By Brandon Chen
Senior Product Marketing Manager
August 22, 2024â˘3 min read
Whether youâre generating a ROPA report, conducting a data protection impact assessment (DPIA), or fulfilling data subject access requests (DSR), most, if not all, privacy workflows depend on having a clear and accurate understanding of where personal data lives across your data ecosystem.
With data visibilityâs critical importance in mind, many privacy vendors offer data mapping features or tools. But not all data mapping solutions are created equal. Legacy solutions rely on âpoint-in-timeâ scans that fail to keep up with the regular cadence of new data systems and tools. On the other hand, next-generation data mapping tools, like Transcend Silo Discovery, Structured Discovery, and Unstructured Discovery, use a combination of metadata and data sampling to automatically discover and classify data at scale.
Traditional privacy solutions focused on a narrow scope of business systems will scan all the data for a given column to understand whether there are any personal data points.
For example, you might be easily able to determine that a field named âsocial_security_numberâ is personal data. In other cases, where thereâs unique language or undecipherable shorthand, having a column or field name isnât enough to determine whether or not personal data exists.
The approach of using deep scanning to understand whatâs in a given column or field results in two main downsides:
Transcend automates the process of finding sensitive and personal data, saving teams time and money with our approach. In fact, Transcend customers were able to use Structured Discovery to find over 8.01 million datapoints across their business systems in 2023, contributing to over 1.33 million hours saved from automating privacy operations workflows. Thatâs a lot of data to classify!
Transcend Structured Discovery reduces the load on your systems and accelerates the automated discovery and classification of personal and sensitive data across your internal systems and 3rd party SaaS tools in two key ways.
Users can further optimize compute efficiency by configuring when either option runs. We recommend following in the footsteps of most of our customersâstarting with Schema Discovery and then enabling Datapoint Classification if the situation, such as increased volume of unstructured data, requires it.
One Transcend user working at a delivery app with over 20M users, shares his experience:
â30 days after purchasing Transcend we had data mapping + classification running on our 1500+ systems (homegrown and SaaS tools), had a full ROPA ready to go, and had automated our DSR flows. That's insane. Now we're implementing them for Consent and Do Not Sell management and are fully on board with Transcend for the long run.â
By using a combination of metadata from Schema Discovery and data sampling from Datapoint Classification, youâre able to dramatically reduce time spent finding personal data across your business systems and save money through reduced resource consumption on those systems. With all of these time savings, youâre able to deliver on other privacy projects to improve compliance, reduce risk, and support revenue-driving initiatives across other business units.
If youâre ready to learn how Transcend's next-gen privacy platform helps reduce risk, improve operational efficiency, and expand compliant data, reach out to our team! Weâre looking forward to meeting you.
By Brandon Chen
Senior Product Marketing Manager