SlideShare a Scribd company logo
Finding Data at Risk
for CCPA Compliance
Harald Smith, Director Product Marketing
Jeff Knotts, Principal Sales Engineer
Housekeeping
Webcast Audio
• Today’s webcast audio is streamed through your computer speakers.
• If you need technical assistance with the web interface or audio,
please reach out to us using the chat window.
Questions Welcome
• Submit your questions at any time during the presentation
using the chat window.
• We will answer them during our Q&A session following
the presentation.
Recording and slides
• This webcast is being recorded. You will receive an
email following the webcast with a link to download
both the recording and the slides.
2
Speakers
3
Harald Smith
• Director of Product Marketing, Syncsort
• 20+ years in Information Management: focus
on data quality, integration, and governance
• Co-author of Patterns of Information
Management
• Author of two Redbooks on Information
Governance and Data Integration
• Blog author: currently through Dataversity;
previously “Data Democratized”
Jeff Knotts
• Principal Sales Engineer, Syncsort
• 25+ years in Data Quality and Data
Governance
Data Governance
is top of mind
Volume and complexity of data
is growing
Broader and deeper compliance
& regulation
May 2018 Jan 2020
4
Data Governance is
enterprise-wide
We are all responsible for enterprise data
and ensuring compliance to regulations
More than just training!
We must:
• Know the data we are
working with
• Know where affected
data resides
• Actively consider data
use, and whether it is
valid for that purpose
5
6
Key Requirements of CCPA
What types of personal & sensitive
data you hold
What you are doing with it and how
you are using it
Whether you have
permission to sell it
What specific data you have
stored and what it looks like
Whether the data has suffered a
breach
How you are keeping it SAFE
CCPA is essentially about knowing:
7
What do you know about me?
Right to access data plus receive a copy of data
Customers are now recognising their new power
Did you get my consent?
Right to restrict data shared on minors
Erase all my data for good!
Right to be forgotten
Has my data been breached?
Right to be informed within 72 hours
How do you use my data?
Right to limit processing of personal data
and whether it can be sold
Demand human interaction
Right to not participate in fully-automated
decisions based on customer profile
8
What is personal data under CCPA?
9
Identifiers Real name, alias, postal address, unique personal identifier, online identifier IP address, email
address, account name, Social Security number, driver’s license number, passport number,
signature, bank account, credit/debit card numbers, medical or health insurance information,
physical characteristics or description, or other similar identifiers
Protected Categories Race, religion, gender, national origin, sexual orientation, etc.
Commercial information Records of personal property, products or services purchased, obtained or considered, or other
purchasing or consuming histories or tendencies
Biometrics, Location, etc. Biometric information, geolocation data, audio, electronic, visual, thermal, olfactory or similar
information
Internet Activity Including, but not limited to, browsing history, search history and information regarding a consumer’s
interaction with a website, application or advertisement
Background information Professional or employment-related information, education information
Inferences Drawn from any of the information identified in this subdivision to create a profile about a consumer
reflecting the consumer’s preferences, characteristics, psychological trends, preferences, predispositions,
behavior, attitudes, intelligence, abilities and aptitudes
Where is all that data? What connects with what?
Multiple touchpoints/databases
10
MDM
ERP
CRM
Website
ODS
EDW Data Lake
Marketing
Data Mart
Data Science
sandbox
Reports &
spreadsheets
?
?
BI reports
?
CCPA – where DQ helps deliver compliance
3. Data Integration
Integration with Data Governance
tools (e.g. Collibra). Triggers issue
management and controls so that
CCPA rules and reports (and overall
compliance) can be easily
understood and monitored by data
stewards.
2. Data Quality Processing
Real-time & batch data cleansing & matching
across multiple data sources generating Single
Customer View (SCV); enabling businesses to
locate records by a single record quickly
SCV also means customer permissions are
respected, records can be amended or
suppressed / deleted, plus businesses can
react to consumer requests quickly
Full traceability of original data source
Documented DQ routines for transparency &
auditing (e.g. user & process control, security)
1. Data Profiling
Confirms actual content vs. metadata
Highlights patterns, types of data, mis-
fielded data, outlying data not
conforming to policy, formatting,
structure, syntax, etc
Exposes relevant fields with buried,
unexpected personal & sensitive data
Applies business rules to data to
identify and monitor for data issues
11
Caution
Cleaning in progress
!
Finding Data at Risk
Demo:
Trillium Discovery
Watch for 3 Scenarios
1. Initiating data profiling to
discover content
2. Reviewing profiled results
looking for patterns, anomalies,
and other content
3. Discovering related content
through join analysis
Notice key features
• Wizard-driven data source
selection
• Visual and text-based review
• Exploration and drilldown to
any content
• Annotation and export of
findings
Culture of Data Literacy
Meeting CCPA compliance requires cultural support
• Empowered to ask questions about the data
• Trained to understand the business context, compliance requirements,
and appropriate use of data
• Trained to understand and evaluate data
• Traditional data, Big data, 3rd party data, …
• Empowered to identify data at risk
Program of Data Governance
• Provide the processes, practices, and tools necessary for success
• Identify, evaluate, and document
• Continous iteration and development
• Communicate what you’ve discovered! (and where others can find!)
Center of Excellence/Knowledge Base
• Where do you go to find answers?
• Who can help show you how?
Communicate!
14
Integrate findings through Collibra
Collibra Data Governance Center
• Enables non-technical users to define
business policies and data quality rules
in plain language
• Makes data quality results available
to all users
Trillium Discovery
• Imports DGC business rules so technical user
can convert to executable data quality rules
• Constantly runs data quality metrics on near
real-time basis, passes results back to Collibra
dashboards
Rulebooks to Rules
Quality test Results
Bi-directional connectivity Constant sync
Metric falling below
thresholds can
trigger workflow in
Collibra Issue
Management
15
Summary
Addressing CCPA
• CCPA mandates tight control
of customer data!
• Without data governance,
at-risk data will propagate,
resulting in misunderstanding
and misrespecting
the customers’ wishes and
demands.
• Over time, this will inevitably
escalate to non-compliance
of CCPA and fines!
Finding Data at Risk
1. Understand that everyone
in your organization has
responsibility!
2. Understand the requirements
of CCPA – what data is at risk
3. Profile and review data in
use; ask questions!
4. Communicate findings to
ensure data remains in
compliance with CCPA!
Data Quality helps
ensure CCPA
compliance!
16
Further Resources
• Syncsort Trillium for Data Governance
• Introducing Trillium DQ for Big Data: Powerful Profiling
and Data Quality for the Data Lake
• How to Strengthen Enterprise Data Governance
with Data Quality
• Unlocking Greater Insights with Integrated
Data Quality for Collibra
harald.smith@syncsort.com
jeff.knotts@syncsort.com
17
Questions
Finding Data at Risk for CCPA Compliance

More Related Content

PDF
BigID, OneTrust, IAPP Webinar: Bridging the Privacy Office with IT
PPTX
Big data and social media, BAE Systems Detica
PDF
A Comparison of Analytics and Tag Management Suites by Piwik PRO and Google
PDF
BigID Data Sheet: Smart Data Labeling and Tagging
PDF
BigID GDPR Privacy Automation Data Sheet
PPTX
Collibra Data Citizen '19 - Bridging Data Privacy with Data Governance
PPTX
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
PPTX
BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data Discovery to...
BigID, OneTrust, IAPP Webinar: Bridging the Privacy Office with IT
Big data and social media, BAE Systems Detica
A Comparison of Analytics and Tag Management Suites by Piwik PRO and Google
BigID Data Sheet: Smart Data Labeling and Tagging
BigID GDPR Privacy Automation Data Sheet
Collibra Data Citizen '19 - Bridging Data Privacy with Data Governance
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data Discovery to...

What's hot (16)

PDF
Delivering Analytics at Scale with a Governed Data Lake
PPTX
CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...
PDF
Privacera Databricks CCPA Webinar Feb 2020
PDF
Enacting the Data Subjects Access Rights for GDPR with Data Services and Data...
PDF
(SACON) Shivangi Nadkarni & Sandeep Rao - An introduction to Data Privacy
PPTX
India'a Proposed Privacy & Personal Data Protection Law
PDF
BigID Data Sheet: LGPD Compliance Automated
PDF
BigID Data Inventory & Data Mapping Data Sheet
PDF
BigID Virtual MDM Data Sheet
PDF
Beginning your General Data Protection Regulation (GDPR) Journey
PDF
BigID Enterprise Privacy Management Data Sheet
PDF
BigID DataSheet: Data Access Intelligence
PDF
BigID's Smart Data Labeling and Tagging
PDF
BigID Data sheet: Consent Governance & Orchestration
PPTX
BigID GDPR Compliance Automation Webinar Slides
PDF
BigID Data Sheet: GDPR Compliance
Delivering Analytics at Scale with a Governed Data Lake
CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...
Privacera Databricks CCPA Webinar Feb 2020
Enacting the Data Subjects Access Rights for GDPR with Data Services and Data...
(SACON) Shivangi Nadkarni & Sandeep Rao - An introduction to Data Privacy
India'a Proposed Privacy & Personal Data Protection Law
BigID Data Sheet: LGPD Compliance Automated
BigID Data Inventory & Data Mapping Data Sheet
BigID Virtual MDM Data Sheet
Beginning your General Data Protection Regulation (GDPR) Journey
BigID Enterprise Privacy Management Data Sheet
BigID DataSheet: Data Access Intelligence
BigID's Smart Data Labeling and Tagging
BigID Data sheet: Consent Governance & Orchestration
BigID GDPR Compliance Automation Webinar Slides
BigID Data Sheet: GDPR Compliance
Ad

Similar to Finding Data at Risk for CCPA Compliance (20)

PDF
Your AI and ML Projects Are Failing – Key Steps to Get Them Back on Track
PPTX
Information Governance: Reducing Costs and Increasing Customer Satisfaction
PDF
Master Your Data. Master Your Business
PDF
Building Rules for Data Governance
PPTX
Fuel your Data-Driven Ambitions with Data Governance
PDF
Webinar #2 - Transforming Challenges into Opportunities for Credit Unions
PPTX
Internet of things, Big Data and Analytics 101
PDF
How to Strengthen Enterprise Data Governance with Data Quality
PPTX
Strata NYC 2015 - Transamerica and INFA v1
PDF
How to Strengthen Enterprise Data Governance with Data Quality
PPTX
Is Your Agency Data Challenged?
PDF
Oceans of big data: Take the plunge or wade in slowly?
PPTX
Accelerating Personalization to Cut Through Digital Noise
PPTX
The challenges of big data, how data capable is your business? DQM Group
PDF
Becoming a Customer Centric Bank
PDF
TekMindz Master Data Management Capabilities
PPTX
ANIn Pune July 2024 | Bootstrapping Data Mesh for a Complex Enterprise by Bal...
PPTX
Mastering B2B Data Cleansing: 10 Essential Strategies for 2025
PDF
Salesforce1 data gov lunch anaheim deck
PDF
Enterprise Data Management Enables Unique Device Identification (UDI)
Your AI and ML Projects Are Failing – Key Steps to Get Them Back on Track
Information Governance: Reducing Costs and Increasing Customer Satisfaction
Master Your Data. Master Your Business
Building Rules for Data Governance
Fuel your Data-Driven Ambitions with Data Governance
Webinar #2 - Transforming Challenges into Opportunities for Credit Unions
Internet of things, Big Data and Analytics 101
How to Strengthen Enterprise Data Governance with Data Quality
Strata NYC 2015 - Transamerica and INFA v1
How to Strengthen Enterprise Data Governance with Data Quality
Is Your Agency Data Challenged?
Oceans of big data: Take the plunge or wade in slowly?
Accelerating Personalization to Cut Through Digital Noise
The challenges of big data, how data capable is your business? DQM Group
Becoming a Customer Centric Bank
TekMindz Master Data Management Capabilities
ANIn Pune July 2024 | Bootstrapping Data Mesh for a Complex Enterprise by Bal...
Mastering B2B Data Cleansing: 10 Essential Strategies for 2025
Salesforce1 data gov lunch anaheim deck
Enterprise Data Management Enables Unique Device Identification (UDI)
Ad

More from Precisely (20)

PDF
The Future of Automation: AI, APIs, and Cloud Modernization.pdf
PDF
Unlock new opportunities with location data.pdf
PDF
Reimagining Insurance: Connected Data for Confident Decisions.pdf
PDF
Introducing Syncsort™ Storage Management.pdf
PDF
Enable Enterprise-Ready Security on IBM i Systems.pdf
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
PDF
Solving the CIO’s Dilemma: Speed, Scale, and Smarter SAP Modernization.pdf
PDF
Solving the Data Disconnect: Why Success Hinges on Pre-Linked Data.pdf
PDF
Cooking Up Clean Addresses - 3 Ways to Whip Messy Data into Shape.pdf
PDF
Building Confidence in AI & Analytics with High-Integrity Location Data.pdf
PDF
SAP Modernization Strategies for a Successful S/4HANA Journey.pdf
PDF
Precisely Demo Showcase: Powering ServiceNow Discovery with Precisely Ironstr...
PDF
The 2025 Guide on What's Next for Automation.pdf
PDF
Outdated Tech, Invisible Expenses – How Data Silos Undermine Operational Effi...
PDF
Modernización de SAP: Maximizando el Valor de su Migración a SAP S/4HANA.pdf
PDF
Outdated Tech, Invisible Expenses – The Hidden Cost of Disconnected Data Syst...
PDF
Migration vers SAP S/4HANA: Un levier stratégique pour votre transformation d...
PDF
Outdated Tech, Invisible Expenses: The Hidden Cost of Poor Data Integration o...
PDF
The Changing Compliance Landscape in 2025.pdf
The Future of Automation: AI, APIs, and Cloud Modernization.pdf
Unlock new opportunities with location data.pdf
Reimagining Insurance: Connected Data for Confident Decisions.pdf
Introducing Syncsort™ Storage Management.pdf
Enable Enterprise-Ready Security on IBM i Systems.pdf
A Day in the Life of Location Data - Turning Where into How.pdf
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Solving the CIO’s Dilemma: Speed, Scale, and Smarter SAP Modernization.pdf
Solving the Data Disconnect: Why Success Hinges on Pre-Linked Data.pdf
Cooking Up Clean Addresses - 3 Ways to Whip Messy Data into Shape.pdf
Building Confidence in AI & Analytics with High-Integrity Location Data.pdf
SAP Modernization Strategies for a Successful S/4HANA Journey.pdf
Precisely Demo Showcase: Powering ServiceNow Discovery with Precisely Ironstr...
The 2025 Guide on What's Next for Automation.pdf
Outdated Tech, Invisible Expenses – How Data Silos Undermine Operational Effi...
Modernización de SAP: Maximizando el Valor de su Migración a SAP S/4HANA.pdf
Outdated Tech, Invisible Expenses – The Hidden Cost of Disconnected Data Syst...
Migration vers SAP S/4HANA: Un levier stratégique pour votre transformation d...
Outdated Tech, Invisible Expenses: The Hidden Cost of Poor Data Integration o...
The Changing Compliance Landscape in 2025.pdf

Recently uploaded (20)

PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PPT
Teaching material agriculture food technology
PDF
Electronic commerce courselecture one. Pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Encapsulation theory and applications.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
20250228 LYD VKU AI Blended-Learning.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Network Security Unit 5.pdf for BCA BBA.
Teaching material agriculture food technology
Electronic commerce courselecture one. Pdf
Unlocking AI with Model Context Protocol (MCP)
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Encapsulation theory and applications.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Per capita expenditure prediction using model stacking based on satellite ima...
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Mobile App Security Testing_ A Comprehensive Guide.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
MYSQL Presentation for SQL database connectivity
Advanced methodologies resolving dimensionality complications for autism neur...
NewMind AI Monthly Chronicles - July 2025
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy

Finding Data at Risk for CCPA Compliance

  • 1. Finding Data at Risk for CCPA Compliance Harald Smith, Director Product Marketing Jeff Knotts, Principal Sales Engineer
  • 2. Housekeeping Webcast Audio • Today’s webcast audio is streamed through your computer speakers. • If you need technical assistance with the web interface or audio, please reach out to us using the chat window. Questions Welcome • Submit your questions at any time during the presentation using the chat window. • We will answer them during our Q&A session following the presentation. Recording and slides • This webcast is being recorded. You will receive an email following the webcast with a link to download both the recording and the slides. 2
  • 3. Speakers 3 Harald Smith • Director of Product Marketing, Syncsort • 20+ years in Information Management: focus on data quality, integration, and governance • Co-author of Patterns of Information Management • Author of two Redbooks on Information Governance and Data Integration • Blog author: currently through Dataversity; previously “Data Democratized” Jeff Knotts • Principal Sales Engineer, Syncsort • 25+ years in Data Quality and Data Governance
  • 4. Data Governance is top of mind Volume and complexity of data is growing Broader and deeper compliance & regulation May 2018 Jan 2020 4
  • 5. Data Governance is enterprise-wide We are all responsible for enterprise data and ensuring compliance to regulations More than just training! We must: • Know the data we are working with • Know where affected data resides • Actively consider data use, and whether it is valid for that purpose 5
  • 7. What types of personal & sensitive data you hold What you are doing with it and how you are using it Whether you have permission to sell it What specific data you have stored and what it looks like Whether the data has suffered a breach How you are keeping it SAFE CCPA is essentially about knowing: 7
  • 8. What do you know about me? Right to access data plus receive a copy of data Customers are now recognising their new power Did you get my consent? Right to restrict data shared on minors Erase all my data for good! Right to be forgotten Has my data been breached? Right to be informed within 72 hours How do you use my data? Right to limit processing of personal data and whether it can be sold Demand human interaction Right to not participate in fully-automated decisions based on customer profile 8
  • 9. What is personal data under CCPA? 9 Identifiers Real name, alias, postal address, unique personal identifier, online identifier IP address, email address, account name, Social Security number, driver’s license number, passport number, signature, bank account, credit/debit card numbers, medical or health insurance information, physical characteristics or description, or other similar identifiers Protected Categories Race, religion, gender, national origin, sexual orientation, etc. Commercial information Records of personal property, products or services purchased, obtained or considered, or other purchasing or consuming histories or tendencies Biometrics, Location, etc. Biometric information, geolocation data, audio, electronic, visual, thermal, olfactory or similar information Internet Activity Including, but not limited to, browsing history, search history and information regarding a consumer’s interaction with a website, application or advertisement Background information Professional or employment-related information, education information Inferences Drawn from any of the information identified in this subdivision to create a profile about a consumer reflecting the consumer’s preferences, characteristics, psychological trends, preferences, predispositions, behavior, attitudes, intelligence, abilities and aptitudes
  • 10. Where is all that data? What connects with what? Multiple touchpoints/databases 10 MDM ERP CRM Website ODS EDW Data Lake Marketing Data Mart Data Science sandbox Reports & spreadsheets ? ? BI reports ?
  • 11. CCPA – where DQ helps deliver compliance 3. Data Integration Integration with Data Governance tools (e.g. Collibra). Triggers issue management and controls so that CCPA rules and reports (and overall compliance) can be easily understood and monitored by data stewards. 2. Data Quality Processing Real-time & batch data cleansing & matching across multiple data sources generating Single Customer View (SCV); enabling businesses to locate records by a single record quickly SCV also means customer permissions are respected, records can be amended or suppressed / deleted, plus businesses can react to consumer requests quickly Full traceability of original data source Documented DQ routines for transparency & auditing (e.g. user & process control, security) 1. Data Profiling Confirms actual content vs. metadata Highlights patterns, types of data, mis- fielded data, outlying data not conforming to policy, formatting, structure, syntax, etc Exposes relevant fields with buried, unexpected personal & sensitive data Applies business rules to data to identify and monitor for data issues 11 Caution Cleaning in progress !
  • 13. Demo: Trillium Discovery Watch for 3 Scenarios 1. Initiating data profiling to discover content 2. Reviewing profiled results looking for patterns, anomalies, and other content 3. Discovering related content through join analysis Notice key features • Wizard-driven data source selection • Visual and text-based review • Exploration and drilldown to any content • Annotation and export of findings
  • 14. Culture of Data Literacy Meeting CCPA compliance requires cultural support • Empowered to ask questions about the data • Trained to understand the business context, compliance requirements, and appropriate use of data • Trained to understand and evaluate data • Traditional data, Big data, 3rd party data, … • Empowered to identify data at risk Program of Data Governance • Provide the processes, practices, and tools necessary for success • Identify, evaluate, and document • Continous iteration and development • Communicate what you’ve discovered! (and where others can find!) Center of Excellence/Knowledge Base • Where do you go to find answers? • Who can help show you how? Communicate! 14
  • 15. Integrate findings through Collibra Collibra Data Governance Center • Enables non-technical users to define business policies and data quality rules in plain language • Makes data quality results available to all users Trillium Discovery • Imports DGC business rules so technical user can convert to executable data quality rules • Constantly runs data quality metrics on near real-time basis, passes results back to Collibra dashboards Rulebooks to Rules Quality test Results Bi-directional connectivity Constant sync Metric falling below thresholds can trigger workflow in Collibra Issue Management 15
  • 16. Summary Addressing CCPA • CCPA mandates tight control of customer data! • Without data governance, at-risk data will propagate, resulting in misunderstanding and misrespecting the customers’ wishes and demands. • Over time, this will inevitably escalate to non-compliance of CCPA and fines! Finding Data at Risk 1. Understand that everyone in your organization has responsibility! 2. Understand the requirements of CCPA – what data is at risk 3. Profile and review data in use; ask questions! 4. Communicate findings to ensure data remains in compliance with CCPA! Data Quality helps ensure CCPA compliance! 16
  • 17. Further Resources • Syncsort Trillium for Data Governance • Introducing Trillium DQ for Big Data: Powerful Profiling and Data Quality for the Data Lake • How to Strengthen Enterprise Data Governance with Data Quality • Unlocking Greater Insights with Integrated Data Quality for Collibra harald.smith@syncsort.com jeff.knotts@syncsort.com 17