Document current baseline of your privacy program
- Education and awareness 
- Monitoring and responding to the regulatory environment 
- Internal policy compliance 
- Data, systems and process assessment 
- Risk assessment (PIAs, etc.) 
- Incident response 
- Remediation 
- Determine desired state and perform gap analysis against an accepted standard or law (including GDPR) 
- Program assurance, including audits 
Processors and third-party vendor assessment
- Evaluate processors and third-party vendors, insourcing and outsourcing privacy risks, including rules of international data transfer 
- Understand and leverage the different types of relationships 
- Risk assessment 
- Contractual requirements 
- Ongoing monitoring and auditing 
Physical assessments
Mergers, acquisitions and divestitures
- Due diligence 
- Risk assessment 
Privacy Impact Assessments (PIAs) and Data Protection Impact Assessments (DPIAs)
- Privacy Threshold Analysis (PTAs) on systems, applications and processes 
- Privacy Impact Assessments (PIAs) 
Privacy Operational Life Cycle: Protect
Information security practices
- Access controls for physical and virtual systems 
- Technical security controls 
- Implement appropriate administrative safeguards 
Privacy by Design
Integrate privacy requirements and representation into functional areas across the organization
- Information security 
- IT operations and development 
- Business continuity and disaster recovery planning 
- Mergers, acquisitions and divestitures 
- Human resources 
- Compliance and ethics 
- Audit 
- Marketing/business development 
- Public relations 
- Procurement/sourcing 
- Legal and contracts 
- Security/emergency services 
- Finance 
- Others 
Other organizational measures
- Quantify the costs of technical controls 
- Manage data retention with respect to the organization’s policies 
- Define the methods for physical and electronic data destruction 
- Define roles and responsibilities for managing the sharing and disclosure of data for internal and external use