Business A.M
No Result
View All Result
Sunday, February 15, 2026
  • Login
  • Home
  • Technology
  • Finance
  • Comments
  • Companies
  • Commodities
  • About Us
  • Contact Us
Subscribe
Business A.M
  • Home
  • Technology
  • Finance
  • Comments
  • Companies
  • Commodities
  • About Us
  • Contact Us
No Result
View All Result
Business A.M
No Result
View All Result
Home Analyst Insight

TECH: Mapping controls in data privacy/information security

by Admin
January 21, 2026
in Analyst Insight

Trust, but verify.” That’s a Russian proverb that has been used in various business facets. The phrase is self-explanatory. One can trust but one should also take further steps to verify truths.
In the information and data privacy space, the phrase has gained prominence. If company XYZ claims that after one-year, particular datasets will be wiped away from their web servers, we can trust it will happen.
Controls define required outcomes. They come in various forms. They can be implemented through procedures, mechanisms, systems, policies, and any other measure designed to reduce risks.
For example, a company stops their admin staff from processing customer bank details or having access to it. That is a form of implementing controls. Companies use controls to avoid risky outcomes or meet desires.
The best form of mapping controls in data privacy is to first define the control objectives. Without understanding the desired outcomes mapping controls becomes a futile exercise. An example of a control objective might be to sanction certain personnel within an organisation from having access to personal information or compliance with regulations and other legal obligations.
By teasing out these control objectives the company can decipher the resources required whether an IT system needs consistent monitoring or what to do when there is an interruption to business activity.
Organisations should find control frameworks that fits their operations. After choosing the control framework that works for the organisation, there needs to be a risk assessment to have a full picture of the risks that controls will address.
Usually, in a data privacy mapping assessment, a privacy professional can find out the existing risks within an organisation and which will lead to the next phase of control implementation. One of the most important aspects of designing a control framework is designing the controls.
The privacy or information security manager with other stakeholders in charge of business functions must design the activities that should occur when the controls are implemented. Sometimes, there might be a need to create mock scenarios to test the validity of the controls before they are launched. Designing controls will require some of these elements: auditing structures and changing cumbersome procedures.
Then we move to the control implementation phase. If the controls designed are not implemented, then what is the need of designing a control? One of the reasons for mapping controls is to see the end and know where the company would be after certain procedures, changed procedures or new business records are implemented.
Any change in any business will impact the business and therefore needs great care so that the business activities don’t come to a halt. If a bank’s critical function is affected because of new controls implemented, then that is a failed control implementation. Therefore, the privacy professional must consider business as usual activities while control implementation takes place. Now, what happens after the controls have been implemented? Most stakeholders often think that after controls have been implemented, they can put their legs up and relax.
But the game of information security needs constant monitoring. There needs to be monitoring of controls. In the absence of monitoring, there won’t be ways to find out if the controls are operated in the “organisational agreed manner”.
After monitoring, the organisation must assess their controls. There needs to be security review, internal and external audit and carry out surveys to find out how the controls are doing.
Mapping controls play an important part in fostering information security and data protection in any organisation. As such, privacy professionals and information security personnel must map controls to fit the structures and business missions of their company.

Previous Post

Blood in the Sand

Next Post

Why Nigeria needs to invest in gum arabic production

Next Post

Why Nigeria needs to invest in gum arabic production

  • Trending
  • Comments
  • Latest
Igbobi alumni raise over N1bn in one week as private capital fills education gap

Igbobi alumni raise over N1bn in one week as private capital fills education gap

February 11, 2026
SIFAX subsidiary bets on operational discipline, cargo diversification to drive recovery at Lagos terminal

SIFAX subsidiary bets on operational discipline, cargo diversification to drive recovery at Lagos terminal

February 10, 2026

Reps summon Ameachi, others over railway contracts, $500m China loan

July 29, 2025
NGX taps tech advancements to drive N4.63tr capital growth in H1

Insurance-fuelled rally pushes NGX to record high

August 8, 2025

6 MLB teams that could use upgrades at the trade deadline

Top NFL Draft picks react to their Madden NFL 16 ratings

Paul Pierce said there was ‘no way’ he could play for Lakers

Arian Foster agrees to buy books for a fan after he asked on Twitter

Credit constraints, price volatility cloud agribusiness outlook

Credit constraints, price volatility cloud agribusiness outlook

February 15, 2026
Bedrock Residences appoints Kofo Ati-John as chairman

Bedrock Residences appoints Kofo Ati-John as chairman

February 14, 2026
Nigerian Breweries rated ‘buy’ as analysts see stronger earnings demand driving recovery

Nigerian Breweries returns to profitability with N99bn net income

February 14, 2026
Nigerian Bottling Company advances youth development as 2026 #YouthEmpowered opens at UNILAG

Nigerian Bottling Company advances youth development as 2026 #YouthEmpowered opens at UNILAG

February 14, 2026

Popular News

  • Igbobi alumni raise over N1bn in one week as private capital fills education gap

    Igbobi alumni raise over N1bn in one week as private capital fills education gap

    0 shares
    Share 0 Tweet 0
  • SIFAX subsidiary bets on operational discipline, cargo diversification to drive recovery at Lagos terminal

    0 shares
    Share 0 Tweet 0
  • Reps summon Ameachi, others over railway contracts, $500m China loan

    0 shares
    Share 0 Tweet 0
  • Insurance-fuelled rally pushes NGX to record high

    0 shares
    Share 0 Tweet 0
  • What’s Behind the Fourth-Quarter Earnings Dip?

    0 shares
    Share 0 Tweet 0
Currently Playing

CNN on Nigeria Aviation

CNN on Nigeria Aviation

Business AM TV

Edeme Kelikume Interview With Business AM TV

Business AM TV

Business A M 2021 Mutual Funds Outlook And Award Promo Video

Business AM TV

Recent News

Credit constraints, price volatility cloud agribusiness outlook

Credit constraints, price volatility cloud agribusiness outlook

February 15, 2026
Bedrock Residences appoints Kofo Ati-John as chairman

Bedrock Residences appoints Kofo Ati-John as chairman

February 14, 2026

Categories

  • Frontpage
  • Analyst Insight
  • Business AM TV
  • Comments
  • Commodities
  • Finance
  • Markets
  • Technology
  • The Business Traveller & Hospitality
  • World Business & Economy

Site Navigation

  • Home
  • About Us
  • Contact Us
  • Privacy & Policy
Business A.M

BusinessAMLive (businessamlive.com) is a leading online business news and information platform focused on providing timely, insightful and comprehensive coverage of economic, financial, and business developments in Nigeria, Africa and around the world.

© 2026 Business A.M

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • Technology
  • Finance
  • Comments
  • Companies
  • Commodities
  • About Us
  • Contact Us

© 2026 Business A.M