{"id":6275,"date":"2024-04-04T06:20:00","date_gmt":"2024-04-04T10:20:00","guid":{"rendered":"https:\/\/canny.io\/blog\/?p=6275"},"modified":"2026-03-10T19:12:02","modified_gmt":"2026-03-10T23:12:02","slug":"protection-data-privacy","status":"publish","type":"post","link":"https:\/\/canny.io\/blog\/protection-data-privacy\/","title":{"rendered":"A product manager\u2019s role in the protection of data&nbsp;privacy"},"content":{"rendered":"\n<p>The role of a product manager is diverse and essential \u2014 you make things&nbsp;happen.&nbsp;<\/p>\n\n\n\n<p>But you\u2019re also responsible for data protection and the safe handling of the data your products&nbsp;use.&nbsp;<\/p>\n\n\n\n<p>This post will help you learn what role product managers play in the protection of data privacy. It also clarifies best practices for laws like the <a href=\"https:\/\/gdpr-info.eu\/\" target=\"_blank\" rel=\"noreferrer noopener\">General Data Protection&nbsp;Regulation<\/a>.<\/p>\n\n\n\n\n\n<h2 class=\"wp-block-heading\">What is data privacy?<\/h2>\n\n\n\n<p>Data privacy refers to protecting individuals\u2019<a href=\"https:\/\/termly.io\/resources\/articles\/personal-information\/\" target=\"_blank\" rel=\"noreferrer noopener\"> personal information<\/a> from unauthorized use and access. It encompasses people&#8217;s rights to control how their personal data gets&nbsp;used.&nbsp;<\/p>\n\n\n\n<p>Some data counts as sensitive information and are subject to more strict guidelines. This includes health information and details about ethnicity and&nbsp;beliefs.<\/p>\n\n\n\n<p>Businesses use personal data&nbsp;to:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Better align product offerings with the customer&nbsp;needs&nbsp;<\/li>\n\n\n\n<li>Gauge marketing campaigns\u2019&nbsp;success<\/li>\n\n\n\n<li>Improve and enhance user&nbsp;experience&nbsp;<\/li>\n\n\n\n<li>Personalize products based on individual interests and&nbsp;preferences<\/li>\n\n\n\n<li>Plan for <a href=\"https:\/\/canny.io\/blog\/why-resource-optimization-is-critical-for-product-teams-in-2023\/\">resource allocation<\/a> and inventory&nbsp;management&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>But this information belongs to and comes from consumers. Businesses must handle traditional and sensitive data&nbsp;responsibly.<\/p>\n\n\n\n<p>What laws impact data&nbsp;privacy?<\/p>\n\n\n\n<p>According to <a href=\"https:\/\/unctad.org\/page\/data-protection-and-privacy-legislation-worldwide\" target=\"_blank\" rel=\"noreferrer noopener\">UNCTAD<\/a>, data protection and privacy laws protect 71% of the world\u2019s&nbsp;countries.&nbsp;<\/p>\n\n\n\n<p>This includes the following&nbsp;laws:&nbsp;&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Australia <a href=\"https:\/\/www.oaic.gov.au\/privacy\/privacy-legislation\/the-privacy-act\" target=\"_blank\" rel=\"noreferrer noopener\">Privacy Act&nbsp;1988<\/a><\/li>\n\n\n\n<li>General Data Protection Regulation (<a href=\"https:\/\/gdpr-info.eu\/\" target=\"_blank\" rel=\"noreferrer&nbsp;noopener\">GDPR<\/a>)<\/li>\n\n\n\n<li>California Consumer Privacy Act (<a href=\"https:\/\/leginfo.legislature.ca.gov\/faces\/codes_displayText.xhtml?division=3.&amp;part=4.&amp;lawCode=CIV&amp;title=1.81.5\" target=\"_blank\" rel=\"noreferrer&nbsp;noopener\">CCPA<\/a>)<\/li>\n\n\n\n<li>California Online Privacy Protection Act (<a href=\"https:\/\/leginfo.legislature.ca.gov\/faces\/codes_displayText.xhtml?division=8.&amp;chapter=22.&amp;lawCode=BPC\" target=\"_blank\" rel=\"noreferrer&nbsp;noopener\">CalOPPA<\/a>)<\/li>\n\n\n\n<li>Colorado Privacy Act (<a href=\"https:\/\/coag.gov\/resources\/colorado-privacy-act\/\" target=\"_blank\" rel=\"noreferrer&nbsp;noopener\">CPA<\/a>)<\/li>\n\n\n\n<li>New Zealand <a href=\"https:\/\/www.legislation.govt.nz\/act\/public\/2020\/0031\/latest\/LMS23223.html\" target=\"_blank\" rel=\"noreferrer noopener\">Privacy Act&nbsp;2020<\/a><\/li>\n\n\n\n<li>Virginia Consumer Data Privacy Act (<a href=\"https:\/\/law.lis.virginia.gov\/vacodefull\/title59.1\/chapter53\/\" target=\"_blank\" rel=\"noreferrer&nbsp;noopener\">VCDPA<\/a>)&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Sometimes, a data protection act has a money and data collection threshold, like the&nbsp;CCPA.&nbsp;<\/p>\n\n\n\n<p>Others apply based on where your users come from and the location of your business. For example, this is the case with the GDPR and&nbsp;CalOPPA.<\/p>\n\n\n\n<p>Product managers should know if a data protection regulation impacts their business. This way, they can ensure they meet each privacy rule for all&nbsp;projects.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why is data privacy important for product managers?<\/h2>\n\n\n\n<p>Product managers work in every part of a project\u2019s life cycle. It\u2019s important to build data privacy best practices into each stage. This helps your company follow data privacy laws. It also helps you foster a relationship of trust with your&nbsp;customers.&nbsp;<\/p>\n\n\n\n<p>Additionally, it allows you to prevent cybersecurity issues. For example, data breaches can lead to consumer identity theft and other&nbsp;issues.&nbsp;<\/p>\n\n\n\n<p>Most businesses fall under the legal threshold of one or more data privacy laws. It depends on the business location and where customers come&nbsp;from.&nbsp;<\/p>\n\n\n\n<p>&nbsp;These laws require businesses to meet specific obligations, such&nbsp;as:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Presenting users with privacy notifications describing what personal data they collect and&nbsp;why<\/li>\n\n\n\n<li>Explaining the rights users have over their information and how to act on&nbsp;them<\/li>\n\n\n\n<li>Getting adequate consent from users for certain types of personal data&nbsp;processing<\/li>\n\n\n\n<li>Safely and securely storing personal data and only keeping it for as long as&nbsp;necessary&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Failure to follow a data privacy law, even by mistake, can lead to significant fines. This is especially true if you process sensitive data. For&nbsp;example:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/edpb.europa.eu\/news\/news\/2023\/12-billion-euro-fine-facebook-result-edpb-binding-decision_en\" target=\"_blank\" rel=\"noreferrer noopener\">Meta<\/a> was issued a \u20ac1.2 billion&nbsp; ($1.3 billion) fine for violating the GDPR in 2023, <a href=\"https:\/\/termly.io\/resources\/articles\/biggest-gdpr-fines\/\" target=\"_blank\" rel=\"noreferrer noopener\">the largest GDPR fine to&nbsp;date<\/a>.<\/li>\n\n\n\n<li><a href=\"https:\/\/oag.ca.gov\/privacy\/privacy-enforcement-actions\" target=\"_blank\" rel=\"noreferrer noopener\">DoorDash<\/a> was issued a $375,000 penalty for violating the CCPA in&nbsp;2023.&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/oag.ca.gov\/news\/press-releases\/attorney-general-bonta-announces-settlement-sephora-part-ongoing-enforcement\" target=\"_blank\" rel=\"noreferrer noopener\">Sephora<\/a> was issued a $1.2 million fine for violating portions of the CCPA in&nbsp;2022.&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/www.ftc.gov\/news-events\/news\/press-releases\/2024\/02\/ftc-order-will-ban-avast-selling-browsing-data-advertising-purposes-require-it-pay-165-million-over\" target=\"_blank\" rel=\"noreferrer noopener\">Avast<\/a> was fined $16.5 million by the FTC for illegally selling user personal&nbsp;data.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Data protection authorities could even force the business to stop all processing&nbsp;activities.&nbsp;&nbsp;<\/p>\n\n\n\n<p>The modern consumer also cares about their privacy, especially online. Before buying a product, they look for privacy policies and consent banners on sites. Just take a look at these <a href=\"https:\/\/termly.io\/resources\/articles\/data-privacy-statistics\/\" target=\"_blank\" rel=\"noreferrer noopener\">data privacy&nbsp;statistics<\/a>:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.cisco.com\/c\/en\/us\/about\/trust-center\/data-privacy-benchmark-study.html#~key-findings\" target=\"_blank\" rel=\"noreferrer noopener\">94% of organizations<\/a> say customers won\u2019t buy from them if they don\u2019t properly protect personal&nbsp;information.<\/li>\n\n\n\n<li><a href=\"https:\/\/public.tableau.com\/app\/profile\/ratnesh2928\/viz\/Stayingcyber-securewhileworkingfromhome\/Stayingcyber-securewhileworkingfromhome\" target=\"_blank\" rel=\"noreferrer noopener\">48% of internet users<\/a> have stopped shopping with a business due to privacy&nbsp;concerns<\/li>\n\n\n\n<li><a href=\"https:\/\/www.pewresearch.org\/internet\/2019\/11\/15\/americans-and-privacy-concerned-confused-and-feeling-lack-of-control-over-their-personal-information\/\" target=\"_blank\" rel=\"noreferrer noopener\">One in five internet users<\/a> often read a privacy policy before agreeing to&nbsp;it<\/li>\n<\/ul>\n\n\n\n<p>Think of it this way \u2014 <em>would you give details about yourself to a website without a privacy policy?&nbsp;<\/em>&nbsp;<\/p>\n\n\n\n<p>Providing users with this information reassures them that you respect their personal data. It also lets them know you&#8217;re prepared to protect it if they share it with&nbsp;you.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The product manager\u2019s role in ensuring products follow data privacy laws<\/h2>\n\n\n\n<p>Product managers don&#8217;t usually create privacy documents or maintain consent management platforms. But, they are responsible for letting the right team know about the personal data a product uses. This helps ensure compliance and keeps everyone on the same&nbsp;page.&nbsp;&nbsp;<\/p>\n\n\n\n<p>As a product manager, you know the ins and outs of everything your business produces better than most.&nbsp; You know why each piece of data is necessary, how it gets used, and how long you need to keep the&nbsp;information.&nbsp;<\/p>\n\n\n\n<p>This knowledge puts you in a position&nbsp;to:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>List every piece of personal data your services collect and&nbsp;use<\/li>\n\n\n\n<li>Organize personal data based on its level of&nbsp;sensitivity<\/li>\n\n\n\n<li>Communicate this information by putting it all in a compliant privacy&nbsp;policy<\/li>\n<\/ul>\n\n\n\n<p>You can also determine the safety measures you must use to keep personal data safe. Cyber threats include unauthorized access, breaches, and other attacks. For&nbsp;example:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Phishing attacks:<\/strong> when someone sends a message that looks reliable. But it convinces them to click on an insecure link. Clicking on the link downloads a virus to the device. Or, it can trick the individual into providing sensitive personal information. For example, they may ask for passwords or social security numbers. This could lead to identity theft, stolen money, or&nbsp;both.&nbsp;<\/li>\n\n\n\n<li><strong>Malware:<\/strong> when harmful software enters your computer, phone, or other device. It can come from downloading something that looks safe or clicking a bad link. It can also come from attaching an infected device to your computer, like a compromised USB drive. It leads to computer viruses, spyware, ransomware attacks, or&nbsp;trojans.&nbsp;<\/li>\n\n\n\n<li><strong>Ransomware: <\/strong>locks you out of your files. The bad actor then demands money to unlock them. This impacts businesses if an employee clicks on an unsafe link in a work&nbsp;email.<\/li>\n\n\n\n<li><strong>Spyware: <\/strong>malicious software that gets downloaded to your device. This leads to a bad actor watching everything you do. They might steal your passwords, credit card information, and other personal data. This attack can impact businesses. It happens when under-trained employees click on a bad link or download a corrupt&nbsp;file.&nbsp;<\/li>\n\n\n\n<li><strong>Trojans: <\/strong>occurs when a bad actor uses software to control your device. They also usually steal your data. This impacts businesses if an employee clicks on an insecure link or downloads a bad file.&nbsp;<strong>&nbsp;<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Prioritizing data privacy is a team effort, and every member of your organization has a role to&nbsp;fill.<\/p>\n\n\n\n<p>Anyone can click on a bad link or download a corrupt file. Training your entire team is the best line of&nbsp;defense.&nbsp;<\/p>\n\n\n\n<p>For&nbsp;example:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Leadership teams should foster a culture of data privacy for all&nbsp;departments<\/li>\n\n\n\n<li>Marketing teams should communicate with customers about how they use&nbsp;data<\/li>\n\n\n\n<li>Product developers should build privacy into all products while limiting data&nbsp;collection<\/li>\n\n\n\n<li>Legal teams should be up-to-date on which data privacy laws impact the company and&nbsp;how<\/li>\n\n\n\n<li>Finance teams should be allocating a budget for data privacy and cybersecurity&nbsp;initiatives<\/li>\n<\/ul>\n\n\n\n<p>It\u2019s not neccessarily a product manager\u2019s job to train everyone on these topics. But they can still ensure everyone is aware of and up to date on the company\u2019s data protection and cybersecurity&nbsp;policies.<\/p>\n\n\n\n<p>Try services like <a href=\"https:\/\/drata.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Drata<\/a>. It keeps your employees engaged in data and cybersecurity best&nbsp;practices.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Data privacy best practices for product managers<\/h2>\n\n\n\n<p>Let\u2019s walk through data privacy best practices product managers can&nbsp;follow.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Product development and privacy by design<\/h3>\n\n\n\n<p>Privacy by design is a concept. It encourages businesses to include data protection and privacy practices in all stages. Product managers should use this process to build data privacy in their&nbsp;projects.&nbsp;<\/p>\n\n\n\n<p>&nbsp;Some of the key principles of privacy by design&nbsp;include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Incorporate privacy measures to prevent issues before they&nbsp;occur<\/li>\n\n\n\n<li>Install end-to-end security&nbsp;controls<\/li>\n\n\n\n<li>Provide users with transparency about personal data collection and&nbsp;use<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Use a cloud workload protection platform<\/h3>\n\n\n\n<p>Product managers should also consider using a cloud workload protection platform (CWPP). A <a href=\"https:\/\/www.wiz.io\/academy\/cloud-workload-protection-platforms-cwpp\">CWPP<\/a> offers security for workloads across various cloud environments. This ensures that data is protected whether it is at rest or in transit. They offer robust security such as encryption, identity management, and real-time threat detection. This is important for maintaining data privacy in cloud-based&nbsp;applications.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Notification requirements<\/strong><\/h3>\n\n\n\n<p>Product managers play a key role in <a href=\"https:\/\/termly.io\/resources\/articles\/privacy-policy-updates\/\" target=\"_blank\" rel=\"noreferrer noopener\">ensuring privacy policies are&nbsp;up-to-date<\/a>.&nbsp;<\/p>\n\n\n\n<p>Businesses under privacy laws must give consumers a privacy notification&nbsp;explaining:&nbsp;&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>What data you&nbsp;collect<\/li>\n\n\n\n<li>Why and how you use the&nbsp;data<\/li>\n\n\n\n<li>If you share the data with third&nbsp;parties<\/li>\n\n\n\n<li>What rights the user has over their data and how to act on&nbsp;them<\/li>\n\n\n\n<li>Company contact&nbsp;information<\/li>\n<\/ul>\n\n\n\n<p>Have this information for each project you oversee. Ensure it ends up in your company privacy&nbsp;policy.&nbsp;<\/p>\n\n\n\n<p>Product managers can also help notify users about changes to the privacy policy. It\u2019s normal to update your privacy policy. You should do so whenever your data collection practices change. Make sure you let users know that the policy has been&nbsp;updated.&nbsp;<\/p>\n\n\n\n<p>For example, add a \u201clast updated\u201d date to your policy. You can also send an email saying the policy has changed. List what\u2019s changed in the email. Let the users know where they can find your new policy on your website. This way, they can read it at their own pace. They can then choose if they still agree to it or&nbsp;not.&nbsp;<\/p>\n\n\n\n<p>See an example of this type of email in the screenshot below from the software developer <a href=\"https:\/\/openai.com\/\" target=\"_blank\" rel=\"noreferrer&nbsp;noopener\">OpenAI<\/a>.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" width=\"702\" height=\"1022\" data-src=\"https:\/\/canny.io\/blog\/wp-content\/uploads\/2024\/04\/image.png\" alt=\"OpenAI privacy policy update email\" class=\"wp-image-7873 lazyload\" style=\"--smush-placeholder-width: 702px; --smush-placeholder-aspect-ratio: 702\/1022;width:600px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" \/><\/figure>\n<\/div>\n\n\n<p>OpenAI was clear about what changed in their policy. They gave an effective date, so users know when the changes took place. They also used the subject line \u201cUpdate to our Terms of Use and Privacy Policy.\u201d This way, users knew exactly what the email was&nbsp;about.&nbsp;<\/p>\n\n\n\n<p>Follow OpenAI\u2019s example when making your own privacy policy update&nbsp;email.&nbsp;<\/p>\n\n\n\n<p>Maintaining an archive of past versions of your company\u2019s privacy policy is also a good&nbsp;idea.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Obtaining consent from consumers<\/h3>\n\n\n\n<p>Privacy laws give users the right to opt into or out of certain types of data&nbsp;processing.&nbsp;<\/p>\n\n\n\n<p>Product managers can help identify when it\u2019s necessary to<a href=\"https:\/\/termly.io\/products\/cookie-consent-manager\/\"> <\/a>use a tool like a <a href=\"https:\/\/termly.io\/products\/cookie-consent-manager\/\" target=\"_blank\" rel=\"noreferrer noopener\">cookie consent manager.<\/a> This way, you can request consent for specific&nbsp;purposes.&nbsp;&nbsp;<\/p>\n\n\n\n<p>For example, you might work for a company subject to a privacy law like the GDPR or the CCPA. Your website might deploy internet cookies that collect information from users. You might then share that information with external vendors. In this case, you&#8217;d need a consent banner on your site. Your users have the right to opt into or out of having their data sold or shared with third&nbsp;parties.&nbsp;<\/p>\n\n\n\n<p>Your project might collect sensitive data from users to function. In this case, you also need consent. This is because privacy laws give people the right to limit the use of sensitive&nbsp;information.<\/p>\n\n\n\n<p>Sensitive information is a type of vulnerable personal data and includes details&nbsp;like:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Religious or philosophical&nbsp;beliefs<\/li>\n\n\n\n<li>Race or&nbsp;ethnicity<\/li>\n\n\n\n<li>Trade&nbsp;membership<\/li>\n\n\n\n<li>Gender&nbsp;identity<\/li>\n\n\n\n<li>Biometrics and health&nbsp;data<\/li>\n<\/ul>\n\n\n\n<p>Determine if consent collection is necessary for each project to meet privacy laws. You can do this by asking yourself the following simple&nbsp;questions:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Does this project need to use personal data from&nbsp;users?<\/li>\n\n\n\n<li>If so, is this data protected by privacy&nbsp;laws?<\/li>\n\n\n\n<li>If so, do the laws need opt-in or opt-out&nbsp;consent?<\/li>\n<\/ul>\n\n\n\n<p>Your answers will help determine if your consent banner needs&nbsp;an:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u2018Accept\u2019&nbsp;button<\/li>\n\n\n\n<li>\u2018Decline\u2019&nbsp;button<\/li>\n\n\n\n<li>\u2018Preference\u2019&nbsp;button<\/li>\n\n\n\n<li>Or a mix of all&nbsp;three<\/li>\n<\/ul>\n\n\n\n<p>This is a necessary step. Otherwise, you might get fined by data protection authorities. For example, these include the European Commission or the California Privacy Protection&nbsp;Agency.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Effective data security measures<\/h3>\n\n\n\n<p>A product manager needs to keep track of the types of personal information your products use. This way, you&#8217;ll know what level of data security is necessary to protect that&nbsp;information.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Common data security techniques&nbsp;include:&nbsp;&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Only collecting data that is&nbsp;necessary<\/li>\n\n\n\n<li>Anonymizing and encrypting the&nbsp;data<\/li>\n\n\n\n<li>Creating access controls to limit who has access to the&nbsp;information<\/li>\n\n\n\n<li>Auditing your security protocol to identify weak areas before a breach&nbsp;occurs<\/li>\n\n\n\n<li>Building data protection and backup recovery plans into your&nbsp;products<\/li>\n\n\n\n<li>Determining your data retention and deletion&nbsp;strategy<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion: product managers and protection of data privacy<\/h2>\n\n\n\n<p>As a product manager, you play a significant role in protecting data privacy. You know what data is necessary to develop different products and&nbsp;services.&nbsp;<\/p>\n\n\n\n<p>You can also incorporate privacy best practices into all project lifecycles. This helps ensure personal data protection at all&nbsp;stages.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>Prioritizing data privacy helps your projects follow data privacy laws. This makes it easier to follow laws like the General Data Protection&nbsp;Regulation.<\/p>\n\n\n\n<p>It also proves to customers that they can trust you with their personal&nbsp;information.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This post will help product managers learn about data protection and privacy. It&#8217;s essential for building great products.<\/p>\n","protected":false},"author":41,"featured_media":6367,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[7],"tags":[840,827,816,820,828,821,822,832,831,834,833,817,824,829,830,15,10,835,825,826,19,836,837,838,823,839],"class_list":["post-6275","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-product-management","tag-consent","tag-cybersecurity","tag-data-privacy","tag-data-protection","tag-data-security","tag-gdpr","tag-general-data-protection-regulation","tag-law","tag-laws","tag-malware","tag-phishing","tag-privacy","tag-privacy-act","tag-privacy-law","tag-privacy-laws","tag-product-management","tag-product-manager","tag-ransomware","tag-regulation","tag-regulations","tag-security","tag-spyware","tag-trojan","tag-trojans","tag-unctad","tag-virus"],"aioseo_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>A product manager\u2019s role in the protection of data privacy - Canny Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/canny.io\/blog\/protection-data-privacy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A product manager\u2019s role in the protection of data privacy - Canny Blog\" \/>\n<meta property=\"og:description\" content=\"This post will help product managers learn about data protection and privacy. It&#039;s essential for building great products.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/canny.io\/blog\/protection-data-privacy\/\" \/>\n<meta property=\"og:site_name\" content=\"Canny Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/cannyio\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-04T10:20:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-10T23:12:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/canny.io\/blog\/wp-content\/uploads\/2024\/04\/protecting-data-privacy.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1520\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Masha Komnenic\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cannyHQ\" \/>\n<meta name=\"twitter:site\" content=\"@cannyHQ\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Masha Komnenic\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/canny.io\\\/blog\\\/protection-data-privacy\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/canny.io\\\/blog\\\/protection-data-privacy\\\/\"},\"author\":{\"name\":\"Masha Komnenic\",\"@id\":\"https:\\\/\\\/canny.io\\\/blog\\\/#\\\/schema\\\/person\\\/9da0ef4ccb751ac0e404c57d54f4d234\"},\"headline\":\"A product manager\u2019s role in the protection of data&nbsp;privacy\",\"datePublished\":\"2024-04-04T10:20:00+00:00\",\"dateModified\":\"2026-03-10T23:12:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/canny.io\\\/blog\\\/protection-data-privacy\\\/\"},\"wordCount\":2185,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/canny.io\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/canny.io\\\/blog\\\/protection-data-privacy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/canny.io\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/protecting-data-privacy.webp\",\"keywords\":[\"consent\",\"cybersecurity\",\"data privacy\",\"data protection\",\"data security\",\"gdpr\",\"general data protection regulation\",\"law\",\"laws\",\"malware\",\"phishing\",\"privacy\",\"privacy act\",\"privacy law\",\"privacy laws\",\"product management\",\"product manager\",\"ransomware\",\"regulation\",\"regulations\",\"security\",\"spyware\",\"trojan\",\"trojans\",\"unctad\",\"virus\"],\"articleSection\":[\"Product Management\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/canny.io\\\/blog\\\/protection-data-privacy\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/canny.io\\\/blog\\\/protection-data-privacy\\\/\",\"url\":\"https:\\\/\\\/canny.io\\\/blog\\\/protection-data-privacy\\\/\",\"name\":\"A product manager\u2019s role in the protection of data privacy - Canny Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/canny.io\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/canny.io\\\/blog\\\/protection-data-privacy\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/canny.io\\\/blog\\\/protection-data-privacy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/canny.io\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/protecting-data-privacy.webp\",\"datePublished\":\"2024-04-04T10:20:00+00:00\",\"dateModified\":\"2026-03-10T23:12:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/canny.io\\\/blog\\\/protection-data-privacy\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/canny.io\\\/blog\\\/protection-data-privacy\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/canny.io\\\/blog\\\/protection-data-privacy\\\/#primaryimage\",\"url\":\"https:\\\/\\\/canny.io\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/protecting-data-privacy.webp\",\"contentUrl\":\"https:\\\/\\\/canny.io\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/protecting-data-privacy.webp\",\"width\":1520,\"height\":800,\"caption\":\"protecting-data-privacy\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/canny.io\\\/blog\\\/protection-data-privacy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/canny.io\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A product manager\u2019s role in the protection of data&nbsp;privacy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/canny.io\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/canny.io\\\/blog\\\/\",\"name\":\"Canny Blog\",\"description\":\"How to build a more informed product\",\"publisher\":{\"@id\":\"https:\\\/\\\/canny.io\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/canny.io\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/canny.io\\\/blog\\\/#organization\",\"name\":\"Canny Blog\",\"url\":\"https:\\\/\\\/canny.io\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/canny.io\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/canny.io\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/canny-wordmark-1.png\",\"contentUrl\":\"https:\\\/\\\/canny.io\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/canny-wordmark-1.png\",\"width\":733,\"height\":201,\"caption\":\"Canny Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/canny.io\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/cannyio\\\/\",\"https:\\\/\\\/x.com\\\/cannyHQ\",\"https:\\\/\\\/www.instagram.com\\\/carryoncode\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/canny.io\\\/blog\\\/#\\\/schema\\\/person\\\/9da0ef4ccb751ac0e404c57d54f4d234\",\"name\":\"Masha Komnenic\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/canny.io\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Masha-Komnenic-v1-150x150-1.jpg\",\"url\":\"https:\\\/\\\/canny.io\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Masha-Komnenic-v1-150x150-1.jpg\",\"contentUrl\":\"https:\\\/\\\/canny.io\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Masha-Komnenic-v1-150x150-1.jpg\",\"caption\":\"Masha Komnenic\"},\"description\":\"Masha is the Director of Global Privacy @ Termly and has been a privacy compliance mentor to many international business accelerators. She specializes in implementing, monitoring, and auditing business compliance with privacy regulations (HIPAA, PIPEDA, ePrivacy Directive, GDPR, CCPA, POPIA, LGPD). Masha studied Law at Belgrade University and passed the Bar examination in 2016.\",\"sameAs\":[\"http:\\\/\\\/Termly.io\"],\"url\":\"https:\\\/\\\/canny.io\\\/blog\\\/author\\\/mashakomnenic\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A product manager\u2019s role in the protection of data privacy - Canny Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/canny.io\/blog\/protection-data-privacy\/","og_locale":"en_US","og_type":"article","og_title":"A product manager\u2019s role in the protection of data privacy - Canny Blog","og_description":"This post will help product managers learn about data protection and privacy. It's essential for building great products.","og_url":"https:\/\/canny.io\/blog\/protection-data-privacy\/","og_site_name":"Canny Blog","article_publisher":"https:\/\/www.facebook.com\/cannyio\/","article_published_time":"2024-04-04T10:20:00+00:00","article_modified_time":"2026-03-10T23:12:02+00:00","og_image":[{"width":1520,"height":800,"url":"https:\/\/canny.io\/blog\/wp-content\/uploads\/2024\/04\/protecting-data-privacy.webp","type":"image\/webp"}],"author":"Masha Komnenic","twitter_card":"summary_large_image","twitter_creator":"@cannyHQ","twitter_site":"@cannyHQ","twitter_misc":{"Written by":"Masha Komnenic","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/canny.io\/blog\/protection-data-privacy\/#article","isPartOf":{"@id":"https:\/\/canny.io\/blog\/protection-data-privacy\/"},"author":{"name":"Masha Komnenic","@id":"https:\/\/canny.io\/blog\/#\/schema\/person\/9da0ef4ccb751ac0e404c57d54f4d234"},"headline":"A product manager\u2019s role in the protection of data&nbsp;privacy","datePublished":"2024-04-04T10:20:00+00:00","dateModified":"2026-03-10T23:12:02+00:00","mainEntityOfPage":{"@id":"https:\/\/canny.io\/blog\/protection-data-privacy\/"},"wordCount":2185,"commentCount":0,"publisher":{"@id":"https:\/\/canny.io\/blog\/#organization"},"image":{"@id":"https:\/\/canny.io\/blog\/protection-data-privacy\/#primaryimage"},"thumbnailUrl":"https:\/\/canny.io\/blog\/wp-content\/uploads\/2024\/04\/protecting-data-privacy.webp","keywords":["consent","cybersecurity","data privacy","data protection","data security","gdpr","general data protection regulation","law","laws","malware","phishing","privacy","privacy act","privacy law","privacy laws","product management","product manager","ransomware","regulation","regulations","security","spyware","trojan","trojans","unctad","virus"],"articleSection":["Product Management"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/canny.io\/blog\/protection-data-privacy\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/canny.io\/blog\/protection-data-privacy\/","url":"https:\/\/canny.io\/blog\/protection-data-privacy\/","name":"A product manager\u2019s role in the protection of data privacy - Canny Blog","isPartOf":{"@id":"https:\/\/canny.io\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/canny.io\/blog\/protection-data-privacy\/#primaryimage"},"image":{"@id":"https:\/\/canny.io\/blog\/protection-data-privacy\/#primaryimage"},"thumbnailUrl":"https:\/\/canny.io\/blog\/wp-content\/uploads\/2024\/04\/protecting-data-privacy.webp","datePublished":"2024-04-04T10:20:00+00:00","dateModified":"2026-03-10T23:12:02+00:00","breadcrumb":{"@id":"https:\/\/canny.io\/blog\/protection-data-privacy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/canny.io\/blog\/protection-data-privacy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/canny.io\/blog\/protection-data-privacy\/#primaryimage","url":"https:\/\/canny.io\/blog\/wp-content\/uploads\/2024\/04\/protecting-data-privacy.webp","contentUrl":"https:\/\/canny.io\/blog\/wp-content\/uploads\/2024\/04\/protecting-data-privacy.webp","width":1520,"height":800,"caption":"protecting-data-privacy"},{"@type":"BreadcrumbList","@id":"https:\/\/canny.io\/blog\/protection-data-privacy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/canny.io\/blog\/"},{"@type":"ListItem","position":2,"name":"A product manager\u2019s role in the protection of data&nbsp;privacy"}]},{"@type":"WebSite","@id":"https:\/\/canny.io\/blog\/#website","url":"https:\/\/canny.io\/blog\/","name":"Canny Blog","description":"How to build a more informed product","publisher":{"@id":"https:\/\/canny.io\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/canny.io\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/canny.io\/blog\/#organization","name":"Canny Blog","url":"https:\/\/canny.io\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/canny.io\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/canny.io\/blog\/wp-content\/uploads\/2024\/03\/canny-wordmark-1.png","contentUrl":"https:\/\/canny.io\/blog\/wp-content\/uploads\/2024\/03\/canny-wordmark-1.png","width":733,"height":201,"caption":"Canny Blog"},"image":{"@id":"https:\/\/canny.io\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/cannyio\/","https:\/\/x.com\/cannyHQ","https:\/\/www.instagram.com\/carryoncode\/"]},{"@type":"Person","@id":"https:\/\/canny.io\/blog\/#\/schema\/person\/9da0ef4ccb751ac0e404c57d54f4d234","name":"Masha Komnenic","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/canny.io\/blog\/wp-content\/uploads\/2024\/04\/Masha-Komnenic-v1-150x150-1.jpg","url":"https:\/\/canny.io\/blog\/wp-content\/uploads\/2024\/04\/Masha-Komnenic-v1-150x150-1.jpg","contentUrl":"https:\/\/canny.io\/blog\/wp-content\/uploads\/2024\/04\/Masha-Komnenic-v1-150x150-1.jpg","caption":"Masha Komnenic"},"description":"Masha is the Director of Global Privacy @ Termly and has been a privacy compliance mentor to many international business accelerators. She specializes in implementing, monitoring, and auditing business compliance with privacy regulations (HIPAA, PIPEDA, ePrivacy Directive, GDPR, CCPA, POPIA, LGPD). Masha studied Law at Belgrade University and passed the Bar examination in 2016.","sameAs":["http:\/\/Termly.io"],"url":"https:\/\/canny.io\/blog\/author\/mashakomnenic\/"}]}},"modified_by":"Eric Hoppe","_links":{"self":[{"href":"https:\/\/canny.io\/blog\/wp-json\/wp\/v2\/posts\/6275","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/canny.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/canny.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/canny.io\/blog\/wp-json\/wp\/v2\/users\/41"}],"replies":[{"embeddable":true,"href":"https:\/\/canny.io\/blog\/wp-json\/wp\/v2\/comments?post=6275"}],"version-history":[{"count":0,"href":"https:\/\/canny.io\/blog\/wp-json\/wp\/v2\/posts\/6275\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/canny.io\/blog\/wp-json\/wp\/v2\/media\/6367"}],"wp:attachment":[{"href":"https:\/\/canny.io\/blog\/wp-json\/wp\/v2\/media?parent=6275"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/canny.io\/blog\/wp-json\/wp\/v2\/categories?post=6275"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/canny.io\/blog\/wp-json\/wp\/v2\/tags?post=6275"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}