Knowing the type of data that you collect, where it is being held, with whom it is being shared, and how it is being transferred is a central component of many data privacy and data security programs. The process of answering these questions is often referred to as a data map or a data inventory. Although the questions that a data map tries to solve are relatively straightforward, the process of conducting one can be daunting . . .