Automating data privacy stewardship with Transcend and Looker
Sep 7, 2021
Transcend is the data privacy infrastructure that makes it simple for companies to give their users control over their personal data. By making data subject requests painless for companies, Transcend is putting users everywhere in the driver’s seat of their personal data.
Read on to learn more about how automating data privacy requests increases internal efficiencies, saves resources and improves your users’ experience.
Understanding the data privacy problem
Regulations like Europe’s GDPR and California’s CCPA and CPRA give people ownership and agency over their data, including the ability to access, delete, or opt out of the data provided to companies. For most companies, the process of addressing individual privacy rights means time-consuming operations to manually complete hundreds or thousands of those actions in the data layer each month.
As more consumers exercise their privacy rights, manual compliance workflows can break down. The resources required to manage individual preferences across data systems with spreadsheets, ticketing systems, web-forms or docs becomes too much. Compliance gaps may start to emerge, including forgetting to make sure a user request is actually rolled through a data system like Looker. That’s not good!
On the other hand, expertly managing data privacy across your business can increase customer confidence, improve data management, and spur business innovation and growth. Today, more organizations are seeing the benefits of data privacy engineering infrastructure—that is, a way to manage user privacy controls across an entire data system in a simple and easy way, with no humans in the loop.
Automating data privacy across Looker systems
At Transcend, we focus on data privacy engineering. We recently launched an integration with Looker that fully automates user privacy requests (like data access and opt out) across the entire data ecosystem via the API. Instead of requiring you to send Looker an email or risk you forgetting to process the data action manually, Looker and Transcend customers ensure requests automatically roll through the entire system, saving time and providing peace of mind.
For example, Indiegogo, the leading online crowd-funding company, turns to Looker for a centralized, governed data source. With Transcend + Looker together, Indiegogo now ensures that their data privacy is managed at a macro-level across all their databases, rather than having to manage each underlying database individually.
“Our platform generates enormous amounts of user data that we need to sort through and use intelligently. We use Looker across our organizational teams to better analyze data and make informed business decisions. Now with Transcend and Looker, we also ensure that our data privacy flows are seamless across our tech stack. It’s a game changer for us on efficient data management,” said Aditya Raghuwanshi, Director of Engineering at Indiegogo.
The three major benefits of automating your data privacy workflows
This type of automation can mean:
- Increased operational efficiency and no manual work
- Resource savings via automated processing that can handle upwards of thousands of individual data privacy requests in less than a minute.
- Brand protection and improved user experience with complete, consolidated and fast data privacy operations.
How data privacy engineering works with Transcend and Looker
By operating with end-to-end encryption, Transcend never sees the underlying end user data that it operates on, which offers enhanced security.
When you receive a data subject request from your end-user, Transcend’s Data Privacy Infrastructure compiles data across your tech stack, including Looker and all other connected data systems. That means you don’t have to build dozens of one-off connections to disparate data systems to wrangle privacy configurations; instead, you can funnel that data through Looker, configure a simple query, and let Transcend do the rest on data privacy. Here’s how it works:
- You implement a query that serves as a model for searching users by an identifier (email address, for instance), effectively structuring the data for Transcend.
- Transcend then fetches the query, modifies it with the data subject’s identifier (in this example, an email address), and creates a new query to return all data associated with that identifier.
- Once the custom query is configured, Transcend returns an aggregate of all analytics profiles related to the individual privacy request in a downloadable CSV file format for every individual access request the customer must process.
Because you build your own queries and you dictate what data gets returned through Transcend, you maintain control of your data in Looker while also rapidly operating on it and complying with various data privacy regulations. With this automation, you can satisfy data privacy demands from your end users while preserving your engineering resources and maintaining your existing data ecosystem.
How to connect Transcend and Looker
As for connecting the integration, you can link Transcend to your Looker environment in under a minute with a Client ID and Client Secret (standard API Key authentication). Transcend does not hold your API Keys.
We’re proud that the Transcend + Looker integration helps enhance your end user data privacy experience while preserving your engineering resources.
Ready to speed your privacy management and improve your data control?
Implement the Transcend integration or get a Looker demo today.