SlideShare une entreprise Scribd logo
1  sur  25
Télécharger pour lire hors ligne
Is Your PeopleSoft Ready For the GDPR?
48 Hours to Go...
Oracle HCM Cloud & PeopleSoft Cedar Day 2018
Wednesday, 23rd May 2018
Sarah Hurley, Cedar Consulting
Introduction - GDPR
The GDPR on a Page
3
The GDPR on a Page
4
₋ Lawful, fair, and transparent
₋ Purpose limitation
₋ Data minimization
₋ Accurate and up-to-date
processing
₋ Limitation of storage
₋ Confidential and secure
₋ Accountability andliability
7 Principles:
Data Classification
PeopleSoft captures a plethora of personal
and sensitive data
Examples of this data can include the
following depending on context:
– Name
– Ethnic or racial origin
– Political opinions
– Memberships
– Physical or mental
health details
– Criminal orcivil
offenses
– IP Address
– Photo
– Meal Preferences
Personal and Sensitive Data
ORACLE©. (2018, May). Be in the Know for PeopleSoft HCM Data Privacy [Webinar].
Data Classification
 The Personally Identifiable and Sensitive data (doc ID 2313438.1) is
being updated (likely this month) with NA payroll and benefits
being added
 Future plans:
 An online (in app) version of the tool is being released which
will allow the addition of custom fields
 Additional spreadsheets being launched for FSCM, ELM and CRM
Data Classification
Oracle’s Mockup of the Online Identification and Usage solution
Data Masking
 Masking of production environments in the user interface (security
driven) – released in PI 26 – currently limited to:
 Date of Birth
 National ID
 Bank Account Number (all but last 4 digits)
 This document is really useful: Implementing Sensitive Data
Masking (Doc ID 2375376.1)
Data Masking
 Future plans:
 A more configurable approach to managing personal and
sensitive data is planned in the form of a Data Privacy
Framework
 Field level security as masked, hidden or display-only
 Full or partial masking
 Support custom masking formats
 Any personal or sensitive data field on any transaction
 Role security or additional controls (country or reg region)
Data Right to be Forgotten
 Person Delete – improved in Image 25 & 26
 Data deleted from all tables with Emplid field
 Configure records excluded from delete e.g. Audit tables
 Individuals ignored with payroll calcs (can be overridden)
 Applicant delete available since image 25
 Future plans
 Integration from HCM to notify ‘subscribers’ that emp info has
been deleted (FSCM, ELM, CRM and third party systems
integrated with IB)
 Learner delete in ELM
Data Right to be Forgotten
 Data Archive Manager is already available to day (PeopleTools)
 Configurable framework supports data retention policies
 Defines tables/records to be archived
 Identifies criteria for rows of data to be archived (query)
 Allows archive, delete and restore
 Sample templates delivered for many products
 Use person or applicant delete for individuals, use Data Archive
Manager for rules based (specific countries, timeframes etc)
Data Subject Consent
 The Acknowledgement Framework was delivered in PI 26
(configurable)
 RTF text display
 Used for acknowledgements and agreements
 Electronic signature capture and audit trail
 Verify identity of individual
 Can be added as a step in an activity guide
 Example is delivered in onboarding
 PeopleSoft HCM Acknowledgement Framework Red Paper (Doc ID
2377140.1)
Auditing
 Future plans
 A solution is needed to track who viewed information
 Ability to configure (rather than customize) the transactions
which are audited
 Most third party solutions today usually track the SQL request of
data (what was retrieved from the database), this does not
mean the data was actually viewed since it could be hidden in
the User Interface
Right to Portability
PeopleSoft provides a number of methods to report on and extract
information from the application:
 “Grids” in the PeopleSoft UI on a transaction page allow download to Excel
 Query Manager reports/extracts data to the browser, file, spreadsheet, or XML
 Pivot Grids leverage queries to generate analytics similar to those provided by
common software such as Microsoft Excel
 BI Publisher formats reports based on a data input source
 Structure Query Reporting (SQR) is a development tool for complex extraction,
formatting, and reporting of data from PeopleSoft or other data sources
 Many sample queries, analytics, and reports are delivered by the application
Privacy by Design…
PEOPLE
People
• Employees/Customers
Suppliers
• Users
• IT/Security
Privacy by Design…
PROCESSPEOPLE
Process
• Threat Management
• Consent Management
• Third Party Due Diligence
• Access Management
People
• Employees/Customers
Suppliers
• Users
• IT/Security
Privacy by Design…
TECHNOLOGY
PROCESSPEOPLE
PRIVACY BY
DESIGN
Process
• Threat Management
• Consent Management
• Third Party Due Diligence
• Access Management
People
• Employees/Customers
Suppliers
• Users
• IT/Security
Technology
• Vulnerability Management
(patching)
• Pseudoanonymisation/
Anonymisation
• Data Classification and
Retention
Privacy by Design…
TECHNOLOGY
PROCESSPEOPLE
PRIVACY BY
DESIGN
PRIVACY
BY DESIGN
WHERE
THESE
AREAS
INTERSECT
Cedar Security Assessment
Client completes Cedar PS Security Questionnaire
Cedar join the client on site looking at relevant
configuration and questionnaire follow-up
Cedar deliver “PS Security Assessment” with
vulnerabilities graded and suggested remediation
Cedar present report on site to allow for an in
depth discussion re vulnerabilities and next steps
Initial
Assessment
Onsite
Consultancy
Security
Assessment
Findings
Delivered
01
02
03
04
Cedar Security Assessment
Better appreciation of
PeopleSoft patching
A patching strategy in place
including recommended
PeopleTools upgrades
Key vulnerabilities
remediated
Proposals for improved IS
procedures
Suggested infrastructure
and/or architecture changes
Automated Data Anonymisation
Production Data
Individual Identifiable
Lower Environments
(e.g. Test)Anonymisation Scripts
Individual Not Identifiable
Automated Data Anonymisation
Production Data
Individual Identifiable
Lower Environments
(e.g. Test)Anonymisation Scripts
Individual Not Identifiable
Cedar are in the early stages of
development of a configurable
anonymisation tool for PeopleSoft.
Next Steps
Assess Vulnerabilities
•-Security Assessment
•-GDPR Programme
•-Disaster Recovery
•-Penetration Testing
•-Selective Adoption
Strategy
Review Architecture
-Data Classification
-Production
-Non Production
-Interfaces
-Third party due
diligence
Review Processes
Joiners/Leavers/Movers
Data Retention
Lawful Processing
• GDPR is a marathon not a
sprint.
• Look for the quickest wins ‘low
hanging fruit’
• New technology might not be
the answer
• GDPR compliance is the
responsibility of EVERY
employee of a company (make
sure they understand)
Tips:
Questions…
+44(0)207 822 2997
www.blackstarglobalrisk.com

Contenu connexe

Tendances

Data centric security key to cloud and digital business
Data centric security key to cloud and digital businessData centric security key to cloud and digital business
Data centric security key to cloud and digital businessUlf Mattsson
 
Umer Khalid Thesis Abstract
Umer Khalid Thesis AbstractUmer Khalid Thesis Abstract
Umer Khalid Thesis AbstractUmer Khalid
 
Advantages of an Electronic Document Management System
Advantages of an Electronic Document Management SystemAdvantages of an Electronic Document Management System
Advantages of an Electronic Document Management SystemCharles, Shouky Abu Ayash
 
Dbms ii mca-ch12-security-2013
Dbms ii mca-ch12-security-2013Dbms ii mca-ch12-security-2013
Dbms ii mca-ch12-security-2013Prosanta Ghosh
 
Cybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityCybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityEryk Budi Pratama
 
01 database security ent-db
01  database security ent-db01  database security ent-db
01 database security ent-dbuncleRhyme
 
Organizational Benefits Of Document Management System
Organizational Benefits Of Document Management SystemOrganizational Benefits Of Document Management System
Organizational Benefits Of Document Management SystemClare White
 
security and privacy in dbms and in sql database
security and privacy in dbms and in sql databasesecurity and privacy in dbms and in sql database
security and privacy in dbms and in sql databasegourav kottawar
 
A Survey on Context Security Policies in the Cloud
A Survey on Context Security Policies in the CloudA Survey on Context Security Policies in the Cloud
A Survey on Context Security Policies in the CloudPaaSword EU Project
 
Logs in Security and Compliance flare
Logs in Security and Compliance flareLogs in Security and Compliance flare
Logs in Security and Compliance flarezilberberg
 
Laserfiche10 highlights- how the new features can benefit your mobile and wor...
Laserfiche10 highlights- how the new features can benefit your mobile and wor...Laserfiche10 highlights- how the new features can benefit your mobile and wor...
Laserfiche10 highlights- how the new features can benefit your mobile and wor...Christopher Wynder
 

Tendances (20)

Data centric security key to cloud and digital business
Data centric security key to cloud and digital businessData centric security key to cloud and digital business
Data centric security key to cloud and digital business
 
Umer Khalid Thesis Abstract
Umer Khalid Thesis AbstractUmer Khalid Thesis Abstract
Umer Khalid Thesis Abstract
 
Edms
EdmsEdms
Edms
 
Dit yvol3iss33
Dit yvol3iss33Dit yvol3iss33
Dit yvol3iss33
 
E Control Summary
E Control   SummaryE Control   Summary
E Control Summary
 
Advantages of an Electronic Document Management System
Advantages of an Electronic Document Management SystemAdvantages of an Electronic Document Management System
Advantages of an Electronic Document Management System
 
Dbms ii mca-ch12-security-2013
Dbms ii mca-ch12-security-2013Dbms ii mca-ch12-security-2013
Dbms ii mca-ch12-security-2013
 
Database modeling and security
Database modeling and securityDatabase modeling and security
Database modeling and security
 
Cybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityCybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber Security
 
Database Security
Database SecurityDatabase Security
Database Security
 
01 database security ent-db
01  database security ent-db01  database security ent-db
01 database security ent-db
 
Organizational Benefits Of Document Management System
Organizational Benefits Of Document Management SystemOrganizational Benefits Of Document Management System
Organizational Benefits Of Document Management System
 
Uid security
Uid securityUid security
Uid security
 
DMS
DMSDMS
DMS
 
security and privacy in dbms and in sql database
security and privacy in dbms and in sql databasesecurity and privacy in dbms and in sql database
security and privacy in dbms and in sql database
 
A Survey on Context Security Policies in the Cloud
A Survey on Context Security Policies in the CloudA Survey on Context Security Policies in the Cloud
A Survey on Context Security Policies in the Cloud
 
Logs in Security and Compliance flare
Logs in Security and Compliance flareLogs in Security and Compliance flare
Logs in Security and Compliance flare
 
Database security
Database securityDatabase security
Database security
 
Gartner Predicts 2018
Gartner Predicts 2018Gartner Predicts 2018
Gartner Predicts 2018
 
Laserfiche10 highlights- how the new features can benefit your mobile and wor...
Laserfiche10 highlights- how the new features can benefit your mobile and wor...Laserfiche10 highlights- how the new features can benefit your mobile and wor...
Laserfiche10 highlights- how the new features can benefit your mobile and wor...
 

Similaire à Cedar Day 2018 - Is Your PeopleSoft Ready for the GDPR - Sarah Hurley

data collection, data integration, data management, data modeling.pptx
data collection, data integration, data management, data modeling.pptxdata collection, data integration, data management, data modeling.pptx
data collection, data integration, data management, data modeling.pptxSourabhkumar729579
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Andy Talbot
 
Toreon adding privacy by design in secure application development oss18 v20...
Toreon adding privacy by design in secure application development   oss18 v20...Toreon adding privacy by design in secure application development   oss18 v20...
Toreon adding privacy by design in secure application development oss18 v20...Sebastien Deleersnyder
 
Agile Mumbai 2022 - Balvinder Kaur & Sushant Joshi | Real-Time Insights and A...
Agile Mumbai 2022 - Balvinder Kaur & Sushant Joshi | Real-Time Insights and A...Agile Mumbai 2022 - Balvinder Kaur & Sushant Joshi | Real-Time Insights and A...
Agile Mumbai 2022 - Balvinder Kaur & Sushant Joshi | Real-Time Insights and A...AgileNetwork
 
Data protection services lifecycle approach to critical information protection
Data protection services  lifecycle approach to critical information protectionData protection services  lifecycle approach to critical information protection
Data protection services lifecycle approach to critical information protectionAujas Networks Pvt. Ltd.
 
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data TeamsEthyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data TeamsCillian Kieran
 
System analysis and design
System analysis and designSystem analysis and design
System analysis and designRobinsonObura
 
Enterprise Data Marketplace: A Centralized Portal for All Your Data Assets
Enterprise Data Marketplace: A Centralized Portal for All Your Data AssetsEnterprise Data Marketplace: A Centralized Portal for All Your Data Assets
Enterprise Data Marketplace: A Centralized Portal for All Your Data AssetsDenodo
 
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your InformationAIIM International
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsDrew Madelung
 
GraphSummit - Process Tempo - Build Graph Applications.pdf
GraphSummit - Process Tempo - Build Graph Applications.pdfGraphSummit - Process Tempo - Build Graph Applications.pdf
GraphSummit - Process Tempo - Build Graph Applications.pdfNeo4j
 
DATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docx
DATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docxDATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docx
DATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docxSteveNgigi2
 
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...IJERA Editor
 
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...Ravikumar Sathyamurthy
 
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...Priyanka Aash
 
Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17Carl Binder
 
Advanced Analytics and Machine Learning with Data Virtualization
Advanced Analytics and Machine Learning with Data VirtualizationAdvanced Analytics and Machine Learning with Data Virtualization
Advanced Analytics and Machine Learning with Data VirtualizationDenodo
 
Database Management System.pptx
Database Management System.pptxDatabase Management System.pptx
Database Management System.pptxShuvrojitMajumder
 
Security Framework for Multitenant Architecture
Security Framework for Multitenant ArchitectureSecurity Framework for Multitenant Architecture
Security Framework for Multitenant ArchitectureDataWorks Summit
 

Similaire à Cedar Day 2018 - Is Your PeopleSoft Ready for the GDPR - Sarah Hurley (20)

data collection, data integration, data management, data modeling.pptx
data collection, data integration, data management, data modeling.pptxdata collection, data integration, data management, data modeling.pptx
data collection, data integration, data management, data modeling.pptx
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)
 
Toreon adding privacy by design in secure application development oss18 v20...
Toreon adding privacy by design in secure application development   oss18 v20...Toreon adding privacy by design in secure application development   oss18 v20...
Toreon adding privacy by design in secure application development oss18 v20...
 
Agile Mumbai 2022 - Balvinder Kaur & Sushant Joshi | Real-Time Insights and A...
Agile Mumbai 2022 - Balvinder Kaur & Sushant Joshi | Real-Time Insights and A...Agile Mumbai 2022 - Balvinder Kaur & Sushant Joshi | Real-Time Insights and A...
Agile Mumbai 2022 - Balvinder Kaur & Sushant Joshi | Real-Time Insights and A...
 
Data protection services lifecycle approach to critical information protection
Data protection services  lifecycle approach to critical information protectionData protection services  lifecycle approach to critical information protection
Data protection services lifecycle approach to critical information protection
 
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data TeamsEthyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
 
System analysis and design
System analysis and designSystem analysis and design
System analysis and design
 
Enterprise Data Marketplace: A Centralized Portal for All Your Data Assets
Enterprise Data Marketplace: A Centralized Portal for All Your Data AssetsEnterprise Data Marketplace: A Centralized Portal for All Your Data Assets
Enterprise Data Marketplace: A Centralized Portal for All Your Data Assets
 
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
 
GraphSummit - Process Tempo - Build Graph Applications.pdf
GraphSummit - Process Tempo - Build Graph Applications.pdfGraphSummit - Process Tempo - Build Graph Applications.pdf
GraphSummit - Process Tempo - Build Graph Applications.pdf
 
DATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docx
DATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docxDATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docx
DATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docx
 
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
 
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
 
InsiderAttack_p3.ppt
InsiderAttack_p3.pptInsiderAttack_p3.ppt
InsiderAttack_p3.ppt
 
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
 
Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17
 
Advanced Analytics and Machine Learning with Data Virtualization
Advanced Analytics and Machine Learning with Data VirtualizationAdvanced Analytics and Machine Learning with Data Virtualization
Advanced Analytics and Machine Learning with Data Virtualization
 
Database Management System.pptx
Database Management System.pptxDatabase Management System.pptx
Database Management System.pptx
 
Security Framework for Multitenant Architecture
Security Framework for Multitenant ArchitectureSecurity Framework for Multitenant Architecture
Security Framework for Multitenant Architecture
 

Plus de Cedar Consulting

Cedar Day 2018 - Cloud IaaS - Ken MacMahon
Cedar Day 2018 - Cloud IaaS - Ken MacMahonCedar Day 2018 - Cloud IaaS - Ken MacMahon
Cedar Day 2018 - Cloud IaaS - Ken MacMahonCedar Consulting
 
Cedar Day 2018 - Winning PeopleSoft Innovator - Kevin Gavaghan
Cedar Day 2018 - Winning PeopleSoft Innovator - Kevin GavaghanCedar Day 2018 - Winning PeopleSoft Innovator - Kevin Gavaghan
Cedar Day 2018 - Winning PeopleSoft Innovator - Kevin GavaghanCedar Consulting
 
Cedar Day 2018 - Smarter Customisation at 9.2 - Graham Smith & Sarah Hurley
Cedar Day 2018 - Smarter Customisation at 9.2 - Graham Smith & Sarah HurleyCedar Day 2018 - Smarter Customisation at 9.2 - Graham Smith & Sarah Hurley
Cedar Day 2018 - Smarter Customisation at 9.2 - Graham Smith & Sarah HurleyCedar Consulting
 
Cedar Day 2018 - Integrating PeopleSoft Payroll - Alex Lightstone
Cedar Day 2018 - Integrating PeopleSoft Payroll - Alex LightstoneCedar Day 2018 - Integrating PeopleSoft Payroll - Alex Lightstone
Cedar Day 2018 - Integrating PeopleSoft Payroll - Alex LightstoneCedar Consulting
 
Cedar Day 2018 - HCM 9.2 Top Ten Enhancements - Russell Lakin
Cedar Day 2018 - HCM 9.2 Top Ten Enhancements - Russell LakinCedar Day 2018 - HCM 9.2 Top Ten Enhancements - Russell Lakin
Cedar Day 2018 - HCM 9.2 Top Ten Enhancements - Russell LakinCedar Consulting
 
Cedar Day 2018 - How to Create Business Value from Your PeopleSoft HCM Techno...
Cedar Day 2018 - How to Create Business Value from Your PeopleSoft HCM Techno...Cedar Day 2018 - How to Create Business Value from Your PeopleSoft HCM Techno...
Cedar Day 2018 - How to Create Business Value from Your PeopleSoft HCM Techno...Cedar Consulting
 
Cedar Day 2018 - Avoid Top Payroll Errors
Cedar Day 2018 -  Avoid Top Payroll ErrorsCedar Day 2018 -  Avoid Top Payroll Errors
Cedar Day 2018 - Avoid Top Payroll ErrorsCedar Consulting
 
18. Madhur Hemnani - Result Orientated Innovation with Oracle HR Analytics
18. Madhur Hemnani - Result Orientated Innovation with Oracle HR Analytics18. Madhur Hemnani - Result Orientated Innovation with Oracle HR Analytics
18. Madhur Hemnani - Result Orientated Innovation with Oracle HR AnalyticsCedar Consulting
 
17. Graham Smith - PeopleSoft in the Cloud 2017
17. Graham Smith - PeopleSoft in the Cloud 201717. Graham Smith - PeopleSoft in the Cloud 2017
17. Graham Smith - PeopleSoft in the Cloud 2017Cedar Consulting
 
16. Hays, Oxfam & BAT - Maintaining PeopleSoft at 9.2
16. Hays, Oxfam & BAT -  Maintaining PeopleSoft at 9.216. Hays, Oxfam & BAT -  Maintaining PeopleSoft at 9.2
16. Hays, Oxfam & BAT - Maintaining PeopleSoft at 9.2Cedar Consulting
 
15. Gary Winstanley - The Lucy Group Story
15. Gary Winstanley - The Lucy Group Story15. Gary Winstanley - The Lucy Group Story
15. Gary Winstanley - The Lucy Group StoryCedar Consulting
 
14. Alex Lightstone & Bill Prescot - Exploiting PeopleSoft Query & Pivot Grids
14. Alex Lightstone & Bill Prescot - Exploiting PeopleSoft Query & Pivot Grids14. Alex Lightstone & Bill Prescot - Exploiting PeopleSoft Query & Pivot Grids
14. Alex Lightstone & Bill Prescot - Exploiting PeopleSoft Query & Pivot GridsCedar Consulting
 
13. Neville Varnham - PeopleSoft Cyber Security
13. Neville Varnham - PeopleSoft Cyber Security13. Neville Varnham - PeopleSoft Cyber Security
13. Neville Varnham - PeopleSoft Cyber SecurityCedar Consulting
 
11. Transforming Recruitment at CMS UK
11. Transforming Recruitment at CMS UK11. Transforming Recruitment at CMS UK
11. Transforming Recruitment at CMS UKCedar Consulting
 
10. Linda Pullan - Important Changes to Payroll
10. Linda Pullan - Important Changes to Payroll10. Linda Pullan - Important Changes to Payroll
10. Linda Pullan - Important Changes to PayrollCedar Consulting
 
9. Sue Heron - Patient Administration & Auto Billing
9. Sue Heron - Patient Administration & Auto Billing9. Sue Heron - Patient Administration & Auto Billing
9. Sue Heron - Patient Administration & Auto BillingCedar Consulting
 
8. Chris Pannell - PeopleSoft Optimisation Impact
8. Chris Pannell - PeopleSoft Optimisation Impact8. Chris Pannell - PeopleSoft Optimisation Impact
8. Chris Pannell - PeopleSoft Optimisation ImpactCedar Consulting
 
20. Marc Weintraub - PeopleSoft Keynote - The PeopleSoft Investment Strategy
20. Marc Weintraub - PeopleSoft Keynote - The PeopleSoft Investment Strategy20. Marc Weintraub - PeopleSoft Keynote - The PeopleSoft Investment Strategy
20. Marc Weintraub - PeopleSoft Keynote - The PeopleSoft Investment StrategyCedar Consulting
 
19. Graham Smith & Sarah Hurley - Implementing the Oracle Vision For PeopleSo...
19. Graham Smith & Sarah Hurley - Implementing the Oracle Vision For PeopleSo...19. Graham Smith & Sarah Hurley - Implementing the Oracle Vision For PeopleSo...
19. Graham Smith & Sarah Hurley - Implementing the Oracle Vision For PeopleSo...Cedar Consulting
 
6. Paul Smit - Global Payroll Update & Roadmap June 2017
6. Paul Smit - Global Payroll Update & Roadmap June 20176. Paul Smit - Global Payroll Update & Roadmap June 2017
6. Paul Smit - Global Payroll Update & Roadmap June 2017Cedar Consulting
 

Plus de Cedar Consulting (20)

Cedar Day 2018 - Cloud IaaS - Ken MacMahon
Cedar Day 2018 - Cloud IaaS - Ken MacMahonCedar Day 2018 - Cloud IaaS - Ken MacMahon
Cedar Day 2018 - Cloud IaaS - Ken MacMahon
 
Cedar Day 2018 - Winning PeopleSoft Innovator - Kevin Gavaghan
Cedar Day 2018 - Winning PeopleSoft Innovator - Kevin GavaghanCedar Day 2018 - Winning PeopleSoft Innovator - Kevin Gavaghan
Cedar Day 2018 - Winning PeopleSoft Innovator - Kevin Gavaghan
 
Cedar Day 2018 - Smarter Customisation at 9.2 - Graham Smith & Sarah Hurley
Cedar Day 2018 - Smarter Customisation at 9.2 - Graham Smith & Sarah HurleyCedar Day 2018 - Smarter Customisation at 9.2 - Graham Smith & Sarah Hurley
Cedar Day 2018 - Smarter Customisation at 9.2 - Graham Smith & Sarah Hurley
 
Cedar Day 2018 - Integrating PeopleSoft Payroll - Alex Lightstone
Cedar Day 2018 - Integrating PeopleSoft Payroll - Alex LightstoneCedar Day 2018 - Integrating PeopleSoft Payroll - Alex Lightstone
Cedar Day 2018 - Integrating PeopleSoft Payroll - Alex Lightstone
 
Cedar Day 2018 - HCM 9.2 Top Ten Enhancements - Russell Lakin
Cedar Day 2018 - HCM 9.2 Top Ten Enhancements - Russell LakinCedar Day 2018 - HCM 9.2 Top Ten Enhancements - Russell Lakin
Cedar Day 2018 - HCM 9.2 Top Ten Enhancements - Russell Lakin
 
Cedar Day 2018 - How to Create Business Value from Your PeopleSoft HCM Techno...
Cedar Day 2018 - How to Create Business Value from Your PeopleSoft HCM Techno...Cedar Day 2018 - How to Create Business Value from Your PeopleSoft HCM Techno...
Cedar Day 2018 - How to Create Business Value from Your PeopleSoft HCM Techno...
 
Cedar Day 2018 - Avoid Top Payroll Errors
Cedar Day 2018 -  Avoid Top Payroll ErrorsCedar Day 2018 -  Avoid Top Payroll Errors
Cedar Day 2018 - Avoid Top Payroll Errors
 
18. Madhur Hemnani - Result Orientated Innovation with Oracle HR Analytics
18. Madhur Hemnani - Result Orientated Innovation with Oracle HR Analytics18. Madhur Hemnani - Result Orientated Innovation with Oracle HR Analytics
18. Madhur Hemnani - Result Orientated Innovation with Oracle HR Analytics
 
17. Graham Smith - PeopleSoft in the Cloud 2017
17. Graham Smith - PeopleSoft in the Cloud 201717. Graham Smith - PeopleSoft in the Cloud 2017
17. Graham Smith - PeopleSoft in the Cloud 2017
 
16. Hays, Oxfam & BAT - Maintaining PeopleSoft at 9.2
16. Hays, Oxfam & BAT -  Maintaining PeopleSoft at 9.216. Hays, Oxfam & BAT -  Maintaining PeopleSoft at 9.2
16. Hays, Oxfam & BAT - Maintaining PeopleSoft at 9.2
 
15. Gary Winstanley - The Lucy Group Story
15. Gary Winstanley - The Lucy Group Story15. Gary Winstanley - The Lucy Group Story
15. Gary Winstanley - The Lucy Group Story
 
14. Alex Lightstone & Bill Prescot - Exploiting PeopleSoft Query & Pivot Grids
14. Alex Lightstone & Bill Prescot - Exploiting PeopleSoft Query & Pivot Grids14. Alex Lightstone & Bill Prescot - Exploiting PeopleSoft Query & Pivot Grids
14. Alex Lightstone & Bill Prescot - Exploiting PeopleSoft Query & Pivot Grids
 
13. Neville Varnham - PeopleSoft Cyber Security
13. Neville Varnham - PeopleSoft Cyber Security13. Neville Varnham - PeopleSoft Cyber Security
13. Neville Varnham - PeopleSoft Cyber Security
 
11. Transforming Recruitment at CMS UK
11. Transforming Recruitment at CMS UK11. Transforming Recruitment at CMS UK
11. Transforming Recruitment at CMS UK
 
10. Linda Pullan - Important Changes to Payroll
10. Linda Pullan - Important Changes to Payroll10. Linda Pullan - Important Changes to Payroll
10. Linda Pullan - Important Changes to Payroll
 
9. Sue Heron - Patient Administration & Auto Billing
9. Sue Heron - Patient Administration & Auto Billing9. Sue Heron - Patient Administration & Auto Billing
9. Sue Heron - Patient Administration & Auto Billing
 
8. Chris Pannell - PeopleSoft Optimisation Impact
8. Chris Pannell - PeopleSoft Optimisation Impact8. Chris Pannell - PeopleSoft Optimisation Impact
8. Chris Pannell - PeopleSoft Optimisation Impact
 
20. Marc Weintraub - PeopleSoft Keynote - The PeopleSoft Investment Strategy
20. Marc Weintraub - PeopleSoft Keynote - The PeopleSoft Investment Strategy20. Marc Weintraub - PeopleSoft Keynote - The PeopleSoft Investment Strategy
20. Marc Weintraub - PeopleSoft Keynote - The PeopleSoft Investment Strategy
 
19. Graham Smith & Sarah Hurley - Implementing the Oracle Vision For PeopleSo...
19. Graham Smith & Sarah Hurley - Implementing the Oracle Vision For PeopleSo...19. Graham Smith & Sarah Hurley - Implementing the Oracle Vision For PeopleSo...
19. Graham Smith & Sarah Hurley - Implementing the Oracle Vision For PeopleSo...
 
6. Paul Smit - Global Payroll Update & Roadmap June 2017
6. Paul Smit - Global Payroll Update & Roadmap June 20176. Paul Smit - Global Payroll Update & Roadmap June 2017
6. Paul Smit - Global Payroll Update & Roadmap June 2017
 

Dernier

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 

Dernier (20)

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 

Cedar Day 2018 - Is Your PeopleSoft Ready for the GDPR - Sarah Hurley

  • 1. Is Your PeopleSoft Ready For the GDPR? 48 Hours to Go... Oracle HCM Cloud & PeopleSoft Cedar Day 2018 Wednesday, 23rd May 2018 Sarah Hurley, Cedar Consulting
  • 3. The GDPR on a Page 3
  • 4. The GDPR on a Page 4 ₋ Lawful, fair, and transparent ₋ Purpose limitation ₋ Data minimization ₋ Accurate and up-to-date processing ₋ Limitation of storage ₋ Confidential and secure ₋ Accountability andliability 7 Principles:
  • 5. Data Classification PeopleSoft captures a plethora of personal and sensitive data Examples of this data can include the following depending on context: – Name – Ethnic or racial origin – Political opinions – Memberships – Physical or mental health details – Criminal orcivil offenses – IP Address – Photo – Meal Preferences Personal and Sensitive Data ORACLE©. (2018, May). Be in the Know for PeopleSoft HCM Data Privacy [Webinar].
  • 6. Data Classification  The Personally Identifiable and Sensitive data (doc ID 2313438.1) is being updated (likely this month) with NA payroll and benefits being added  Future plans:  An online (in app) version of the tool is being released which will allow the addition of custom fields  Additional spreadsheets being launched for FSCM, ELM and CRM
  • 7. Data Classification Oracle’s Mockup of the Online Identification and Usage solution
  • 8. Data Masking  Masking of production environments in the user interface (security driven) – released in PI 26 – currently limited to:  Date of Birth  National ID  Bank Account Number (all but last 4 digits)  This document is really useful: Implementing Sensitive Data Masking (Doc ID 2375376.1)
  • 9. Data Masking  Future plans:  A more configurable approach to managing personal and sensitive data is planned in the form of a Data Privacy Framework  Field level security as masked, hidden or display-only  Full or partial masking  Support custom masking formats  Any personal or sensitive data field on any transaction  Role security or additional controls (country or reg region)
  • 10. Data Right to be Forgotten  Person Delete – improved in Image 25 & 26  Data deleted from all tables with Emplid field  Configure records excluded from delete e.g. Audit tables  Individuals ignored with payroll calcs (can be overridden)  Applicant delete available since image 25  Future plans  Integration from HCM to notify ‘subscribers’ that emp info has been deleted (FSCM, ELM, CRM and third party systems integrated with IB)  Learner delete in ELM
  • 11. Data Right to be Forgotten  Data Archive Manager is already available to day (PeopleTools)  Configurable framework supports data retention policies  Defines tables/records to be archived  Identifies criteria for rows of data to be archived (query)  Allows archive, delete and restore  Sample templates delivered for many products  Use person or applicant delete for individuals, use Data Archive Manager for rules based (specific countries, timeframes etc)
  • 12. Data Subject Consent  The Acknowledgement Framework was delivered in PI 26 (configurable)  RTF text display  Used for acknowledgements and agreements  Electronic signature capture and audit trail  Verify identity of individual  Can be added as a step in an activity guide  Example is delivered in onboarding  PeopleSoft HCM Acknowledgement Framework Red Paper (Doc ID 2377140.1)
  • 13. Auditing  Future plans  A solution is needed to track who viewed information  Ability to configure (rather than customize) the transactions which are audited  Most third party solutions today usually track the SQL request of data (what was retrieved from the database), this does not mean the data was actually viewed since it could be hidden in the User Interface
  • 14. Right to Portability PeopleSoft provides a number of methods to report on and extract information from the application:  “Grids” in the PeopleSoft UI on a transaction page allow download to Excel  Query Manager reports/extracts data to the browser, file, spreadsheet, or XML  Pivot Grids leverage queries to generate analytics similar to those provided by common software such as Microsoft Excel  BI Publisher formats reports based on a data input source  Structure Query Reporting (SQR) is a development tool for complex extraction, formatting, and reporting of data from PeopleSoft or other data sources  Many sample queries, analytics, and reports are delivered by the application
  • 15. Privacy by Design… PEOPLE People • Employees/Customers Suppliers • Users • IT/Security
  • 16. Privacy by Design… PROCESSPEOPLE Process • Threat Management • Consent Management • Third Party Due Diligence • Access Management People • Employees/Customers Suppliers • Users • IT/Security
  • 17. Privacy by Design… TECHNOLOGY PROCESSPEOPLE PRIVACY BY DESIGN Process • Threat Management • Consent Management • Third Party Due Diligence • Access Management People • Employees/Customers Suppliers • Users • IT/Security Technology • Vulnerability Management (patching) • Pseudoanonymisation/ Anonymisation • Data Classification and Retention
  • 18. Privacy by Design… TECHNOLOGY PROCESSPEOPLE PRIVACY BY DESIGN PRIVACY BY DESIGN WHERE THESE AREAS INTERSECT
  • 19. Cedar Security Assessment Client completes Cedar PS Security Questionnaire Cedar join the client on site looking at relevant configuration and questionnaire follow-up Cedar deliver “PS Security Assessment” with vulnerabilities graded and suggested remediation Cedar present report on site to allow for an in depth discussion re vulnerabilities and next steps Initial Assessment Onsite Consultancy Security Assessment Findings Delivered 01 02 03 04
  • 20. Cedar Security Assessment Better appreciation of PeopleSoft patching A patching strategy in place including recommended PeopleTools upgrades Key vulnerabilities remediated Proposals for improved IS procedures Suggested infrastructure and/or architecture changes
  • 21. Automated Data Anonymisation Production Data Individual Identifiable Lower Environments (e.g. Test)Anonymisation Scripts Individual Not Identifiable
  • 22. Automated Data Anonymisation Production Data Individual Identifiable Lower Environments (e.g. Test)Anonymisation Scripts Individual Not Identifiable Cedar are in the early stages of development of a configurable anonymisation tool for PeopleSoft.
  • 23. Next Steps Assess Vulnerabilities •-Security Assessment •-GDPR Programme •-Disaster Recovery •-Penetration Testing •-Selective Adoption Strategy Review Architecture -Data Classification -Production -Non Production -Interfaces -Third party due diligence Review Processes Joiners/Leavers/Movers Data Retention Lawful Processing • GDPR is a marathon not a sprint. • Look for the quickest wins ‘low hanging fruit’ • New technology might not be the answer • GDPR compliance is the responsibility of EVERY employee of a company (make sure they understand) Tips: