figure, the transfer asset depicted may serveas a storage asset for another portion of the data model. In suchembodiments, the transfer asset may be associated with a respective oneor more of the types of data elements described above. In this way, thesystem may generate a data model that may build upon itself to comprisea plurality of layers as the system adds one or more new data assets,attributes, etc.

As may be further understood from FIG. 4, a particular data model mayindicate one or more parties that have access to and/or use of theprimary asset (e.g., storage asset). In such embodiments, the system maybe configured to enable the one or more parties to access one or morepieces of data (e.g., personal data) stored by the storage asset.

As shown in FIG. 4, the data model may further comprise one or morecollection assets (e.g., one or more data assets or individuals fromwhich the storage asset receives data such as personal data). In theexemplary data model (e.g., visual data map) shown in this figure, thecollection assets comprise a data subject (e.g., an individual that mayprovide data to the system for storage in the storage asset) and acollection asset (e.g., which may transfer one or more pieces of datathat the collection asset has collected to the storage asset).

FIG. 5 depicts a portion of an exemplary data model that is populatedfor the primary data asset Gusto. Gusto is a software application that,in the example shown in FIG. 5, may serve as a human resources servicethat contains financial, expense, review, time and attendance,background, and salary information for one or more employees of aparticular organization (e.g., GeneriTech). In the example of FIG. 5,the primary asset (e.g., Gusto) may be utilized by the HR (e.g., HumanResources) department of the particular organization (e.g., GeneriTech).Furthermore, the primary asset, Gusto, may collect financial informationfrom one or more data subjects (e.g., employees of the particularorganization), receive expense information transferred from Expensify(e.g., expensing software), and receive time and attendance datatransferred from Kronos (e.g., timekeeping software). In the exampleshown in FIG. 5, access to the information collected and/or stored byGusto may include, for example: (1) an ability to view and administersalary and background information by HR employees, and (2) an ability toview and administer employee review information by one or more servicemanagers. In the example shown in this figure, personal and other datacollected and stored by Gusto (e.g., salary information, etc.) may betransferred to a company banking system, to QuickBooks, and/or to an HRfile cabinet.

As may be understood from the example shown in FIG. 5, the system may beconfigured to generate a data model based around Gusto that illustratesa flow of personal data utilized by Gusto. The data model in thisexample illustrates, for example, a source of personal data collected,stored and/or processed by Gusto, a destination of such data, anindication of who has access to such data within Gusto, and anorganization and department responsible for the information collected byGusto. In particular embodiments, the data model and accompanying visualrepresentation (e.g., data map) generated by the system as described inany embodiment herein may be utilized in the context of compliance withone or more record keeping requirements related to the collection,storage, and processing of personal data.

FIGS. 6 and 7 depict an exemplary data model and related example that issimilar, in some respects, to the data model and example of FIGS. 4 and5. In the example shown in FIGS. 6 and 7, the exemplary data model andrelated example include a specific business process and processingactivity that is associated with the primary asset (Gusto). In thisexample, the business process is compensation and the specificprocessing activity is direct deposit generation in Gusto. As may beunderstood from this figure, the collection and transfer of data relatedto the storage asset of Gusto is based on a need to generate directdeposits through Gusto in order to compensate employees. Gusto generatesthe information needed to conduct a direct deposit (e.g., financial andsalary information) and then transmits this information to: (1) acompany bank system for execution of the direct deposit; (2) Quickbooksfor use in documenting the direct deposit payment; and (3) HR Filecabinet for use in documenting the salary info and other financialinformation.

As may be understood in light of this disclosure, when generating such adata model, particular pieces of data (e.g., data attributes, dataelements) may not be readily available to the system. In suchembodiment, the system is configured to identify a particular type ofdata, create a placeholder for such data in memory, and seek out (e.g.,scan for and populate) an appropriate piece of data to further populatethe data model. For example, in particular embodiments, the system mayidentify Gusto as a primary asset and recognize that Gusto storesexpense information. The system may then be configured to identify asource of the expense information (e.g., Expensify).

FIG. 8 depicts an exemplary screen display 800 that illustrates a visualrepresentation (e.g., visual data map) of a data model (e.g., a datainventory). In the example shown in FIG. 8, the data map provides avisual indication of a flow of data collected from particular datasubjects (e.g., employees 801). As may be understood from this figure,the data map illustrates that three separate data assets receive data(e.g., which may include personal data) directly from the employees 801.In this example, these three data assets include Kronos 803 (e.g., ahuman resources software application), Workday 805 (e.g., a humanresources software application), and ADP 807 (e.g., a human resourcessoftware application and payment processor). As shown in FIG. 8, thetransfer of data from the employees 801 to these assets is indicated byrespective arrows.

As further illustrated in FIG. 8, the data map indicates a transfer ofdata from Workday 805 to ADP 807 as well as to a Recovery Datacenter 809and a London HR File Center 811. As may be understood in light of thisdisclosure, the Recovery Datacenter 809 and London HR File Center 811may comprise additional data assets in the context of the data modelillustrated by the data map shown in FIG. 8. The Recover Datacenter 809may include, for example, one or more computer servers (e.g., backupservers). The London HR File Center 811 may include, for example, one ormore databases (e.g., such as the One or More Databases 140 shown inFIG. 1). AS shown in FIG. 8, each particular data asset depicted in thedata map may be shown along with a visual indication of the type of dataasset. For example, Kronos 803, Workday 805, and ADP 807 are depictedadjacent a first icon type (e.g., a computer monitor), while RecoverDatacenter 809 and London HR File Center 811 are depicted adjacent asecond and third icon type respectively (e.g., a server cluster and afile folder). In this way, the system may be configured to visuallyindicate, via the data model, particular information related to the datamodel in a relatively minimal manner.

FIG. 9 depicts an exemplary screen display 900 that illustrates a datamap of a plurality of assets 905 in tabular form (e.g., table form). Asmay be understood from this figure, a table that includes one or moreinventory attributes of each particular asset 905 in the table mayindicate, for example: (1) a managing organization 910 of eachrespective asset 905; (2) a hosting location 915 of each respectiveasset 905 (e.g., a physical storage location of each asset 905); (3) atype 920 of each respective asset 905, if known (e.g., a database,software application, server, etc.); (4) a processing activity 925associated with each respective asset 905; and/or (5) a status 930 ofeach particular data asset 905. In various embodiments, the status 930of each particular asset 905 may indicate a status of the asset 905 inthe discovery process. This may include, for example: (1) a “new” statusfor a particular asset that has recently been discovered as an assetthat processes, stores, or collects personal data on behalf of anorganization (e.g., discovered via one or more suitable techniquesdescribed herein); (2) an “in discovery” status for a particular assetfor which the system is populating or seeking to populate one or moreinventory attributes, etc.

FIG. 10 depicts an exemplary data map 1000 that includes an asset map ofa plurality of data assets 1005A-F, which may, for example, be utilizedby a particular entity in the collection, storage, and/or processing ofpersonal data. As may be understood in light of this disclosure, theplurality of data assets 1005A-F may have been discovered using anysuitable technique described herein (e.g., one or more intelligentidentity scanning techniques, one or more questionnaires, one or moreapplication programming interfaces, etc.). In various embodiments, adata inventory for each of the plurality of data assets 1005A-F maydefine, for each of the plurality of data assets 1005A-F a respectiveinventory attribute related to a storage location of the data asset.

As may be understood from this figure, the system may be configured togenerate a map that indicates a location of the plurality of data assets1005A-F for a particular entity. In the embodiment shown in this figure,locations that contain a data asset are indicated by circular indiciathat contain the number of assets present at that location. In theembodiment shown in this figure, the locations are broken down bycountry. In particular embodiments, the asset map may distinguishbetween internal assets (e.g., first party servers, etc.) andexternal/third party assets (e.g., third party owned servers or softwareapplications that the entity utilizes for data storage, transfer, etc.).

In some embodiments, the system is configured to indicate, via thevisual representation, whether one or more assets have an unknownlocation (e.g., because the data model described above may be incompletewith regard to the location). In such embodiments, the system may beconfigured to: (1) identify the asset with the unknown location; (2) useone or more data modeling techniques described herein to determine thelocation (e.g., such as pinging the asset, generating one or morequestionnaires for completion by a suitable individual, etc.); and (3)update a data model associated with the asset to include the location.

Data Model Population Module

In particular embodiments, a Data Model Population Module 1100 isconfigured to: (1) determine one or more unpopulated inventoryattributes in a data model; (2) determine one or more attribute valuesfor the one or more unpopulated inventory attributes; and (3) modify thedata model to include the one or more attribute values.

Turning to FIG. 11, in particular embodiments, when executing the DataModel Population Module 1100, the system begins, at Step 1110, byanalyzing one or more data inventories for each of the one or more dataassets in the data model. The system may, for example, identify one ormore particular data elements (e.g., inventory attributes) that make upthe one or more data inventories. The system may, in variousembodiments, scan one or more data structures associated with the datamodel to identify the one or more data inventories. In variousembodiments, the system is configured to build an inventory of existing(e.g., known) data assets and identify inventory attributes for each ofthe known data assets.

Continuing to Step 1120, the system is configured to determine, for eachof the one or more data inventories, one or more populated inventoryattributes and one or more unpopulated inventory attributes (e.g.,and/or one or more unpopulated data assets within the data model). As aparticular example related to an unpopulated data asset, when generatingand populating a data model, the system may determine that, for aparticular asset, there is a destination asset. In various embodiments,the destination asset may be known (e.g., and already stored by thesystem as part of the data model). In other embodiments, the destinationasset may be unknown (e.g., a data element that comprises thedestination asset may comprise a placeholder or other indication inmemory for the system to populate the unpopulated inventory attribute(e.g., data element).

As another particular example, a particular storage asset may beassociated with a plurality of inventory assets (e.g., stored in a datainventory associated with the storage asset). In this example, theplurality of inventory assets may include an unpopulated inventoryattribute related to a type of personal data stored in the storageasset. The system may, for example, determine that the type of personaldata is an unpopulated inventory asset for the particular storage asset.

Returning to Step 1130, the system is configured to determine, for eachof the one or more unpopulated inventory attributes, one or moreattribute values. In particular embodiments, the system may determinethe one or more attribute values using any suitable technique (e.g., anysuitable technique for populating the data model). In particularembodiments, the one or more techniques for populating the data modelmay include, for example: (1) obtaining data for the data model by usingone or more questionnaires associated with a particular privacycampaign, processing activity, etc.; (2) using one or more intelligentidentity scanning techniques discussed herein to identify personal datastored by the system and then map such data to a suitable data model;(3) using one or more application programming interfaces (API) to obtaindata for the data model from another software application; and/or (4)using any other suitable technique. Exemplary techniques for determiningthe one or more attribute values are described more fully below. Inother embodiments, the system may be configured to use such techniquesor other suitable techniques to populate one or more unpopulated dataassets within the data model.

Next, at Step 1140, the system modifies the data model to include theone or more attribute values for each of the one or more unpopulatedinventory attributes. The system may, for example, store the one or moreattributes values in computer memory, associate the one or moreattribute values with the one or more unpopulated inventory attributes,etc. In still other embodiments, the system may modify the data model toinclude the one or more data assets identified as filling one or morevacancies left within the data model by the unpopulated one or more dataassets.

Continuing to Step 1150, the system is configured to store the modifieddata model in memory. In various embodiments, the system is configuredto store the modified data model in the One or More Databases 140, or inany other suitable location. In particular embodiments, the system isconfigured to store the data model for later use by the system in theprocessing of one or more data subject access requests. In otherembodiments, the system is configured to store the data model for use inone or more privacy impact assessments performed by the system.

Data Model Population Questionnaire Generation Module

In particular embodiments, a Data Population Questionnaire GenerationModule 1200 is configured to generate a questionnaire (e.g., one or morequestionnaires) comprising one or more questions associated with one ormore particular unpopulated data attributes, and populate theunpopulated data attributes based at least in part on one or moreresponses to the questionnaire. In other embodiments, the system may beconfigured to populate the unpopulated data attributes based on one ormore responses to existing questionnaires.

In various embodiments, the one or more questionnaires may comprise oneor more processing activity questionnaires (e.g., privacy impactassessments, data privacy impact assessments, etc.) configured to elicitone or more pieces of data related to one or more undertakings by anorganization related to the collection, storage, and/or processing ofpersonal data (e.g., processing activities). In particular embodiments,the system is configured to generate the questionnaire (e.g., aquestionnaire template) based at least in part on one or more processingactivity attributes, data asset attributes (e.g., inventory attributes),or other suitable attributes discussed herein.

Turning to FIG. 12, in particular embodiments, when executing the DataPopulation

Questionnaire Generation Module 1200, the system begins, at Step 1210,by identifying one or more unpopulated data attributes from a datamodel. The system may, for example, identify the one or more unpopulateddata attributes using any suitable technique described above. Inparticular embodiments, the one or more unpopulated data attributes mayrelate to, for example, one or more processing activity or assetattributes such as: (1) one or more processing activities associatedwith a particular data asset; (2) transfer data associated with theparticular data asset (e.g., how and where the data stored and/orcollected by the particular data asset is being transferred to and/orfrom); (3) personal data associated with the particular data assetsasset (e.g., what type of personal data is collected and/or stored bythe particular data asset; how, and from where, the data is collected,etc.); (4) storage data associated with the personal data (e.g., whetherthe data is being stored, protected and deleted); and (5) any othersuitable attribute related to the collection, use, and transfer ofpersonal data by one or more data assets or via one or more processingactivities. In other embodiments, the one or more unpopulated inventoryattributes may comprise one or more other pieces of information such as,for example: (1) the type of data being stored by the particular dataasset; (2) an amount of data stored by the particular data asset; (3)whether the data is encrypted by the particular data asset; (4) alocation of the stored data (e.g., a physical location of one or morecomputer servers on which the data is stored by the particular dataasset); etc.

Continuing to Step 1220, the system generates a questionnaire (e.g., aquestionnaire template) comprising one or more questions associated withone or more particular unpopulated data attributes. As may be understoodin light of the above, the one or more particulate unpopulated dataattributes may relate to, for example, a particular processing activityor a particular data asset (e.g., a particular data asset utilized aspart of a particular processing activity). In various embodiments, theone or more questionnaires comprise one or more questions associatedwith the unpopulated data attribute. For example, if the data modelincludes an unpopulated data attribute related to a location of a serveron which a particular asset stores personal data, the system maygenerate a questionnaire associated with a processing activity thatutilizes the asset (e.g., or a questionnaire associated with the asset).The system may generate the questionnaire to include one or morequestions regarding the location of the server.

Returning to Step 1230, the system maps one or more responses to the oneor more questions to the associated one or more particular unpopulateddata attributes. The system may, for example, when generating thequestionnaire, associate a particular question with a particularunpopulated data attribute in computer memory. In various embodiments,the questionnaire may comprise a plurality of question/answer pairings,where the answer in the question/answer pairings maps to a particularinventory attribute for a particular data asset or processing activity.

In this way, the system may, upon receiving a response to the particularquestion, substantially automatically populate the particularunpopulated data attribute. Accordingly, at Step 1240, the systemmodifies the data model to populate the one or more responses as one ormore data elements for the one or more particular unpopulated dataattributes. In particular embodiments, the system is configured tomodify the data model such that the one or more responses are stored inassociation with the particular data element (e.g., unpopulated dataattribute) to which the system mapped it at Step 1230. In variousembodiments, the system is configured to store the modified data modelin the One or More Databases 140, or in any other suitable location. Inparticular embodiments, the system is configured to store the data modelfor later use by the system in the processing of one or more datasubject access requests. In other embodiments, the system is configuredto store the data model for use in one or more privacy impactassessments performed by the system.

Continuing to optional Step 1250, the system may be configured to modifythe questionnaire based at least in part on the one or more responses.The system may, for example, substantially dynamically add and/or removeone or more questions to/from the questionnaire based at least in parton the one or more responses (e.g., one or more response received by auser completing the questionnaire). For example, the system may, inresponse to the user providing a particular inventory attribute or newasset, generates additional questions that relate to that particularinventory attribute or asset. The system may, as the system addsadditional questions, substantially automatically map one or moreresponses to one or more other inventory attributes or assets. Forexample, in response to the user indicating that personal data for aparticular asset is stored in a particular location, the system maysubstantially automatically generate one or more additional questionsrelated to, for example, an encryption level of the storage, who hasaccess to the storage location, etc.

In still other embodiments, the system may modify the data model toinclude one or more additional assets, data attributes, inventoryattributes, etc. in response to one or more questionnaire responses. Forexample, the system may modify a data inventory for a particular assetto include a storage encryption data element (which specifies whetherthe particular asset stores particular data in an encrypted format) inresponse to receiving such data from a questionnaire. Modification of aquestionnaire is discussed more fully below with respect to FIG. 13.

Data Model Population via Questionnaire Process Flow

FIG. 13 depicts an exemplary process flow 1300 for populating a datamodel (e.g., modifying a data model to include a newly discovered dataasset, populating one or more inventory attributes for a particularprocessing activity or data asset, etc.). In particular, FIG. 13 depictsone or more exemplary data relationships between one or more particulardata attributes (e.g., processing activity attributes and/or assetattributes), a questionnaire template (e.g., a processing activitytemplate and/or a data asset template), a completed questionnaire (e.g.,a processing activity assessment and/or a data asset assessment), and adata inventory (e.g., a processing activity inventory and/or an assetinventory). As may be understood from this figure the system isconfigured to: (1) identify new data assets; (2) generate an assetinventory for identified new data assets; and (3) populate the generatedasset inventories. Systems and methods for populating the generatedinventories are described more fully below.

As may be understood from FIG. 13, a system may be configured to mapparticular processing activity attributes 1320A to each of: (1) aprocessing activity template 1330A; and (2) a processing activity datainventory 1310A. As may be understood in light of this disclosure, theprocessing activity template 1330A may comprise a plurality of questions(e.g., as part of a questionnaire), which may, for example, beconfigured to elicit discovery of one or more new data assets. Theplurality of questions may each correspond to one or more fields in theprocessing activity inventory 1310A, which may, for example, define oneor more inventory attributes of the processing activity.

In particular embodiments, the system is configured to provide aprocessing activity assessment 1340A to one or more individuals forcompletion. As may be understood from FIG. 13, the system is configuredto launch the processing activity assessment 1340A from the processingactivity inventory 1310A and further configured to create the processingactivity assessment 1340A from the processing activity template 1330.The processing activity assessment 1340A may comprise, for example, oneor more questions related to the processing activity. The system may, invarious embodiments, be configured to map one or more responses providedin the processing activity assessment 1340A to one or more correspondingfields in the processing activity inventory 1310A. The system may thenbe configured to modify the processing activity inventory 1310A toinclude the one or more responses, and store the modified inventory incomputer memory. In various embodiments, the system may be configured toapprove a processing activity assessment 1340A (e.g., receive approvalof the assessment) prior to feeding the processing activity inventoryattribute values into one or more fields and/or cells of the inventory.

As may be further understood from FIG. 13, in response to creating a newasset record (e.g., which the system may create, for example, inresponse to a new asset discovery via the processing activity assessment1340A described immediately above, or in any other suitable manner), thesystem may generate an asset inventory 1310B (e.g., a data assetinventory) that defines a plurality of inventory attributes for the newasset (e.g., new data asset).

As may be understood from FIG. 13, a system may be configured to mapparticular asset attributes 1320B to each of: (1) an asset template1330BA; and (2) an asset inventory 1310A. As may be understood in lightof this disclosure, the asset template 1330B may comprise a plurality ofquestions (e.g., as part of a questionnaire), which may, for example, beconfigured to elicit discovery of one or more processing activitiesassociated with the asset and/or one or more inventory attributes of theasset. The plurality of questions may each correspond to one or morefields in the asset inventory 1310B, which may, for example, define oneor more inventory attributes of the asset.

In particular embodiments, the system is configured to provide an assetassessment 1340B to one or more individuals for completion. As may beunderstood from FIG. 13, the system is configured to launch the assetassessment 1340B from the asset inventory 1310B and further configuredto create the asset assessment 1340B from the asset template 1330B. Theasset assessment 1340B may comprise, for example, one or more questionsrelated to the data asset. The system may, in various embodiments, beconfigured to map one or more responses provided in the asset assessment1340B to one or more corresponding fields in the asset inventory 1310B.The system may then be configured to modify the asset inventory 1310B(e.g., and/or a related processing activity inventory 1310A) to includethe one or more responses, and store the modified inventory in computermemory. In various embodiments, the system may be configured to approvean asset assessment 1340B (e.g., receive approval of the assessment)prior to feeding the asset inventory attribute values into one or morefields and/or cells of the inventory.

FIG. 13 further includes a detail view 1350 of a relationship betweenparticular data attributes 1320C with an exemplary data inventory 1310Cand a questionnaire template 1330C. As may be understood from thisdetail view 1350, a particular attribute name may map to a particularquestion title in a template 1330C as well as to a field name in anexemplary data inventory 1310C. In this way, the system may beconfigured to populate (e.g., automatically populate) a field name for aparticular inventory 1310C in response to a user providing a questiontitle as part of a questionnaire template 1330C. Similarly, a particularattribute description may map to a particular question description in atemplate 1330C as well as to a tooltip on a fieldname in an exemplarydata inventory 1310C. In this way, the system may be configured toprovide the tooltip for a particular inventory 1310C that includes thequestion description provided by a user as part of a questionnairetemplate 1330C.

As may be further understood from the detail view 1350 of FIG. 13, aparticular response type may map to a particular question type in atemplate 1330C as well as to a field type in an exemplary data inventory1310C. A particular question type may include, for example, a multiplechoice question (e.g., A, B, C, etc.), a freeform response, an integervalue, a drop down selection, etc. A particular field type may include,for example, a memo field type, a numeric field type, an integer fieldtype, a logical field type, or any other suitable field type. Aparticular data attribute may require a response type of, for example:(1) a name of an organization responsible for a data asset (e.g., a freeform response); (2) a number of days that data is stored by the dataasset (e.g., an integer value); and/or (3) any other suitable responsetype.

In still other embodiments, the system may be configured to map a one ormore attribute values to one or more answer choices in a template 1330Cas well as to one or more lists and/or responses in a data inventory1310C. The system may then be configured to populate a field in the datainventory 1310C with the one or more answer choices provided in aresponse to a question template 1330C with one or more attribute values.

Exemplary Questionnaire Generation and Completion User Experience

FIGS. 14-25 depict exemplary screen displays that a user may encounterwhen generating a questionnaire (e.g., one or more questionnaires and/ortemplates) for populating one or more data elements (e.g., inventoryattributes) of a data model for a data asset and/or processing activity.FIG. 14, for example, depicts an exemplary asset based questionnairetemplate builder 1400. As may be understood from FIG. 14, the templatebuilder may enable a user to generate an asset based questionnairetemplate that includes one or more sections 1420 related to the asset(e.g., asset information, security, disposal, processing activities,etc.). As may be understood in light of this disclosure, the system maybe configured to substantially automatically generate an asset basedquestionnaire template based at least in part on the one or moreunpopulated inventory attributes discussed above. The system may, forexample, be configured to generate a template that is configured topopulate the one or more unpopulated attributes (e.g., by elicitingresponses, via a questionnaire to one or more questions that are mappedto the attributes within the data inventory).

In various embodiments, the system is configured to enable a user tomodify a default template (e.g., or a system-created template) by, forexample, adding additional sections, adding one or more additionalquestions to a particular section, etc. In various embodiments, thesystem may provide one or more tools for modifying the template. Forexample, in the embodiment shown in FIG. 14, the system may provide auser with a draft and drop question template 1410, from which the usermay select a question type (e.g., textbox, multiple choice, etc.).

A template for an asset may include, for example: (1) one or morequestions requesting general information about the asset; (2) one ormore security-related questions about the asset; (3) one or morequestions regarding how the data asset disposes of data that it uses;and/or (4) one or more questions regarding processing activities thatinvolve the data asset. In various embodiments, each of these one ormore sections may comprise one or more specific questions that may mapto particular portions of a data model (e.g., a data map).

FIG. 15 depicts an exemplary screen display of a processing activityquestionnaire template builder 1500. The screen display shown in FIG. 15is similar to the template builder shown in FIG. 14 with respect to thedata asset based template builder. As may be understood from FIG. 15,the template builder may enable a user to generate a processing activitybased questionnaire template that includes one or more sections 1520related to the processing activity (e.g., business process information,personal data, source, storage, destinations, access and use, etc.). Asmay be understood in light of this disclosure, the system may beconfigured to substantially automatically generate a processing activitybased questionnaire template based at least in part on the one or moreunpopulated inventory attributes related to the processing activity(e.g., as discussed above). The system may, for example, be configuredto generate a template that is configured to populate the one or moreunpopulated attributes (e.g., by eliciting responses, via aquestionnaire to one or more questions that are mapped to the attributeswithin the data inventory).

In various embodiments, the system is configured to enable a user tomodify a default template (e.g., or a system-created template) by, forexample, adding additional sections, adding one or more additionalquestions to a particular section, etc. In various embodiments, thesystem may provide one or more tools for modifying the template. Forexample, in the embodiment shown in FIG. 15, the system may provide auser with a draft and drop question template 1510, from which the usermay select a question type (e.g., textbox, multiple choice, assetattributes, data subjects, etc.). The system may be further configuredto enable a user to publish a completed template (e.g., for use in aparticular assessment). In other embodiments, the system may beconfigured to substantially automatically publish the template.

In various embodiments, a template for a processing activity mayinclude, for example: (1) one or more questions related to the type ofbusiness process that involves a particular data asset; (2) one or morequestions regarding what type of personal data is acquired from datasubjects for use by a particular data asset; (3) one or more questionsrelated to a source of the acquired personal data; (4) one or morequestions related to how and/or where the personal data will be storedand/or for how long; (5) one or more questions related to one or moreother data assets that the personal data will be transferred to; and/or(6) one or more questions related to who will have the ability to accessand/or use the personal data.

Continuing to FIG. 16, an exemplary screen display 1600 depicts alisting of assets 1610 for a particular entity. These may, for example,have been identified as part of the data model generation systemdescribed above. As may be understood from this figure, a user mayselect a drop down indicator 1615 to view more information about aparticular asset. In the exemplary embodiment shown in FIG. 16, thesystem stores the managing organization group for the “New Asset”, butis missing some additional information (e.g., such as a description 1625of the asset). In order to fill out the missing inventory attributes forthe “New Asset”, the system, in particular embodiments, is configured toenable a user to select a Send Assessment indicia 1620 in order totransmit an assessment related to the selected asset to an individualtasked with providing one or more pieces of information related to theasset (e.g., a manager, or other individual with knowledge of the one ormore inventory attributes).

In response to the user selecting the Send Assessment indicia 1620, thesystem may create the assessment based at least in part on a templateassociated with the asset, and transmit the assessment to a suitableindividual for completion (e.g., and/or transmit a request to theindividual to complete the assessment).

FIG. 17 depicts an exemplary assessment transmission interface 1700 viawhich a user can transmit one or more assessments for completion. Asshown in this figure, the user may assign a respondent, provide adeadline, indicate a reminder time, and provide one or more commentsusing an assessment request interface 1710. The user may then select aSend Assessment(s) indicia 1720 in order to transmit the assessment.

FIG. 18 depicts an exemplary assessment 1800 which a user may encounterin response to receiving a request to complete the assessment asdescribed above with respect to FIGS. 16 and 17. As shown in FIG. 18,the assessment 1800 may include one or more questions that map to theone or more unpopulated attributes for the asset shown in FIG. 16. Forexample, the one or more questions may include a question related to adescription of the asset, which may include a free form text box 1820for providing a description of the asset. FIG. 19 depicts an exemplaryscreen display 1900 with the text box 1920 completed, where thedescription includes a value of “Value_1”. As shown in FIGS. 18 and 19,the user may have renamed “New Asset” (e.g., which may have included adefault or placeholder name) shown in FIGS. 16 and 17 to “7^(th) Asset.”

Continuing to FIG. 20, the exemplary screen display 2000 depicts thelisting of assets 2010 from FIG. 16 with some additional attributespopulated. For example, the Description 2025 (e.g., “Value_1”) providedin FIG. 19 has been added to the inventory. As may be understood inlight of this disclosure, in response to a user providing thedescription via the assessment shown in FIGS. 18 and 19, the system maybe configured to map the provided description to the attribute valueassociated with the description of the asset in the data inventory. Thesystem may have then modified the data inventory for the asset toinclude the description attribute. In various embodiments, the system isconfigured to store the modified data inventory as part of a data model(e.g., in computer memory).

FIGS. 21-24 depict exemplary screen displays showing exemplary questionsthat make up part of a processing activity questionnaire (e.g.,assessment). FIG. 21 depicts an exemplary interface 2100 for respondingto a first question 2110 and a second question 2120. As shown in FIG.21, the first question 2110 relates to whether the processing activityis a new or existing processing activity. The first question 2110 shownin FIG. 21 is a multiple choice question. The second question 2120relates to whether the organization is conducting the activity on behalfof another organization. As shown in this figure, the second question2120 includes both a multiple choice portion and a free-form responseportion.

As discussed above, in various embodiments, the system may be configuredto modify a questionnaire in response to (e.g., based on) one or moreresponses provided by a user completing the questionnaire. In particularembodiments, the system is configured to modify the questionnairesubstantially on-the-fly (e.g., as the user provides each particularanswer). FIG. 22 depicts an interface 2200 that includes a secondquestion 2220 that differs from the second question 2120 shown in FIG.21. As may be understood in light of this disclosure, in response to theuser providing a response to the first question 2110 in FIG. 21 thatindicates that the processing activity is a new processing activity, thesystem may substantially automatically modify the second question 2120from FIG. 21 to the second question 2220 from FIG. 22 (e.g., such thatthe second question 2220 includes one or more follow up questions orrequests for additional information based on the response to the firstquestion 2110 in FIG. 21).

As shown in FIG. 22, the second question 2220 requests a description ofthe activity that is being pursued. In various embodiments (e.g., suchas if the user had selected that the processing activity was an existingone), the system may not modify the questionnaire to include the secondquestion 2220 from FIG. 22, because the system may already storeinformation related to a description of the processing activity atissue. In various embodiments, any suitable question described hereinmay include a tooltip 2225 on a field name (e.g., which may provide oneor more additional pieces of information to guide a user's response tothe questionnaire and/or assessment).

FIGS. 23 and 24 depict additional exemplary assessment questions. Thequestions shown in these figures relate to, for example, particular dataelements processed by various aspects of a processing activity.

FIG. 25 depicts a dashboard 2500 that includes an accounting of one ormore assessments that have been completed, are in progress, or requirecompletion by a particular organization. The dashboard 2500 shown inthis figure is configured to provide information relate to the status ofone or more outstanding assessments. As may be understood in light ofthis disclosure, because of the volume of assessment requests, it may benecessary to utilize one or more third party organizations to facilitatea timely completion of one or more assessment requests. In variousembodiments, the dashboard may indicate that, based on a fact that anumber of assessments are still in progress or incomplete, that aparticular data model for an entity, data asset, processing activity,etc. remains incomplete. In such embodiments, an incomplete nature of adata model may raise one or more flags or indicate a risk that an entitymay not be in compliance with one or more legal or industry requirementsrelated to the collection, storage, and/or processing of personal data.

Intelligent Identity Scanning Module

Turning to FIG. 26, in particular embodiments, the Intelligent IdentityScanning Module 2600 is configured to scan one or more data sources toidentify personal data stored on one or more network devices for aparticular organization, analyze the identified personal data, andclassify the personal data (e.g., in a data model) based at least inpart on a confidence score derived using one or more machine learningtechniques. The confidence score may be and/or comprise, for example, anindication of the probability that the personal data is actuallyassociated with a particular data subject (e.g., that there is at leastan 80% confidence level that a particular phone number is associatedwith a particular individual.)

When executing the Intelligent Identity Scanning Module 2600, the systembegins, at Step 2610, by connecting to one or more databases or otherdata structures, and scanning the one or more databases to generate acatalog of one or more individuals and one or more pieces of personalinformation associated with the one or more individuals. The system may,for example, be configured to connect to one or more databasesassociated with a particular organization (e.g., one or more databasesthat may serve as a storage location for any personal or other datacollected, processed, etc. by the particular organization, for example,as part of a suitable processing activity. As may be understood in lightof this disclosure, a particular organization may use a plurality of oneor more databases (e.g., the One or More Databases 140 shown in FIG. 1),a plurality of servers (e.g., the One or More Third Party Servers 160shown in FIG. 1), or any other suitable data storage location in orderto store personal data and other data collected as part of any suitableprivacy campaign, privacy impact assessment, processing activity, etc.

In particular embodiments, the system is configured to scan the one ormore databases by searching for particular data fields comprising one ormore pieces of information that may include personal data. The systemmay, for example, be configured to scan and identify one of more piecesof personal data such as: (1) name; (2) address; (3) telephone number;(4) e-mail address; (5) social security number; (6) informationassociated with one or more credit accounts (e.g., credit card numbers);(7) banking information; (8) location data; (9) internet search history;(10) non-credit account data; and/or (11) any other suitable personalinformation discussed herein. In particular embodiments, the system isconfigured to scan for a particular type of personal data (e.g., or oneor more particular types of personal data).

The system may, in various embodiments, be further configured togenerate a catalog of one or more individuals that also includes one ormore pieces of personal information (e.g., personal data) identified forthe individuals during the scan. The system may, for example, inresponse to discovering one or more pieces of personal data in aparticular storage location, identify one or more associations betweenthe discovered pieces of personal data. For example, a particulardatabase may store a plurality of individuals' names in association withtheir respective telephone numbers. One or more other databases mayinclude any other suitable information.

The system may, for example, generate the catalog to include anyinformation associated with the one or more individuals identified inthe scan. The system may, for example, maintain the catalog in anysuitable format (e.g., a data table, etc.).

In still other embodiments, in addition to connecting to a database, thesystem may be configured to: (1) access an application through one ormore application programming interfaces (APIs); (2) use one or morescreen scraping techniques on an end user page to identify and analyzeeach field on the page; and/or (3) connect to any other suitable datastructure in order to generate the catalog of individuals and personalinformation associated with each of the individuals. In someembodiments, the system may be configured to analyze one or more accesslogs and applications set up through a system active directory or SSOportal for which one or more applications might contain certain data foruser groups. The system may then be configured to analyze an emailenvironment to identify one or more links to particular businessapplications, which may, for example, be in use by an entity and containcertain data. In still other embodiments, the system may be configuredto analyze one or more system log files (Syslog) from a securityenvironment to capture which particular applications an entity may beusing in order to discover such applications.

Continuing to Step 2620, the system is configured to scan one or morestructured and/or unstructured data repositories based at least in parton the generated catalog to identify one or more attributes of dataassociated with the one or more individuals. The system may, forexample, be configured to utilize information discovered during theinitial scan at Step 2610 to identify the one or more attributes of dataassociated with the one or more individuals.

For example, the catalog generated at Step 2610 may include a name,address, and phone number for a particular individual. The system may beconfigured, at Step 2620, to scan the one or more structured and/orunstructured data repositories to identify one or more attributes thatare associated with one or more of the particular individual's name,address and/or phone number. For example, a particular data repositorymay store banking information (e.g., a bank account number and routingnumber for the bank) in association with the particular individual'saddress. In various embodiments, the system may be configured toidentify the banking information as an attribute of data associated withthe particular individual. In this way, the system may be configured toidentify particular data attributes (e.g., one or more pieces ofpersonal data) stored for a particular individual by identifying theparticular data attributes using information other than the individual'sname.

Returning to Step 2630, the system is configured to analyze andcorrelate the one or more attributes and metadata for the scanned one ormore structured and/or unstructured data repositories. In particularembodiments, the system is configured to correlate the one or moreattributes with metadata for the associated data repositories from whichthe system identified the one or more attributes. In this way, thesystem may be configured to store data regarding particular datarepositories that store particular data attributes.

In particular embodiments, the system may be configured tocross-reference the data repositories that are discovered to store oneor more attributes of personal data associated with the one or moreindividuals with a database of known data assets. In particularembodiments, the system is configured to analyze the data repositoriesto determine whether each data repository is part of an existing datamodel of data assets that collect, store, and/or process personal data.In response to determining that a particular data repository is notassociated with an existing data model, the system may be configured toidentify the data repository as a new data asset (e.g., via assetdiscovery), and take one or more actions (e.g., such as any suitableactions described herein) to generate and populate a data model of thenewly discovered data asset. This may include, for example: (1)generating a data inventory for the new data asset; (2) populating thedata inventory with any known attributes associated with the new dataasset; (3) identifying one or more unpopulated (e.g., unknown)attributes of the data asset; and (4) taking any suitable actiondescribed herein to populate the unpopulated data attributes.

In particular embodiments, the system my, for example: (1) identify asource of the personal data stored in the data repository that led tothe new asset discovery; (2) identify one or more relationships betweenthe newly discovered asset and one or more known assets; and/or (3) etc.

Continuing to Step 2640, the system is configured to use one or moremachine learning techniques to categorize one or more data elements fromthe generated catalog, analyze a flow of the data among the one or moredata repositories, and/or classify the one or more data elements basedon a confidence score as discussed below.

Continuing to Step 2650, the system, in various embodiments, isconfigured to receive input from a user confirming or denying acategorization of the one or more data elements, and, in response,modify the confidence score. In various embodiments, the system isconfigured to iteratively repeat Steps 2640 and 2650. In this way, thesystem is configured to modify the confidence score in response to auser confirming or denying the accuracy of a categorization of the oneor more data elements. For example, in particular embodiments, thesystem is configured to prompt a user (e.g., a system administrator,privacy officer, etc.) to confirm that a particular data element is, infact, associated with a particular individual from the catalog. Thesystem may, in various embodiments, be configured to prompt a user toconfirm that a data element or attribute discovered during one or moreof the scans above were properly categorized at Step 2640.

In particular embodiments, the system is configured to modify theconfidence score based at least in part on receiving one or moreconfirmations that one or more particular data elements or attributesdiscovered in a particular location during a scan are associated withparticular individuals from the catalog. As may be understood in lightof this disclosure, the system may be configured to increase theconfidence score in response to receiving confirmation that particulartypes of data elements or attributes discovered in a particular storagelocation are typically confirmed as being associated with particularindividuals based on one or more attributes for which the system wasscanning.

Exemplary Intelligent Identity Scanning Technical Platforms

FIG. 27 depicts an exemplary technical platform via which the system mayperform one or more of the steps described above with respect to theIntelligent Identity Scanning Module 2600. As shown in the embodiment inthis figure, an Intelligent Identity Scanning System 2600 comprises anIntelligent Identity Scanning Server 130, such as the IntelligentIdentity Scanning Server 130 described above with respect to FIG. 1. TheIntelligent Identity Scanning Server 130 may, for example, comprise aprocessing engine (e.g., one or more computer processors). In someembodiments, the Intelligent Identity Scanning Server 130 may includeany suitable cloud hosted processing engine (e.g., one or morecloud-based computer servers). In particular embodiments, theIntelligent Identity Scanning Server 130 is hosted in a Microsoft Azurecloud.

In particular embodiments, the Intelligent Identity Scanning Server 130is configured to sit outside one or more firewalls (e.g., such as thefirewall 195 shown in FIG. 26). In such embodiments, the IntelligentIdentity Scanning Server 130 is configured to access One or More RemoteComputing Devices 150 through the Firewall 195 (e.g., one or morefirewalls) via One or More Networks 115 (e.g., such as any of the One orMore Networks 115 described above with respect to FIG. 1).

In particular embodiments, the One or More Remote Computing Devices 150include one or more computing devices that make up at least a portion ofone or more computer networks associated with a particular organization.In particular embodiments, the one or more computer networks associatedwith the particular organization comprise one or more suitable servers,one or more suitable databases, one or more privileged networks, and/orany other suitable device and/or network segment that may store and/orprovide for the storage of personal data. In the embodiment shown inFIG. 27, the one or more computer networks associated with theparticular organization may comprise One or More Third Party Servers160, One or More Databases 140, etc. In particular embodiments, the Oneor More Remote Computing Devices 150 are configured to access one ormore segments of the one or more computer networks associated with theparticular organization. In some embodiments, the one or more computernetworks associated with the particular organization comprise One orMore Privileged Networks 165. In still other embodiments, the one ormore computer networks comprise one or more network segments connectedvia one or more suitable routers, one or more suitable network hubs, oneor more suitable network switches, etc.

As shown in FIG. 27, various components that make up one or more partsof the one or more computer networks associated with the particularorganization may store personal data (e.g., such as personal data storedon the One or More Third Party Servers 160, the One or More Databases140, etc.). In various embodiments, the system is configured to performone or more steps related to the Intelligent Identity Scanning Server2600 in order to identify the personal data for the purpose ofgenerating the catalog of individuals described above (e.g., and/oridentify one or more data assets within the organization's network thatstore personal data)

As further shown in FIG. 27, in various embodiments, the One or MoreRemote Computing Devices 150 may store a software application (e.g., theIntelligent Identity Scanning Module). In such embodiments, the systemmay be configured to provide the software application for installationon the One or More Remote Computing Devices 150. In particularembodiments, the software application may comprise one or more virtualmachines. In particular embodiments, the one or more virtual machinesmay be configured to perform one or more of the steps described abovewith respect to the Intelligent Identity Scanning Module 2600 (e.g.,perform the one or more steps locally on the One or More RemoteComputing Devices 150).

In various embodiments, the one or more virtual machines may have thefollowing specifications: (1) any suitable number of cores (e.g., 4, 6,8, etc.); (2) any suitable amount of memory (e.g., 4 GB, 8 GB, 16 GBetc.); (3) any suitable operating system (e.g., CentOS 7.2); and/or (4)any other suitable specification. In particular embodiments, the one ormore virtual machines may, for example, be used for one or more suitablepurposes related to the Intelligent Identity Scanning System 2700. Theseone or more suitable purposes may include, for example, running any ofthe one or more modules described herein, storing hashed and/ornon-hashed information (e.g., personal data, personally identifiabledata, catalog of individuals, etc.), storing and running one or moresearching and/or scanning engines (e.g., Elasticsearch), etc.

In various embodiments, the Intelligent Identity Scanning System 2700may be configured to distribute one or more processes that make up partof the Intelligent Identity Scanning Process (e.g., described above withrespect to the Intelligent Identity Scanning Module 1800). The one ormore software applications installed on the One or more Remote ComputingDevices 150 may, for example, be configured to provide access to the oneor more computer networks associated with the particular organization tothe Intelligent Identity Scanning Server 130. The system may then beconfigured to receive, from the One or more Remote Computing Devices 150at the Intelligent Identity Scanning Server 130, via the Firewall 195and One or More Networks 115, scanned data for analysis.

In particular embodiments, the Intelligent Identity Scanning System 2700is configured to reduce an impact on a performance of the One or MoreRemote Computing Devices 150, One or More Third Party Servers 160 andother components that make up one or more segments of the one or morecomputer networks associated with the particular organization. Forexample, in particular embodiments, the Intelligent Identity ScanningSystem 2700 may be configured to utilize one or more suitable bandwidththrottling techniques. In other embodiments, the Intelligent IdentityScanning System 2700 is configured to limit scanning (e.g., any of theone or more scanning steps described above with respect to theIntelligent Identity Scanning Module 2600) and other processing steps(e.g., one or more steps that utilize one or more processing resources)to non-peak times (e.g., during the evening, overnight, on weekendsand/or holidays, etc.). In other embodiments, the system is configuredto limit performance of such processing steps to backup applications anddata storage locations. The system may, for example, use one or moresampling techniques to decrease a number of records required to scanduring the personal data discovery process.

FIG. 28 depicts an exemplary asset access methodology that the systemmay utilize in order to access one or more network devices that maystore personal data (e.g., or other personally identifiableinformation). As may be understood from this figure, the system may beconfigured to access the one or more network devices using a locallydeployed software application (e.g., such as the software applicationdescribed immediately above). In various embodiments, the softwareapplication is configured to route identity scanning traffic through oneor more gateways, configure one or more ports to accept one or moreidentity scanning connections, etc.

As may be understood from this figure, the system may be configured toutilize one or more credential management techniques to access one ormore privileged network portions. The system may, in response toidentifying particular assets or personally identifiable information viaa scan, be configured to retrieve schema details such as, for example,an asset ID, Schema ID, connection string, credential reference URL,etc. In this way, the system may be configured to identify and store alocation of any discovered assets or personal data during a scan.

Data Subject Access Request Fulfillment Module

Turning to FIG. 29, in particular embodiments, a Data Subject AccessRequest Fulfillment Module 2900 is configured to receive a data subjectaccess request, process the request, and fulfill the request based atleast in part on one or more request parameters. In various embodiments,an organization, corporation, etc. may be required to provideinformation requested by an individual for whom the organization storespersonal data within a certain time period (e.g., 30 days). As aparticular example, an organization may be required to provide anindividual with a listing of, for example: (1) any personal data thatthe organization is processing for an individual, (2) an explanation ofthe categories of data being processed and the purpose of suchprocessing; and/or (3) categories of third parties to whom the data maybe disclosed.

Various privacy and security policies (e.g., such as the EuropeanUnion's General Data Protection Regulation, and other such policies) mayprovide data subjects (e.g., individuals, organizations, or otherentities) with certain rights related to the data subject's personaldata that is collected, stored, or otherwise processed by anorganization. These rights may include, for example: (1) a right toobtain confirmation of whether a particular organization is processingtheir personal data; (2) a right to obtain information about the purposeof the processing (e.g., one or more reasons for which the personal datawas collected); (3) a right to obtain information about one or morecategories of data being processed (e.g., what type of personal data isbeing collected, stored, etc.); (4) a right to obtain information aboutone or more categories of recipients with whom their personal data maybe shared (e.g., both internally within the organization or externally);(5) a right to obtain information about a time period for which theirpersonal data will be stored (e.g., or one or more criteria used todetermine that time period); (6) a right to obtain a copy of anypersonal data being processed (e.g., a right to receive a copy of theirpersonal data in a commonly used, machine-readable format); (7) a rightto request erasure (e.g., the right to be forgotten), rectification(e.g., correction or deletion of inaccurate data), or restriction ofprocessing of their personal data; and (8) any other suitable rightsrelated to the collection, storage, and/or processing of their personaldata (e.g., which may be provided by law, policy, industry ororganizational practice, etc.).

As may be understood in light of this disclosure, a particularorganization may undertake a plurality of different privacy campaigns,processing activities, etc. that involve the collection and storage ofpersonal data. In some embodiments, each of the plurality of differentprocessing activities may collect redundant data (e.g., may collect thesame personal data for a particular individual more than once), and maystore data and/or redundant data in one or more particular locations(e.g., on one or more different servers, in one or more differentdatabases, etc.). In this way, a particular organization may storepersonal data in a plurality of different locations which may includeone or more known and/or unknown locations. As such, complying withparticular privacy and security policies related to personal data (e.g.,such as responding to one or more requests by data subjects related totheir personal data) may be particularly difficult (e.g., in terms ofcost, time, etc.). In particular embodiments, a data subject accessrequest fulfillment system may utilize one or more data model generationand population techniques (e.g., such as any suitable techniquedescribed herein) to create a centralized data map with which the systemcan identify personal data stored, collected, or processed for aparticular data subject, a reason for the processing, and any otherinformation related to the processing.

Turning to FIG. 29, when executing the Data Subject Access RequestFulfillment Module 2900, the system begins, at Step 2910, by receiving adata subject access request. In various embodiments, the system receivesthe request via a suitable web form. In certain embodiments, the requestcomprises a particular request to perform one or more actions with anypersonal data stored by a particular organization regarding therequestor. For example, in some embodiments, the request may include arequest to view one or more pieces of personal data stored by the systemregarding the requestor. In other embodiments, the request may include arequest to delete one or more pieces of personal data stored by thesystem regarding the requestor. In still other embodiments, the requestmay include a request to update one or more pieces of personal datastored by the system regarding the requestor. In still otherembodiments, the request may include a request based on any suitableright afforded to a data subject, such as those discussed above.

Continuing to Step 2920, the system is configured to process the requestby identifying and retrieving one or more pieces of personal dataassociated with the requestor that are being processed by the system.For example, in various embodiments, the system is configured toidentify any personal data stored in any database, server, or other datarepository associated with a particular organization. In variousembodiments, the system is configured to use one or more data models,such as those described above, to identify this personal data andsuitable related information (e.g., where the personal data is stored,who has access to the personal data, etc.). In various embodiments, thesystem is configured to use intelligent identity scanning (e.g., asdescribed above) to identify the requestor's personal data and relatedinformation that is to be used to fulfill the request.

In still other embodiments, the system is configured to use one or moremachine learning techniques to identify such personal data. For example,the system may identify particular stored personal data based on, forexample, a country in which a web site that the data subject request wassubmitted is based, or any other suitable information.

In particular embodiments, the system is configured to scan and/orsearch one or more existing data models (e.g., one or more current datamodels) in response to receiving the request in order to identify theone or more pieces of personal data associated with the requestor. Thesystem may, for example, identify, based on one or more data inventories(e.g., one or more inventory attributes) a plurality of storagelocations that store personal data associated with the requestor. Inother embodiments, the system may be configured to generate a data modelor perform one or more scanning techniques in response to receiving therequest (e.g., in order to automatically fulfill the request).

Returning to Step 2930, the system is configured to take one or moreactions based at least in part on the request. In some embodiments, thesystem is configured to take one or more actions for which the requestwas submitted (e.g., display the personal data, delete the personaldata, correct the personal data, etc.). In particular embodiments, thesystem is configured to take the one or more actions substantiallyautomatically. In particular embodiments, in response a data subjectsubmitting a request to delete their personal data from anorganization's systems, the system may: (1) automatically determinewhere the data subject's personal data is stored; and (2) in response todetermining the location of the data (which may be on multiple computingsystems), automatically facilitate the deletion of the data subject'spersonal data from the various systems (e.g., by automatically assigninga plurality of tasks to delete data across multiple business systems toeffectively delete the data subject's personal data from the systems).In particular embodiments, the step of facilitating the deletion maycomprise, for example: (1) overwriting the data in memory; (2) markingthe data for overwrite; (2) marking the data as free (e.g., and deletinga directory entry associated with the data); and/or (3) any othersuitable technique for deleting the personal data. In particularembodiments, as part of this process, the system uses an appropriatedata model (see discussion above) to efficiently determine where all ofthe data subject's personal data is stored.

Data Subject Access Request User Experience

FIGS. 30-31 depict exemplary screen displays that a user may view whensubmitting a data subject access request. As shown in FIG. 30, a website3000 associated with a particular organization may include auser-selectable indicia 3005 for submitting a privacy-related request. Auser desiring to make such a request may select the indicia 3005 inorder to initiate the data subject access request process.

FIG. 31 depicts an exemplary data subject access request form in both anunfilled and filled out state. As shown in this figure, the system mayprompt a user to provide information such as, for example: (1) what typeof requestor the user is (e.g., employee, customer, etc.); (2) what therequest involves (e.g., requesting info, opting out, deleting data,updating data, etc.); (3) first name; (4) last name; (5) email address;(6) telephone number; (7) home address; and/or (8) one or more detailsassociated with the request.

As discussed in more detail above, a data subject may submit a subjectaccess request, for example, to request a listing of any personalinformation that a particular organization is currently storingregarding the data subject, to request that the personal data bedeleted, to opt out of allowing the organization to process the personaldata, etc.

Alternative Embodiments

In particular embodiments, a data modeling or other system describedherein may include one or more features in addition to those described.Various such alternative embodiments are described below.

Processing Activity and Data Asset Assessment Risk Flagging

In particular embodiments, the questionnaire template generation systemand assessment system described herein may incorporate one or more riskflagging systems. FIGS. 32-35 depict exemplary user interfaces thatinclude risk flagging of particular questions within a processingactivity assessment. As may be understood from these figures, a user mayselect a flag risk indicia to provide input related to a description ofrisks and mitigation of a risk posed by one or more inventory attributesassociated with the question. As shown in these figures, the system maybe configured to substantially automatically assign a risk to aparticular response to a question in a questionnaire. In variousembodiments, the assigned risk is determined based at least in part onthe template from which the assessment was generated.

In particular embodiments, the system may utilize the risk levelassigned to particular questionnaire responses as part of a riskanalysis of a particular processing activity or data asset. Varioustechniques for assessing the risk of various privacy campaigns aredescribed in U.S. patent application Ser. No. 15/256,419, filed Sep. 2,2016, entitled “Data processing systems and methods for operationalizingprivacy compliance and assessing the risk of various respective privacycampaigns,” which is hereby incorporated herein in its entirety.

Cross-Border Visualization Generation System

In particular embodiments, a Cross-Border Visualization GenerationSystem is configured to analyze one or more data systems (e.g., dataassets), identify data transfers between/among those systems, determinewhether any particular regulations apply to the identified datatransfers, and generate a visual representation of physical locations ofthe one or more data systems and the one or more data transfers betweenthem. The system may, for example, color-code one or more lines orindicators showing a transfer of data between a first and second datasystem. The one or more indicators may convey, for example: (1) whetherthe data transfer is secure; (2) a type or level of security that isapplied to the transfers; (3) one or more regulations that apply to thetransfer; and/or (4) any other suitable information related to thetransfer of particular data between the first and second data system.

Various processes performed by the Cross-Border Visualization GenerationSystem may be implemented by a Cross-Border Visualization GenerationModule 3600. Referring to FIG. 36, in particular embodiments, thesystem, when executing the Cross-Border Visualization Generation Module3600, is configured to: (1) identify data systems associated with aparticular entity; (2) determine a location of the data systems; (3)identity one or more transfers of particular data elements betweenparticular data systems of the one or more data systems; (4) determineone or more regulations that relate to the one or more data transfers;and (5) generate a visual representation of the one or more datatransfers based at least in part on the one or more regulations.

When executing the Cross-Border Visualization Generation Module 3600,the system begins, at Step 3610, by identifying one or more data systems(e.g., data assets) associated with a particular entity. The particularentity may include, for example, a particular organization, company,sub-organization, etc. In particular embodiments, the one or more dataassets (e.g., data systems) may include, for example, any entity thatcollects, processes, contains, and/or transfers data (e.g., such as asoftware application, “internet of things” computerized device,database, website, data-center, server, etc.). For example, a first dataasset may include any software or device utilized by a particular entityfor such data collection, processing, transfer, storage, etc. In variousembodiments, the first data asset may be at least partially stored onand/or physically located in a particular location. For example, aserver may be located in a particular country, jurisdiction, etc. Apiece of software may be stored on one or more servers in a particularlocation, etc.

In particular embodiments, the system is configured to identify the oneor more data systems using one or more data modeling techniques. Asdiscussed more fully above, a data model may store the followinginformation: (1) the entity that owns and/or uses a particular dataasset (e.g., such as a primary data asset, an example of which is shownin the center of the data model in FIG. 4); (2) one or more departmentswithin the organization that are responsible for the data asset; (3) oneor more software applications that collect data (e.g., personal data)for storage in and/or use by the data asset; (4) one or more particulardata subjects (or categories of data subjects) that information iscollected from for use by the data asset; (5) one or more particulartypes of data that are collected by each of the particular applicationsfor storage in and/or use by the data asset; (6) one or more individuals(e.g., particular individuals or types of individuals) that arepermitted to access and/or use the data stored in, or used by, the dataasset; (7) which particular types of data each of those individuals areallowed to access and use; and (8) one or more data assets (destinationassets) that the data is transferred to for other use, and whichparticular data is transferred to each of those data assets.

As may be understood in light of this disclosure, the system may utilizea data model (e.g., or one or more data models) of data assetsassociated with a particular entity to identify the one or more datasystems associated with the particular entity.

Continuing to Step 3620, the system is configured to analyze the one ormore data assets (e.g., data systems) to identify one or more dataelements stored in the one or more identified data systems. Inparticular embodiments, the system is configured to identify one or moredata elements stored by the one or more data systems that are subject totransfer (e.g., transfer to the one or more data systems such as from asource asset, transfer from the one or more data systems to adestination asset, etc.). In particular embodiments, the system isconfigured to identify a particular data element that is subject to suchtransfer (e.g., such as a particular piece of personal data or otherdata). In some embodiments, the system may be configured to identify anysuitable data element that is subject to transfer and includes personaldata. The system may be configured to identify such transfer data usingany suitable technique described herein.

In any embodiment described herein, personal data may include, forexample: (1) the name of a particular data subject (which may be aparticular individual); (2) the data subject's address; (3) the datasubject's telephone number; (4) the data subject's e-mail address; (5)the data subject's social security number; (6) information associatedwith one or more of the data subject's credit accounts (e.g., creditcard numbers); (7) banking information for the data subject; (8)location data for the data subject (e.g., their present or pastlocation); (9) internet search history for the data subject; and/or (10)any other suitable personal information, such as other personalinformation discussed herein.

As may be understood from this disclosure, the transfer of personal datamay trigger one or more regulations that govern such transfer. Inparticular embodiments, personal data may include any data that relatesto a living individual who can be identified: (1) from the data; or (2)from the data in combination with other information that is in thepossession of, or is likely to come into the possession of, a particularentity. In particular embodiments, a particular entity may collect,store, process, and/or transfer personal data for one or more customers,one or more employees, etc.

In various embodiments, the system is configured to use one or more datamodels of the one or more data assets (e.g., data systems) to analyzeone or more data elements associated with those assets to determinewhether the one or more data elements include one or more data elementsthat include personal data and are subject to transfer. In particularembodiments, the transfer may include, for example: (1) an internaltransfer (e.g., a transfer from a first data asset associated with theentity to a second data asset associated with the entity); (2) anexternal transfer (e.g., a transfer from a data asset associated withthe entity to a second data asset associated with a second entity);and/or (3) a collective transfer (e.g., a transfer to a data assetassociated with the entity from an external data asset associated with asecond entity).

Next, at Step 3630, the system is configured to define a plurality ofphysical locations and identify, for each of the one or more datasystems, a particular physical location of the plurality of physicallocations. In some embodiments, the system is configured to define theplurality of physical locations based at least in part on input from auser. The system may, for example, define each of the plurality ofphysical locations based at least in part on one or more geographicboundaries. These one or more geographic boundaries may include, forexample: (1) one or more countries; (2) one or more continents; (3) oneor more jurisdictions (e.g., such as one or more legal jurisdictions);(4) one or more territories; (5) one or more counties; (6) one or morecities; (7) one or more treaty members (e.g., such as members of atrade, defense, or other treaty); and/or (8) any other suitablegeographically distinct physical locations.

The system may then be configured to identify, for each of the one ormore data systems identified at Step 3610, an associated physicallocation. For example, the system may be configured to determine inwhich of the one or more defined plurality of physical locations eachparticular data system is physically located. In particular embodiments,the system is configured to determine the physical location based atleast in part on one or more data attributes of a particular data asset(e.g., data system) using one or more data modeling techniques (e.g.,using one or more suitable data modeling techniques described herein).In some embodiments, the system may be configured to determine thephysical location of each data asset based at least in part on anexisting data model that includes the data asset. In still otherembodiments, the system may be configured to determine the physicallocation based at least in part on an IP address and/or domain of thedata asset (e.g., in the case of a computer server or other computingdevice) or any other identifying feature of a particular data asset.

Returning to Step 3640, the system is configured to analyze theidentified one or more data elements to determine one or more datatransfers between one or more data systems in different particularphysical locations. The system may, for example, analyze a data modelbased on each particular data asset to identify one or more datatransfers between and/or among the one or more data assets (e.g., datasystems). For example, as may be understood from FIG. 4, a particularasset (e.g., storage asset) may receive data, for example, from a datasubject, a collection asset, or other suitable source (e.g., dataasset). The particular asset may further, in some embodiments, transferdata to a transfer asset (e.g., an asset to which the particular assettransfers data). The system may be configured to identify such datatransfers between and/or among one or more data assets for the purposeof generating a visual representation of such data transfers.

Continuing to Step 3650, the system is configured to determine one ormore regulations that relate to (e.g., apply to) the one or more datatransfers. As may understood in light of this disclosure, one or moreregulations (e.g., industry regulations, legal regulations, etc.) maygovern the transfer of personal data (e.g., between one or morejurisdictions, physical locations, and the like). In particular, the oneor more regulations may impose one or more minimum standards on thehandling of the transfer of such personal data in the interest ofprotecting the privacy of one or more data subjects or other individualswith whom the personal data is associated. In particular instances, itmay be inevitable (e.g., as a result of the sharing of customer data,the centralization of IT services, etc.) that a particular entity orcompany (e.g., a particular entity whose business activities span aplurality of jurisdictions or locations) will undertake one or more datatransfers that may triggers the one or more regulations.

In particular embodiments, the one or more regulations described abovemay include one or more transfer restrictions. In various embodiments,the one or more transfer restrictions may restrict transfer from a firstlocation (e.g., jurisdiction) to a second location (e.g., jurisdiction)absent an adequate level of privacy protection. A particular exemplarytransfer restriction may, for example, require data transferred from afirst location to a second location to be subject to the same level ofprivacy protection at the second location that the data enjoys in thefirst location. For example, the first location may, for example, placeany suitable limit on the collection and storage of personal data (e.g.,one or more time limits, one or more encryption requirements, etc.). Inparticular embodiments, the one or more regulations may include atransfer restriction that prohibits transfer of personal data from thefirst location to a second location unless the second location placeslimits on the collection and storage of personal data that are at leastas stringent as the first location.

In various embodiments, the system may, for example: (1) analyze one ormore first storage restrictions on personal data stored in a first dataasset; (2) analyze one or more second storage restrictions on personaldata stored in a second data asset to which the first data assettransfers personal data; and (3) compare the one or more first storagerestrictions with the one or more second storage restrictions. Thesystem may then, for example, flag a transfer of data from the firstdata asset to the second data asset based at least in part on thecomparison. For example, in response to determining that the one or moresecond restrictions are less stringent than the one or more firstrestrictions, the system may flag the transfer as risky or noncompliant.In another example, in response to determining that the one or moresecond restrictions are at least as stringent as the one or more firstrestrictions, the system may flag (e.g., automatically flag) thetransfer as acceptable or compliant.

In particular embodiments, the system may be configured to substantiallyautomatically determine that a transfer to a particular location isadequate. The system may, for example, store a listing (e.g., in memory)of one or more locations (e.g., countries) deemed automatically adequateas destinations of transferred personal data. In such embodiments, theone or more regulations may include a regulation that any location onthe ‘safe list’ provides adequate privacy protection for personal data.The system may then substantially automatically determine that atransfer of data that includes a ‘safe list’ location as a targetdestination in a transfer would automatically meet an adequacy standardfor data transfer. In a particular example, the one or more locations onthe ‘safe list’ may include one or more countries (e.g., Argentina,Canada, Israel, Switzerland, Uruguay, Jersey, Guernsey, the Isle of Man,etc.).

In various other embodiments, the one or more regulations may include aregulation that a transfer of personal data to a location that is partof a safe harbor is acceptable. In various embodiments, a safe harbormay include a commitment to adhere to a set of safe harbor principlesrelated to data protection. In a particular example, a United Statescompany wishing to identify as a safe harbor entity may be required toself-certify to the U.S. Department of Commerce that it adheres to theSafe Harbor principles and to make a public declaration of theadherence.

In particular other embodiments, the system may identify a particularprivacy shield arrangement between a first and second location in orderto determine an adequacy of a transfer of data from the first locationto the second location. In particular, a privacy shield arrangement mayfacilitate monitoring of an entity's compliance with one or morecommitments and enforcement of those commitments under the privacyshield. In particular, an entity entering a privacy shield arrangementmay, for example: (1) be obligated to publicly commit to robustprotection of any personal data that it handles; (2) be required toestablish a clear set of safeguards and transparency mechanisms on whocan access the personal data it handles; and/or (3) be required toestablish a redress right to address complaints about improper access tothe personal data.

In a particular example of a privacy shield, a privacy shield betweenthe United States and Europe may involve, for example: (1) establishmentof responsibility by the U.S. Department of Commerce to monitor anentity's compliance (e.g., a company's compliance) with its commitmentsunder the privacy shield; and (2) establishment of responsibility of theFederal Trade Commission having enforcement authority over thecommitments. In a further example, the U.S. Department of Commerce maydesignate an ombudsman to hear complaints from Europeans regarding U.S.surveillance that affects personal data of Europeans.

In some embodiments, the one or more regulations may include aregulation that allows data transfer to a country or entity thatparticipates in a safe harbor and/or privacy shield as discussed herein.The system may, for example, be configured to automatically identify atransfer that is subject to a privacy shield and/or safe harbor as ‘lowrisk.’

In some embodiments, the one or more regulations may include aregulation that a location that is not deemed automatically adequate asa data transfer target (e.g., a location to which data is beingtransferred) may be deemed adequate by entering one or more contracts(e.g., standard clauses) with an entity that is the source of thetransferred data. For example, the system may automatically determinethat a particular data transfer is adequate by identifying a contractthat exists between a first entity and a second entity, where the firstentity is transferring data from a first asset to a second assetassociated with the second entity. In various embodiments, the one ormore data elements that make up a data model (e.g., for the first dataasset) may indicate the existence of any contracts that the first entityhas executed related to the transfer of data with one or more otherentities. In various embodiments, the system is configured to analyzethe one or more contracts to determine whether the one or more contractsapply to a particular data transfer of the one or more transfersidentified at Step 3640.

In particular embodiments, the one or more contracts may include one ormore third party beneficiary rights to the one or more data subjectswhose personal data is subject to transfer. In such embodiments, suchcontracts may, for example, be enforced by an exporting entity (e.g.,the entity that is transferring the data) as well as the data subjectthemselves.

In particular embodiments, a further method of legitimizing a transferof data between one or more data assets may include implementing one ormore binding corporate rules. In particular embodiments, the one or morebinding corporate rules may be approved by a regulating authority. Insuch embodiments, the one or more regulations referred to in step 3650may include one or more regulations related to the existence of one ormore binding corporate rules (e.g., that have been approved by aregulating authority).

In various embodiments, the one or more binding corporate rules mayinclude a scheme that involves an entity (e.g., corporate group) settingup an internal suite of documents that set out how the entity intends toprovide adequate safeguards to individuals whose personal data is beingtransferred to a second location (e.g., country). In particularembodiments, the one or more binding corporate rules may include one ormore safeguards that are no less than those required by the location inwhich the personal data is originally stored.

In still other embodiments, the system is configured to identify one ormore attributes of the one or more transfers. For example, the systemmay be configured to identify and/or determine one or more dataretention policies of each of one or more data assets involved in aparticular transfer. The system may, for example, determine one or moredata retention policies related to: (1) an amount of time that data isstored at one particular data assets (e.g., following a transfer to/froma second data asset); (2) a type of encryption applied to data stored atone or more particular data assets; (3) one or more data retentionpolicies utilized by each of one or more data assets involved in aparticular data transfer; and/or (4) any other suitable data retentionpolicy and/or attribute related to one or more transfers.

At Step 3660, the system continues by generating a visual representationof the one or more data transfers based at least in part on the one ormore regulations. The system may, for example, generate a visualrepresentation of a map that includes the plurality of physicallocations described above. The system may then indicate, on the visualrepresentation, a location of each of the one or more data systems(e.g., using a suitable marker or indicia). In particular embodiments,the system may color code one or more of the plurality of physicallocations based on, for example, an existence of a privacy shield, aprevailing legal requirement for a particular jurisdiction, etc.

In various embodiments, the system may be configured to generate, on themap, a visual representation of a data transfer between at least a firstdata asset and a second data asset (e.g., where the first and seconddata asset are in two different physical locations). For example, thesystem may generate a linear representation of the transfer, or othersuitable representation. In particular embodiments, they system isconfigured to color code the visual representation of the transfer basedat least in part on the physical locations, one or more regulations,etc. In still other embodiments, the system is configured to color codethe visual representation of the transfer based at least in part on theone or more regulations that the system has determined apply to thetransfer (e.g., one or more binding corporate rules, privacy shield,etc.). This may, for example, indicate a legal basis of each particularidentified data transfer.

In various embodiments, the system may be configured to substantiallyautomatically flag a particular transfer of data as problematic (e.g.,because the transfer does not comply with an applicable regulation). Forexample, a particular regulation may require data transfers from a firstasset to a second asset to be encrypted. The system may determine, basedat least in part on the one or more data elements, that the transfer isnot encrypted. In response, the system may flag the transfer as Highrisk (e.g., using a particular color such as red). In various otherembodiments, the system may be configured to determine a risk level of aparticular transfer based at least in part on the physical location ofeach of the data assets, the one or more regulations, the type of databeing transferred (e.g., whether the data contains personal data), etc.

In particular embodiments, the visual representation may be used by aparticular entity to demonstrate compliance with respect to one or moreregulations related to the transfer of personal data. In suchembodiments, the visual representation may serve as a report thatindicates the legal basis of any transfer performed by the entity (e.g.,and further serve as documentation of the entity's compliance with oneor more legal regulations).

Risk Identification for Cross-Border Data Transfers

In various embodiments, the Cross-Border Visualization Generation Systemmay identify one or more risk associated with a cross-border datatransfer. In various embodiments, a data transfer record may be createdfor each transfer of data between a first asset in a first location anda second asset in a second location where the transfer record may alsoinclude information regarding the type of data being transferred, a timeof the data transfer, an amount of data being transferred, etc. Thesystem may apply data transfer rules to each data transfer record. Thedata transfer rules may be configurable to support different privacyframeworks (e.g., a particular data subject type is being transferredfrom a first asset in the European Union to a second asset outside ofthe European Union) and organizational frameworks (e.g., to support thedifferent locations and types of data assets within an organization).The applied data transfer rules may be automatically configured by thesystem (e.g., when an update is applied to privacy rules in a country orregion) or manually adjusted by the particular organization (e.g., by aprivacy officer of the organization). The data transfer rules to beapplied may vary based on the data being transferred. For example, ifthe data being transferred includes personal data, then particular datatransfer rules may be applied (e.g., encryption level requirements,storage time limitations, access restrictions, etc.).

In particular embodiments, the system may perform a data transferassessment on each data transfer record based on the data transfer rulesto be applied to each data transfer record. The data transfer assessmentperformed by the system may identify risks associated with the datatransfer record, and in some embodiments, a risk score may be calculatedfor the data transfer. For example, a data transfer that containssensitive data that includes a customer credit card, has a sourcelocation in one continent (e.g., at a merchant), and has a destinationlocation in a different continent (e.g., in a database), may have a highrisk score because of the transfer of data between two separatecontinents and the sensitivity of the data being transferred.

The risk score may be calculated in any suitable way, and may includerisk factors such as a source location of the data transfer, adestination location of the data transfer, the type of data beingtransferred, a time of the data transfer, an amount of data beingtransferred, etc. Additionally, the system may apply weighting factors(e.g., custom weighting factors or automatically determined ones) to therisk factors. Further, in some implementation, the system can include athreshold risk score where a data transfer may be terminated (e.g.,automatically) if the data transfer risk score indicates a higher riskthan the threshold risk score (e.g., the data transfer risk score beinghigher than the threshold risk score). When the data transfer risk scoreindicates a lower risk than the threshold risk score, then the systemmay process the data transfer. In some implementations, if one or moreof the risk factors indicate a heightened risk for the data transfer,then the system can notify an individual associated with the particularorganization. For example, the individual associated with the particularorganization may enable the data transfer to process, flag the datatransfer for further evaluation (e.g., send the data transferinformation to another individual for input), or terminate the datatransfer, among other actions.

The system may process the data transfer after evaluating the datatransfer assessment and/or the risk score for the data transfer.Additionally, in some implementations, the system may initiate the datatransfer via a secure terminal or secure link between a computer systemof the source location and a computer system of the destination locationwhere the system to prevent interception of the data or unwarrantedaccess to the additional information.

Cross-Border Visualization Generation User Experience

FIGS. 37-38 depict exemplary screen displays that a user may view whenreviewing a cross-border visualization generated by the system asdescribed above. As shown in FIG. 37, the system may be configured togenerate a visual representation of an asset map (e.g., a data assetmap, data system map, etc.). As may be understood from this figure, thesystem may be configured to generate a map that indicates a location ofone or more data assets for a particular entity. In the embodiment shownin this figure, locations that contain a data asset are indicated bycircular indicia that contain the number of assets present at thatlocation. In the embodiment shown in this figure, the locations arebroken down by country. In particular embodiments, the asset map maydistinguish between internal assets (e.g., first party servers, etc.)and external/third party assets (e.g., third party owned servers thatthe entity utilizes for data storage, transfer, etc.).

In some embodiments, the system is configured to indicate, via thevisual representation, whether one or more assets have an unknownlocation (e.g., because the data model described above may be incompletewith regard to the location). In such embodiments, the system may beconfigured to: (1) identify the asset with the unknown location; (2) useone or more data mapping techniques described herein to determine thelocation (e.g., pinging the asset); and (3) update a data modelassociated with the asset to include the location.

As shown in FIG. 38, the system may be further configured to indicate,via a suitable line or other visual, a transfer of data between a firstasset in a first location and a second asset in a second location. Asmay be understood from this figure, the transfer indicated by the linehas a “High” risk level, contains sensitive data that includes acustomer credit card, has a source location of Spain (e.g., at amerchant), and has a destination location of Brazil (e.g., in adatabase). In various other embodiments, the system may generate avisual representation that includes a plurality of transfers between aplurality of asset locations.

Adaptive Execution on a Data Model

In various embodiments, a Data Model Adaptive Execution System may beconfigured to take one or more suitable actions to remediate anidentified risk trigger in view of one or more regulations (e.g., one ormore legal regulations, one or more binding corporate rules, etc.). Forexample, in order to ensure compliance with one or more legal orindustry standards related to the collection and/or storage of privateinformation (e.g., personal data), an entity may be required to modifyone or more aspects of a way in which the entity collects, stores,and/or otherwise processes personal data (e.g., in response to a changein a legal or other requirement). In order to identify whether aparticular change or other risk trigger requires remediation, the systemmay be configured to assess a relevance of the risk posed by thepotential risk trigger and identify one or more processing activities ordata assets that may be affected by the risk.

Certain functionality of a Data Model Adaptive Execution System may beimplemented via an Adaptive Execution on a Data Model Module 3900. Aparticular embodiment of the Adaptive Execution on a Data Model Module3900 is shown in FIG. 39. When executing the Adaptive Execution on aData Model Module 3900, the system may be configured, at Step 3910, toidentify and/or detect one or more potential risk triggers. Inparticular embodiments, the system is configured to identify one or morepotential risk triggers in response to receiving a notification of asecurity breach (e.g., data breach) of one or more data assets (e.g.,one or more data assets utilized by a particular organization). Forexample, in response to receiving an indication that Salesforce (e.g., acustomer relationship management platform) has had a data breach, thesystem may identify one or more potential risk triggers in the form ofany data that the system receives from, or processes via Salesforce.

In still other embodiments, the system is configured to identify one ormore potential risk triggers in response to determining (e.g., receivingan input or indication) that one or more legal or industry requirementsthat relate to the collection, storage, and/or processing of personaldata have changed. For example, a particular legal regulation related toan amount of time that personal data can be stored, an encryption levelrequired to be applied to personal data, etc. may change. As anotherexample, a safe harbor arrangement (e.g., such as the safe harborarrangement discussed above) may be determined to be inadequatejustification for a transfer of data between a first and secondlocation. In this example, the system may be configured to receive anindication that ‘safe harbor’ is no longer an adequate justification fordata transfer from a first asset in a first location to a second assetin a second location.

Continuing to Step 3920, the system is configured to assess and analyzethe one or more potential risk triggers to determine a relevance of arisk posed by the one or more potential risk triggers. The system may,for example, determine whether the one or more potential risk triggersare related to one or more data assets (e.g., one or more data elementsof one or more data assets) and/or processing activities associated witha particular entity. When analyzing the one or more potential risktriggers to determine a relevance of a risk posed by the one or morepotential risk triggers, the system may be configured to utilize (e.g.,use) a formula to determine a risk level of the identified one or morepotential risk triggers. The system may, for example, determine the risklevel based at least in part on: (1) an amount of personal data affectedby the one or more potential risk triggers; (2) a type of personal dataaffected by the one or more potential risk triggers; (3) a number ofdata assets affected by the one or more potential risk triggers; and/or(4) any other suitable factor.

For example, in response to identifying a data breach in Salesforce, thesystem may, for example: (1) determine whether one or more systemsassociated with the entity utilize Salesforce; and (2) assess the one ormore systems utilized by Salesforce to evaluate a risk posed by the databreach. The system may, for example, determine that the entity utilizesSalesforce in order to store customer data such as name, address,contact information, etc. In this example, the system may determine thatthe Salesforce data breach poses a high risk because the data breach mayhave resulted in a breach of personal data of the entity's customers(e.g., data subjects).

In still another example, in response to determining that safe harbor isno longer a valid justification for a data transfer between twolocations, the system may be configured to: (1) determine whether one ormore data transfers involving one or more data assets associated withthe particular entity are currently justified via a safe harborarrangement; and (2) in response to determining that the one or moredata transfers are currently justified via a safe harbor arrangement,assessing a risk of the one or more transfers in view of the determinedinadequacy of safe harbor as a data transfer justification. Inparticular embodiments, the system may identify one or more supplementaljustifications and determine that the determined inadequacy of safeharbor poses a low risk. In other embodiments, the system may beconfigured to determine that the determined inadequacy of safe harborposes a high risk (e.g., because the system is currently performing oneor more data transfers that may be in violation of one or more legal,internal, or industry regulations related to data transfer).

Returning to Step 3930, the system is configured to use one or more datamodeling techniques to identify one or more processing activities and/ordata assets that may be affected by the risk. As discussed above, thesystem may utilize a particular data model that maps and/or indexes dataassociated with a particular data asset. The data model may, forexample, define one or more data transfers, one or more types of data,etc. that are associated with a particular data asset and/or processingactivity. In some embodiments, the system is configured to use the datamodel to identify one or more data assets and/or processing activitiesthat may be affected by the risk assessed at Step 3920. In variousembodiments, the system is configured to identify, using any suitabledata modeling technique described herein, one or more pieces of personaldata that the system is configured to collect, store, or otherwiseprocess that may be affected by the one or more potential risk triggers.

Next, at Step 3940, the system is configured to determine, based atleast in part on the identified one or more processing activities and/ordata assets and the relevance of the risk, whether to take one or moreactions in response to the one or more potential risk triggers. Inparticular embodiments, the system may, for example: (1) determine totake one or more actions in response to determining that a calculatedrisk level is above a threshold risk level; (2) determine to take theone or more actions in response to determining that the one or morepotential risk triggers may place the entity in violation of one or moreregulations (e.g., legal and/or industry regulations); etc.

In some embodiments, the system may determine whether to take one ormore actions based at least in part on input from one or moreindividuals associated with the entity. The one or more individuals mayinclude, for example, one or more privacy officers, one or more legalrepresentatives, etc. In particular embodiments, the system isconfigured to receive input from the one or more individuals, anddetermine whether to take one or more actions in response to the input.

Continuing to Step 3950, the system is configured to take one or moresuitable actions to remediate the risk in response to identifying and/ordetecting the one or more potential risk triggers.

In particular embodiments, the one or more actions may include, forexample: (1) adjusting one or more data attributes of a particular dataasset (e.g., an encryption level of data stored by the data asset, oneor more access permissions of data stored by the particular data asset,a source of data stored by the particular data asset, an amount of timethe data is stored by a particular asset, etc.); (2) generating a reportindicating the risk level and the identified one or more risk triggers;(3) providing the report to one or more individuals (e.g., a privacyofficer or other individual); and/or (4) taking any other suitableaction, which may, for example, be related to the identified one or morepotential risk triggers.

Automatic Risk Remediation Process

In various embodiments, a system may be configured to substantiallyautomatically determine whether to take one or more actions in responseto one or more identified risk triggers as discussed above in thecontext of the Adaptive Execution on a Data Model Module 3900. Inparticular embodiments, the system is configured to substantiallyautomatically perform one or more steps related to the analysis of andresponse to the one or more potential risk triggers discussed above. Forexample, the system may substantially automatically determine arelevance of a risk posed by (e.g., a risk level) the one or morepotential risk triggers based at least in part on one or morepreviously-determined responses to similar risk triggers. This mayinclude, for example, one or more previously determined responses forthe particular entity that has identified the current risk trigger, oneor more similarly situated entities, or any other suitable entity orpotential trigger.

In particular embodiments, the system may, for example, when determiningwhether to take one or more actions in response to the one or morepotential risk triggers (e.g., as discussed above with respect to Step3940 of the Adaptive Execution on a Data Model Module): (1) compare thepotential risk trigger to one or more previous risks triggersexperienced by the particular entity at a previous time; (2) identify asimilar previous risk trigger (e.g., one or more previous risk triggersrelated to a similar change in regulation, breach of data, type of issueidentified, etc.); (3) determine the relevance of the current risktrigger based at least in part on a determined relevance of the previousrisk trigger; and (4) determine whether to take one or more actions tothe current risk trigger based at least in part on one or moredetermined actions to take in response to the previous, similar risktrigger.

Similarly, in particular embodiments, the system may be configured tosubstantially automatically determine one or more actions to take inresponse to a current potential risk trigger based on one or moreactions taken by one or more similarly situated entities to one or moreprevious, similar risk triggers. For example, the system may beconfigured to: (1) compare the potential risk trigger to one or moreprevious risk triggers experienced by one or more similarly situatedentities at a previous time; (2) identify a similar previous risktrigger (e.g., one or more previous risk triggers related to a similarchange in regulation, breach of data, and/or type of issue identified,etc. from the one or more previous risk triggers experienced by the oneor more similarly-situated entities at the previous time; (3) determinethe relevance of the current risk trigger based at least in part on adetermined relevance of the previous risk trigger (e.g., a relevancedetermined by the one or more similarly situated entities); and (4)determine one or more actions to take in response to the current risktrigger based at least in part on one or more previously determinedactions to take in response to the previous, similar risk trigger (e.g.,one or more determined actions by the one or more similarly situatedentities at the previous time).

In various embodiments, the one or more similarly-situated entities mayinclude, for example: (1) one or more other entities in a geographiclocation similar to a geographic location of the entity that hasidentified the one or more potential risk triggers (e.g., a similarcountry, jurisdiction, physical location, etc.); (2) one or more otherentities in a similar industry (e.g., banking, manufacturing,electronics, etc.); (3); one or more entities of a similar size (e.g.,market capitalization, number of employees, etc.); (4) one or moreentities that are governed by one or more similar regulations (e.g.,such as any suitable regulation discussed herein); and/or (5) any othersuitably similarly situated entity.

In various embodiments, the system is configured to use one or moremachine learning techniques to analyze one or more risk levels assignedto previously identified risk triggers, determine a suitable response tosimilar, currently-identified risk triggers based on previouslydetermined responses, etc.

In particular embodiments, the system may, for example, be configuredto: (1) receive risk remediation data for a plurality of identified risktriggers from a plurality of different entities; (2) analyze the riskremediation data to determine a pattern in assigned risk levels anddetermined response to particular risk triggers; and (3) develop a modelbased on the risk remediation data for use in facilitating an automaticassessment of and/or response to future identified risk triggers.

In a particular example of a reactive system for automaticallydetermining a suitable action to take in response to an identified risktrigger, the system may take one or more suitable actions in response toidentifying a data beach in Salesforce (e.g., as discussed above). Inparticular embodiments, the system may, for example: (1) substantiallyautomatically identify one or more actions taken by the system inresponse to a similar data breach of one or more different vendors; and(2) determine a suitable action to take in response to the data breachbased on the one or more actions taken in response to the similar databreach. The similar data breach may include, for example, a breach indata of a similar type, or any other similar breach.

In another example, the system may be configured to identify one or moresimilarly situated entities that have experienced a data breach viaSalesforce or other similar vendor. The system, may, for example, beconfigured to determine a suitable action to take based at least in parton an action taken by such a similar entity to a similar data breach. Instill another example, the system may be configured, based on one ormore previous determinations related to a data breach by a vendor (e.g.,such as by Salesforce) to take no action in response to the identifiedrisk trigger (e.g., because the identified risk may pose no or minimaldanger).

Systems and Methods for Automatically Remediating Identified Risks

A data model generation and population system, according to particularembodiments, is configured to generate a data model (e.g., one or moredata models) that maps one or more relationships between and/or among aplurality of data assets utilized by a corporation or other entity(e.g., individual, organization, etc.) in the context, for example, ofone or more business processes. In particular embodiments, each of theplurality of data assets (e.g., data systems) may include, for example,any entity that collects, processes, contains, and/or transfers data(e.g., such as a software application, “internet of things” computerizeddevice, database, website, data-center, server, etc.). For example, afirst data asset may include any software or device (e.g., server orservers) utilized by a particular entity for such data collection,processing, transfer, storage, etc.

In particular embodiments, a system may be configured to generate andmaintain one or more disaster recovery plans for particular data assetsbased on one or more relationships between/among one or more data assetsoperated and/or utilized by a particular entity.

In various embodiments, a system may be configured to substantiallyautomatically determine whether to take one or more actions in responseto one or more identified risk triggers. For example, an identified risktrigger include any suitable risk trigger such as that a data asset foran organization is hosted in only one particular location therebyincreasing the scope of risk if the location were infiltrated (e.g., viacybercrime). In particular embodiments, the system is configured tosubstantially automatically perform one or more steps related to theanalysis of and response to the one or more potential risk triggersdiscussed above. For example, the system may substantially automaticallydetermine a relevance of a risk posed by (e.g., a risk level) the one ormore potential risk triggers based at least in part on one or morepreviously-determined responses to similar risk triggers. This mayinclude, for example, one or more previously determined responses forthe particular entity that has identified the current risk trigger, oneor more similarly situated entities, or any other suitable entity orpotential trigger.

In particular embodiments, the system may, for example, be configuredto: (1) receive risk remediation data for a plurality of identified risktriggers from a plurality of different entities; (2) analyze the riskremediation data to determine a pattern in assigned risk levels anddetermined response to particular risk triggers; and (3) develop a modelbased on the risk remediation data for use in facilitating an automaticassessment of and/or response to future identified risk triggers.

In some embodiments, in response to a change or update is made to one ormore processing activities and/or data assets (e.g., a databaseassociated with a particular organization), the system may use datamodeling techniques to update the risk remediation data for use infacilitating an automatic assessment of and/or response to futureidentified risk triggers. For example, the system may be configured touse a data map and/or data model described herein to, for example: (1)particular systems that may require some remedial action in response toan identified breach/incident for one or more related systems; (2)automatically generate a notification to an individual to update adisaster recovery plan for those systems; and/or (3) automaticallygenerate a disaster recovery plan that includes one or more actions inresponse to identifying an incident in one or more related systemsidentified using the data mapping techniques described herein. Invarious embodiments, in response to modification of a privacy campaign,processing activity, etc. of the particular organization (e.g., add,remove, or update particular information), the system may update therisk remediation data for use in facilitating an automatic assessment ofand/or response to future identified risk triggers. For example, thesystem may be configured to (1) identify one or more changes to one ormore relationships between/among particular data assets in response to achange in one or more business processes; and (2) modify (e.g., and/orgenerate a notification to modify) one or more disaster recovery plansfor any affected data assets.

In particular embodiments, the system may, for example, be configuredto: (1) access risk remediation data for an entity that identifies oneor more suitable actions to remediate a risk in response to identifyingone or more data assets of the entity that may be affected by one ormore potential risk triggers; (2) receive an indication of an update tothe one or more data assets; (3) identify one or more potential updatedrisk triggers for an entity; (4) assess and analyze the one or morepotential updated risk triggers to determine a relevance of a risk posedto the entity by the one or more potential updated risk triggers; (5)use one or more data modeling techniques to identify one or more dataassets associated with the entity that may be affected by the risk; and(6) update the risk remediation data to include the one or more actionsto remediate the risk in response to identifying the one or morepotential updated risk triggers.

Webform Crawling to Map Processing Activities in a Data Model

In particular embodiments, a data mapping system (e.g., such as anysuitable data mapping and/or modeling system described herein) may beconfigured to generate a data model that maps one or more relationshipsbetween and/or among a plurality of data assets utilized by acorporation or other entity (e.g., individual, organization, etc.) inthe context, for example, of one or more business processes and/orprocessing activities. In various embodiments, when generating the datamodel, the system may identify one or more webforms utilized by thesystem in the collection and processing of personal data and determineone or more particular data assets and/or processing activities thatutilize such data. Although in the course of this description, thesystem is described as crawling (e.g., and/or scanning) one or morewebforms, it should be understood that other embodiments may be utilizedto scan, crawl or analyze any suitable electronic form in order to mapany data input via the electronic form in any suitable manner.

In particular embodiments, the system may be configured to use one ormore website scanning tools to, for example: (1) identify a webform(e.g., on a website associated with a particular entity ororganization); (2) robotically complete the webform; (3) and analyze thecompleted webform to determine one or more particular processingactivities, and/or business processes, etc. that use one or more piecesof data submitted via the webform.

As may be understood in light of this disclosure, one or more legaland/or industry regulations may require an entity to, for example,maintain a record of one or more processing activities undertaken by theentity that includes: (1) a name and contact details of a controllerresponsible for the processing activity; (2) a purpose of theprocessing; (3) a description of one or more categories of data subjectsand/or of one or more categories of personal data collected as part ofthe processing activity; (4) one or more categories of recipients towhom the personal data may be disclosed, including recipients in one ormore second countries or other locations; (5) one or more transfers ofthe personal data to a second country or an international organization;(6) a time limit for erasure of the personal data, if applicable; (7) anidentification of one or more security measures taken in the collectionand/or storage of the personal data; and/or (8) any other suitableinformation.

As may be further understood in light of this disclosure, a particularorganization may undertake a plurality of different privacy campaigns,processing activities, etc. that involve the collection and storage ofpersonal data. In some embodiments, each of the plurality of differentprocessing activities may collect redundant data (e.g., may collect thesame personal data for a particular individual more than once), and maystore data and/or redundant data in one or more particular locations(e.g., on one or more different servers, in one or more differentdatabases, etc.). Additionally, one or more sub-organizations (e.g.,subgroups) of an organization or entity may initiate a processingactivity that involves the collection of personal data without vettingthe new processing activity with a privacy compliance officer or otherindividual within the company tasked with ensuring compliance with oneor more prevailing privacy regulations. In this way, a particularorganization may collect and store personal data in a plurality ofdifferent locations which may include one or more known and/or unknownlocations, or may collect personal data for a purpose that is notimmediately apparent (e.g., using one or more webforms). As such, it maybe desirable for an entity to implement a system that is configured toscan one or more webforms that collect personal data to identify whichparticular processing activity (e.g., or processing activities) thatpersonal data is utilized in the context of.

Various processes are performed by the Data Access Webform CrawlingSystem and may be implemented by a Webform Crawling Module 4300.Referring to FIG. 43, in particular embodiments, the system, whenexecuting the Webform Crawling Module 4300, is configured to: (1)identify a webform used to collect one or more pieces of personal data;(2) robotically complete the identified webform; (3) analyze thecompleted webform to determine one or more processing activities thatutilize the one or more pieces of personal data collected by thewebform; (4) identify a first data asset in the data model that isassociated with the one or more processing activities; (5) modify a datainventory for the first data asset in the data model to include dataassociated with the webform; and (6) modify the data model to includethe modified data inventory for the first data asset.

When executing the Webform Crawling Module 4300, the system begins, atStep 4310, by identifying a webform used to collect one or more piecesof personal data. The system may use one or more website scanning toolsto identify the webform. The webform may be a website associated with aparticular entity or organization. For example, the webform may be a“Contact Us” form that is on the particular organization's website orany other type of webform associated with the particular organization.At Step 4320, the system is configured to robotically complete theidentified webform. The identified webform may be completed by using avirtual profile that emulates a user profile, and the virtual profilemay include an e-mail address. The system may monitor the e-mail accountassociated with the e-mail address for a confirmation e-mail related tothe completion of the identified webform where the system may receiveand interact with the confirmation e-mail. Additionally, the system mayanalyze (e.g., scrape) the confirmation e-mail for the data associatedwith the webform. The data associated with the webform may identify oneor more processing activities and one or more pieces of personal datacollected by the webform.

Next, at Step 4330, the system is configured to analyze the completedwebform to determine one or more processing activities that utilize theone or more pieces of personal data collected by the webform. In someimplementations, the system may analyze one or more pieces of computercode associated with the webform to determine the one or more processingactivities that utilize the one or more pieces of personal datacollected by the webform. Further, the system may analyze the one ormore pieces of computer code to identify a storage location to which theone or more pieces of personal data collected by the webform are routed.At Step 4340, the system is configured to identify a first data asset inthe data model that is associated with the one or more processingactivities. In some implementations, the system may identify aprocessing activity based on the storage location of the identified oneor more pieces of personal data, and an asset may be associated with aparticular storage location.

Continuing to Step 4350, the system is configured to modify a datainventory for the first data asset in the data model to include dataassociated with the webform. The system may include an indication thatthe one or more processing activities operate with data included in thefirst data asset. Additionally, the system may indicate that the one ormore pieces of personal data are utilized by the identified one or moreprocessing activities.

At Step 4360, the system continues by modifying the data model toinclude the modified data inventory for the first data asset. In someimplementations, the system may include a mapping of the first dataasset to the one or more processing activities that utilize the one morepieces of personal data. The mapping may be based on the analysis of thecomputer code associated with the webform. Moreover, in someimplementations, the system may add the first data asset to athird-party data repository, and the first data asset may include anelectronic link to the webform. The third-party repository is furtherdiscussed below.

Central Consent Repository

In particular embodiments, any entity (e.g., organization, company,etc.) that collects, stores, processes, etc. personal data may requireone or more of: (1) consent from a data subject from whom the personaldata is collected and/or processed; and/or (2) a lawful basis for thecollection and/or processing of the personal data. In variousembodiments, the entity may be required to, for example, demonstratethat a data subject has freely given specific, informed, and unambiguousindication of the data subject's agreement to the processing of his orher personal data for one or more specific purposes (e.g., in the formof a statement or clear affirmative action). As such, in particularembodiments, an organization may be required to demonstrate a lawfulbasis for each piece of personal data that the organization hascollected, processed, and/or stored. In particular, each piece ofpersonal data that an organization or entity has a lawful basis tocollect and process may be tied to a particular processing activityundertaken by the organization or entity.

A particular organization may undertake a plurality of different privacycampaigns, processing activities, etc. that involve the collection andstorage of personal data. In some embodiments, each of the plurality ofdifferent processing activities may collect redundant data (e.g., maycollect the same personal data for a particular individual more thanonce), and may store data and/or redundant data in one or moreparticular locations (e.g., on one or more different servers, in one ormore different databases, etc.). In this way, because of the number ofprocessing activities that an organization may undertake, and the amountof data collected as part of those processing activities over time, oneor more data systems associated with an entity or organization may storeor continue to store data that is not associated with any particularprocessing activity (e.g., any particular current processing activity).Under various legal and industry standards related to the collection andstorage of personal data, such data may not have or may no longer have alegal basis for the organization or entity to continue to store thedata. As such, organizations and entities may require improved systemsand methods to maintain an inventory of data assets utilized to processand/or store personal data for which a data subject has provided consentfor such storage and/or processing.

In various embodiments, the system is configured to provide athird-party data repository system to facilitate the receipt andcentralized storage of personal data for each of a plurality ofrespective data subjects, as described herein. Additionally, thethird-party data repository system is configured to interface with acentralized consent receipt management system.

In various embodiments, the system may be configured to, for example:(1) identify a webform used to collect one or more pieces of personaldata, (2) determine a data asset of a plurality of data assets of theorganization where input data of the webform is transmitted, (3) add thedata asset to the third-party data repository with an electronic link tothe webform, (4) in response to a user submitting the webform, create aunique subject identifier to submit to the third-party data repositoryand the data asset along with the form data provided by the user in thewebform, (5) submit the unique subject identifier and the form dataprovided by the user in the webform to the third-party data repositoryand the data asset, and (6) digitally store the unique subjectidentifier and the form data provided by the user in the webform in thethird-party data repository and the data asset.

In some embodiments, the system may be further configured to, forexample: (1) receive a data subject access request from the user (e.g.,a data subject rights' request, a data subject deletion request, etc.),(2) access the third-party data repository to identify the uniquesubject identifier of the user, (3) determine which data assets of theplurality of data assets of the organization include the unique subjectidentifier, (4) access personal data of the user stored in each of thedata assets of the plurality of data assets of the organization thatinclude the unique subject identifier, and (5) take one or more actionsbased on the data subject access request (e.g., delete the accessedpersonal data for a data subject deletion request).

The system may, for example: (1) generate, for each of a plurality ofdata subjects, a respective unique subject identifier in response tosubmission, by each data subject, of a particular webform; (2) maintaina database of each respective unique subject identifier; and (3)electronically link each respective unique subject identifier to eachof: (A) a webform initially submitted by the user; and (B) one or moredata assets that utilize data received from the data subject via thewebform.

The Webform Crawling Data System may also implement a Data Asset andWebform Management Module 4400. Referring to FIG. 44, in particularembodiments, the system, when executing the Data Asset and WebformManagement Module 4400, is configured for: (1) identifying a webformused to collect one or more pieces of personal data; (2) determining adata asset of a plurality of data assets of the organization where inputdata of the webform is transmitted; (3) adding the data asset to thethird-party data repository with an electronic link to the webform; (4)in response to a user submitting the webform, creating a unique subjectidentifier to submit to the third-party data repository and the dataasset along with form data provided by the user in the webform; (5)submitting the unique subject identifier and the form data provided bythe user in the webform to the third-party data repository and the dataasset; and (6) digitally storing the unique subject identifier and theform data provided by the user in the webform in the third-party datarepository and the data asset.

When executing the Data Asset and Webform Management Module 4400, thesystem begins, at Step 4410, by identifying a webform used to collectone or more pieces of personal data. In particular embodiments, thesystem may be configured to use one or more website scanning tools to,for example, identify a webform. The webform may be a website associatedwith a particular entity or organization. For example, the webform maybe a “Contact Us” form that is on the particular organization's websiteor any other type of webform associated with the particularorganization.

At Step 4420, the system is configured to determine a data asset of aplurality of data assets of the organization where input data of thewebform is transmitted. The system may perform the determination byidentifying where the input data of the webform is transmitted (e.g.,Salesforce). Continuing to Step 4430, the system is configured to addthe data asset to the third-party data repository with an electroniclink to the webform. The system may provide the third-party datarepository with a reference to the data asset, or in someimplementations, the system may provide the one or more pieces ofpersonal data that were transmitted to the one or more data assets tothe third-party repository. The system may associate the electronic linkto the webform with the identified data asset that includes the one ormore pieces of personal data.

Returning to Step 4440, the system is configured to create a uniquesubject identifier to submit to the third-party data repository and thedata asset along with form data provided by the user in the webform inresponse to a user submitting the webform. In response to a userinputting form data (e.g., name, address, credit card information, etc.)at the webform and submitting the webform, the system may, based on thelink to the webform, create a unique subject identifier to identify theuser. The unique subject identifier may be any type of numerical,alphabetical, or any other type of identifier to identify the user.

Continuing to Step 4450, the system is configured to submit the uniquesubject identifier and the form data provided by the user in the webformto the third-party data repository and the data asset. The system isconfigured to submit the unique subject identifier to the third-partydata repository and the data asset along with the form data. Further,the system may use the unique subject identifier of a user to access andupdate each of the data assets of the particular organization (i.e.,including the other data assets of the particular organization where theform data is not transmitted). For example, in response to a usersubmitting a data subject access request to delete personal data theparticular organization has stored of the user, the system may use theunique subject identifier of the user to access and retrieve the user'spersonal data stored in all of the data assets (e.g., Salesforce,Eloqua, Marketo, etc.) utilized by the particular organization. At Step4460, the system continues by digitally storing the unique subjectidentifier and the form data provided by the user in the webform in thethird-party data repository and the data asset.

Further, in some implementations, the system may be configured toreceive a data subject access request from the user. The data subjectaccess request may be one or more different types of data subject accessrequests, and may be, for example, a data subject deletion request or adata subject rights request. Upon the system receiving the data subjectaccess request, the system may be configured to access the third-partydata repository to identify the unique subject identifier of the user,determine which data assets of the plurality of data assets of theorganization include the unique subject identifier, and access personaldata of the user stored in each of the data assets of the plurality ofdata assets of the organization that include the unique subjectidentifier. Upon the data subject access request being a data subjectdeletion request, then the system may delete the accessed personal dataof the user stored in each of the data assets of the plurality of dataassets of the organization that include the unique subject identifier.When the data subject access request is a data subject rights request,the system may generate a data subject rights request report thatincludes the accessed personal data of the user stored in each of thedata assets of the plurality of data assets of the organization thatinclude the unique subject identifier. Further, the data subject rightsrequest report may be transmitted to the user. In some implementations,the system may transmit the data subject rights request report to theuser via a secure electronic link.

Webform Generation User Experience

FIG. 40 depicts an exemplary webform that a particular entity mayinclude on a website for completion by one or more customers or users ofthe website. As may be understood from FIG. 40, the webform may collectpersonal data such as, for example: (1) first name; (2) last name; (3)organization name; (4) country of residence; (5) state; (6) phonenumber; (7) e-mail address; (8) website; and/or (9) any other suitablepersonal data. As may be further understood from this figure, an entity(e.g., or a system controlled by the entity) may use the webform tocollect such personal data as part of one or more processing activities(e.g., e-mail marketing, online surveys, event marketing, etc.). Invarious embodiments, the system may be configured to scan a particularwebform to identify a particular processing activity for which theentity is collecting the personal data.

In various embodiments, the system may, for example: (1) roboticallyfill out the webform (e.g., using one or more virtual profiles); (2)analyze one or more pieces of computer code associated with the webform(e.g., javascript, HTML, etc.); and (3) map one or more businessprocesses that utilize the data collected via the webform based at leastin part on the analyzed one or more pieces of computer code. Inparticular embodiments, a particular entity that utilizes a webform tocollect personal data for use in a particular processing activity (e.g.,business process) may analyze one or more pieces of computer codeassociated with the webform to determine: (1) one or more systemsassociated with the entity to which data entered the webform is routed(e.g., one or more data assets that serve as a destination asset to dataentered via the webform); (2) a purpose for the collection of the dataentered via the webform (e.g., a processing activity that utilizes thedestination asset discussed above; (3) a type of data collected via thewebform; and/or (4) any other suitable information related to thecollection of data via the webform.

In particular embodiments, a system may be configured to transmit awebform completion confirmation e-mail to a user that completes thewebform. In various embodiments, the system may be configured to analyzethe e-mail or other message to identify one or more business processesthat utilize the data collected by the webform (e.g., byanalyzing/scraping one or more contents of the e-mail or other message).The system may then determine a purpose of the data collection and/or anassociated processing activity based at least in part on the analysis.

Scanning Electronic Correspondence to Facilitate Automatic Data SubjectAccess Request Submission

In various embodiments, any system described herein may be configuredfor: (1) analyzing electronic correspondence associated with a datasubject (e.g., the emails within one or more email in-boxes associatedwith the data subject, or a plurality of text messages); (2) based onthe analysis, identifying one or more entities (e.g., corporateentities) that that the data subject does not actively do business with(e.g., as evidenced by the fact that the data subject no longer opensemails from the entity, has set up a rule to automatically delete emailsreceived from the entity, has blocked texts from the entity, etc.); (3)in response to identifying the entity as an entity that the data subjectno longer does business with, at least substantially automaticallygenerating a data subject access request and, optionally, automaticallysubmitting the data subject access request to the identified entity.

The system may, for example, be configured to determine whether the datasubject still uses one or more services from a particular e-mail sender(e.g., service provider) based at least in part on one more determinedinteractions of the data subject with one or more e-mails, or otherelectronic correspondence, from the service provider (e.g., whether thedata subject reads the e-mail, selects one or more links within thee-mail, deletes the e-mail without reading it, etc.). The system maythen substantially automatically generate and/or complete a data subjectaccess request on behalf of the data subject that includes a request tobe forgotten (e.g., a request for the entity to delete some or all ofthe data subject's personal data that the entity is processing).

For purposes of simplicity, various embodiments will now be described inwhich the system scans a plurality of emails associated with a datasubject in order to identify one or more entities that the data subjectno longer does business with. However, it should be understood that, inother embodiments, the same or similar techniques may be used inanalyzing other types of electronic or other correspondence to identifyentities that the data subject no longer does business with. Forexample, the system may analyze text messages, social media posts, scansof paper mail, or any other correspondence and/or other documentsassociated with the data subject to determine whether the data subjectdoes business with particular entities. In various embodiments, thesystem bases this determination on its analysis of multiple differenttypes of electronic correspondence between the data subject and one ormore entities (which may include one-way correspondence in which therecipient of a particular correspondence doesn't respond, or two-waycorrespondence, in which the recipient of the correspondence responds tothe correspondence).

In various embodiments, various functions performed by an E-mailScanning System may be implemented via an E-mail Scanning Module 4100.FIG. 41 depicts an E-mail Scanning Module 4100 according to a particularembodiment, which may be executed, for example, on any of the servers110, 120, 130, 160 shown in FIG. 1, or on one or more remote computingdevices 150. When executing an exemplary E-mail Scanning Module 4100,the system begins, at Step 4110, by providing a software application forinstallation on a computing device. In particular embodiments, thesoftware application may be configured to integrate with an e-mailservice (e.g., gmail, yahoo, live, Microsoft Exchange, etc.) in order toprovide access to a data subject's e-mail (e.g., a data subject'se-mail). In particular embodiments, the software application may beembodied as a software plugin that interfaces with a particular softwareapplication (e.g., Microsoft Outlook) in order to provide access to thedata subject's e-mail to the systems. In other embodiments, the softwareapplication may be embodied as a browser plugin for use with a webbrowser to provide access to the data subject's web-based e-mailservice. In particular embodiments, the system is configured to providethe software application for installation on a data subject's computingdevice (e.g., mobile computing device, etc.). In such embodiments, thesoftware application may be embodied as a client-side softwareapplication that executes one or more of the processes described belowon a client computing device (e.g., such as the data subject's computingdevice on which the data subject accesses his or her e-mails).

In still other embodiments, the system is configured to provide thesoftware application for installation on one or more suitable servers(e.g., one or more suitable servers that host a particular e-mailservice). In particular embodiments, for example, the system isconfigured to: (1) receive authorization from a data subject to accesshis or her e-mails; and (2) use a software application installed on oneor more remote servers to perform one or more of the functions describedbelow. In such embodiments, the system may be configured to provide thesoftware application to the one or more remote servers. In particularother embodiments, the system may be at least partially integrated inone or more remote servers (e.g., via a direct server integration). Insuch embodiments, the system may be at least partially integrated withone or more remote e-mail servers (e.g., one or more remote servers thatstore and/or process a data subject's emails).

Returning to Step 4120, the system is configured to use the softwareapplication to scan and optionally index one or more data subjecte-mails, and then analyze information derived from the emails toidentify a subject entity (e.g., corporate or non-corporate entity) fromwhich each of the one or more data subject e-mails was received by adata subject. The system may, for example, be configured to scan and/orindex the data subject's emails to identify one or more subject entitiesas the sender of the emails. In particular embodiments, the one or moresubject entities may include one or more subject entities (e.g.,corporate entities) that would be required to respond to a data subjectaccess request, if received from the data subject. For example, the oneor more subject entities may include any subject company that collects,stores, or otherwise processes the data subject's personal data. Thesystem may, for example, be configured to identify particular e-mails ofthe data subject's indexed e-mails that were received from any suitableentity (e.g., Target, Home Depot, etc.). The system may, for example,scan an e-mail's subject field, body, sender, etc. to identify, forexample: (1) a name of the subject company; (2) an e-mail domainassociated with the subject company; and/or (3) any other suitableinformation which may identify the subject entity as the sender of thee-mail.

In some embodiments, the system may be configured to identify e-mailmessages from a subject entity based at least in part on an emailmailbox in which the messages are located in the data subject's e-mailaccount. For example, the data subject's e-mail account may alreadypre-sort incoming messages into one or more categories (e.g., which mayinclude, for example, a promotions category, a junk category, etc.). Insuch embodiments, the system may be configured to limit the one or moree-mails that the system scans and/or indexes to e-mails that have beenidentified as promotional in nature (or that have been placed into anyother pre-defined category, such as Spam) by the data subject's e-mailservice.

Continuing to Step 4130, the system is configured to use an algorithm todetermine whether the data subject actively does business with theentity. In particular embodiments, the system is configured to make thisdetermination based at least in part on (e.g., partially or entirelyon): (1) whether the data subject opens any of the one or more e-mailsreceived from the subject company; (2) how long the data subject spendsreviewing one or more of the e-mails that the data subject does openfrom the subject company; (3) whether the data subject deletes one ormore of the e-mails from the subject company without reading them; (4)what portion (e.g., percentage) of e-mails received from the subjectcompany the data subject opens; (5) whether the data subject selects oneor more links contained in one or more e-mails received from the subjectcompany; (6) how much time the data subject spends viewing a website towhich a link is provided in the one or more e-mails from the subjectcompany; (7) whether the data subject has set up a rule (e.g., asoftware-based rule) to auto-delete or block emails from the subjectcompany; (8) whether the data subject has set up a rule (e.g., asoftware-based rule) to redirect emails received from the subjectcompany to a specific folder or other location (e.g., a folderdesignated for commercial correspondence, or a folder designated forunwanted correspondence); (9) whether the data subject has submitted arequest to the particular entity for the particular entity not to sendemails to the data subject; (10) whether the data subject has submitteda request to the particular entity for the particular entity not to sendtext messages to the data subject; (11) whether the data subject hassubmitted a request to the particular entity for the particular entitynot to call the data subject; and/or (12) any other suitable informationrelated to the data subject's use of one or more services, or purchaseof goods, related to the one or more e-mails or other electroniccorrespondence received by the data subject from the subject company. Inparticular embodiments, the system is configured to automatically (e.g.,using one or more computer processors) determine the information of anyof the items listed above (e.g., whether the data subject has set up arule to redirect emails received from the subject company to a specificfolder) using any suitable technique.

As noted above, the system may, in addition, or alternatively, make thedetermination described above by analyzing electronic correspondenceother than emails, such as texts, social media postings, etc. thatinvolve the data subject and the entity. For example, the system maydetermine that the data subject no longer actively does business with aparticular entity if the data subject configures software (e.g.,messaging software on the data subject's smartphone) to block texts fromthe particular entity.

In various embodiments, the system is configured to utilize an algorithmthat takes into account one or more of the various factors discussedabove to determine whether the data subject still actively does businesswith the subject entity (e.g., and therefore would likely be interestedin continuing to receive e-mails from the subject company). In doing so,the system may assign any appropriate value to each of the factors indetermining whether to determine that the data subject no longer doesbusiness with the subject entity. Similarly, the system may allow thecalculation to be customized by allowing users to assign weightingfactors to each particular variable.

As a simple example, the system may use the following formula todetermine whether the data subject does business with a particularentity:

Data Subject Disengagement Rating=(Emails Opened Value)+(Texts ReadValue)+(Emails Automatically Deleted Value)+(Texts Blocked Value)

In a particular example, the system is configured to determine that thedata subject no longer actively does business with the entity if theData Subject Disengagement Rating is above 80. In this example, thesystem may assign: (1) a value of 80 to the Emails Read Value if thedata subject opens fewer than 5% of emails received from the from theentity; (2) a value of 50 to the Emails Read Value if the data subjectopens between 5%-25% of emails received from the entity; and (3) a valueof 0 to the Emails Read Value if the data subject opens over 25% ofemails received from the from the entity. The system may assign similarvalues to the other variables based on the user's other email and textrelated activities. For example, the system may assign a value of 100 toText Blocked Value if the data subject has actively blocked (e.g., viasoftware instructions) texts from the entity, and a value of 0 to TextBlocked Value if the data subject has not actively blocked texts fromthe entity. Similarly, the system may assign a value of 100 to EmailsAutomatically Deleted Value if the data subject has set software toautomatically delete (e.g., immediately delete or route to a junkfolder) emails from the entity, and a value of 0 to Emails AutomaticallyDeleted Value if the data subject has not initiated such a setting.

As noted above, the system may allow users to customize the calculationabove by assigning a weighting value to any of the values included inthe Data Subject Disengagement Rating calculation. For example, thesystem may allow the user to assign a weighting value of 1.2 to EmailsOpened Value if that particular user believes that this factor should beweighted 20% higher than usual in the calculation.

In various embodiments, the system is configured to, in response todetermining that the data subject no longer actively does business withthe entity, automatically generate, populate, and/or submit a datasubject access request to the entity. In various embodiments, the datasubject access request may include: (1) a request to delete some or allof the data subject's personal data that is being processed by theentity (e.g., in the form of a “right to be forgotten” request); (2) arequest to rectify inaccurate personal data of the data subject that isbeing processed by the entity; (3) a request to access of a copy ofpersonal information of the data subject processed by the entity; (4) arequest to restrict the processing of the data subject's data by theentity; and/or (5) a request to transfer the data subject's data fromthe entity to a specified controller.

As a particular example, the system may generate a focused request tohave the entity delete all of the data subject's personal data that theentity is processing in conjunction with a particular service offered bythe entity. For example, at Step 4140, the system is configured tosubstantially automatically complete one or more data subject accessrequests on behalf of the data subject for one or more services that thedata subject no longer uses.

FIG. 42 depicts an exemplary data subject access request form that thesystem may substantially automatically generate, complete and/or submitfor the data subject on the data subject's behalf. As shown in thisfigure, the system may complete information such as, for example: (1)what type of requestor the data subject is (e.g., employee, customer,etc.); (2) what the request involves (e.g., deleting data, etc.); (3)the requestor's first name; (4) the requestor's last name; (5) therequestor's email address; (6) the requestor's telephone number; (7) therequestor's home address; and/or (8) one or more details associated withthe request. In particular embodiments, the system is configured to usean index of information about a particular entity or service to automatefilling out the data subject access request.

In various embodiments, the system may receive at least some data fromthe data subject in order to complete the data subject access request.In other embodiments, the system is configured to scan one or moree-mails from the subject company to obtain one or more particular piecesof information for use in filling out the data subject access request(e.g., by identifying a shipping address in a particular e-mail, billingaddress, first name, last name, and/or phone number of the data subjectfrom a previous order that the data subject placed with the subjectcompany, etc.). In particular embodiments, the system may automaticallyidentify all of the information needed to populate the data subjectaccess request by identifying the information from within one or moreindividual electronic correspondence associated with the data subject(e.g., one or more texts or emails from the entity to the data subject).

In particular embodiments, the system may be configured to send amessage to the data subject (e.g., via e-mail) prior to automaticallycompleting the data subject access request. The message may, forexample, require the data subject to confirm that the data subject wouldlike the system to complete the request on the data subject's behalf. Invarious embodiments, in response to the data subject confirming that thedata subject would like the system to complete the request, the systemautomatically populates the request and submits the request to theentity on the data subject's behalf.

In other embodiments, the system may automatically submit the requestwithout explicit authorization from the data subject (e.g., the datasubject may have provided a blanket authorization for submitting suchrequests when configuring the system's settings.)

In some embodiments, the Email Scanning System may comprise a thirdparty system that is independent from the one or more subject entities.In such embodiments, the Email Scanning System may be implemented aspart of a service for data subjects who may desire to exercise one ormore privacy rights, but who aren't necessarily aware of which companiesmay be storing or processing their personal data, or who don't want tospend the time to submit data subject access requests manually.Similarly, various embodiments of the system may be implemented as partof a service that advantageously provides a data subject with anautomated way of submitting data subject access requests to subjectcompanies whose services the data subject no longer uses.

In still other embodiments, the system may be provided by a subjectentity (e.g., company) for use by data subjects. Because subjectcompanies are subject to requirements (e.g., in the form of laws andregulations) related to the storage and processing of personal data, itmay benefit the subject company to no longer burden itself with storingor processing data related to a data subject that is no longerpurchasing the subject entity's goods or utilizing the subject entity'sservices (e.g., that is no longer actively engaged with the entity). Insuch embodiments, the system may be configured to: (1) substantiallyautomatically submit the data subject access request; and (2) respond toand fulfill the data subject access request (e.g., the same system orrelated systems utilized by a particular subject entity may beconfigured to both submit and fulfill the data subject access request).In other embodiments, the subject entity may unilaterally modify (e.g.,edit or delete) the data subject's personal data within one or more ofits systems in response to determining that the data subject does notactively do business with the subject entity.

In particular embodiments for example, in response to the systemsubmitting a request to delete the data subject's personal data from asubject entity's systems, the system may: (1) automatically determinewhere the data subject's personal data, which is processed by thesubject entity, is stored; and (2) in response to determining thelocation of the data (e.g., which may be on multiple computing systems),automatically facilitate the deletion of the data subject's personaldata from the various systems (e.g., by automatically assigning one ormore tasks to delete data across one or more computer systems toeffectively delete the data subject's personal data from the systems).In particular embodiments, the step of facilitating the deletion of thepersonal data may comprise, for example: (1) overwriting the data inmemory; (2) marking the data for overwrite; (2) marking the data as free(e.g., and deleting a directory entry associated with the data); and/or(3) any other suitable technique for deleting the personal data. Inparticular embodiments, as part of this process, the system uses anappropriate data model (see discussion above) to efficiently determinewhere all of the data subject's personal data is stored.

Mapping of Personal Data Controls

A large number of regulations govern how an organization or entity mustmanage personal data. Various jurisdictions may employ differentstandards, frameworks, and/or regulations dictating how personal datamust be managed. Other factors may also influence how an entity mustmanage personal data, such as the nationality of data subject associatedwith the personal data and the business sector associated with thepersonal data. Examples of security standards that indicate how anentity is to manage personal data include the International Organizationfor Standardization (ISO) 27000 series standards, the National Instituteof Standards and Technology (NIST) standards, the Health InformationTechnology for Economic and Clinical Health (HITECH) standards, theHealth Insurance Portability and Accountability Act (HIPAA) standards,the American Institute of Certified Public Accountants (AICPA) Systemand Organization Controls (SOC) standards, the European Union's GeneralData Protection Regulation (GDPR), and the California Consumer PrivacyAct (CCPA). Each such regulation or standard may, for example, requireone or more particular controls that an entity must put in place inorder to meet and/or comply with a particular standard and/orregulation. Jurisdictions may also develop and use their own sets ofrequirements for handling personal data. Entities (e.g., corporations,organizations, companies, etc.) may also have their own requirements andpolicies regarding the handling of personal data.

Systems according to various embodiments may store (e.g., in a computermemory) an ontology that maps respective questions from a personal datamanagement questionnaire for a first jurisdiction, standard, and/orbusiness sector (e.g., an initial, high-level questionnaire that is usedto determine the controls in place for the first jurisdiction, standard,and/or business sector) to: (1) corresponding questions within one ormore other personal data management questionnaires for one or more otherjurisdictions, standards, and/or business sectors; and/or (2)corresponding questions within a master questionnaire.

In various embodiments, the system may map controls that are requiredfor compliance with a first privacy standard (e.g., HIPAA, NIST, HITECH)to corresponding controls required for compliance with one or more otherprivacy standards and/or to respective corresponding questions within amaster questionnaire. For example, the HIPAA, NIST, and HITECH privacystandards may all require multi-factor authentication of employeesbefore the employees access sensitive data. Accordingly, the ontologymay map, to one another, respective controls listed in the HIPAA, NIST,and HITECH privacy standards that each involve multi-factorauthentication of employees.

The ontology may also, or alternatively, map each of the respectivecontrols listed in the HIPAA, NIST and HITECH privacy standards thatinvolve multi-factor authentication of employees to a question in amaster list of questions that may be used to determine compliance withone or more privacy standards. A question may be, for example, “Doesyour organization require multi-factor authentication of employeesbefore they access sensitive data?”. A question may also, or instead,solicit an answer in the form of data and/or documentation. For example,a question may solicit documentation outlining the manner in which anentity requires employee to utilize multi-factor authentication.

In a particular example, in response to receiving an answer to thisquestion in a master list, the system may use the answer provided by auser and the ontology to populate the answer to the correspondingquestions within questionnaires that are used to assess an entity'slevel of compliance with a plurality of privacy standards (e.g., HIPAA,NIST, and HITECH in the example above).

Systems according to various embodiments may also, or alternatively,store, in a computer memory, an ontology that maps respective controlsthat are in place in a personal data management system for a firstentity (e.g., to facilitate compliance with a privacy standard) tocorresponding controls that are in place in a personal data managementsystem for a second entity (e.g., to facilitate compliance with the sameand/or a different privacy standard). Such controls may correspond tocontrols required for compliance with one or more privacy standards. Forexample, for adherence to one or more applicable laws, regulations,and/or standards, and/or one or more organizational policies, a firstentity and/or a second entity may require multi-factor authentication ofemployees before such employees access sensitive data. Accordingly, theontology may map, to one another, controls associated with each entityindicating whether the respective entity employs the use of multi-factorauthentication of employees. The ontology may also, or alternatively,map each of the respective controls used by a first entity that involvemulti-factor authentication of employees to a question in a master listof questions that is used to determine whether a second entity is incompliance with one or more applicable laws, regulations, and/orstandards, and/or one or more organizational policies. The question maybe, for example, “Does your organization require multi-factorauthentication of employees before they access sensitive data?”.

In a particular example, in response to receiving the answer to thisquestion in the master questionnaire for a first entity, the system mayuse the answer provided by the user and the ontology to generate acomparison between the first entity and the second entity (e.g., usinganswers to a master questionnaire for the second entity), for example todetermine how the second entity compares to the first entity incomplying to one or more applicable laws, regulations, and/or standards,and/or one or more organizational policies.

In various embodiments, in order to facilitate the generation of acomparison of a first entity's compliance to the compliance of multiplesimilarly situated (e.g., geographically similar, operate in similarbusiness sectors, operate in in similar regulatory environments, etc.)entities, the system may store, in a computer memory, an ontology thatmaps respective controls that are in place in a personal data managementsystem for the first entity (e.g., to facilitate compliance with aprivacy standard) to corresponding controls that are in place in aplurality of personal data management systems operated by multiplerespective other entities. For example, for adherence to one or moreapplicable laws, regulations, and/or standards, and/or one or moreorganizational policies, a particular regulation or standard may requiremulti-factor authentication of employees before such employees accesssensitive data. Accordingly, the ontology may map, to one another,controls associated with the first entity indicating whether the firstentity employs the use of multi-factor authentication of employees tocontrols indicating the compliance of multiple other similarly situatedentities with multi-factor authentication requirements (e.g., percentageof other similarly situated entities that require multi-factorauthentication, number of other similarly situated entities that requiremulti-factor authentication, etc.).

In a particular example, in response to receiving the answer to aquestion about multi-factor authentication in the master questionnairefor the first entity, the system may use the answer provided by the userand the ontology to generate a comparison between the first entity and anumber of similarly situated entities, for example to determine how thefirst entity compares to its industry peers in complying to one or moreapplicable laws, regulations, and/or standards, and/or one or moreorganizational policies (e.g., generating a score reflecting how wellthe first entity's compliance tracks the compliance of its peers, etc.).

In particular embodiments, the system may capture, store, and associatevarious types of data using the disclosed ontologies. For example, inaddition to, or instead of, security controls such as a multi-factorauthentication requirements, the system may obtain data (e.g., via aquestionnaire) indicating one or more of: (1) one or more types of datathat the entity receives and/or stores from its users (e.g., datasubjects, customers, etc.); (2) how long the entity stores data receivedfrom its users; (3) where the entity stores data received from itsusers; and (4) etc.

It should be understood that an ontology may vary in complexity based onthe circumstances. In particular embodiments, one or more questions froma master list of questions (e.g., 1, 2, 3, 4, 5, etc. questions) mayeach be respectively mapped to one or more corresponding questions inone or more (e.g., any number of) respective compliance questionnairesfor other privacy standards. For example, the multi-factorauthentication question above may be mapped to a respective question incompliance questionnaires for 20 different privacy standards.

FIG. 45 illustrates a graphical representation 4500 of an exemplaryontology according to various embodiments. A Privacy Data ManagementMaster Questionnaire 4510 may be a master questionnaire representingdata that may have been provided by an operator of a personal datamanagement system. Alternatively, the Privacy Data Management MasterQuestionnaire 4510 may represent data associated with the requirementsof one or more laws, regulations, and/or standards, and/or one or moreorganizational policies. The disclosed system may map controls,attributes, fields, and/or any other representations of the data in orassociated with the Privacy Data Management Master Questionnaire 4510 toother questionnaires, such as the Privacy Data ManagementRegulation/Standard Questionnaires 4520 and 4530, each of which mayrepresent data associated with a privacy standard, a regulation, a legalframework, etc. Such questionnaires may instead represent dataassociated with a particular entity's personal data management system.

As shown in FIG. 45, the system may map one or more answers in onequestionnaire (e.g., fields containing answers to questions) to one ormore answers (e.g., fields) in one or more other questionnaires. Forexample, the system may map the Question 4510A (e.g., the answer to thequestion) of the Privacy Data Management Master Questionnaire 4510 tothe Question 4520C in the Privacy Data Management Regulation/StandardQuestionnaire 4520 and to the Question 4530A in the Privacy DataManagement Regulation/Standard Questionnaire 4530. Similarly, the systemmay map the Question 4510C (e.g., the answer to the question) of thePrivacy Data Management Master Questionnaire 4510 to the Question 4520Lin the Privacy Data Management Regulation/Standard Questionnaire 4520and to the Question 4530C in the Privacy Data ManagementRegulation/Standard Questionnaire 4530. The system may map each questionin any questionnaire, and/or its associated answer, to any number ofother questions in one or more other questionnaires, or to no otherquestion.

One potential advantage of various embodiments of computer-implementedversions of this ontology is that it may allow a user to effectivelycomplete at least a portion of a large number of data standardcompliance or personal data management system comparison questionnairesby only completing a single, master questionnaire. In practice, thesystem would typically prompt the user to input answers to eachrespective question in the master questionnaire. The system would thenmap the answer to each of the questions to also be an answer of anycorresponding questions in the respective compliance questionnaires forany suitable privacy standards or comparison to one or more otherentities.

In particular embodiments, the system may be configured to dynamicallyedit a current master questionnaire for a particular entity so that themaster list of questions includes, for example, at least one questionthat will provide the answer for each question within one or moreprivacy standard compliance questionnaires for one or more respectivelaws, regulations, and/or standards, and/or one or more respectiveorganizational policies. For example, if a privacy standard compliancequestionnaire includes a question that is unique to HIPAA, the masterquestionnaire will include that question if a user indicates that theywould like to assess the entity's compliance with HIPAA. However, if auser indicates that the entity (or the user) no longer wishes to assessthe entity's compliance with HIPAA, the system may automatically modifythe master questionnaire to remove the question (since the question willno longer be applicable to the entity). Similarly, if a user laterupdates the entity's profile to indicate that the entity (or user) againwishes to evaluate the entity's compliance with HIPAA, the system mayautomatically update the master questionnaire to include the HIPAAspecific question.

It should be understood that, in various embodiments, the system may beconfigured to generate a master questionnaire at any appropriate time.For example, in a particular embodiment, the system may prompt the userto indicate the privacy standards for which the user would like to havethe entity evaluated for compliance before generating a master list ofquestions that the system then uses to determine the extent to which theentity complies with the indicated privacy standards.

Similarly, in particular embodiments, the system may be configured todynamically edit a current group of peer entities so that the peerentity group includes additional peer entities or fewer peer entities.For example, if a peer entity ceases to do business as an entityoperating in a same or similar business sector as an entity for which acomparison is being generated, that peer entity may be removed from theapplicable peer entity group. Likewise, if a peer entity begins to dobusiness in a same or similar business sector as an entity for which acomparison is being generated, that peer entity may be added to theapplicable peer entity group. As with the master list described herein,a peer entity group may be generated at any appropriate time.

After the user provides their answers to the questions, the system thenuses the ontology to map the user's answers to the questions back to thequestionnaires for each specified privacy standard, law, regulation,and/or policy, or to the questionnaires associated with one or more peerentities, to determine the extent to which the entity complies orcompares with each respective privacy standard, law, regulation, and/orpolicy or peer entity. The results of this determination may beselectively communicated to the user, in any suitable way—e.g., in areport showing the degree to which (e.g., in percentages) the entitycomplies with each specified privacy standard. For example, in variousembodiments, the system may generate a visual interface presented on oneor more computer monitors or display devices indicating the results ofthis determination. In addition, or instead, the system may generate oneor more printed reports indicating the results of this determination. Inaddition, or instead, the system may generate one or more audibleindications of the results of this determination. The system maygenerate and/or provide any other form of report or provision of resultsof this determination, and any combinations thereof.

In particular embodiments, the system is adapted to not re-presentquestions that the system already has answers for. In such embodiments,the system may only present, to the user, compliance questions forselected privacy standards, laws, regulations, and/or policies, and/orfor selected peer comparisons, that the system does not have ananalogous answer for (e.g., based on an earlier-answered question fromthe master list of questions and/or an earlier-answered question from acompliance question for another privacy standard, law, regulation,and/or policy, and/or another peer comparison).

The system may also be adapted to automatically determine that aparticular entity complies, fully or partially, with one or moreparticular privacy standards, laws, regulations, and/or policies (e.g.,the HITECH standard) based on the entity's compliance with one or moreother privacy standards, laws, regulations, policies, and/or the answersto various questions within the master list of questions.

In various embodiments, the questions may be answered based on differenttypes of information that are associated with different levels ofconfidence. For example, each particular question may be answered with:(1) unsubstantiated data provided by the entity; (2) data that issubstantiated via a remote interview; or (3) data that is substantiatedby an on-site audit. In particular embodiments, the system is adapted tostore an indication of the confidence level of the answer to eachcompliance question in memory and to selectively provide thisinformation to a user (e.g., in the form of a report). This may providethe user with an indication of the confidence level that the entityactually complies with the standard, law, regulation, and/or policy.

In a particular embodiment, the system may also use logic and/or machinelearning to assess the risk of particular business processes oroperations via answers to a master questionnaire. In a particularembodiment, the system may be configured to automatically approve one ormore (e.g., any) business processes or operations for a particularentity for which the system automatically determines that the risk isbelow a particular threshold. This may be advantageous, for example, insituations where a business executes thousands of different businessprocesses or operations, since it would avoid the need for each suchprocess or operation to be manually reviewed.

As noted above, in various embodiments, the system may compare thecontrols and other aspects related to privacy and security of aparticular entity with those implemented by one or more other similarlysituated entities. FIG. 46 illustrates a graphical representation 4600of an exemplary ontology according to various embodiments. A PrivacyData Management Questionnaire 4610 for a particular entity (“Entity X”in FIG. 46) may be a master questionnaire representing data that mayhave been provided by an operator of a personal data management systemassociated with that particular entity. Alternatively, the Privacy DataManagement Questionnaire 4610 may represent any collection of dataassociated with the privacy and/or security controls and other aspectsthat may be implemented by the particular entity, for example, in aneffort to comply with the requirements of one or more laws, regulations,and/or standards, and/or one or more organizational policies. Thedisclosed system may map the questions (e.g., fields containing answersto questions) in the Privacy Data Management Questionnaire 4610 to otherquestionnaires associated with other entities for comparison purposes,such as the Privacy Data Management Questionnaire 4620 for anotherparticular entity (“Entity Y” in FIG. 46) and/or Aggregated EntityPrivacy Data Management Questionnaire 4630 associated with a pluralityof entities.

The Privacy Data Management Questionnaires 4620 may include questionsand answers in a master questionnaire as described herein associatedwith another particular entity (“Entity Y” in FIG. 46) that is similarlysituated to the particular entity associated with the Privacy DataManagement Questionnaire 4610 (“Entity X”). The Aggregated EntityPrivacy Data Management Questionnaire 4630 may include questions andanswers representing an aggregation of privacy and/or securityinformation, for example, aggregated from a plurality of masterquestionnaires as described herein associated with plurality ofrespective entities that may each be similarly situated to theparticular entity associated with the Privacy Data ManagementQuestionnaire 4610 (“Entity X”).

As shown in FIG. 46, the system may map one or more answers in onequestionnaire (e.g., fields containing answers to questions) to one ormore answers (e.g., fields) in one or more other questionnaires. Forexample, the system may map the Question 4610A (e.g., the answer to thequestion) of the Privacy Data Management Questionnaire 4610 to theQuestion 4620C in the Privacy Data Management Questionnaires 4620 and tothe Question 4630A in the Aggregated Entity Privacy Data ManagementQuestionnaire 4630. Similarly, the system may map the Question 4610B(e.g., the answer to the question) of the Privacy Data ManagementQuestionnaire 4610 to the Question 4620Y in the Privacy Data ManagementQuestionnaire 4620, but not to any question in the Aggregated EntityPrivacy Data Management Questionnaire 4630. The system may map Question4610C (e.g., the answer to the question) of the Privacy Data ManagementQuestionnaire 4610 to the Question 4630C in the Aggregated EntityPrivacy Data Management Questionnaire 4630, but not to any question inthe Privacy Data Management Questionnaire 4620. The system may map eachquestion in any questionnaire, and/or its associated answer, to anynumber of other questions in one or more other questionnaires, or to noother question.

A potential advantage of various embodiments of computer-implementedversions of this ontology is that it may allow a user to effectivelycompare an entity's implementation of various security and privacymeasures to those implemented by similarly situated entities, such ascompetitors or similar businesses operating in, for example, otherjurisdictions. The system may be configured to dynamically edit acurrent master questionnaire used for readiness assessment based onchanges in the entity's business, customer base, legal requirements,etc. operational jurisdictions, etc. as described above.

It should be understood that, in various embodiments, the system may beconfigured to generate a questionnaire that can be used for relativereadiness assessment at any appropriate time. For example, in aparticular embodiment, the system may prompt the user to indicate thesimilarly situated entities or the appropriate business sector orjurisdiction in which the user would like to have the entity assessedagainst similarly situated entities before generating a master list ofquestions that the system then uses to assess the entity's readiness incomparison to similar situated entities. Alternatively, the system, uponreceiving an instruction to process such an assessment, may use apreviously completed mater questionnaire associated with the entity forthe assessment. The system may use other similar master questionnairescompleted by similarly situated entities in the assessment. In variousembodiments, such similar master questionnaires are not visible orotherwise accessible by a user associated with a particular entity thatis requesting a readiness assessment. In this way, the system may usethe data in such similar master questionnaires while maintaining theanonymity of the providers of such data.

Similarly, in particular embodiments, the system may be configured todynamically edit a current group of similarly situated entities so thatthe similarly situated entity group includes additional similar entitiesor fewer similar entities. For example, if a similarly situated entityceases to do business as an entity operating in a same or similarbusiness sector as an entity for which a comparison is being generated,that similarly situated entity may be removed from the applicablesimilarly situated entity group. Likewise, if a similarly situatedentity begins to do business in a same or similar business sector as anentity for which a comparison is being generated, that similarlysituated entity may be added to the applicable similarly situated entitygroup. As with the master list described herein, a similarly situatedentity group may be generated at any appropriate time.

After the user provides their answers to the questions, the system thenuses the ontology to map the user's answers to the questions back to thequestionnaires for one or more similarly situated entities or to anaggregate questionnaire associated with a plurality of similarlysituated peer entities, to determine the extent to which the entitycompares with one or more similarly situated entities. The system mayselectively communicate the results of this determination to the user inany suitable way—e.g., in a report showing the degree to which (e.g., inpercentages) the particular entity compares with one or more similarlysituated entities, in a listing showing the controls implemented by oneor more similarly situated entities that are not implemented by theparticular entity, in a listing showing the controls implemented by theparticular entity that are not implemented by one or more similarlysituated entities, etc. For example, in various embodiments, the systemmay generate a visual interface presented on one or more computermonitors or display devices indicating the results of this comparison.In addition, or instead, the system may generate one or more printedreports indicating the results of this determination. In addition, orinstead, the system may generate one or more audible indications of theresults of this determination. The system may generate and/or provideany other form of report or provision of results of this determination,and any combinations thereof.

Relative Readiness Assessment

In various embodiments, the system may determine one or more grades,scores, summaries, or other indications of the relative readiness of anorganization or entity to operate in compliance with one or moreapplicable laws, regulations, and/or standards as compared to one ormore similarly situated entities. The controls and other privacy andsecurity aspects implemented by a particular entity in the entity'smanagement of personal data may be compared to those of other entitiesoperating in similar business sectors and jurisdictional spaces toprovide the particular entity with an improved assessment of theirability to manage personal data.

The operation of an example embodiment of the system will now bedescribed in greater detail. In various embodiments, the system maydetermine current personal data management configurations of aparticular entity for which a comparison is to be performed using aprivacy data management questionnaire (e.g., a master questionnaire) asdescribed herein. Such a questionnaire may be used to determine thecontrols and other aspects implemented by the particular entity, forexample, in its efforts to comply with one or more applicable laws,regulations, and/or standards. The master questionnaire questions mayrequest information on controls associated with personal data and howpersonal data may be managed, stored, discarded, transmitted, received,affected, or otherwise dealt with by the entity, for example, to complywith such one or more applicable laws, regulations, and/or standards,and/or one or more organizational policies. In various embodiments, thesystem may use an ontology as described herein to map answers toquestions in the master questionnaire to respective controls and otheraspects implemented by one or more similarly situated entities.

In order to determine such similarly situated entities, the system mayuse a data map, questionnaire, or any other source of information todetermine one or more business sectors in which the particular entityoperates. For example, a pharmaceutical company may operate in thepharma business sector and/or the health business sector, a bank mayoperate in the financial business sector, a store may operate in thecommerce business sector, etc. Each business sector may have particularpersonal data management requirements associated with it.

The system may also use a data map, questionnaire, or any other sourceof information to determine one or more jurisdictions in which theentity operates (or to otherwise determine one or more particularregulations, standards, laws, etc., to be used in the readinessassessment) in order to determine similarly situated entities.

Using the information about the entity's business sector and operationaljurisdictions, the system may determine one or more other entitiesoperating in the same business sector and the same jurisdiction(s) assimilarly situated entities. Once such similarly situated entities havebeen determined, the system may determine, for each such entities, oneor more respective personal data management controls and other aspectsused by such entities. This information for one or more similarlysituated entities may be determined using questionnaires completed bysuch one or more similarly situated entities, aggregated questionnairesrepresenting information acquired from such one or more similarlysituated entities, one or more data maps associated with such one ormore similarly situated entities, and/or any other sources ofinformation. Such sources of information may include answers to othermaster questionnaires completed by the one or more other entities. Forexample, to acquire personal data management information for aparticular similarly situated entity, the system may access an ontologyassociated with the particular similarly situated entity that includessuch information (for example, as mapped from answers to questions in amaster questionnaire presented to the particular similarly situatedentity to respective questionnaires associated with one or moreapplicable laws, regulations, and/or standards, and/or one or moreorganizational policies).

Upon determining one or more personal data management data managementcontrols and other aspects used by similarly situated entities, thesystem may generate an ontology that may be used to compare theparticular entity's personal data management controls with one or morecontrols implemented by one or more similarly situated entities. Usingthis ontology, the system may generate a representation of thecomparison indicating how the particular entity compares to one or more(e.g., each) of the similarly situated entities. Also, or instead, usingsuch an ontology, the system may generate a summary of the personal datamanagement controls implemented by the similarly situated entities.Using the ontology, the system may perform a relative readinessassessment that may include determining which personal data managementfunctions the particular may not be performing compared to one or moresimilarly situated entities and/or how the particular entity isperforming personal data management functions differently than one ormore similarly situated entities. For example, the disclosed systems maydetermine that a similarly situated entity is storing certain personaldata that the particular entity under comparison is not storing, and/orthat a similarly situated entity is retaining other personal data for adifferent amount of time than the particular entity under comparisonretains such data.

The system may assign a score or grade to the particular entity thatindicates how similarly the particular entity is implementing personaldata management controls compared to one or more similarly situatedentities. For example, the system may determine that the particularentity has implemented 95 of the 100 personal data management controlsperformed by a similarly situated entity and may therefore assign theentity a score of 95% relative to the similarly situated entity. Thesystem may also determine a relative readiness grade based on acomparison to multiple similarly situated entities. For example, thesystem may assign a grade of “B” to the particular entity if the systemdetermines that the particular entity scores 85% or higher for aspecific number of comparisons (e.g., more than half, 75%, 85%, all,etc.) to respective similarly situated entities in a plurality ofsimilarly situated entities. Other scoring methods and mechanisms may beused as well, or instead.

Alternatively, or in addition, for each entity in a comparison, (e.g.,the particular entity under comparison and each of the one or moresimilarly situated entities), after determining respective personal datamanagement information (e.g., obtaining a completed master questionnaireor personal data management questionnaire), the system may determine acompliance score or grade indicating the quality or quantity ofcompliance of the respective entity to one or more applicable laws,regulations, and/or standards. For example, the system may assign ascore on a scale of 0-100 to the level of compliance of each entity,where 100 may indicate that an entity complies with all requirements ofone or more applicable laws, regulations, and/or standards and where 0may indicate that an entity does not comply with any of the requirementsof one or more applicable laws, regulations, and/or standards. Next, thesystem may compare the compliance score of the particular entity undercomparison to each of the compliance scores of one or more respectivesimilarly situated entities. The system may then determine a relativereadiness grade based on this comparison.

The system may present scores, grades, and/or any other resultsgenerated by the system based on the relative readiness assessment inany of various formats. For example, the system may present results ofcomparisons in detail, showing how the particular entity compares toeach similarly situated entity. Alternatively, or in addition, thesystem may present a summary comparison simply providing an indicationof how well the particular entity compares to similarly situatedentities generally. The system may present rankings of scores and/orcomparisons and may highlight and/or color code such rankings toindicate how the particular entity compares to similarly situatedentities.

The system may provide recommended additional actions and/or activities.For example, the system may present a list of controls implemented bysimilarly situated entities that are not being performed by theparticular entity under assessment and may recommend that such controlsbe implemented. The system may also present details regarding suchcontrols, such as the respective standard, law, regulation, and/orpolicy associated with each control. In various embodiments, the systemmay disguise or anonymize similarly situated entity personal datamanagement information and any other data that may reveal the identityof a similarly situated entity so that the particular entity, and anyuser or operator associated therewith, may not be able to determine theidentity of the similarly situated entity.

The system may provide results of a relative readiness assessment in anyform. For example, in various embodiments, the system may generate avisual interface presented on one or more computer monitors or displaydevices indicating the results of a relative readiness assessment,including any grading, scoring, ranking, comparison information, and/orrecommended actions. In addition, or instead, the system may generateone or more printed reports indicating the results of a relativereadiness assessment. In addition, or instead, the system may generateone or more audible indications of the results of a relative readinessassessment. The system may generate and/or provide any other form ofreport or provision of results, and any combinations thereof.

FIG. 47 depicts a Relative Readiness Assessment Module 4700 according tovarious embodiments, which may be executed, for example, on any of theservers, devices, or computing devices described herein, or on anycombination thereof. When executing the Relative Readiness AssessmentModule 4700, the system may begin at Step 4710 by generating andreceiving a completed personal data management questionnaire for anentity under comparison or otherwise obtaining such a completedquestionnaire. Such a questionnaire may include question and answerpairings related to controls, attributes, activities, actions, and/orany other information associated with privacy, security, personal data,and/or personal data management.

At Step 4720, the system may determine one or more business sectors inwhich the particular entity operates. This may be determined based on amaster questionnaire, user input or configurations, a data mapassociated with the particular entity, or any other source ofinformation. Also based on such a questionnaire, data map, and/or otherinformation, at Step 4730, the system may determine one or morejurisdictions in which the entity under comparison operates.Alternatively, or in addition, at Step 4730 the system may determine oneor more regulations, laws, standards, etc. to be used in the relativereadiness assessment.

At Step 4740, the system may determine one or more other entities(“similarly situated entities”) that are operating in the samejurisdiction(s) and the same business sector(s) as the particularentity. At Step 4750, the system may obtain personal data managementinformation for such similarly situated entities, for example in theform of one or more respective personal data management questionnairesthat may include controls, attributes, or any other informationassociated with personal data and/or personal data management. Thesystem may also, or instead, obtain such information from other sources,such as one or more data maps, databases, etc. For example, the systemmay determine, for a particular similarly situated entity, the personaldata that the similarly situated entity stores, how the similarlysituated entity stores such personal data, where the similarly situatedentity stores such personal data, for how long the similarly situatedentity stores such personal data, one or more security measures thesimilarly situated entity has in place for access to personal data, etc.

At Step 4760, the system may perform a comparison of the particularentity's personal data management questionnaire with one or morequestionnaires associated with of one or more similarly situatedentities (e.g., questionnaires associated with individual similarlysituated entities, an aggregated questionnaire reflecting informationassociated with individual similarly situated entities, etc.). Using anontology, the system may generate a comparison indicating how controlsimplemented by the particular entity compare to controls implemented by(e.g., each of) one or more similarly situated entities. Also, orinstead, based on the comparison generated using the ontology, thesystem may generate a summary of the personal data managementinformation of the similarly situated entities, for example, as comparedto the personal data management information of the particular entity. Ingenerating such a comparison, the system may determine the controls thatthe particular entity has not implemented compared to the controlsimplemented by one or more similarly situated entities. In particularembodiments, the system may also, or instead, determine the controlsthat the particular entity has implemented compared to the controls notimplemented by one or more similarly situated entities. In particularembodiments, the system may also, or instead, determine any otheraspects of data management that the particular entity is performingdifferently than one or more similarly situated entities. For example,the system may determine that a similarly situated entity is storingcertain personal data that the particular entity is not storing and/orthat a similarly situated entity is retaining other personal data for adifferent amount of time than the particular entity retains such data.

At Step 4770, the system may assign a score or grade to the particularentity that indicates how similarly the particular entity is performingpersonal data management compared to one or more similarly situatedentities. For example, the system may determine that the particularentity has implemented 95 of the 100 personal data controls performed bya particular similarly situated entity and may therefore assign theparticular entity a score of 95% for the comparison to the particularsimilarly situated entity. The system may also, or instead, determine arelative readiness grade based on a comparison to multiple similarlysituated entities. For example, the system may determine that theparticular entity that 85% or higher for each comparison to a respectivesimilarly situated entity of a plurality of similarly situated entities,and therefore assign the particular entity a relative readiness grade of“B.” In another example, the system may base the score or gradedetermined for the particular entity on other criteria, including, butnot limited to, a level of compliance by the particular entity with oneor more applicable laws, regulations, and/or standards compared to alevel of compliance of one or more similarly situated entities to thesame one or more applicable laws, regulations, and/or standards. Otherscoring methods and mechanisms may be used as well, or instead.

Alternatively, or in addition, for each entity in the comparison, (e.g.,the particular entity under comparison and the one or more similarlysituated entities), after determining the controls in place by theparticular entity and each of the similarly situated entities in thecomparison (e.g., based on a master questionnaire), the system maydetermine a compliance score or grade indicating the quality or quantityof compliance of each respective entity to one or more applicable laws,regulations, and/or standards. For example, the system may assign ascore on a scale of 0-100 to the level of compliance of each entity,where 100 may indicate that an entity complies with all requirements ofone or more applicable laws, regulations, and/or standards and where 0may indicate that an entity does not comply with any of the requirementsof one or more applicable laws, regulations, and/or standards. Next, thesystem may compare the compliance score of the particular entity undercomparison to the compliance scores of the similarly situated entitiesin the comparison. The system may determine a relative readiness gradebased on this comparison at Step 4770.

At Step 4780, the system may generate a relative readiness report (inany form) that presents comparison information and/or summarizes thepersonal data management information for the particular entity ascompared to one or more similarly situated entities. The system maypresent scores, grades, and/or any other results in any of variousformats. For example, the system may present results of the comparisonsin detail, showing how the particular entity compares to each similarlysituated entity. Alternatively, or in addition, the system may present asummary comparison providing an indication of how well the particularentity compares to similarly situated entities generally. The system maypresent rankings of scores and/or comparisons and may highlight and/orcolor code such rankings to indicate how the entity compares to itspeers.

The system may indicate recommended additional actions and/oractivities. For example, the system may generate a listing of actionsperformed by similarly situated entities that are not being performed bythe particular entity and may recommend that the particular entity beginto perform such actions. The system may also present details regardingsuch actions, such as the respective standard, law, regulation, and/orpolicy associated with each recommended action. In various embodiments,the system may disguise or otherwise anonymize similarly situated entitycompliance information and any other data that may reveal the identityof a similarly situated entity so that the particular entity, and anyuser or operator associated therewith, may not be able to determine theidentity of a similarly situated entity.

Further at Step 4780, the system may provide results of a relativereadiness assessment in any form. For example, in various embodiments,the system may generate a visual interface presented on one or morecomputer monitors or display devices indicating the results of arelative readiness assessment, including any grading, scoring, ranking,comparison information, and/or recommended actions. In addition, orinstead, the system may generate one or more printed reports indicatingthe results of a relative readiness assessment. In addition, or instead,the system may generate one or more audible indications of the resultsof a relative readiness assessment. The system may generate and/orprovide any other form of report or provision of results, and anycombinations thereof.

Compliance Documentation Determination and Collection

In various embodiments, a system may determine the documentationrequirements for processes used in the management of personal data basedon one or more applicable laws, regulations, and/or standards used inone or more jurisdictions in which an entity operates. A jurisdictionmay have particular required documentation and/or reporting of variousprocesses and controls used in the management of personal data. Ajurisdiction may also, or instead, require a risk assessment of systemsprocessing personal data within its legal boundaries. Such riskassessments may require the knowledge and/or use of various processesand controls used in the management of personal data.

The operation of an example embodiment of the system will now bedescribed in greater detail. Using a data map, questionnaire, or anyother source of information, the system may determine one or morejurisdictions in which an entity operates. Next, using a data map,questionnaire, or any other source of information (e.g., the same sourceof information used to determine the one or more jurisdictions in whichthe entity operates), the system may determine a business sector inwhich the entity operates. For example, a pharmaceutical company mayoperate in the pharma business sector and/or the health business sector,a bank may operate in the financial business sector, a store may operatein the commerce business sector, etc. Each business sector may haveparticular personal data processing documentation requirementsassociated with it in a particular jurisdiction.

Using this information about a particular entity's business sector andoperational jurisdictions, the system may determine one or moreapplicable laws, regulations, and/or standards. The system may analyzethe one or more applicable laws, regulations, and/or standards todetermine the processes and/or controls that must be documented for theparticular entity to obtain or remain in compliance with the one or moreapplicable laws, regulations, and/or standards. For example, the systemmay determine that, for an entity operating in a determined businesssector and in a particular jurisdiction, particular processes formanaging personal data and/or particular controls applied to personaldata must be documented, for example, to comply with privacy regulationsin force in the particular jurisdiction.

Based on the determined applicable laws, regulations, and/or standards,the system may generate an ontology that maps respective personal datamanagement aspects (e.g., processes, controls, attributes, companyofficers, responsible personnel, etc.) for which documentation isrequired for compliance with a first privacy law, regulation, and/orstandard in a first jurisdiction to respective corresponding questionswithin a master questionnaire. In various embodiments, the system mayalso, or instead, generate an ontology that maps respective personaldata management aspects or which documentation is required forcompliance with the first privacy law, regulation, and/or standard inthe first jurisdiction to corresponding personal data aspects for whichdocumentation is required for compliance with one or more other privacylaws, regulations, and/or standards in one or more other jurisdictions.For example, a privacy standard employed by the EU may requiredocumentation of a multi-factor authentication process used for accessto sensitive data. A privacy standard used in the United States may alsorequire documentation of a multi-factor authentication process used foraccess to sensitive data. Accordingly, the ontology may map, to eachother, the respective personal data controls associated withmulti-factor authentication for each of these jurisdictions. Theontology may also, or alternatively, map each of the EU and U.S.multi-factor authentication process documentation to a question in amaster list of questions that may be used to notify a user of therequirement of such documentation for compliance with one or moreapplicable laws, regulations, and/or standards. The system may use thismaster questionnaire to solicit such documentation from the user andstore that documentation as documentation satisfying the multi-factorauthentication process documentation requirement for both the EU andU.S. Note that as used herein, a “question” refers to an item in aquestionnaire that may include a request, a notification, information,or other data. A question may include a request for documentation, forexample, “Please provide documentation detailing your multi-factorauthentication process used for access to sensitive data.” A questionmay also, or instead, include a notification of a documentationrequirement, for example, “Documentation detailing your multi-factorauthentication process used for access to sensitive data is required byat least one jurisdiction in which you do business.”

Once a master questionnaire is generated, the system may present thequestionnaire to a user of the system. For example, the system maygenerate an interactive graphical user interface on a computer displaydevice that allows a user to view the questionnaire and submit data anddocumentation as answers to questions in the questionnaire. In responseto receiving such data and/or documentation as a response to a questionin the master questionnaire, the system may use the data and/ordocumentation in conjunction with the ontology to populate therespective data and/or documentation requirements of one or morecorresponding questions a questionnaire associated with a particularprivacy law, regulation, and/or standard in a particular jurisdiction.In this way, the system may gather the required documentation ofpersonal data management for several jurisdictions and their associatedlaws, regulations, and/or standards using a single master questionnairerather than a different questionnaire per jurisdiction and/or law,regulation, and/or standard. For example, the system may prompt the userto input answers (e.g., data, documentation, and/or a reference todocumentation such as a hyperlink) to each respective question in themaster questionnaire. The system would then map the answer to each ofthe questions to the respective answers of any corresponding questionsin the questionnaires for any jurisdiction and/or law, regulation,and/or standard as appropriate.

The system may also adjust the questions of a master questionnaireand/or generate a new master questionnaire based on changes injurisdictions and/or business sectors in which an entity operates. Forexample, should a particular entity begin operating in a newjurisdiction, the system may identify this particular new jurisdiction,determine personal data management documentation required for theparticular new jurisdiction, and generate a questionnaire for thisparticular new jurisdiction with questions including such requirements.If such documentation requirements include documentation not requestedin a current master questionnaire, the system may generate a new masterquestionnaire including one or more inquiries addressing such newrequirements. Alternatively, the system may update the existing masterquestionnaire to include one or more inquiries addressing the newrequirements. Likewise, the system may adjust questionnaires when anentity no longer operates in a particular jurisdiction and/or is nolonger subject to a particular law, regulation, and/or standard byupdating a master questionnaire to remove questions that are notapplicable to any other jurisdiction, law, regulation, and/or standardor generating a new master questionnaire without such questions.

Each jurisdiction may require one or more reports and/or documents thatinclude the documentation collected by the system (e.g., a report to aregulatory body). Using the data collected and organized according tothe various embodiments, the system may generate a report for aparticular jurisdiction that includes the documentation required forthat particular jurisdiction. The system may format, and/or transmitsuch reports based on the requirements of the particular jurisdictionfor which the report is generated. The system may provide such a reportin any form. For example, in various embodiments, the system maygenerate a visual representation of a report on one or more computermonitors or display devices. In addition, or instead, the system maygenerate one or more printed reports. In addition, or instead, thesystem may generate one or more audible reports. The system may generateand/or provide any other form of report, and any combinations thereof.

In various embodiments, the system may generate one or more electronicreports. In particular embodiments, the system may automatically sendsuch reports to a regulatory agency, while in other particularembodiments, the system may present such reports to a user for approvalor modification before transmitting such reports to a regulatory agencyin response to approval from the user.

FIG. 48 depicts a Compliance Documentation Collection Module 4800according to a particular embodiment, which may be executed, forexample, on any of the servers, devices, or computing devices describedherein, or on any combination thereof. When executing a ComplianceDocumentation Collection Module 4800, the system may begin, at Step4810, by determining one or more jurisdictions in which a particularentity operates. The system may determine such one or more jurisdictionsusing a data map, questionnaire, or any other source of information. AtStep 4820, the system may determine one or more business sectors inwhich the entity operates. The system may determine such one or moresectors using a data map, questionnaire, or any other source ofinformation.

At Step 4830, using information about the particular entity's businesssector(s) and operational jurisdiction(s), the system may determine oneor more applicable laws, regulations, and/or standards. The system mayanalyze the one or more applicable laws, regulations, and/or standardsto determine the documentation (e.g., personal data management processdocumentation, personal data controls documentation, etc.) required forthe entity to obtain, or remain in, compliance with the one or moreapplicable laws, regulations, and/or standards. For example, the systemmay determine that, for the particular entity operating in itsdetermined business sector(s) and jurisdiction(s), certain personal datamanagement processes and controls must be documented for the particularentity to remain in compliance with the regulations in force in thatparticular jurisdiction.

Based on the determined documentation requirements, at Step 4840, thesystem may generate a first questionnaire for a first privacy law,regulation, and/or standard in a first jurisdiction in which theparticular entity operates. The first questionnaire may includequestions associated with the documentation requirements for compliancewith the first privacy law, regulation, and/or standard in the firstjurisdiction. The system may generate an ontology that maps suchquestions associated with documentation requirements to correspondingquestions within a master questionnaire. The system may also generateadditional questionnaires for other jurisdictions and/orlaws/regulations/standards and may use the ontology to map questions insuch additional questionnaires to the appropriate correspondingquestions in the master questionnaire. The system may also, or instead,map such questions in the first questionnaire to corresponding questionswithin any one or more of the additional questionnaires using theontology.

The system may use this ontology to notify a user of such requirementsand/or request documentation to address such requirements. At Step 4850,the system may present the master questionnaire to a user an solicitrespective answers. For example, the system may generate an interactivegraphical user interface on a computer display device that allows a userto view one or more of the questions within the master questionnaire andsubmit data and/or documentation as answers to such one or morequestions. In response to receiving the responsive data and/ordocumentation for a particular question in the master questionnaire, thesystem may use the ontology to populate the answer to a particularcorresponding question in a questionnaire for a particular privacy law,regulation, and/or standard in a particular jurisdiction (e.g., populatethe answer with the data and/or documentation received in response tothe particular question in the master questionnaire). In this way, thesystem may gather the required documentation for several jurisdictionsand their associated laws, regulations, and/or standards using a singlemaster questionnaire rather than a different questionnaire perjurisdiction and/or law, regulation, and/or standard. For example, thesystem may prompt the user to input answers (e.g., data, documentation,a reference to documentation, etc.) to each respective question in themaster questionnaire. The system may then map the answer to each of thequestions to the respective answer of any corresponding questions in thequestionnaires for any jurisdiction and/or law, regulation, and/orstandard as appropriate.

At Step 4860, using the data collected and organized using an ontology,the system may generate a report (e.g., a report to a regulatory body)for a particular jurisdiction that includes the documentation requiredfor that particular jurisdiction. The system may format, and/or transmitsuch reports based on the requirements of the particular jurisdictionfor which the report is generated. In various embodiments, the systemmay automatically send an electronic version of such a report to aregulatory agency. In other embodiments, the system may present such areport to a user for approval or modification before transmitting thereport to a regulatory agency in response to receiving approval from theuser.

At Step 4870, the system may determine whether there have been changedto the jurisdictions and/or sectors in which the particular entityoperates. If there have been changes, then the system may return to Step4830 to adjust the questions of a master questionnaire and/or generate anew master questionnaire based on changes in jurisdictions or businesssectors in which the particular entity operates.

Identifying Potential Data Transfers

In various embodiments, the system may detect data transfers, orpotential data transfers, and determine either or both of the source anddestination of such a transfer to determine whether the transfer isexpected and/or authorized. For example, a system may use a datatransfer log entry to analyze a data transfer between a data asset andanother system (“second system”) involved in the data transfer. Thesystem may determine a network address (e.g., IP address) for the dataasset and the second system associated with a data transfer and usethose addresses to determine whether the transfer is authorized. Invarious embodiments, the identity of the data asset may be known, andtherefore the system may only need to determine a network address forthe second system involved in the data transfer, for example, in orderto identify that second system.

A system may include one or more security event management (SEM) systemsor servers and/or one or more security incident and event management(SIEM) systems or servers. In various embodiments, a STEM system maymaintain data transfer logs in which it may record information about oneor more transfers of data between a data asset managed by the STEMsystem and one or more other assets, systems, and/or environments thatmay be involved in a data transfer with the data asset. A data map mayinclude data assets managed by a SIEM or other system as describedherein. Such a data map may also include one or more geographical and/orjurisdictional locations with which a particular data asset is expectedor authorized to engage in data transfers. A data map may also, orinstead, include one or more systems and/or environments with which aparticular data asset is expected or authorized to engage in datatransfers. In various embodiments, the system may use logs (e.g., SIEMlogs, SEM logs, etc.) in conjunction with information from one or moredata maps to determine whether any particular data asset under itsmanagement is engaging in unexpected and/or unauthorized data transfers.

Note that the log entries described herein may reflect data transfersthat have been completed as well as, on instead of, data transfersplanned or in progress. For example, a data transfer log entry may becreated after a successful transfer of data between a data asset andanother system. In another example, a data transfer log entry may becreated upon initiation or planning of a data transfer between a dataasset and another system. In such embodiments, the system may beconfigured to analyze such log entries before the data transfer has beencompleted and may therefore be able to halt to transfer before it iscompleted, thereby potentially preventing the transfer of data tounauthorized systems. In other particular embodiments, the system may beconfigured to require approval before a data transfer can commence, forexample for every transfer, for transfers where one system is notexplicitly authorized, and/or for transfers where one system isexplicitly unauthorized (e.g., in a data map). In such embodiments, thesystem may issue an instruction allowing the transfer to proceed orstopping the transfer in response to the results of its data transferanalysis performed as described herein.

The operation of an example embodiment of the system will now bedescribed in greater detail. The system may examine logs generated inresponse to data transfers to determine the IP addresses of the dataassets and other systems involved in such data transfers. For example,the system may examine each new data transfer log entry as it isgenerated, received, or otherwise detected by the system. Alternatively,the system may periodically examine such data transfer logs. The systemmay determine, for a particular data transfer log entry, the networkaddress associated with the data asset involved in a particular datatransfer associated with the particular entry. The system may alsodetermine, for that particular entry, the network address for the othersystem involved in the particular data transfer. Such other system maybe any other system, device, environment, or data asset, and may be alocal or remote system.

The system may determine the identity of the data asset in theparticular data transfer log entry, for example, based on the networkaddress of the data asset shown in the particular entry. The system mayalso determine a geographical and/or jurisdictional location for theother system in the particular entry based on the respective networkaddresses for that system. For example, the system may use a reversenetwork address look-up (e.g., reverse IP address look-up) process todetermine an identity of the particular data asset indicated in aparticular data transfer log entry and/or to determine a location and/oridentity for the other system indicated in the particular data transferlog entry.

The may also, or instead, determine the identity, geographical location,and/or jurisdictional location of a particular data asset (e.g., a dataasset involved in a data transfer) using data from the data transferlog. In a particular embodiment, the system may analyze the domainreflected in a data log entry to determine a location (e.g., if thedomain of an email address is @.fr, the system may determine that thedata subject or data asset associated with that domain is in France). Ina particular embodiment, the system may use natural language processing(NLP) to analyze a name (e.g., of a data subject, data asset, etc.) todetermine a location of the associated data subject or data asset. Theysystem may also, or instead, use any available information in the datatransfer log to determine the identity, geographical location, and/orjurisdictional location of a particular data asset and/or data subject,including, but not limited to, an address, a phone number, etc. Theysystem may also, or instead, use any available information in the datatransfer log to derive or otherwise obtain the identity, geographicallocation, and/or jurisdictional location of a particular data assetand/or data subject, for example, by performing database look-ups usingsuch information.

The system may determine a set of expected or authorized geographicaland/or jurisdictional data transfer locations for the particular dataasset based on a data map associated with that particular data assetbased on the data asset's identity. In various embodiments, such a datamap may include a listing of authorized and/or expected geographicaland/or jurisdictional locations in which systems that are permitted toparticipate in a data transfer with that particular data asset may belocated. Alternatively, or in addition, a data map associated with theparticular data asset may include a listing of authorized and/orexpected particular systems and/or environments that should be permittedto participate in a data transfer with that data asset. In yet anotheradditional or alternative embodiment, a data map associated with theparticular data asset may include a listing of unauthorized and/orunexpected jurisdictions, locations, particular systems, and/orparticular environments that should not participate in data transferswith that particular data asset.

The system may compare the determined geographical and/or jurisdictionallocation (or particular system or environment) of the other system inthe particular data transfer log entry to the list of expected and/orauthorized geographical and/or jurisdictional locations (or particularsystems and environments) for the corresponding data asset. For example,having determined a jurisdictional and/or geographical location for theother system involved in a particular data transfer using a reversenetwork address look-up (e.g., reverse IP address look-up) or othermeans, the system may then compare that location to a listing ofauthorized locations in the data map associated with the particular dataasset involved in that data transfer. In another example, havingdetermined a jurisdictional and/or geographical location for the othersystem involved in a particular data transfer using a reverse networkaddress look-up or other means, the system may then compare thatlocation to a listing of prohibited locations in the data map associatedwith the particular data asset involved in that data transfer.

If the system determines that the location of the other system involvedin a particular data transfer with a particular data asset is not anauthorized location, the system may generate a notification forpresentation to user notifying the user of the unauthorized orunexpected data transfer. Any of the information related to the datatransfer may be included in such a notification, such as the identitiesof the systems and/or data assets involved in the transfer, thelocations of either or both systems and/or data assets involved in thetransfer, etc. In this way, the system may proactively notify a user ofpotentially unauthorized or illegitimate communications and datatransfers between its data assets and other systems or environments.This notification may take any form. In various embodiments, the systemmay generate a visual notification presented on one or more computermonitors or display devices indicating that a prohibited or unexpecteddata transfer has occurred. In addition, or instead, the system maygenerate one or more printed reports indicating that a prohibited orunexpected data transfer has occurred. In addition, or instead, thesystem may generate one or more audible indications that a prohibited orunexpected data transfer has occurred. The system may generate and/orprovide any other form of notification of an unauthorized or unexpecteddata transfer, and any combinations thereof.

In various embodiments, the system may also, or instead, take one ormore other actions in response to determining that one or more dataassets involved in a particular data transfer are not located at, orotherwise associated with, an authorized location. In particularembodiments, the system may determine whether the data transfer hasbegun and/or has been completed and take one or more actions in responseto this determination. For example, the system may be configured to: (1)prevent the data transfer commencing (e.g., if the system determinesthat the data transfer has not yet begun); (2) terminate the datatransfer (e.g., if the system determines that the data transfer hasalready started or has completed); and/or (3) reverse the data transfer(e.g., if the system determines that the data transfer has alreadystarted or has completed).

The system may also, or instead, take one or more other actions relatedto a detected unauthorized data transfer. In particular embodiments, thesystem may, upon detecting an unauthorized data transfer, automaticallyrevoke and/or modify access for a user associated with the unauthorizeddata transfer. For example, the system may determine a particular userthat initiated the data transfer (e.g., using data transfer logs orother means) and, upon determining that the particular data transferinvolves a data asset at an unauthorized location, may take one or moreactions to revoke the particular user's access to one or more dataassets (e.g., one or more of the data assets involved in the datatransfer). Alternatively, or in addition, the system may take one ormore actions to modify the particular user's access to one or more dataassets (e.g., one or more of the data assets involved in the datatransfer). For example, upon determining that the particular datatransfer involves a data asset at an unauthorized location, the systemmay allow the particular user to access the data asset from which theunauthorized data transfer was initiated, but may modify the particularuser's permissions on that data asset so that the particular user isprohibited from initiating data transfers from that data asset.

In various embodiments, the system may also automatically generateand/or update records on or associated with one or more data assets inresponse to detecting an unauthorized data transfer. Such a record maybe an object record, a data asset record, a record associated with adata asset, a record associated with data transfers, a configurationfile on a data asset, a record associated with a data inventory, arecord associated with a data model, etc. For example, the system mayupdate metadata in an object record associated with a data asset thatoriginated the unauthorized data transfer, instructing the originatingdata asset to block all future data transfers to the unauthorizeddestination data asset. In another example, the system may updatemetadata in an object record associated with a data asset that was thedestination asset in the data transfer, instructing the destination dataasset to block all future data transfers from the originating dataasset. Such record and/or metadata updates may also prevent completionof the originally detected unauthorized data transfer by causing one ormore of the involved data assets to cease the data transfer in responseto detecting the update.

The system may also, or instead, automatically modify the network and/orcommunications connectivity between two or more data assets in responseto detecting an unauthorized data transfer. In particular embodiments,in response to detecting an unauthorized data transfer, the system mayaccess one or more network communications components (e.g., on one ormore data assets and/or on one or more network connectivity devices)using one or more networking APIs and modify the communicationscapabilities between the originating data asset and the destination dataasset involved in the unauthorized data transfer. For example, thesystem may access a network component (e.g., router, switch, firewall,intermediate server, etc.) located in the communications path betweenthe originating data asset and the destination data asset and modify aconfiguration of the network component (e.g., access list, firewallrule, port configuration, interface configuration, etc.) to prevent anyfuture data transfers between the originating data asset and thedestination data asset. The system may use the network informationassociated with one or both of the originating data asset and thedestination data asset to perform such configuration changes. Forexample, the system may identify the network address for the originatingdata asset and/or the destination data asset as described herein and usean API to add one or both network addresses to an access list orfirewall rule at a network component. The system may also, or instead,access one or both of the originating data asset and the destinationdata asset and modify network communications configurations on one orboth such assets to prevent communications between them. Such networkconfiguration changes may also prevent completion of the originallydetected unauthorized data transfer by halting the network trafficbetween the originating data asset and the destination data asset.

FIG. 49 depicts a Data Transfer Analysis Module 4900 according to aparticular embodiment, which may be executed, for example, on any of theservers, devices, or computing devices described herein, or on anycombination thereof. When executing the exemplary Data Transfer AnalysisModule 4900, the system may begin, at Step 4910, by examining datatransfer logs generated by a logging system (e.g., a SEIM system, a SEMsystem, etc.) to acquire a particular data transfer log entry associatedwith a particular data transfer involving a particular data asset. Invarious embodiments, the system may, for example, automatically orproactively, analyze each new data transfer log entry as it isgenerated, received, or otherwise detected. Alternatively, the systemmay periodically analyze data transfer logs or may analyze data transferlogs in response to receiving an instruction to do so.

At Step 4920, the system may determine the network address of theparticular data asset involved in the particular data transfer, orotherwise determine the identity of the particular data asset, from thedata transfer log entry. In particular embodiments, the system may usean IP address of the data asset included in the data transfer log entryto perform a reverse look-up (e.g., reverse IP look-up) to acquireinformation that the system may then use to identify the data asset. Inother embodiments, the data transfer log entry may include identifyinginformation for the particular data asset. The may also, or instead,determine the identity, geographical location, and/or jurisdictionallocation of a particular data asset (e.g., a data asset involved in adata transfer) using data from the data transfer log as described above.

Further at Step 4920, the system may determine the network address ofthe other system (“second system”) involved in the data transferassociated with the particular data transfer log entry. In variousembodiments, the network address provided for a system in a datatransfer log entry may be an IP address, but other types of address maybe used also, or instead.

At Step 4930, the system may determine the identity of the particulardata asset in the data transfer log entry, for example, based on thenetwork address of the particular data asset contained in the log entry.Further at Step 4930, the system may determine a geographical and/orjurisdictional location for the second system indicated the datatransfer log entry based on the respective network address for thatparticular system. For example, the system may use a reverse networkaddress look-up (e.g., reverse IP address look-up) process to determinea location for the particular second system using its respective IPaddress. The may also, or instead, determine the identity, geographicallocation, and/or jurisdictional location of a particular data asset(e.g., a data asset involved in a data transfer) using data from thedata transfer log as described above.

At Step 4940, the system may determine one or more expected and/orauthorized geographical and/or jurisdictional data transfer locationsfor the particular data asset based on a data map associated with theparticular data asset. In various embodiments, such a data map mayinclude a listing of authorized and/or expected geographical and/orjurisdictional locations for the particular data asset in which systemsthat are permitted to participate in a data transfer with that dataasset may be located. Alternatively, or in addition, a data mapassociated with the particular data asset may include a listing ofauthorized and/or expected particular systems and/or environmentspermitted or expected to participate in data transfers with that dataasset. In yet another addition or alternative, a data map associatedwith the particular data asset may include a listing of unauthorizedand/or unexpected locations, systems, and/or environments that are notpermitted or expected to participate in data transfers with that dataasset.

At Step 4950, the system may compare the determined location of thesecond system in the data transfer log entry to the list of expectedand/or authorized geographical and/or jurisdictional locations (orcompare the determined system/environment to expected and/or authorizedsystems/environments) for the corresponding data asset. For example,having determined a jurisdictional and/or geographical location for asecond system involved in the data transfer with the particular dataasset using a reverse network address look-up or other means, the systemmay then compare that location to a listing of authorized locations inthe data map associated with the particular data asset. In anotherexample, having determined a jurisdictional and/or geographical locationfor a second system involved in the data transfer with the particulardata asset using a reverse network address look-up or other means, thesystem may then compare that location to a listing of prohibited orunexpected locations in the data map associated with the particular dataasset.

If, at Step 4960, the system determines that the location of the secondsystem involved in the particular data transfer is not an authorizedlocation, the system may generate, at Step 4970, a notification forpresentation to a user, for example, via a graphical user interface orother electronic communications. In this way, such users may beproactively notified of potentially unauthorized or illegitimatecommunications and data transfers between the system's data assets andother systems or environments. This notification may take any form. Forexample, in various embodiments, the system may generate a visualnotification presented on one or more computer monitors or displaydevices indicating that a prohibited or unexpected data transfer hasoccurred. In addition, or instead, the system may generate one or moreprinted reports indicating that a prohibited or unexpected data transferhas occurred. In addition, or instead, the system may generate one ormore audible indications that a prohibited or unexpected data transferhas occurred. The system may generate and/or provide any other form ofnotification of an unauthorized or unexpected data transfer, and anycombinations thereof.

Further at Step 4970, if the system determines that the location of thesecond system involved in the particular data transfer is not anauthorized location, the system may take one or more actions toproactively prevent any future transfers of data between the particulardata asset and the second system. For example, the system may implementa rule at a firewall or other security system that preventscommunications with the second system. In another example, the systemmay modify the data map associated with the particular data asset toinclude the second system and/or its geographical location in a listingof unauthorized systems and/or locations. In other examples, asdescribed in more detail above, the system may modify or revoke useraccess permissions, update records and/or metadata, perform networkconfiguration modification, and/or take any other one or more actions toprevent future such unauthorized data transfers and/or block thedetected unauthorized data transfer. Also, or instead, where the datatransfer is ongoing or has not yet begun, at Step 4970 the system maytake one or more actions to prevent the data transfer from commencing orcompleting. For example, the system may proactively block any trafficbetween the particular data asset and the second system using any ofvarious means. The system may include information regarding any actionstaken (preventing commencement of data transfer, stopping the datatransfer, adding a firewall rule, modifying a data map, etc.) in thenotification that may also be generated at Step 4970.

Regardless of whether the data transfer associated with the datatransfer log entry currently under analysis is associated with anunauthorized location, system, or environment, the system may return toStep 4910 to perform data transfer analysis on another data transfer logentry.

CONCLUSION

Although embodiments above are described in reference to various privacymanagement systems, it should be understood that various aspects of thesystem described above may be applicable to other privacy-relatedsystems, or to other types of systems, in general.

Also, although various embodiments are described as having the systemanalyze a data subject's interaction with email, text messages (e.g.,SMS or MMS messages), or other electronic correspondence to determinewhether the data subject actively does business with a particularentity, in other embodiments, the system may make this determinationwithout analyzing electronic correspondence (e.g., emails or texts) or adata subject's interaction with electronic correspondence. For example,in particular embodiments, the system may automatically determinewhether a data subject has requested that a particular entity not sendemails to the data subject and, at least partially in response to makingthis determination, automatically generate, populate, and/or submit adata subject access request to the particular entity. Such a datasubject access request may include, for example, any of the various datasubject access requests described above (e.g., a request to delete allof the data subject's personal data that is being processed by theparticular entity). The system may execute similar functionality inresponse to determining that the data subject has requested that theparticular entity not send text (e.g., SMS or MMS) messages to the datasubject, call the data subject, etc.

It should be understood that, in various embodiments, the system maygenerate, populate, and/or submit any of the data subject accessrequests referenced above electronically (e.g., via a suitable computingnetwork).

While this specification contains many specific embodiment details,these should not be construed as limitations on the scope of anyinvention or of what may be claimed, but rather as descriptions offeatures that may be specific to particular embodiments of particularinventions. Certain features that are described in this specification inthe context of separate embodiments may also be implemented incombination in a single embodiment. Conversely, various features thatare described in the context of a single embodiment may also beimplemented in multiple embodiments separately or in any suitablesub-combination. Moreover, although features may be described above asacting in certain combinations and even initially claimed as such, oneor more features from a claimed combination may in some cases be excisedfrom the combination, and the claimed combination may be directed to asub-combination or variation of a sub-combination.

Similarly, while operations are depicted in the drawings in a particularorder, this should not be understood as requiring that such operationsbe performed in the particular order shown or in sequential order, orthat all illustrated operations be performed, to achieve desirableresults. In certain circumstances, multitasking and parallel processingmay be advantageous. Moreover, the separation of various systemcomponents in the embodiments described above should not be understoodas requiring such separation in all embodiments, and it should beunderstood that the described program components and systems maygenerally be integrated together in a single software product orpackaged into multiple software products.

Many modifications and other embodiments of the invention will come tomind to one skilled in the art to which this invention pertains havingthe benefit of the teachings presented in the foregoing descriptions andthe associated drawings. Therefore, it is to be understood that theinvention is not to be limited to the specific embodiments disclosed andthat modifications and other embodiments are intended to be includedwithin the scope of the appended claims. Although specific terms areemployed herein, they are used in a generic and descriptive sense onlyand not for the purposes of limitation.

What is claimed:
 1. A method comprising: identifying, by computinghardware and based on a first data transfer log entry representing acompleted data transfer between a first system and a second system, anetwork address of the first system; identifying, by the computinghardware and based on the network address of the first system, a datamap associated with the first system; determining, by the computinghardware and based on the data map, that the second system is notauthorized to perform data transfers with the first system; storing, bythe computing hardware and in response to determining that the secondsystem not authorized to perform data transfers with the first system,metadata indicating that the second system not authorized to performdata transfers with the first system; detecting, by the computinghardware and based on a generation of a second data transfer log entry,a request to initiate a second data transfer between the first systemand the second system; determining, by the computing hardware and basedon analyzing the second data transfer log entry using the metadata, thatthe second system is not authorized to perform data transfers with thefirst system; transmitting, by the computing hardware, a firstinstruction to cancel the second data transfer; generating, by thecomputing hardware on a graphical user interface, a request to allow thesecond data transfer; receiving, by the computing hardware via thegraphical user interface, approval of the request to allow the seconddata transfer; and transmitting, by the computing hardware and inresponse to receiving the approval of the request to allow the seconddata transfer, a second instruction to initiate the second datatransfer.
 2. The method of claim 1, wherein generating the request toallow the second data transfer comprises: configuring, on the graphicaluser interface, a first control element configured to generate anindication of the approval of the request to allow the second datatransfer and a second control element configured to generate anindication of a denial of the request to allow the second data transfer;and transmitting a third instruction to an application executed on auser device causing the application to present the graphical userinterface on the user device.
 3. The method of claim 2, whereintransmitting the second instruction to initiate the second data transferin response to receiving the approval of the request to allow the seconddata transfer comprises transmitting the second instruction to initiatethe second data transfer in response to a selection of the first controlelement.
 4. The method of claim 1, wherein receiving the approval of therequest to allow the second data transfer comprises detecting a state ofan application executed on a user device, the state of the applicationcomprising an indication of the approval of the request to allow thesecond data transfer.
 5. The method of claim 1, wherein determining thatthe second system is not authorized to perform data transfers with thefirst system comprises: determining a network address of the secondsystem; and determining that the network address of the second system isassociated with an unauthorized system based on the data map.
 6. Themethod of claim 1, wherein transmitting the first instruction to cancelthe second data transfer comprises transmitting a fourth instruction tomodify a configuration of a network device to block the second datatransfer.
 7. The method of claim 6, wherein transmitting the secondinstruction to initiate the second data transfer comprises modifying theconfiguration of the network device to allow the second data transfer.8. A system comprising: a non-transitory computer-readable mediumstoring instructions; and processing hardware communicatively coupled tothe non-transitory computer-readable medium, wherein the processinghardware is configured to execute the instructions and thereby performoperations comprising: detecting a completed data transfer between afirst system and a second system based on a data transfer log entry;determining a geographical location associated with the second system;determining that the second system is not authorized to perform datatransfers with the first system based on a data map associated with thefirst system and the geographical location; in response to determiningthat the second system not authorized to perform data transfers with thefirst system, storing metadata indicating that the second system is notauthorized to perform data transfers with the first system; detecting astate of a first application, the state of the first applicationcomprising a first system parameter identifying the first system, asecond system parameter identifying the second system, and an indicationof a request to initiate a data transfer between the first system andthe second system; generating a graphical user interface based on thestate of the first application and the metadata by: configuring a firstcontrol element configured for generating an indication of an approvalof the request to initiate the data transfer, a second control elementconfigured for generating an indication of a denial of the request toinitiate the data transfer, and a first display element configured forpresenting an indication that the second system is not authorized toperform data transfers with the first system, and excluding a seconddisplay element configured for presenting an indication that the secondsystem is authorized to perform data transfers with the first system;transmitting an instruction to a second application executed on a userdevice causing the second application to present the graphical userinterface on the user device; and in response to a selection of thesecond control element, initiating a responsive action to block the datatransfer.
 9. The system of claim 8, wherein: the data transfer log entrycomprises domain information for the second system; and determining thegeographical location associated with the second system is based on thedomain information.
 10. The system of claim 8, wherein the indication ofthe request to initiate the data transfer comprises a second datatransfer log entry identifying the data transfer between the firstsystem and the second system.
 11. The system of claim 8, wherein theresponsive action comprises transmitting an instruction to the firstsystem to block data transfers with the second system.
 12. The system ofclaim 8, wherein the responsive action comprises accessing the firstsystem using an application programming interface to modify aconfiguration of the first system to block data transfers with thesecond system.
 13. The system of claim 8, wherein storing the metadatacomprises storing the metadata in an object record for the first systemthat is evaluated by the first system in response to detecting a datatransfer request.
 14. The system of claim 8, wherein the operationsfurther comprise, in response to the selection of the second controlelement, modifying access of a user associated with the data transfer.15. A non-transitory computer-readable medium storingcomputer-executable instructions that, when executed by processinghardware, configure the processing hardware to perform operationscomprising: detecting a completed data transfer between a first systemand a second system based on a data transfer log entry, the datatransfer log entry composing a network address of the second system;determining a geographical location associated with the second systembased on the network address of the second system; determining that thesecond system is not authorized to perform data transfers with the firstsystem based on a data map associated with the first system and thegeographical location; in response to determining that the second systemnot authorized to perform data transfers with the first system, storingmetadata indicating that the second system is not authorized to performdata transfers with the first system; detecting a state of anapplication, the state of the application comprising a first systemparameter identifying the first system, a second system parameteridentifying the second system, and an indication of an initiation of adata transfer between the first system and the second system; inresponse to detecting the state of the application, determining that thesecond system is not authorized to perform data transfers with the firstsystem based on the state of the application and the metadata; and inresponse to determining that the second system is not authorized toperform data transfers with the first system, initiating a responsiveaction to reverse the data transfer.
 16. The non-transitorycomputer-readable medium of claim 15, wherein determining thegeographical location comprises performing a reverse network addresslook-up using the network address of the second system to determine thegeographical location.
 17. The non-transitory computer-readable mediumof claim 15, wherein the indication of the initiation of the datatransfer comprises a second data transfer log entry identifying the datatransfer between the first system and the second system.
 18. Thenon-transitory computer-readable medium of claim 15, wherein theresponsive action comprises transmitting an instruction to the secondsystem to delete data received from the first system via the datatransfer.
 19. The non-transitory computer-readable medium of claim 15,wherein the responsive action comprises transmitting an instruction tothe second system to block data transfers with the first system.
 20. Thenon-transitory computer-readable medium of claim 15, wherein storing themetadata comprises storing the metadata in an object record for thesecond system that is evaluated by the second system in response todetecting a data transfer request.