Session 2 Trustworthy, Compliant, Supported (14).png

Data privacy is not a compliance checkbox. It is a design constraint for responsible data products.

Regulation keeps expanding (GDPR, AI-related acts, sector rules). User expectations are rising. That means data teams need repeatable ways to prevent exposure, prove control, and honor individual rights.

Identify and classify personally identifiable information (PII)

Start by identifying and classifying PII: names, addresses, contact details, customer and employee IDs, and any fields that can be used to re-identify a person.

Some data catalogs and platforms (for example, Collibra) can help detect and tag PII fields automatically or semi-automatically. Security vendors can also detect sensitive data appearing in unapproved locations.

Automation helps, but it is not perfect. Manual validation is still required. Treat PII classification as a non-negotiable baseline capability.

Grant access on a need-to-know basis

Session 2 Trustworthy, Compliant, Supported (15).png

Master data (customer, product, supplier, employee) is typically the most sensitive and the most widely shared. That makes it one of the most common sources of accidental exposure.

Practical rules that work:

Once PII is identified, enforce access controls consistently:

Support individual data rights consistently

Privacy also means honoring rights such as deletion, consent withdrawal, and data access.

This is difficult in fragmented landscapes unless you operationalize it: