Would you forward this file?
Attention ActivityWhy this matters: Every hire is a data guardian. One casual mistake can trigger a breach, fines, and loss of trust.
Source Manual Snapshots
These thumbnails come from the official Enterprise Data Privacy, Information Security, and Governance SOP we are simplifying for you.
What you'll do in this lesson
OverviewLesson roadmap
- See how laws like GDPR and CCPA show up in our daily work.
- Classify data (Public, Internal, Confidential, Restricted) using quick scenarios.
- Apply do's and don'ts for access, sharing, encryption, and retention.
- Walk through an incident-report mini-drill.
- Complete a scored assessment and unlock your certificate.
What's in it for you
By the end of this lesson, you'll be able to:
- Spot risky requests before they become incidents.
- Use the right channels for sharing and storing sensitive data.
- Know exactly how and when to escalate suspected breaches.
Regulatory frameworks, startup edition
ConceptStrictest rule wins
Our SOP chooses the strictest applicable rule across GDPR, UK GDPR, CCPA/CPRA, HIPAA (if health data), PIPEDA, LGPD, ISO/IEC 27001 & 27701, SOC 2, and NIST controls.
- If two laws conflict, we default to the more protective option for the data subject.
- In practice, this means we design for privacy by default, then relax only when documented and approved.
Visual: Compliance stack
Think of our startup as sitting on a stack of guardrails:
- Top: Users' expectations and contracts.
- Middle: Laws and frameworks (GDPR, CCPA, ISO 27701, NIST).
- Base: Our internal SOP (this manual).
Which approach matches our SOP?
Classifying startup data in 4 tiers
ConceptThe 4 tiers
- Public: Marketing website copy, published blog posts.
- Internal: Non-public docs that would be awkward but not catastrophic if leaked (e.g., team handbooks).
- Confidential: Customer lists, product metrics, non-public financials, most personal data.
- Restricted: Credentials, encryption keys, sensitive personal data, incident reports.
Interactive: classify these
Click a chip to guess its classification. This is for practice only.
Which is most likely “Restricted”?
Lawful basis and consent in everyday work
ConceptWhy are we allowed to process data?
Every processing activity must map to a lawful basis (e.g., consent, contract, legal obligation, legitimate interest).
- Consent: users tick a box to receive marketing emails.
- Contract: we process data to deliver our product.
- Legal obligation: we store invoices for tax authorities.
Using data beyond its original purpose requires a compatibility check and often fresh consent.
Mini-activity: match the basis
Imagine you want to reuse onboarding survey data for a case study. Ask yourself:
- Did we say we'd use it for this purpose?
- Would users reasonably expect this use?
- Do we need new consent or DPO approval?
Least privilege, MFA, and monitoring
PracticeYour responsibilities
- Use your own account; never share credentials.
- Enable and keep multi-factor authentication (MFA) on.
- Request access only to the data you need for your role.
- Log out or lock your device when stepping away.
Visual: RBAC in a startup
Think of access like concentric circles:
- Everyone: Public + some Internal.
- Teams: Internal + relevant Confidential.
- Small group: Restricted (e.g., security, compliance).
Spot the least-privilege violation
Encryption, retention, and destruction
ConceptHow we protect data
- Encryption: AES‑256 at rest, TLS 1.2+ in transit.
- Key management: Hardware security modules or managed key vaults with rotation and dual control.
- Retention: We keep data only as long as required by law, contract, or documented business need.
When retention expires, data is destroyed securely (e.g., cryptographic erasure, certified physical destruction).
Visual: Data lifecycle
Collect → Store (encrypted) → Use (under lawful basis) → Archive → Delete securely.
At each stage, ask: “Do we still need this, and is it protected?”
If something feels wrong, act fast
ProcedureOur incident playbook (simplified)
- Report suspected issues within 24 hours to the Information Security or Security point-of-contact.
- Do not try to quietly fix or hide incidents.
- Security will investigate, contain, preserve evidence, and coordinate any required notifications.
Mini-drill
You accidentally email a customer report to the wrong recipient.
- Stop: don't recall data by forwarding it again.
- Screenshot what happened and who received it.
- Immediately submit an incident ticket or ping the security contact.
Vendors, logging, and accountability
ConceptThird parties and transfers
- We only use vendors with signed Data Processing Agreements and adequate safeguards.
- Cross-border transfers rely on mechanisms like standard contractual clauses or binding rules.
Monitoring & audits
- We log authentication, admin actions, and unusual access or export attempts.
- Internal audits check that our controls match the SOP and external standards.
Your day-to-day constraints
Without approval, you must not:
- Upload customer data into unsanctioned tools.
- Share data exports directly with vendors.
- Disable logging or export “clean” versions of logs.
Key takeaways before you’re assessed
RecapSummary: your responsibilities
- Apply the strictest relevant privacy rule, not the most convenient one.
- Classify and handle data as Public, Internal, Confidential, or Restricted.
- Base processing on a lawful basis and respect original purposes.
- Use least privilege, MFA, and secure storage at all times.
- Report suspected incidents within 24 hours—never hide them.
Quick self-check
Before the assessment, ask yourself:
- Can I explain why we have this SOP to a friend?
- Do I know who to contact if I see something suspicious?
- Do I understand what data I personally handle and its classification?
Read this before starting the assessment
AssessmentHow this assessment works
- 5 questions, 4 options each, one correct answer.
- You need 80% or higher to earn the certificate.
- No per-question feedback; you'll see your overall score at the end.
Take your time and think in terms of risk reduction, user trust, and regulatory expectations.
Enter your name for the certificate
Your name appears on the certificate if you pass. You can update it before printing.