Introduction
Consumer privacy refers to the protection and control of consumer’s personal identification information and other sensitive data. The key aspects of consumer privacy are listed below:- Data collection and consent
- Data usage and retention
- Data Security
- Transparency in privacy policies
- Data Breach: Incident detection and response
Consumer Privacy Laws
Organizations must adhere to an array of security regulations, depending on where they operate. Examples include: GDPR, HIPPA, CCPA, GLBA, PIPA, PIPEDA, LGPD, and the NYDFS Cybersecurity Regulation, to name a few. These laws define a variety of restrictions around data use, but the most stringent controls are around personally identifiable information (PII): addresses, social security numbers, credit card numbers, debit card numbers, signatures, and more. Kumo does not persist the data used for model training in the long-term. This makes it easy for your firm to remain compliant to the provisions related to data retention and deletion. Also, as Kumo does not directly collect data from your customers, the provisions related to consent and right-of-access do not apply to Kumo. The following sections provide more details on the tools that Kumo provides to help your business remain compliant.Data Collection and Consent
Most companies that collect customer information typically have a privacy policy that controls how customer data is used. In order to determine whether you are legally permitted to use a tool like Kumo to process your customer data, we recommend following up with your internal privacy team, to confirm that you have received consent from your customers. Typically, this is not an issue, but it doesn’t hurt to double-check.Data Usage and Retention
Before beginning any engagement, Kumo can work with your privacy team to ensure that Kumo’s data handling practices adhere to the data processing agreement between you, your customers, and your regulators. This could include:- Defining and enforcing retention policies for temporary data stored in the Kumo cache during model training
- Filtering or obfuscating PII, before loading data into Kumo.
- Making contractual arrangements to mitigate risk, such as signing a DPA or BAA.