Knowing the type of data that you collect, where it is being held, with whom it is being shared, and how it is being transferred is a central component of many data privacy and data security programs.  The process of answering these questions is often referred to as a data map or a data inventory.  Although the questions that a data map tries to solve are relatively straightforward, the process of conducting one can be daunting . . . Data_Map_At A Glance (2)