HiringCoachAI

NIST Privacy Framework mapping

Last reviewed 2026-05-12

This document maps HiringCoachAI's privacy program to the NIST Privacy Framework v1.0 Core. It is a current-state self-assessment for privacy due diligence and HECVAT support.

The current mapping baseline is NIST Privacy Framework v1.0, published January 2020. NIST Privacy Framework 1.1 remains in Initial Public Draft status as of this review; HiringCoachAI will review the final 1.1 Core after NIST publishes it.

Status Key

StatusMeaning
ImplementedThe outcome is addressed by current policy, process, product behavior, provider controls, or review evidence.
PartialThe outcome is addressed in part, but coverage is intentionally limited by current product scope or a documented roadmap item.
Provider-managedThe outcome is primarily handled by managed cloud, hosting, identity, payment, or infrastructure providers under vendor controls reviewed through the vendor-risk program.
Not applicableThe outcome is not applicable to HiringCoachAI's current cloud-hosted SaaS scope.

Current Privacy Program Scope

HiringCoachAI processes account, authentication, career-content, resume, job-search, coaching, billing identifier, support, usage, and security-event data for a cloud-hosted SaaS product. The service is not designed to collect HIPAA-regulated protected health information, payment-card primary account numbers, card verification values, card-track data, government identifiers, children's personal data, or secrets. Because users can enter free text, unexpected regulated data may be submitted inadvertently; those cases are handled under confidential-data safeguards, data-subject request procedures, deletion procedures, and incident-response processes.

The privacy program uses the following evidence sources:

Evidence areaCurrent sources
Privacy notice and user rightsPrivacy Policy, Cookie Policy, Data Processing Agreement template
Data inventory and data flowData Map, Data Flow Diagram, Architecture, Data Residency
Vendor and processor governanceSub-Processors List, DPA Register, Vendor Risk Management Policy
Privacy risk governanceInternal Audit Program, Information Security Policy, AI Use Policy, AI Model Inventory, AI Bias Evaluation
Data lifecycleData Retention Policy, Account Export, Account Deletion, Breach Notification
Access and protectionAccess Control Policy, Acceptable Use Policy, Security Overview, Logging and Retention, Patch Management, Change Management
Resilience and responseIncident Response, Business Continuity Plan, Disaster Recovery Plan, Responsible Disclosure
Training and personnelSecurity Awareness Training, Privacy/Data Handling Training Module, Background Checks, Access Control Policy

Function Coverage Summary

NIST Privacy Framework functionCoverageSummary
Identify-PImplemented with partial third-party ecosystem depthData categories, processing purposes, systems, providers, processing locations, and core privacy risks are inventoried. Vendor reassessment is operating, with vendor assurance based on standard published terms, DPAs, and trust materials where available.
Govern-PImplementedPrivacy roles, policies, training, legal obligations, risk review, data-subject request processes, complaint intake, and internal audit cadence are documented.
Control-PPartialAccount export, account deletion, consent management, data retention, and user-editable data support the core privacy controls. Granular consent propagation, advanced de-identification, and user-selectable data-processing controls are scoped per feature.
Communicate-PImplemented with partial data-lineage depthPrivacy notice, cookie notice, AI disclosure, sub-processor notice, breach-notification process, and privacy mailbox are in place. Detailed per-record provenance and downstream disclosure records are limited to current product and vendor registry scope.
Protect-PImplemented with provider-managed componentsAccess control, encryption, logging, vulnerability management, change management, resilience, incident response, and provider-managed physical/infrastructure safeguards are documented. Hardware integrity and datacenter maintenance are provider-managed, not first-party controls.

Detailed Category Mapping

NIST categorySubcategories coveredCoverageHiringCoachAI controls and evidence
ID.IM-P: Inventory and MappingID.IM-P1 through ID.IM-P8ImplementedData Map inventories personal data categories, processing purposes, processors, locations, retention, and data flows. Architecture and Data Flow Diagram identify systems and component interactions. Sub-Processors List and DPA Register identify third-party processors.
ID.BE-P: Business EnvironmentID.BE-P1 through ID.BE-P3ImplementedDeployment Model, Privacy Policy, DPA template, and Information Security Policy define HiringCoachAI's role as SaaS provider, processor/service-provider posture for customer end-user data, and controller/business posture for direct account and operational data.
ID.RA-P: Risk AssessmentID.RA-P1 through ID.RA-P5ImplementedInternal Audit Program includes privacy checks, data-subject request tests, vendor review, AI governance review, and retention verification. AI Bias Evaluation evaluates algorithmic-output risk. Threat Model and Data Classification support risk prioritization.
ID.DE-P: Data Processing Ecosystem Risk ManagementID.DE-P1 through ID.DE-P5PartialVendor Risk Management Policy, DPA Register, Sub-Processors List, and Data Map identify vendors, data categories, contractual posture, SCC posture, review cadence, and offboarding expectations. ID.DE-P4 is generally not applicable to the current cloud-hosted SaaS delivery model except through standard DPAs, SCCs, and customer DPA terms.
GV.PO-P: Governance Policies, Processes, and ProceduresGV.PO-P1 through GV.PO-P6ImplementedPrivacy Policy, Information Security Policy, Data Classification, Access Control Policy, AI Use Policy, Data Retention Policy, and DPA template establish privacy values, requirements, roles, processing conditions, retention, and user-rights commitments.
GV.RM-P: Risk Management StrategyGV.RM-P1 through GV.RM-P3ImplementedInternal Audit Program, Vendor Risk Management Policy, Threat Model, and risk-tiering in vendor review define risk ownership, tolerance, review cadence, and escalation expectations.
GV.AT-P: Awareness and TrainingGV.AT-P1 through GV.AT-P4ImplementedSecurity Awareness Training, Privacy/Data Handling Training Module, Acceptable Use Policy, Access Control Policy, DPA terms, and vendor contracts address privacy-related responsibilities for personnel and third parties.
GV.MT-P: Monitoring and ReviewGV.MT-P1 through GV.MT-P7ImplementedInternal Audit Program, document-review cadence, vendor review cadence, privacy mailbox, data-subject request process, breach-notification process, and incident-response lessons-learned process provide ongoing review and response to privacy issues.
CT.PO-P: Data Processing Policies, Processes, and ProceduresCT.PO-P1 through CT.PO-P4ImplementedPrivacy Policy, Cookie Policy, DPA template, Data Retention Policy, account export, account deletion, consent management, and SDLC documentation establish processing authorization, rights request handling, retention, and data lifecycle expectations.
CT.DM-P: Data Processing ManagementCT.DM-P1 through CT.DM-P10PartialAccount export and deletion support review, portability, transmission, alteration, and erasure. Retention procedures support destruction. Audit logging is documented with data-minimization expectations. Granular permission propagation across all data elements, and stakeholder privacy preferences as explicit algorithmic constraints in every AI workflow, are scoped per feature.
CT.DP-P: Disassociated ProcessingCT.DP-P1 through CT.DP-P5PartialUser-scoped identifiers, logical tenant separation, encryption, restricted fields, data minimization, and analytics consent controls reduce unnecessary observability and linkage. Advanced privacy-preserving computation, broad de-identification, and attribute-substitution patterns are not universal because the service must process user-identifiable account and career content to deliver the product.
CM.PO-P: Communication Policies, Processes, and ProceduresCM.PO-P1 through CM.PO-P2ImplementedPrivacy Policy, Cookie Policy, AI Disclosure, DPA template, Sub-Processors List, Breach Notification, and designated privacy/security contact channels define how privacy practices and risks are communicated.
CM.AW-P: Data Processing AwarenessCM.AW-P1 through CM.AW-P8PartialPublic privacy notices, cookie notice, AI disclosure, trust-center documents, privacy mailbox, breach-notification process, export/deletion mechanisms, and customer DPA support transparency and requests. Detailed data provenance/lineage records and downstream disclosure records are maintained within current vendor and audit registries.
PR.PO-P: Data Protection Policies, Processes, and ProceduresPR.PO-P1 through PR.PO-P10ImplementedSecurity Overview, Access Control Policy, Change Management, SDLC, Patch Management, Incident Response, Business Continuity Plan, Disaster Recovery Plan, Background Checks, and vendor-managed backup controls establish protection procedures.
PR.AC-P: Identity Management, Authentication, and Access ControlPR.AC-P1 through PR.AC-P6ImplementedAuthentication, account ownership, administrator authorization, least privilege, access review, offboarding, provider MFA for administrative accounts, and vendor-dashboard access controls limit access to authorized personnel and systems.
PR.DS-P: Data SecurityPR.DS-P1 through PR.DS-P8Implemented with provider-managed componentsData at rest and in transit are protected through managed cloud encryption, HTTPS, HSTS, and field-level encryption for selected restricted values. Production and non-production environments are separated. Capacity, platform resilience, and hardware integrity are provider-managed.
PR.MA-P: MaintenancePR.MA-P1 through PR.MA-P2Provider-managedHiringCoachAI does not operate first-party datacenters or customer-hosted appliances. Cloud infrastructure maintenance is handled by managed providers; application changes follow Change Management and SDLC procedures.
PR.PT-P: Protective TechnologyPR.PT-P1 through PR.PT-P4Implemented with provider-managed componentsRemovable media is restricted by policy. Least-functionality expectations, managed DNS/security edge, hosting protections, logging, backup, and recovery controls support resilience and protective technology outcomes.

Partial-Coverage Notes

AreaCurrent limitationCurrent handling
ISO 27701ISO 27701 certification has not been pursued.HiringCoachAI uses the NIST Privacy Framework v1.0 as the privacy-framework mapping baseline for HECVAT PDOC-02.
NIST Privacy Framework certificationNIST Privacy Framework is a voluntary framework and does not itself provide certification.This document is a self-assessment mapped to current controls and evidence.
Granular processing permissionsUser privacy choices exist for consent-gated analytics/marketing and data-subject rights, but every data element does not carry a machine-readable processing-permission object.Data processing is constrained through Privacy Policy, Cookie Policy, account export/deletion, DPA terms, data minimization, vendor registry review, and retention controls.
Advanced de-identification and privacy-preserving computationThe core product must process identifiable career content to deliver resume, job-search, and coaching workflows.The program uses user-scoped authorization, minimization, retention controls, encryption, vendor review, and consent controls rather than claiming universal de-identification.
Detailed data lineage and disclosure recordsCurrent records identify vendors, processing purposes, and data categories, but not a per-field downstream lineage ledger for every individual record.Data Map, Sub-Processors List, DPA Register, audit logs, and vendor-risk reviews provide current disclosure and processing evidence.
Provider-managed physical, hardware, and platform controlsHiringCoachAI does not operate first-party datacenters, physical servers, or network appliances.Google Cloud, Firebase, Vercel, Cloudflare, Stripe, and other providers operate these controls under vendor terms and security programs reviewed through vendor risk management.

Maintenance

The Privacy Officer reviews this mapping at least annually and when any of the following occurs:

  • A new category of personal data is collected.
  • A new sub-processor receives personal data.
  • A material AI, analytics, or user-rights workflow changes.
  • A new privacy law or customer DPA obligation materially changes the program.
  • NIST finalizes a new Privacy Framework version.

References

Change Log

DateChange
2026-05-12Initial NIST Privacy Framework v1.0 mapping created for HECVAT PDOC-02.

← Back to the trust center

showUpgradeModal: false, modalType: migration, planName: