Data Flow Mapping
Mapping how personal data moves through the system — from collection to storage, processing, sharing, and retention — to identify exposure points.
| Data Element | Classification | Source | Storage | Shared With | Retention | Lawful Basis |
|---|---|---|---|---|---|---|
| SSN / National ID | Restricted | Employee self-entry | Encrypted, masked in UI | Payroll vendor only | Term + 7 years | Legal obligation |
| Salary & Compensation | Confidential | HRIS sync | Encrypted at rest | Finance, Manager (limited) | Term + 5 years | Contract performance |
| Health Plan Selections | Confidential | Benefits enrollment flow | Encrypted, access-restricted | Benefits vendor | Term + 6 years | Contract performance |
| Bank Account / Direct Deposit | Restricted | Employee self-entry | Encrypted, tokenized | Payroll vendor only | Term + 3 years | Contract performance |
| Performance Ratings | Internal | Manager input | Standard encryption | HR, Manager chain | Term + 3 years | Legitimate interest |
| Contact Info (Address, Phone) | Internal | Employee self-entry | Standard encryption | HR, Emergency contacts | Term + 1 year | Contract performance |
| Time & Attendance Logs | Standard | System-generated | Standard encryption | Manager, Payroll | Term + 3 years | Contract performance |
| Device & Session Metadata | Standard | System-generated | Log storage (90 days) | IT Security only | 90 days rolling | Legitimate interest |
Risk Assessment Matrix
Plotting identified risks by likelihood and impact to prioritize mitigation efforts. Risks are mapped before recommended controls are applied.
X-axis: Impact | Y-axis: Likelihood
Risk Register
Detailed findings from the assessment, with each risk documented by category, inherent severity, and recommended mitigation.
Recommended Controls & Mitigations
Proposed controls mapped to each identified risk, categorized by control type.
Assessment Summary
Aggregate findings and go-live readiness determination.
| Risk | Inherent Rating | Control | Residual Rating | Go-Live Blocker? |
|---|---|---|---|---|
| R-01 Over-Provisioned Access | Critical | RBAC Redesign + Certification | Low | Yes — Must remediate |
| R-02 SSN API Exposure | Critical | Server-Side Masking + Tokenization | Low | Yes — Must remediate |
| R-03 No Vendor DPA | High | Execute DPA | Low | Yes — Must remediate |
| R-04 EU Data Transfer | High | Data Localization or SCCs | Low | Yes — Must remediate |
| R-05 No Mobile Timeout | Medium | Session Timeout + Biometric | Low | Recommended before launch |
| R-06 Retention Not Enforced | Medium | Automated Lifecycle Mgmt | Low | No — 90-day remediation |
| R-07 Privacy Notice Gaps | Low | Notice Update | Low | Recommended before launch |
| R-08 Audit Logging Gaps | Low | Field-Level Logging | Low | No — 90-day remediation |
Recommendation
Conditional Go-Live Approval. Four go-live blocking findings (R-01 through R-04) must be remediated before production launch. Two additional controls (R-05, R-07) are strongly recommended for launch readiness. Remaining items (R-06, R-08) approved for 90-day post-launch remediation with progress reporting to the CISO's office at 30-day intervals. Upon completion of all critical and high remediations, the portal will meet organizational privacy standards and regulatory requirements across US, EU, and LATAM operating regions.