{"id":16025,"date":"2024-11-13T10:00:00","date_gmt":"2024-11-13T09:00:00","guid":{"rendered":"https:\/\/itpatagonia.com\/?p=16025"},"modified":"2026-05-14T15:01:31","modified_gmt":"2026-05-14T13:01:31","slug":"desafios-de-la-gestion-de-datos-personales","status":"publish","type":"post","link":"https:\/\/itpatagonia.com\/en\/blog\/desafios-de-la-gestion-de-datos-personales","title":{"rendered":"Personal data management: main pain points and challenges"},"content":{"rendered":"<p>The management of personal data is no longer just a legal issue; today it directly impacts architecture, operations, customer experience, business continuity, and corporate reputation.<\/p>\n\n\n\n<p>The problem is that many organizations still approach privacy reactively: they respond when an incident, an audit, a regulatory requirement, or a reputational problem arises.<\/p>\n\n\n\n<p>In practice, this results in fragmented programs, diffuse ownership, and inconsistent decisions about how data is used, shared, and protected.<\/p>\n\n\n\n<p>That&#039;s why more and more companies are starting to work under a privacy by design approach: which involves incorporating privacy from the design of processes, products and architectures, instead of adding controls late and in isolation.<\/p>\n\n\n\n<p>As explained from <a href=\"https:\/\/digitalprivacy.ieee.org\/publications\/topics\/what-is-privacy-by-design-and-why-it-s-important\/\">IEEE Digital Privacy<\/a>, This is an approach that seeks to protect individual privacy and data protection through intentional design decisions.&nbsp;<\/p>\n\n\n\n<p>This is not about creating bureaucracy. It&#039;s about building a minimum viable, sustainable, and operational program.<\/p>\n\n\n\n<p>In this context, the <a href=\"https:\/\/itpatagonia.com\/en\/blog\/desafios-de-la-gestion-de-datos-personales\/\">personal data management<\/a> becomes part of a broader strategy of <a href=\"https:\/\/itpatagonia.com\/en\/blog\/data-governance\/\">data governance<\/a>, where the decisions, those responsible, and the risks are made explicit.<\/p>\n\n\n\n<p>This article analyzes the main pain points that companies face today, and proposes a minimum viable privacy program based on ownership, data governance and a privacy-by-design approach.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe title=\"How to establish a data governance program\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/lTFfcrAAFZ8?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><figcaption class=\"wp-element-caption\">How to establish a data governance program.<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><strong>What changes when you process personal data (risk and reputation)<\/strong><\/strong><\/h2>\n\n\n\n<p>When an organization works with personal data, the level of business exposure changes.<\/p>\n\n\n\n<p>Simply storing information correctly is no longer enough. It&#039;s also necessary to demonstrate: its purpose, who has access, how long it&#039;s retained, which third parties are involved, and how the system responds to incidents or regulatory requests.<\/p>\n\n\n\n<p>The impact is no longer just technical. It is also operational, reputational, and financial.<\/p>\n\n\n\n<p>This becomes especially relevant in regulated industries such as banking, insurance, or healthcare. In Argentina, for example, the <a href=\"https:\/\/www.bcra.gob.ar\/archivos\/Pdfs\/comytexord\/A7724.pdf\">BCRA Communication A7724<\/a> It raised the requirements on security, management and control related to the processing of information.<\/p>\n\n\n\n<p>As a result of the provision, banks had to strengthen controls over traceability, access, monitoring and management of third parties, consolidating a more comprehensive vision of privacy and cybersecurity.<\/p>\n\n\n\n<p>At the same time, customers&#039; expectations have also changed. Today they expect transparency regarding the use of their data and react quickly to incidents or malpractice.<\/p>\n\n\n\n<p>That&#039;s why privacy is no longer just about compliance. It&#039;s about operational trust, and when that trust is broken, the cost is often much higher than any fine.<\/p>\n\n\n\n<p>To reduce this risk, many companies are beginning to integrate privacy, security, and governance into a single data strategy. This approach also connects with initiatives from <a href=\"https:\/\/itpatagonia.com\/en\/blog\/ciberseguridad-y-proteccion-de-datos\/\">cybersecurity and data protection<\/a>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"389\" src=\"https:\/\/itpatagonia.com\/wp-content\/uploads\/2024\/11\/Privacidad-de-datos_imagen-1--1024x389.png\" alt=\"Cada vez son m\u00e1s los pa\u00edses que cuentan con normativas de datos personales.\" class=\"wp-image-16026\" srcset=\"https:\/\/itpatagonia.com\/wp-content\/uploads\/2024\/11\/Privacidad-de-datos_imagen-1--1024x389.png 1024w, https:\/\/itpatagonia.com\/wp-content\/uploads\/2024\/11\/Privacidad-de-datos_imagen-1--300x114.png 300w, https:\/\/itpatagonia.com\/wp-content\/uploads\/2024\/11\/Privacidad-de-datos_imagen-1--768x291.png 768w, https:\/\/itpatagonia.com\/wp-content\/uploads\/2024\/11\/Privacidad-de-datos_imagen-1--1536x583.png 1536w, https:\/\/itpatagonia.com\/wp-content\/uploads\/2024\/11\/Privacidad-de-datos_imagen-1--2048x777.png 2048w, https:\/\/itpatagonia.com\/wp-content\/uploads\/2024\/11\/Privacidad-de-datos_imagen-1--18x7.png 18w, https:\/\/itpatagonia.com\/wp-content\/uploads\/2024\/11\/Privacidad-de-datos_imagen-1--720x273.png 720w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">More and more countries have personal data regulations.<\/figcaption><\/figure>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><strong>Pain 1: You don&#039;t know where your personal data is stored.<\/strong><\/strong><\/h2>\n\n\n\n<p>This is often the first real problem. The organization knows it has personal data, but it can&#039;t answer precisely: which systems it&#039;s on, which departments use it, what integrations exist, or what copies are circulating outside of controlled environments.<\/p>\n\n\n\n<p>In many cases, the data appears duplicated among CRM, ERP, SaaS tools, spreadsheets, marketing platforms, and internal developments.<\/p>\n\n\n\n<p>The problem is one of ownership. When no one is responsible for the data lifecycle, inconsistencies, unnecessary access, and difficult-to-control risks arise.&nbsp;<\/p>\n\n\n\n<p>Therefore, the inventory of personal data should not be seen as bureaucratic documentation, but as an operational tool for decision-making:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A Head of Data needs to understand which systems concentrate the most exposure.<\/li>\n\n\n\n<li>A CISO needs to identify access risks.<\/li>\n\n\n\n<li>Compliance needs traceability.<\/li>\n\n\n\n<li>The business area needs to know what information truly adds value.<\/li>\n<\/ul>\n\n\n\n<p>Without visibility, none of those decisions can be sustained.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/itpatagonia.com\/wp-content\/uploads\/2024\/11\/Infografia-Data-Protection-Officer_Emailing_240730_v1.jpg\"><img decoding=\"async\" width=\"1024\" height=\"389\" src=\"https:\/\/itpatagonia.com\/wp-content\/uploads\/2024\/11\/Privacidad-de-datos_imagen-2-1024x389.png\" alt=\"Data Protection Officer: perfil clave en la gobernanza de datos-Infograf\u00eda-IT Patagonia\" class=\"wp-image-16028\" srcset=\"https:\/\/itpatagonia.com\/wp-content\/uploads\/2024\/11\/Privacidad-de-datos_imagen-2-1024x389.png 1024w, https:\/\/itpatagonia.com\/wp-content\/uploads\/2024\/11\/Privacidad-de-datos_imagen-2-300x114.png 300w, https:\/\/itpatagonia.com\/wp-content\/uploads\/2024\/11\/Privacidad-de-datos_imagen-2-768x291.png 768w, https:\/\/itpatagonia.com\/wp-content\/uploads\/2024\/11\/Privacidad-de-datos_imagen-2-1536x583.png 1536w, https:\/\/itpatagonia.com\/wp-content\/uploads\/2024\/11\/Privacidad-de-datos_imagen-2-2048x777.png 2048w, https:\/\/itpatagonia.com\/wp-content\/uploads\/2024\/11\/Privacidad-de-datos_imagen-2-18x7.png 18w, https:\/\/itpatagonia.com\/wp-content\/uploads\/2024\/11\/Privacidad-de-datos_imagen-2-720x273.png 720w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><strong>Pain 2: Consent and unclear purposes<\/strong><\/strong><\/h2>\n\n\n\n<p>Another common problem is that organizations collect data without having a fully defined purpose for it.&nbsp;<\/p>\n\n\n\n<p>Over time, difficult questions arise:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>What was that data originally captured for?<\/li>\n\n\n\n<li>Who authorized its use?<\/li>\n\n\n\n<li>Can it be reused for another process?<\/li>\n\n\n\n<li>Is there traceability of consent?<\/li>\n\n\n\n<li>What happens if the customer requests to revoke it?<\/li>\n<\/ul>\n\n\n\n<p>Many companies still handle consent in a scattered way across forms, platforms, and sales channels.<\/p>\n\n\n\n<p>This creates operational inconsistencies and increases regulatory risk.<\/p>\n\n\n\n<p>The privacy by design approach changes that logic. The purpose of the data processing is no longer discussed at the end of the project but is defined from the initial design stage.<\/p>\n\n\n\n<p>For example: a product team defines what data is really necessary, the architecture team validates where it will be stored, the security team defines access, and compliance verifies legal bases and retention.<\/p>\n\n\n\n<p>This early alignment reduces rework and prevents privacy from appearing only as a barrier.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><strong><strong>Pain 3: Third parties\/suppliers and shared responsibilities<\/strong><\/strong><\/strong><\/h2>\n\n\n\n<p>One of the biggest current risks appears outside the organization, since personal data often circulates among third parties without a clear model of responsibilities.<\/p>\n\n\n\n<p>Then critical questions arise:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Who is responsible for responding to an incident?<\/li>\n\n\n\n<li>What evidence does the supplier provide?<\/li>\n\n\n\n<li>How are access points audited?<\/li>\n\n\n\n<li>What SLAs exist?<\/li>\n\n\n\n<li>Where is the data stored?<\/li>\n\n\n\n<li>What happens when the contract ends?<\/li>\n<\/ul>\n\n\n\n<p>In practice, many organizations only discover these gaps after a problem has occurred.<\/p>\n\n\n\n<p>That&#039;s why privacy and third-party management have to work together. Simply including legal clauses isn&#039;t enough.<\/p>\n\n\n\n<p>Operational controls, evidence, and continuous monitoring are also needed.<\/p>\n\n\n\n<p>Especially in AI projects, where the use of external models can generate new risks regarding traceability, training, and exposure of sensitive information.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><strong><strong><strong>Pain 4: Culture and processes (not just legal)<\/strong><\/strong><\/strong><\/strong><\/h2>\n\n\n\n<p>One of the most common mistakes is thinking of privacy as an issue exclusively within the legal field.<\/p>\n\n\n\n<p>In reality, the biggest problems usually arise in daily operations:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Users sharing information incorrectly.<\/li>\n\n\n\n<li>Excessive access.<\/li>\n\n\n\n<li>Data exported outside of policies.<\/li>\n\n\n\n<li>Automations without validation.<\/li>\n\n\n\n<li>AI tools used without minimal controls.<\/li>\n<\/ul>\n\n\n\n<p>Privacy doesn&#039;t scale with policies alone. It scales with operational practices.<\/p>\n\n\n\n<p>That&#039;s why the most effective programs work on specific cultures and processes.<\/p>\n\n\n\n<p>For example: defining responsibilities for each data domain, establishing access criteria, providing training on the use of AI, incorporating validations in development, and creating simple playbooks for incidents.<\/p>\n\n\n\n<p>When privacy is integrated into daily work, it ceases to be a hindrance and becomes an organizational capability.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"389\" src=\"https:\/\/itpatagonia.com\/wp-content\/uploads\/2024\/11\/Privacidad-de-datos_imagen-3--1024x389.png\" alt=\"Una organizaci\u00f3n se distingue de otra por el tratamiento \u00e9tico de sus datos personales.\" class=\"wp-image-16027\" srcset=\"https:\/\/itpatagonia.com\/wp-content\/uploads\/2024\/11\/Privacidad-de-datos_imagen-3--1024x389.png 1024w, https:\/\/itpatagonia.com\/wp-content\/uploads\/2024\/11\/Privacidad-de-datos_imagen-3--300x114.png 300w, https:\/\/itpatagonia.com\/wp-content\/uploads\/2024\/11\/Privacidad-de-datos_imagen-3--768x291.png 768w, https:\/\/itpatagonia.com\/wp-content\/uploads\/2024\/11\/Privacidad-de-datos_imagen-3--1536x583.png 1536w, https:\/\/itpatagonia.com\/wp-content\/uploads\/2024\/11\/Privacidad-de-datos_imagen-3--2048x777.png 2048w, https:\/\/itpatagonia.com\/wp-content\/uploads\/2024\/11\/Privacidad-de-datos_imagen-3--18x7.png 18w, https:\/\/itpatagonia.com\/wp-content\/uploads\/2024\/11\/Privacidad-de-datos_imagen-3--720x273.png 720w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">One organization is distinguished from another by the ethical treatment of your personal data.<\/figcaption><\/figure>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><strong>Minimum Viable Privacy Program in 8 Steps<\/strong><\/strong><\/h2>\n\n\n\n<p>Many organizations postpone these programs because they envision enormous and difficult-to-implement initiatives.<\/p>\n\n\n\n<p>But an effective program can begin incrementally.<\/p>\n\n\n\n<p>A minimum viable approach typically includes:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Identify systems and sources with critical personal data.<\/li>\n\n\n\n<li>Define responsibilities for each domain or process.<\/li>\n\n\n\n<li>Record the purposes and legal bases of the processing.<\/li>\n\n\n\n<li>Establish classification and access levels.<\/li>\n\n\n\n<li>Implement simple retention and deletion policies.<\/li>\n\n\n\n<li>Review contracts and controls over third parties.<\/li>\n\n\n\n<li>Create an operational playbook for incidents.<\/li>\n\n\n\n<li>Train teams on responsible use of data and AI.<\/li>\n<\/ul>\n\n\n\n<p>The goal is not to achieve immediate perfection. It&#039;s to build traceability, ownership, and the capacity for continuous improvement.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><strong>How to integrate it into data governance without slowing down the business<\/strong><\/strong><\/h2>\n\n\n\n<p>One of the main fears in the business is that privacy will slow down projects. This happens when controls are implemented late or in isolation.<\/p>\n\n\n\n<p>In contrast, when privacy is integrated into the data governance model, decisions become faster and more predictable.<\/p>\n\n\n\n<p>For example: architecture knows which standards to apply, product understands what data is needed, security defines controls from the start, and the business can reuse information with less risk.<\/p>\n\n\n\n<p>The benefit is measurable: less rework, fewer incidents, shorter validation times, and greater capacity to scale digital and AI initiatives.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><strong>Common mistakes<\/strong><\/strong><\/h2>\n\n\n\n<p>One of the most common mistakes is starting with tools before defining responsibilities.&nbsp;<\/p>\n\n\n\n<p>Another common mistake is building overly theoretical programs that nobody uses in operation.<\/p>\n\n\n\n<p>The disconnect between areas is also common, and many companies underestimate the impact of AI on privacy and governance.<\/p>\n\n\n\n<p>Today, simply controlling traditional databases is no longer enough. It&#039;s also necessary to define how to use assistants, models, and automations that interact with sensitive information.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Checklist: minimum privacy program<\/strong><\/h2>\n\n\n\n<p>Most organizations do not need to start with a complex or highly sophisticated program.<\/p>\n\n\n\n<p>The important thing is to build an operational base that allows for ordering decisions, assigning responsibilities, and progressively reducing risks.<\/p>\n\n\n\n<p>This checklist serves as a minimum viable starting point to begin working on privacy continuously, integrated into data governance and aligned with the real needs of the business.<\/p>\n\n\n\n<p>1. <strong>Inventory of personal data by system\/source<\/strong>. It allows you to identify where the data is located, which areas use it, and what level of exposure exists on each platform.<\/p>\n\n\n\n<p>2. <strong>Record of purposes and legal bases for processing<\/strong>. It helps to document what the data is used for and under what regulatory or contractual criteria those treatments are justified.<\/p>\n\n\n\n<p>3. <strong>Consent management (capture, traceability, revocation)<\/strong>. It makes it easier to demonstrate when and how a user authorized the use of their data, including clear revocation mechanisms.<\/p>\n\n\n\n<p>4. <strong>Data classification and access levels<\/strong>. It allows limiting access based on criticality and operational role, reducing risks of misuse or unnecessary exposure.<\/p>\n\n\n\n<p>5. <strong>Retention and deletion (policy + execution)<\/strong>. Define how long the data should be kept and how to execute effective deletion or anonymization processes.<\/p>\n\n\n\n<p>6. <strong>Suppliers: clauses, SLAs, audits and evidence<\/strong>. It helps to establish shared responsibilities with third parties and ensure traceability regarding the external processing of information.<\/p>\n\n\n\n<p>7. <strong>Playbook incident response and responsible parties<\/strong>. It allows for faster action in response to security or privacy events, avoiding improvisation and reducing operational impact.<\/p>\n\n\n\n<p>8. <strong>Training and monitoring of AI tool use<\/strong>. It seeks to reduce risks associated with the uncontrolled use of assistants, automations, or platforms that process sensitive data.<\/p>\n\n\n\n<p>9. <strong>Implementing these points does not imply halting projects or adding unnecessary bureaucracy.<\/strong>. The goal is to build a sustainable model where privacy, governance, and operations work in a coordinated manner to support business growth with less risk and greater traceability.<\/p>\n\n\n\n<p>Download the minimum privacy program checklist: <a href=\"https:\/\/itpatagonia.com\/en\/recursos\/checklist-privacidad-datos\/\">by clicking here<\/a>&nbsp;<\/p>\n\n\n\n<p>Want to integrate privacy, governance, and data strategy without slowing down your business? Discover IT Patagonia&#039;s Data &amp; AI approach: <a href=\"https:\/\/itpatagonia.com\/en\/servicios\/data-ia\/\">Click here<\/a>&nbsp;<\/p>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>We analyze the main pain points in personal data management and the appropriate paths to resolve them. In addition, we address the legal challenges to comply with current regulations and the importance of cultural change.<\/p>","protected":false},"author":3,"featured_media":16029,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[172],"tags":[86,118,116],"class_list":["post-16025","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-ia","tag-data-governance","tag-data-privacy","tag-gobernanza-de-datos"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Gesti\u00f3n de datos personales: principales dolores y desaf\u00edos<\/title>\n<meta name=\"description\" content=\"Analizamos las problem\u00e1ticas de la gesti\u00f3n de los datos personales y caminos para resolverlas. Desaf\u00edos legales y del cambio cultural.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itpatagonia.com\/en\/blog\/desafios-de-la-gestion-de-datos-personales\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Gesti\u00f3n de datos personales: principales dolores y desaf\u00edos\" \/>\n<meta property=\"og:description\" content=\"Analizamos las problem\u00e1ticas de la gesti\u00f3n de los datos personales y caminos para resolverlas. Desaf\u00edos legales y del cambio cultural.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itpatagonia.com\/en\/blog\/desafios-de-la-gestion-de-datos-personales\/\" \/>\n<meta property=\"og:site_name\" content=\"IT Patagonia\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-13T09:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-14T13:01:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itpatagonia.com\/wp-content\/uploads\/2024\/11\/Privacidad-de-datos_Portada-copia-3-1024x389.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"389\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Valeria Frick\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Valeria Frick\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/itpatagonia.com\\\/blog\\\/desafios-de-la-gestion-de-datos-personales#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/itpatagonia.com\\\/blog\\\/desafios-de-la-gestion-de-datos-personales\"},\"author\":{\"name\":\"Valeria Frick\",\"@id\":\"https:\\\/\\\/itpatagonia.com\\\/#\\\/schema\\\/person\\\/ac8661c9cfc3e2a5a865f0fe97c9e1bb\"},\"headline\":\"Gesti\u00f3n de los datos personales: principales dolores y desaf\u00edos\",\"datePublished\":\"2024-11-13T09:00:00+00:00\",\"dateModified\":\"2026-05-14T13:01:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/itpatagonia.com\\\/blog\\\/desafios-de-la-gestion-de-datos-personales\"},\"wordCount\":1830,\"publisher\":{\"@id\":\"https:\\\/\\\/itpatagonia.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/itpatagonia.com\\\/blog\\\/desafios-de-la-gestion-de-datos-personales#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/itpatagonia.com\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Privacidad-de-datos_Portada-copia-3.png\",\"keywords\":[\"Data governance\",\"Data privacy\",\"Gobernanza de datos\"],\"articleSection\":[\"Data &amp; IA\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/itpatagonia.com\\\/blog\\\/desafios-de-la-gestion-de-datos-personales\",\"url\":\"https:\\\/\\\/itpatagonia.com\\\/blog\\\/desafios-de-la-gestion-de-datos-personales\",\"name\":\"Gesti\u00f3n de datos personales: principales dolores y desaf\u00edos\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/itpatagonia.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/itpatagonia.com\\\/blog\\\/desafios-de-la-gestion-de-datos-personales#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/itpatagonia.com\\\/blog\\\/desafios-de-la-gestion-de-datos-personales#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/itpatagonia.com\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Privacidad-de-datos_Portada-copia-3.png\",\"datePublished\":\"2024-11-13T09:00:00+00:00\",\"dateModified\":\"2026-05-14T13:01:31+00:00\",\"description\":\"Analizamos las problem\u00e1ticas de la gesti\u00f3n de los datos personales y caminos para resolverlas. Desaf\u00edos legales y del cambio cultural.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/itpatagonia.com\\\/blog\\\/desafios-de-la-gestion-de-datos-personales#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/itpatagonia.com\\\/blog\\\/desafios-de-la-gestion-de-datos-personales\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/itpatagonia.com\\\/blog\\\/desafios-de-la-gestion-de-datos-personales#primaryimage\",\"url\":\"https:\\\/\\\/itpatagonia.com\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Privacidad-de-datos_Portada-copia-3.png\",\"contentUrl\":\"https:\\\/\\\/itpatagonia.com\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Privacidad-de-datos_Portada-copia-3.png\",\"width\":3334,\"height\":1265,\"caption\":\"Privacidad de datos-Gesti\u00f3n de datos personales-IT Patagonia\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/itpatagonia.com\\\/blog\\\/desafios-de-la-gestion-de-datos-personales#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/itpatagonia.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Gesti\u00f3n de los datos personales: principales dolores y desaf\u00edos\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/itpatagonia.com\\\/#website\",\"url\":\"https:\\\/\\\/itpatagonia.com\\\/\",\"name\":\"IT Patagonia\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/itpatagonia.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/itpatagonia.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/itpatagonia.com\\\/#organization\",\"name\":\"IT Patagonia\",\"url\":\"https:\\\/\\\/itpatagonia.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/itpatagonia.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/itpatagonia.com\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/IT-Patagonia-logo-web.png\",\"contentUrl\":\"https:\\\/\\\/itpatagonia.com\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/IT-Patagonia-logo-web.png\",\"width\":350,\"height\":100,\"caption\":\"IT Patagonia\"},\"image\":{\"@id\":\"https:\\\/\\\/itpatagonia.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/itpatagonia\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/itpatagonia.com\\\/#\\\/schema\\\/person\\\/ac8661c9cfc3e2a5a865f0fe97c9e1bb\",\"name\":\"Valeria Frick\",\"url\":\"https:\\\/\\\/itpatagonia.com\\\/en\\\/blog\\\/author\\\/vfrick\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Personal data management: main pains and challenges","description":"We analyze the problems of personal data management and ways to resolve them. We explore legal challenges and challenges related to cultural change.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itpatagonia.com\/en\/blog\/desafios-de-la-gestion-de-datos-personales\/","og_locale":"en_US","og_type":"article","og_title":"Gesti\u00f3n de datos personales: principales dolores y desaf\u00edos","og_description":"Analizamos las problem\u00e1ticas de la gesti\u00f3n de los datos personales y caminos para resolverlas. Desaf\u00edos legales y del cambio cultural.","og_url":"https:\/\/itpatagonia.com\/en\/blog\/desafios-de-la-gestion-de-datos-personales\/","og_site_name":"IT Patagonia","article_published_time":"2024-11-13T09:00:00+00:00","article_modified_time":"2026-05-14T13:01:31+00:00","og_image":[{"width":1024,"height":389,"url":"https:\/\/itpatagonia.com\/wp-content\/uploads\/2024\/11\/Privacidad-de-datos_Portada-copia-3-1024x389.png","type":"image\/png"}],"author":"Valeria Frick","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Valeria Frick","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itpatagonia.com\/blog\/desafios-de-la-gestion-de-datos-personales#article","isPartOf":{"@id":"https:\/\/itpatagonia.com\/blog\/desafios-de-la-gestion-de-datos-personales"},"author":{"name":"Valeria Frick","@id":"https:\/\/itpatagonia.com\/#\/schema\/person\/ac8661c9cfc3e2a5a865f0fe97c9e1bb"},"headline":"Gesti\u00f3n de los datos personales: principales dolores y desaf\u00edos","datePublished":"2024-11-13T09:00:00+00:00","dateModified":"2026-05-14T13:01:31+00:00","mainEntityOfPage":{"@id":"https:\/\/itpatagonia.com\/blog\/desafios-de-la-gestion-de-datos-personales"},"wordCount":1830,"publisher":{"@id":"https:\/\/itpatagonia.com\/#organization"},"image":{"@id":"https:\/\/itpatagonia.com\/blog\/desafios-de-la-gestion-de-datos-personales#primaryimage"},"thumbnailUrl":"https:\/\/itpatagonia.com\/wp-content\/uploads\/2024\/11\/Privacidad-de-datos_Portada-copia-3.png","keywords":["Data governance","Data privacy","Gobernanza de datos"],"articleSection":["Data &amp; IA"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/itpatagonia.com\/blog\/desafios-de-la-gestion-de-datos-personales","url":"https:\/\/itpatagonia.com\/blog\/desafios-de-la-gestion-de-datos-personales","name":"Personal data management: main pains and challenges","isPartOf":{"@id":"https:\/\/itpatagonia.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itpatagonia.com\/blog\/desafios-de-la-gestion-de-datos-personales#primaryimage"},"image":{"@id":"https:\/\/itpatagonia.com\/blog\/desafios-de-la-gestion-de-datos-personales#primaryimage"},"thumbnailUrl":"https:\/\/itpatagonia.com\/wp-content\/uploads\/2024\/11\/Privacidad-de-datos_Portada-copia-3.png","datePublished":"2024-11-13T09:00:00+00:00","dateModified":"2026-05-14T13:01:31+00:00","description":"We analyze the problems of personal data management and ways to resolve them. We explore legal challenges and challenges related to cultural change.","breadcrumb":{"@id":"https:\/\/itpatagonia.com\/blog\/desafios-de-la-gestion-de-datos-personales#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itpatagonia.com\/blog\/desafios-de-la-gestion-de-datos-personales"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itpatagonia.com\/blog\/desafios-de-la-gestion-de-datos-personales#primaryimage","url":"https:\/\/itpatagonia.com\/wp-content\/uploads\/2024\/11\/Privacidad-de-datos_Portada-copia-3.png","contentUrl":"https:\/\/itpatagonia.com\/wp-content\/uploads\/2024\/11\/Privacidad-de-datos_Portada-copia-3.png","width":3334,"height":1265,"caption":"Privacidad de datos-Gesti\u00f3n de datos personales-IT Patagonia"},{"@type":"BreadcrumbList","@id":"https:\/\/itpatagonia.com\/blog\/desafios-de-la-gestion-de-datos-personales#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/itpatagonia.com\/"},{"@type":"ListItem","position":2,"name":"Gesti\u00f3n de los datos personales: principales dolores y desaf\u00edos"}]},{"@type":"WebSite","@id":"https:\/\/itpatagonia.com\/#website","url":"https:\/\/itpatagonia.com\/","name":"IT Patagonia","description":"","publisher":{"@id":"https:\/\/itpatagonia.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itpatagonia.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/itpatagonia.com\/#organization","name":"IT Patagonia","url":"https:\/\/itpatagonia.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itpatagonia.com\/#\/schema\/logo\/image\/","url":"https:\/\/itpatagonia.com\/wp-content\/uploads\/2023\/11\/IT-Patagonia-logo-web.png","contentUrl":"https:\/\/itpatagonia.com\/wp-content\/uploads\/2023\/11\/IT-Patagonia-logo-web.png","width":350,"height":100,"caption":"IT Patagonia"},"image":{"@id":"https:\/\/itpatagonia.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/itpatagonia\/"]},{"@type":"Person","@id":"https:\/\/itpatagonia.com\/#\/schema\/person\/ac8661c9cfc3e2a5a865f0fe97c9e1bb","name":"Valeria Frick","url":"https:\/\/itpatagonia.com\/en\/blog\/author\/vfrick"}]}},"_links":{"self":[{"href":"https:\/\/itpatagonia.com\/en\/wp-json\/wp\/v2\/posts\/16025","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/itpatagonia.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itpatagonia.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itpatagonia.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/itpatagonia.com\/en\/wp-json\/wp\/v2\/comments?post=16025"}],"version-history":[{"count":6,"href":"https:\/\/itpatagonia.com\/en\/wp-json\/wp\/v2\/posts\/16025\/revisions"}],"predecessor-version":[{"id":30801,"href":"https:\/\/itpatagonia.com\/en\/wp-json\/wp\/v2\/posts\/16025\/revisions\/30801"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itpatagonia.com\/en\/wp-json\/wp\/v2\/media\/16029"}],"wp:attachment":[{"href":"https:\/\/itpatagonia.com\/en\/wp-json\/wp\/v2\/media?parent=16025"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itpatagonia.com\/en\/wp-json\/wp\/v2\/categories?post=16025"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itpatagonia.com\/en\/wp-json\/wp\/v2\/tags?post=16025"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}