Chapter 1. How data flows into and within your company
Chapter 1. How priacy affects your business at a macro leel
Chapter 1. How the role of engineers has changed, and how that has affected priacy
Chapter 1. Priacy A mental model
Chapter 1. Priacy engineering Why it s needed, how to scale it
Chapter 1. Priacy tech and tooling Your options and your choices
Chapter 1. Summary
Chapter 1. What this book will not do
Chapter 1. Why priacy matters
Chapter 2. After building the tools comes the hard part Building a program
Chapter 2. As you build a program, build a priacy-first culture
Chapter 2. Data, your business growth strategy, and priacy
Chapter 2. Examples When priacy is iolated
Chapter 2. Priacy and the regulatory landscape
Chapter 2. Priacy and the user
Chapter 2. Summary
Chapter 2. This could be your company
Chapter 2. Understanding data and priacy
Chapter 3. Data classification
Chapter 3. Data classification An example
Chapter 3. How to classify data with a focus on priacy laws
Chapter 3. How you can implement data classification to improe priacy
Chapter 3. Summary
Chapter 3. The data classification process
Chapter 3. Why data classification is necessary
Chapter 4. A data inentory is not a binary process
Chapter 4. Creating a baseline
Chapter 4. Data inentory
Chapter 4. Machine-readable tags
Chapter 4. Summary
Chapter 4. The technical architecture
Chapter 4. Understanding the data
Chapter 4. What does a successful data inentory process look like
Chapter 4. When should you start the data inentory process
Chapter 5. Data sharing
Chapter 5. How to share data safely Security as an ally of priacy
Chapter 5. Measuring priacy impact
Chapter 5. Obfuscation techniques for priacy-safe data sharing
Chapter 5. Priacy harms This is not a drill
Chapter 5. Sharing internal IDs with third parties
Chapter 5. Summary
Chapter 6. Implementing the legal priacy reiew process
Chapter 6. Integrating technical priacy reiews into the innoation pipeline
Chapter 6. Making the case for a technical priacy reiew
Chapter 6. Sample technical priacy reiews
Chapter 6. Scaling the technical priacy reiew process
Chapter 6. Summary
Chapter 6. The technical priacy reiew
Chapter 7. Data deletion
Chapter 7. Deleting account-leel data Automation and scaling for distributed serices
Chapter 7. Deleting account-leel data A starting point
Chapter 7. How the data collection architecture works
Chapter 7. Sensitie data deletion
Chapter 7. Summary
Chapter 7. What does a modern data collection architecture look like
Chapter 7. Who should own data deletion
Chapter 8. DSAR automation, data structures, and data flows
Chapter 8. Exporting user data Data Subject Access Requests
Chapter 8. Internal-facing screens and dashboards
Chapter 8. Setting up the DSAR process
Chapter 8. Summary
Chapter 9. A consent management platform
Chapter 9. A data schema model for consent management
Chapter 9. Building a consent management platform
Chapter 9. Consent code Objects
Chapter 9. Integrating consent management into product workflow
Chapter 9. Other useful capabilities in a CMP
Chapter 9. Summary
Chapter 10. Closing security ulnerabilities
Chapter 10. Protecting priacy by closing access-control gaps
Chapter 10. Protecting priacy by managing perimeter access
Chapter 10. Summary
Chapter 11. Priacy and the regulatory climate
Chapter 11. Scaling, hiring, and considering regulations
Chapter 11. Summary
Chapter 11. The priacy engineering domain and skills
Part 1. Priacy, data, and your business
Part 2. A proactie priacy program Data goernance
Part 3. Building tools and processes
Part 4. Security, scaling, and staffing