Blog

Why Production Is Not the Only Privacy Boundary

Most personal data incidents do not begin in the primary system of record. They begin in the copies around it.

The most tightly governed environment in a company is usually production. It has named owners, approved access paths, change control, monitoring, and a clearer audit trail.

The problem is that personal data does not stay there.

It moves into staging databases, test fixtures, CSV extracts, shared drives, analytics sandboxes, partner handoffs, and AI workflows. Those copies often carry the same liability as the primary system, but they rarely inherit the same operational controls.

That is the real privacy gap.

The wrong mental model

Many teams still treat privacy as a perimeter issue around the production database. That leads to a false sense of security:

  • production is locked down, so the data is safe
  • access to the core system is reviewed, so the risk is contained
  • the main database is monitored, so the compliance position is defensible

All three can be true while the organisation still has weaker copies of the same data spread through lower-control environments.

What usually causes the spill

The movement is rarely malicious. It is operational.

  • engineering needs realistic data for testing
  • analytics needs a flat extract for exploration
  • a partner needs a subset quickly
  • a user wants to upload a file to an external AI tool
  • a project team creates a local workaround because the official path is too slow

The issue is not that people want to break policy. It is that the governed path is often slower than the unofficial one.

What a better model looks like

A better privacy model treats the question as an operational workflow problem:

  1. Where does the data actually move after it leaves the source?
  2. Which of those movements are legitimate?
  3. What control should apply before that movement happens?
  4. Can the decision be evidenced afterwards?

That is why discovery, review, de-identification, and audit need to stay on the same operating layer. If each team solves a different part with a separate tool and a separate process, the organisation loses consistency at exactly the moment it needs it most.

The practical standard

For most regulated teams, the standard should be simple:

  • know where sensitive data lives beyond production
  • create a governed review path before downstream use
  • make safe exports easier than ad hoc copying
  • preserve an evidence trail for what changed and why

Privacy programmes become more credible when they reflect how data really moves, not how the architecture diagram says it should move.