However, this has dramatically changed with the introduction of new consumer privacy regulations such as the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA). These regulations grant consumers additional rights to comprehend and govern the usage and tracking of their data for marketing and other purposes. These rights are commonly referred to as the Right of Access or Right to Know and the Right of Erasure or Right to Delete. They empower consumers to take actions such as requesting the removal of their personal information or requesting a report detailing the data known about them by the business.
To effectively manage these consumer privacy processes and ensure compliance with GDPR and CCPA requirements, many enterprises leverage the capabilities offered by Lytics and OneTrust. These tools provide valuable automation functionalities that streamline the necessary activities mandated by the regulations. Organizations already using OneTrust Privacy Rights Automation in their privacy compliance workflows can enhance their privacy management efforts and establish a robust framework for safeguarding consumer data by integrating with Lytics APIs to allow real-time compliance.
When it comes to managing cookie consent primarily on the client side, the common approach is to use explicit opt-out methods. One popular tool for cookie consent management is OneTrust. By utilizing OneTrust's cookie consent management, you can configure it to read the consent opt-out and prevent loading any configured tags. This means that the Lytics tag, responsible for sending data downstream and storing cookies client side, will be effectively disabled.
To learn more about OneTrust's cookie consent management, visit their website: OneTrust Cookie Consent.
For configuration purposes the Lytics cookie has flexibility in how is categorized depending on how the cookie is going to be used.
In addition to cookie consent management, Lytics offers a comprehensive platform for managing customer consent. Integrating Lytics with OneTrust can elevate your customer consent management to new heights. Lytics enables you to gather and handle customer consent data effectively, providing you with actionable insights and enabling personalized experiences while respecting consumer preferences.
To learn how to leverage Lytics for managing customer consent, we have created a dedicated resource: Using Lytics to Manage Customer Consent. This guide will walk you through the process of utilizing Lytics alongside OneTrust to ensure compliance and build stronger customer relationships.
As a consumer in California, you hold certain rights concerning your personal data, including the right to access and request the removal of information stored by companies. OneTrust offers efficient solutions for handling Data Subject Access Requests (DSARs), Data Erasure Requests, and automating privacy rights management.
Data Subject Access Requests can be sent from OneTrust to the Lytics Get User API endpoint. This endpoint requires an API token to authorize the request and the by-field of the profile (typically email address). Any fields on the user profile can be returned and included in the reporting sent back to the consumer.
Requesting the deletion of a consumer profile in Lytics can be triggered through the Lytics Delete User API endpoint. This endpoint again requires an API token to authorize the deletion request, as well as the email address (or other appropriate by-field) of the consumer profile to identify what to delete. This process returns a deletion request ID, which can be used to monitor the process completion. As the deletion involves removals from data archives anywhere else that the data may be retained, this can take up to 14 days in some cases.
Here's an overview of how OneTrust handles DSARs:
- DSAR Submission
- On your customer webpage, you can provide a URL link that directs users to a OneTrust-hosted web form dedicated to handling DSARs.
- This web form, residing on a dedicated subdomain, allows individuals to submit their DSAR requests by providing their email addresses and indicating their preference for information deletion.
- Request Processing
- OneTrust receives and queues DSAR requests, processing them in a systematic manner.
- Once a request is processed, the OneTrust system can perform the following actions:
- Submit deletion requests to Lytics and other connected systems and tools to ensure the removal of relevant information.
- Retrieve information from various configured connections, such as Lytics, CRMs, and databases, to generate comprehensive reports for compliance purposes.
To further enhance your privacy rights automation and consent management, OneTrust allows you to configure a custom webhook integration with Lytics. This integration enables seamless communication between the two platforms and streamlines the following key functions:
- Delete Profile
- Endpoints: The Lytics Delete User API endpoint can be used to send the profile deletion requests to Lytics from a OneTrust webhook.
- Required fields: The Delete User Endpoint requires a profile identifier or by-field that Lytics uses to identify the profile being deleted. When integrating with OneTrust for privacy management automation, it is recommended to use email as the identifier.
- API Key: Generated from the account settings in Lytics.
- Verify Deletion Status
- This step is optional but can be set up to check the status of profile deletion.
- The relevant endpoint and details can be found in the Lytics API Documentation for Profile Deletion.
- Retrieve Profile
- Endpoint: The Lytics Get User API endpoint allows you to retrieve profile information from Lytics and include it in the DSAR reports generated in OneTrust.
- Required fields: Similar to the delete profile configuration, the profile identifier or by field type and value should be specified (e.g., email).
- API Key: Generated from the account settings in Lytics.
- Optional fields: You can specify which fields you want to return when retrieving the profile information.
Implementing automation of consumer profile reporting and privacy regulation management should be done with careful consideration of the entire environment and systems which consumer data may be retained or synced from. Timing of syncs between systems, availability of complete data for reporting, and archive retention periods are all important to keep in mind when planning, designing, and implementing these types of automations.
Updated 3 months ago