DATA
Owner: Data Protection Officer / Privacy Team / CISO
AI Data Controls
Address the unique risks of data input, retention, and generation in AI systems, which often differ from standard data protection needs.
Framework Mapping
Controls from each source framework that map to this domain.
| Framework | Mapped Controls |
|---|---|
| ISO 42001 |
A.8 Data for AI Systems
Cl.7 Support
Cl.8 Operation
|
| NIST AI RMF |
GV-1 Policies
MP-2 Context & Purpose
MP-4 Data Requirements
MS-2 Performance
|
| OWASP LLM |
LLM06 Sensitive Info Disclosure
LLM02 Insecure Output
|
| OWASP Agentic |
ASI03 Data & Model Poisoning
ASI08 Compliance & Regulatory
|
Controls
3 controls across Tier 1 (essential) and Tier 2 (advanced).
Audit Checklist
Quick-reference checklist items grouped by control.
- ☐ Data input policy exists, is current, and explicitly maps data classification tiers to permitted AI interactions
- ☐ DLP controls are active on all approved AI tool access paths (browser, API gateway, endpoint)
- ☐ User acknowledgment records confirm policy acceptance prior to AI tool access
- ☐ Quarterly sample audits of AI interactions are documented with findings and remediation actions
- ☐ Automated data pipelines include classification validation gates before AI submission
- ☐ Retention schedule exists and maps each category of AI interaction data to a defined retention period with regulatory justification
- ☐ DPAs with AI vendors explicitly address data retention, training opt-out, and deletion procedures
- ☐ Privacy notices are presented to users before AI interaction data is collected or stored
- ☐ Automated purge mechanisms are operational and logs confirm on-schedule execution
- ☐ Quarterly audits verify no orphaned interaction data exists beyond retention periods
- ☐ Post-generation PII scanning is active on all production AI output channels
- ☐ Detection rules cover at minimum: names, emails, phone numbers, national identifiers, and financial account numbers
- ☐ PII leakage incident response procedure is documented and includes regulatory notification timelines
- ☐ Inferential re-identification risk assessments are conducted for high-risk AI use cases
- ☐ Role-based output policies adjust PII suppression based on consumer authorization level