What does the role require you to do
- Conduct Privacy impact assessments for new technology solution or process such as BYOD, Biometric Authentication for Physical Security, Smartphone app-based solutions, Web applications
- Analyze and Recommend Privacy by Design in new products and platforms
- Identify and Mitigate risks related to PII
- Investigate any data privacy breaches including root cause analysis, corrective and preventive actions.
- Participate in strategic improvement initiatives
- Conduct privacy compliance checks for clients, internal solutions and processes
- Review and respond to client privacy requirements
- Implement and monitor the data privacy policies and associated processes across functions and business units.
Skillsets required:
Candidate should have knowledge about GDPR, DPDPA, CIPP, Privacy by design, Data Privacy Laws
Certifications required (but not mandatory): IAPP, DSCI (Data Security Council of India), PECB (Professional Evaluation and Certification Board), FDPPI, CIPM, CDP
What the role does not involve
- Coding or software development
- Security Engineering or Testing
- External Privacy consulting for Infosys clients (not at present)
What will be your strengths (apart from technical qualification)
- Learnability
- Business Communication & Articulation Skills
- Adaptability to interact and work with people from different nations & culture
Why join Infosys Data Privacy Group
- With its corporate headquarters at Bangalore but Infosys global presence, you will be exposed to data privacy regulations of various geos, clients, technologies and business processes.
- Leader in data privacy among its peers in India, demonstrated by the DSCI (Data Security Council of India) Excellence Award, Infosys won in 2014, under the Privacy in Outsourcing Sector (IT-ITeS/BPM) category. Infosys DPO also leads and participates several key privacy initiatives both in India and international community
- Privacy as an organizational function being itself at a nascent stage in India, there is tremendous potential for growth of this field over the coming years, as was the case with information security a decade ago.