SlideShare une entreprise Scribd logo
1  sur  29
Real-World Data
Engineering
Practice for GDPR
Ching-Yu Wu and Jeff Hung, SPN Data Team, Trend Micro
2019/09/06 @DataCon
© 2019 Trend Micro Inc.2
⚠️ Disclaimer
• Please view this sharing as a reference
– Detailed implementation varies with different business
requirements
– Maybe not suitable for every company
– MUST reach a consensus with legal department before
implementing your data pipeline
© 2019 Trend Micro Inc.3
What is GDPR?
General Data Protection Regulation
Effective on 2018/5/25
Protect Personal Data of EU citizens
Strengthen Privacy Rights of EU Individuals
© 2019 Trend Micro Inc.4
Key Changes
Increased Territorial Scope
• All businesses collecting personal data on EU citizens
• Regardless of the company’s location
Breach Notification
• Report it within 72 hours
Penalties
• 20M € or 4% of global turnover
• Google was fined 50M € on 2019/1/21
© 2019 Trend Micro Inc.5
Highlighted Individual’s Rights
Right to
Access
Right to
Erasure
Data
Portability
Privacy by
Design
© 2019 Trend Micro Inc.6
Simple Data Pipeline for GDPR
© 2019 Trend Micro Inc.7
Topics
•Data Collection Declaration
•Data Categorization
Legal & Compliance
•Anonymization
•Permission Control
•Data Encryption
Security
•Right to Access and Erasure
User's Rights
•Data Abuse Prevention
Role & Responsibility
© 2019 Trend Micro Inc.8
Data Collection Declaration
• Clearly declare the purposes in Terms of Use
– What data will be sent?
• List all the categories
– Reasons for collecting data
• Is it essential for service?
– A clear consent
• Check box for opt-in or opt-out
© 2019 Trend Micro Inc.9
Data Categorization
• Definition of personal data
– Personally Identifying Information (PII)
– Non-PII, PII and Sensitive-PII
• PII: name, account ID, email address, date of birth, gender, etc.
• Sensitive-PII: Health data, sexual orientation, Race, etc.
– Collecting Sensitive-PII data is basically prohibited
© 2019 Trend Micro Inc.10
It’s All About Compliance
• The definition MUST be established by Legal
Department
• Review process in development cycle
– Clear description for the data being collected
• Provided by product team
– Legal review, approve and archive it
– Clearer document, better communication
© 2019 Trend Micro Inc.11
Topics
•Data Collection Declaration
•Data Categorization
Legal & Compliance
•Anonymization
•Permission Control
•Data Encryption
Security
•Right to Access and Erasure
User's Rights
•Data Abuse Prevention
Role & Responsibility
© 2019 Trend Micro Inc.12
Separated Databases
• De-identification in analytical data
– Have a clear separation between user and analytical data
• No one can access both
– User data (user’s behavior and personal information)
• Purchase records, login records, etc.
– Analytical data (neutral logs)
• Detection logs, activity data, etc.
© 2019 Trend Micro Inc.13
Anonymization
• GDPR suggests to have a unified anonymous ID
across all the systems
– Stop using e-mail or other user’s personal information as
the unique ID
– Avoid storing personal information in each
service/application
• Use foreign key or other similar concepts
© 2019 Trend Micro Inc.14
• How to de-identify an identifiable field?
– Irreversible encoding
– Simplest way: one-way hash
• With or without salt?
• Refresh salt or not?
– Ways to avoid re-counting (e.g., DAU and MAU)
• Synchronize the salt between client and server
• Use one-way hash (or with fixed salt)
• Change the definition of “active”
Anonymization (cont’d)
© 2019 Trend Micro Inc.15
Anonymization (cont’d)
• Where to de-identify a field?
– Ideally at the client-side (before the data sends out)
– At least at the very beginning step of server-side ETL
process
• The mapping table of identifiable
data is viewed as User data
• The operation MUST be isolated
© 2019 Trend Micro Inc.16
Permission Control
• ACL on bucket
– Few users/service accounts can read
– Even fewer service accounts can write
• User cannot have write permission
– Principle of analytical data permission control
© 2019 Trend Micro Inc.17
Limited Data Retention
• Data shouldn’t be kept for “just in case” purpose
• Periodically remove outdated data
– The retention period is set according to…
• Business value (application’s need)
• Data volume (cost)
• Other legal issues
© 2019 Trend Micro Inc.18
Data Encryption
• All the data should be encrypted in storage and in
transmission
– Bucket-level encryption
– SSL connection
– Audit logs
© 2019 Trend Micro Inc.19
Topics
•Data Collection Declaration
•Data Categorization
Legal & Compliance
•Anonymization
•Permission Control
•Data Encryption
Security
•Right to Access and Erasure
User's Rights
•Data Abuse Prevention
Role & Responsibility
© 2019 Trend Micro Inc.20
Rights to Access and Erasure
• If the user and analytical database are separated
– Just dump/delete the related records in user database
• Otherwise
– It’s a big project…
© 2019 Trend Micro Inc.21
The Design of User Database
• Dump/Delete user database is challenging
– Try not to put historical data in user database (if you can)
– Try to concentrate personal data on few tables
– Use foreign key or similar concept for storing “key
information”
• Just modify the record in main table as “removed”
– Consider the data exportation and deletion processes at
design-phase
• Minimize the number of actions to take
© 2019 Trend Micro Inc.22
Topics
•Data Collection Declaration
•Data Categorization
Legal & Compliance
•Anonymization
•Permission Control
•Data Encryption
Security
•Right to Access and Erasure
User's Rights
•Data Abuse Prevention
Role & Responsibility
© 2019 Trend Micro Inc.23
Data Abuse Prevention
• Fulfill marketing’s requirements
– When you have to associate user and analytical data
• To send promotion e-mail to the inactive users
• Let active users have discount while purchase new edition
– Do the association at the last step
© 2019 Trend Micro Inc.24
Role & Responsibility
• There MUST be a Data Protection Officer (DPO) in
each company
– Organize a taskforce to review the out-coming inquiries
– Audit data usage
• Audit log parser for monitoring data accessing
– Monitor data breach
© 2019 Trend Micro Inc.25
Summary
© 2019 Trend Micro Inc.26
Summary
• Recommended practices for engineers
– Good communication with Legal
• Documentation
– Separate user data and analytical data
• De-identify all analytical data
• Permission control
• Data retention period
© 2019 Trend Micro Inc.27
Q & A
Automated hybrid cloud workload protection via calls to
Trend Micro APIs. Created with real data by Trend Micro
threat researcher and artist Jindrich Karasek.
© 2019 Trend Micro Inc.29
Reference
[1] https://eugdpr.org/
[2] https://gdpr-info.eu
[3] https://blog.infodiagram.com/2018/05/present-
gdpr-diagram-data-privacy-ppt-template.html

Contenu connexe

Tendances

User Experience and Product Management: Two Peas in the Same Pod?
User Experience and Product Management: Two Peas in the Same Pod?User Experience and Product Management: Two Peas in the Same Pod?
User Experience and Product Management: Two Peas in the Same Pod?Jeff Lash
 
Product Owner and Strategy
Product Owner and StrategyProduct Owner and Strategy
Product Owner and StrategyRoman Pichler
 
Design Thinking vs Agile Scrum vs Design Sprints
Design Thinking vs Agile Scrum vs Design SprintsDesign Thinking vs Agile Scrum vs Design Sprints
Design Thinking vs Agile Scrum vs Design SprintsDesign Sprint Academy
 
The experience is the product (for Mind The Product 2016)
The experience is the product (for Mind The Product 2016)The experience is the product (for Mind The Product 2016)
The experience is the product (for Mind The Product 2016)Peter Merholz
 
Product Management 2.0: Using Confluence to drive company-wide alignment and ...
Product Management 2.0: Using Confluence to drive company-wide alignment and ...Product Management 2.0: Using Confluence to drive company-wide alignment and ...
Product Management 2.0: Using Confluence to drive company-wide alignment and ...Atlassian
 
Roadmapping the Product Roadmap (ProductCamp Boston 2016)
Roadmapping the Product Roadmap (ProductCamp Boston 2016)Roadmapping the Product Roadmap (ProductCamp Boston 2016)
Roadmapping the Product Roadmap (ProductCamp Boston 2016)ProductCamp Boston
 
Lean UX + UX Strat, from UX Strat conference, September 2013
Lean UX + UX Strat, from UX Strat conference, September 2013Lean UX + UX Strat, from UX Strat conference, September 2013
Lean UX + UX Strat, from UX Strat conference, September 2013Joshua Seiden
 
Design thinking lean startup and agile pradeep
Design thinking lean startup and agile pradeepDesign thinking lean startup and agile pradeep
Design thinking lean startup and agile pradeepPradeep Patel, PMP®
 
Product Strategy Success Factors
Product Strategy Success FactorsProduct Strategy Success Factors
Product Strategy Success FactorsRoman Pichler
 
Building a compelling value proposition
Building a compelling value propositionBuilding a compelling value proposition
Building a compelling value propositionMichael Skok
 
Change Management Value Proposition
Change Management Value PropositionChange Management Value Proposition
Change Management Value PropositionTim Creasey
 
The Kanban PMO: How to improve an existing PMO using Kanban and AgilePM
The Kanban PMO: How to improve an existing PMO using Kanban and AgilePMThe Kanban PMO: How to improve an existing PMO using Kanban and AgilePM
The Kanban PMO: How to improve an existing PMO using Kanban and AgilePMActiniumPartners
 
VISION-STRATEGY-PRODUCT (VSP) Yacht: An Agile Plan to Rapidly Achieve Problem...
VISION-STRATEGY-PRODUCT (VSP) Yacht: An Agile Plan to Rapidly Achieve Problem...VISION-STRATEGY-PRODUCT (VSP) Yacht: An Agile Plan to Rapidly Achieve Problem...
VISION-STRATEGY-PRODUCT (VSP) Yacht: An Agile Plan to Rapidly Achieve Problem...Rod King, Ph.D.
 
Change Management ROI - Prosci Conference Board 2014 Presentation
Change Management ROI - Prosci Conference Board 2014 PresentationChange Management ROI - Prosci Conference Board 2014 Presentation
Change Management ROI - Prosci Conference Board 2014 PresentationTim Creasey
 
Leading Change Workshop
Leading Change WorkshopLeading Change Workshop
Leading Change WorkshopMichael Barker
 
Design Thinking - Bootcamp
Design Thinking - BootcampDesign Thinking - Bootcamp
Design Thinking - BootcampJan Schmiedgen
 
Catalytic Skills for Developers: There's Nothing 'Soft' about These Skills
Catalytic Skills for Developers: There's Nothing 'Soft' about These SkillsCatalytic Skills for Developers: There's Nothing 'Soft' about These Skills
Catalytic Skills for Developers: There's Nothing 'Soft' about These SkillsApril Wensel
 

Tendances (20)

User Experience and Product Management: Two Peas in the Same Pod?
User Experience and Product Management: Two Peas in the Same Pod?User Experience and Product Management: Two Peas in the Same Pod?
User Experience and Product Management: Two Peas in the Same Pod?
 
Product Owner and Strategy
Product Owner and StrategyProduct Owner and Strategy
Product Owner and Strategy
 
Design Thinking vs Agile Scrum vs Design Sprints
Design Thinking vs Agile Scrum vs Design SprintsDesign Thinking vs Agile Scrum vs Design Sprints
Design Thinking vs Agile Scrum vs Design Sprints
 
Guide to Product Strategy
Guide to Product StrategyGuide to Product Strategy
Guide to Product Strategy
 
The experience is the product (for Mind The Product 2016)
The experience is the product (for Mind The Product 2016)The experience is the product (for Mind The Product 2016)
The experience is the product (for Mind The Product 2016)
 
Product Management 2.0: Using Confluence to drive company-wide alignment and ...
Product Management 2.0: Using Confluence to drive company-wide alignment and ...Product Management 2.0: Using Confluence to drive company-wide alignment and ...
Product Management 2.0: Using Confluence to drive company-wide alignment and ...
 
Roadmapping the Product Roadmap (ProductCamp Boston 2016)
Roadmapping the Product Roadmap (ProductCamp Boston 2016)Roadmapping the Product Roadmap (ProductCamp Boston 2016)
Roadmapping the Product Roadmap (ProductCamp Boston 2016)
 
Lean UX + UX Strat, from UX Strat conference, September 2013
Lean UX + UX Strat, from UX Strat conference, September 2013Lean UX + UX Strat, from UX Strat conference, September 2013
Lean UX + UX Strat, from UX Strat conference, September 2013
 
What Is Product Management?
What Is Product Management?What Is Product Management?
What Is Product Management?
 
Design thinking lean startup and agile pradeep
Design thinking lean startup and agile pradeepDesign thinking lean startup and agile pradeep
Design thinking lean startup and agile pradeep
 
Product Strategy Success Factors
Product Strategy Success FactorsProduct Strategy Success Factors
Product Strategy Success Factors
 
Building a compelling value proposition
Building a compelling value propositionBuilding a compelling value proposition
Building a compelling value proposition
 
Change Management Value Proposition
Change Management Value PropositionChange Management Value Proposition
Change Management Value Proposition
 
The Kanban PMO: How to improve an existing PMO using Kanban and AgilePM
The Kanban PMO: How to improve an existing PMO using Kanban and AgilePMThe Kanban PMO: How to improve an existing PMO using Kanban and AgilePM
The Kanban PMO: How to improve an existing PMO using Kanban and AgilePM
 
VISION-STRATEGY-PRODUCT (VSP) Yacht: An Agile Plan to Rapidly Achieve Problem...
VISION-STRATEGY-PRODUCT (VSP) Yacht: An Agile Plan to Rapidly Achieve Problem...VISION-STRATEGY-PRODUCT (VSP) Yacht: An Agile Plan to Rapidly Achieve Problem...
VISION-STRATEGY-PRODUCT (VSP) Yacht: An Agile Plan to Rapidly Achieve Problem...
 
Change Management ROI - Prosci Conference Board 2014 Presentation
Change Management ROI - Prosci Conference Board 2014 PresentationChange Management ROI - Prosci Conference Board 2014 Presentation
Change Management ROI - Prosci Conference Board 2014 Presentation
 
Bff and GraphQL
Bff and GraphQLBff and GraphQL
Bff and GraphQL
 
Leading Change Workshop
Leading Change WorkshopLeading Change Workshop
Leading Change Workshop
 
Design Thinking - Bootcamp
Design Thinking - BootcampDesign Thinking - Bootcamp
Design Thinking - Bootcamp
 
Catalytic Skills for Developers: There's Nothing 'Soft' about These Skills
Catalytic Skills for Developers: There's Nothing 'Soft' about These SkillsCatalytic Skills for Developers: There's Nothing 'Soft' about These Skills
Catalytic Skills for Developers: There's Nothing 'Soft' about These Skills
 

Similaire à Real world data engineering practices for GDPR

Impact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A SecurityImpact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A SecurityEQS Group
 
Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...
Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...
Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...IDERA Software
 
Embedding GDPR Within Your Information and Library Service
Embedding GDPR Within Your Information and Library ServiceEmbedding GDPR Within Your Information and Library Service
Embedding GDPR Within Your Information and Library ServiceCILIPScotland
 
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for complianceGDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for complianceCloudera, Inc.
 
Improve IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkImprove IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkPrecisely
 
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...confluent
 
Practical steps to GDPR compliance
Practical steps to GDPR compliance Practical steps to GDPR compliance
Practical steps to GDPR compliance Jean-Michel Franco
 
Safeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningUlf Mattsson
 
GDPR Noncompliance: Avoid the Risk with Data Virtualization
GDPR Noncompliance: Avoid the Risk with Data VirtualizationGDPR Noncompliance: Avoid the Risk with Data Virtualization
GDPR Noncompliance: Avoid the Risk with Data VirtualizationDenodo
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection RegulationGrittyCC
 
2019 09-26 leveraging the power of automated intelligence for privacy management
2019 09-26 leveraging the power of automated intelligence for privacy management2019 09-26 leveraging the power of automated intelligence for privacy management
2019 09-26 leveraging the power of automated intelligence for privacy managementTrustArc
 
How Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR complianceHow Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR complianceCloudera, Inc.
 
gkknwqeq3232,sqSecurity essentials domain 3
gkknwqeq3232,sqSecurity essentials   domain 3gkknwqeq3232,sqSecurity essentials   domain 3
gkknwqeq3232,sqSecurity essentials domain 3Anne Starr
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
sunil_soares_dama_day.pdf
sunil_soares_dama_day.pdfsunil_soares_dama_day.pdf
sunil_soares_dama_day.pdfmsacs
 
Cybertopicsecurity_3
Cybertopicsecurity_3Cybertopicsecurity_3
Cybertopicsecurity_3Anne Starr
 
GDPR Readiness for Software Usage Analytics
GDPR Readiness for Software Usage AnalyticsGDPR Readiness for Software Usage Analytics
GDPR Readiness for Software Usage AnalyticsRevulytics Inc.
 

Similaire à Real world data engineering practices for GDPR (20)

Impact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A SecurityImpact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A Security
 
Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...
Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...
Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...
 
Embedding GDPR Within Your Information and Library Service
Embedding GDPR Within Your Information and Library ServiceEmbedding GDPR Within Your Information and Library Service
Embedding GDPR Within Your Information and Library Service
 
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for complianceGDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
 
Improve IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkImprove IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in Splunk
 
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...
 
Practical steps to GDPR compliance
Practical steps to GDPR compliance Practical steps to GDPR compliance
Practical steps to GDPR compliance
 
Safeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learning
 
GDPR Noncompliance: Avoid the Risk with Data Virtualization
GDPR Noncompliance: Avoid the Risk with Data VirtualizationGDPR Noncompliance: Avoid the Risk with Data Virtualization
GDPR Noncompliance: Avoid the Risk with Data Virtualization
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection Regulation
 
2019 09-26 leveraging the power of automated intelligence for privacy management
2019 09-26 leveraging the power of automated intelligence for privacy management2019 09-26 leveraging the power of automated intelligence for privacy management
2019 09-26 leveraging the power of automated intelligence for privacy management
 
GDPR- The Buck Stops Here
GDPR-  The Buck Stops HereGDPR-  The Buck Stops Here
GDPR- The Buck Stops Here
 
Gdpr brief and controls ver2.0
Gdpr brief and controls ver2.0Gdpr brief and controls ver2.0
Gdpr brief and controls ver2.0
 
How Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR complianceHow Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR compliance
 
gkknwqeq3232,sqSecurity essentials domain 3
gkknwqeq3232,sqSecurity essentials   domain 3gkknwqeq3232,sqSecurity essentials   domain 3
gkknwqeq3232,sqSecurity essentials domain 3
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
sunil_soares_dama_day.pdf
sunil_soares_dama_day.pdfsunil_soares_dama_day.pdf
sunil_soares_dama_day.pdf
 
Prepare Your Firm for GDPR
Prepare Your Firm for GDPRPrepare Your Firm for GDPR
Prepare Your Firm for GDPR
 
Cybertopicsecurity_3
Cybertopicsecurity_3Cybertopicsecurity_3
Cybertopicsecurity_3
 
GDPR Readiness for Software Usage Analytics
GDPR Readiness for Software Usage AnalyticsGDPR Readiness for Software Usage Analytics
GDPR Readiness for Software Usage Analytics
 

Dernier

Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...amitlee9823
 
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionfulawalesam
 
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men 🔝malwa🔝 Escorts Ser...
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men  🔝malwa🔝   Escorts Ser...➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men  🔝malwa🔝   Escorts Ser...
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men 🔝malwa🔝 Escorts Ser...amitlee9823
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusTimothy Spann
 
Probability Grade 10 Third Quarter Lessons
Probability Grade 10 Third Quarter LessonsProbability Grade 10 Third Quarter Lessons
Probability Grade 10 Third Quarter LessonsJoseMangaJr1
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...amitlee9823
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfMarinCaroMartnezBerg
 
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...SUHANI PANDEY
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFxolyaivanovalion
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxolyaivanovalion
 
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...amitlee9823
 
Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -
Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -
Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -Pooja Nehwal
 
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...amitlee9823
 
Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night StandCall Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 

Dernier (20)

Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
 
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interaction
 
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men 🔝malwa🔝 Escorts Ser...
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men  🔝malwa🔝   Escorts Ser...➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men  🔝malwa🔝   Escorts Ser...
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men 🔝malwa🔝 Escorts Ser...
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and Milvus
 
Probability Grade 10 Third Quarter Lessons
Probability Grade 10 Third Quarter LessonsProbability Grade 10 Third Quarter Lessons
Probability Grade 10 Third Quarter Lessons
 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
 
Anomaly detection and data imputation within time series
Anomaly detection and data imputation within time seriesAnomaly detection and data imputation within time series
Anomaly detection and data imputation within time series
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFx
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptx
 
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
 
Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -
Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -
Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -
 
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts ServiceCall Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
 
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
 
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
 
Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night StandCall Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Stand
 
Predicting Loan Approval: A Data Science Project
Predicting Loan Approval: A Data Science ProjectPredicting Loan Approval: A Data Science Project
Predicting Loan Approval: A Data Science Project
 

Real world data engineering practices for GDPR

  • 1. Real-World Data Engineering Practice for GDPR Ching-Yu Wu and Jeff Hung, SPN Data Team, Trend Micro 2019/09/06 @DataCon
  • 2. © 2019 Trend Micro Inc.2 ⚠️ Disclaimer • Please view this sharing as a reference – Detailed implementation varies with different business requirements – Maybe not suitable for every company – MUST reach a consensus with legal department before implementing your data pipeline
  • 3. © 2019 Trend Micro Inc.3 What is GDPR? General Data Protection Regulation Effective on 2018/5/25 Protect Personal Data of EU citizens Strengthen Privacy Rights of EU Individuals
  • 4. © 2019 Trend Micro Inc.4 Key Changes Increased Territorial Scope • All businesses collecting personal data on EU citizens • Regardless of the company’s location Breach Notification • Report it within 72 hours Penalties • 20M € or 4% of global turnover • Google was fined 50M € on 2019/1/21
  • 5. © 2019 Trend Micro Inc.5 Highlighted Individual’s Rights Right to Access Right to Erasure Data Portability Privacy by Design
  • 6. © 2019 Trend Micro Inc.6 Simple Data Pipeline for GDPR
  • 7. © 2019 Trend Micro Inc.7 Topics •Data Collection Declaration •Data Categorization Legal & Compliance •Anonymization •Permission Control •Data Encryption Security •Right to Access and Erasure User's Rights •Data Abuse Prevention Role & Responsibility
  • 8. © 2019 Trend Micro Inc.8 Data Collection Declaration • Clearly declare the purposes in Terms of Use – What data will be sent? • List all the categories – Reasons for collecting data • Is it essential for service? – A clear consent • Check box for opt-in or opt-out
  • 9. © 2019 Trend Micro Inc.9 Data Categorization • Definition of personal data – Personally Identifying Information (PII) – Non-PII, PII and Sensitive-PII • PII: name, account ID, email address, date of birth, gender, etc. • Sensitive-PII: Health data, sexual orientation, Race, etc. – Collecting Sensitive-PII data is basically prohibited
  • 10. © 2019 Trend Micro Inc.10 It’s All About Compliance • The definition MUST be established by Legal Department • Review process in development cycle – Clear description for the data being collected • Provided by product team – Legal review, approve and archive it – Clearer document, better communication
  • 11. © 2019 Trend Micro Inc.11 Topics •Data Collection Declaration •Data Categorization Legal & Compliance •Anonymization •Permission Control •Data Encryption Security •Right to Access and Erasure User's Rights •Data Abuse Prevention Role & Responsibility
  • 12. © 2019 Trend Micro Inc.12 Separated Databases • De-identification in analytical data – Have a clear separation between user and analytical data • No one can access both – User data (user’s behavior and personal information) • Purchase records, login records, etc. – Analytical data (neutral logs) • Detection logs, activity data, etc.
  • 13. © 2019 Trend Micro Inc.13 Anonymization • GDPR suggests to have a unified anonymous ID across all the systems – Stop using e-mail or other user’s personal information as the unique ID – Avoid storing personal information in each service/application • Use foreign key or other similar concepts
  • 14. © 2019 Trend Micro Inc.14 • How to de-identify an identifiable field? – Irreversible encoding – Simplest way: one-way hash • With or without salt? • Refresh salt or not? – Ways to avoid re-counting (e.g., DAU and MAU) • Synchronize the salt between client and server • Use one-way hash (or with fixed salt) • Change the definition of “active” Anonymization (cont’d)
  • 15. © 2019 Trend Micro Inc.15 Anonymization (cont’d) • Where to de-identify a field? – Ideally at the client-side (before the data sends out) – At least at the very beginning step of server-side ETL process • The mapping table of identifiable data is viewed as User data • The operation MUST be isolated
  • 16. © 2019 Trend Micro Inc.16 Permission Control • ACL on bucket – Few users/service accounts can read – Even fewer service accounts can write • User cannot have write permission – Principle of analytical data permission control
  • 17. © 2019 Trend Micro Inc.17 Limited Data Retention • Data shouldn’t be kept for “just in case” purpose • Periodically remove outdated data – The retention period is set according to… • Business value (application’s need) • Data volume (cost) • Other legal issues
  • 18. © 2019 Trend Micro Inc.18 Data Encryption • All the data should be encrypted in storage and in transmission – Bucket-level encryption – SSL connection – Audit logs
  • 19. © 2019 Trend Micro Inc.19 Topics •Data Collection Declaration •Data Categorization Legal & Compliance •Anonymization •Permission Control •Data Encryption Security •Right to Access and Erasure User's Rights •Data Abuse Prevention Role & Responsibility
  • 20. © 2019 Trend Micro Inc.20 Rights to Access and Erasure • If the user and analytical database are separated – Just dump/delete the related records in user database • Otherwise – It’s a big project…
  • 21. © 2019 Trend Micro Inc.21 The Design of User Database • Dump/Delete user database is challenging – Try not to put historical data in user database (if you can) – Try to concentrate personal data on few tables – Use foreign key or similar concept for storing “key information” • Just modify the record in main table as “removed” – Consider the data exportation and deletion processes at design-phase • Minimize the number of actions to take
  • 22. © 2019 Trend Micro Inc.22 Topics •Data Collection Declaration •Data Categorization Legal & Compliance •Anonymization •Permission Control •Data Encryption Security •Right to Access and Erasure User's Rights •Data Abuse Prevention Role & Responsibility
  • 23. © 2019 Trend Micro Inc.23 Data Abuse Prevention • Fulfill marketing’s requirements – When you have to associate user and analytical data • To send promotion e-mail to the inactive users • Let active users have discount while purchase new edition – Do the association at the last step
  • 24. © 2019 Trend Micro Inc.24 Role & Responsibility • There MUST be a Data Protection Officer (DPO) in each company – Organize a taskforce to review the out-coming inquiries – Audit data usage • Audit log parser for monitoring data accessing – Monitor data breach
  • 25. © 2019 Trend Micro Inc.25 Summary
  • 26. © 2019 Trend Micro Inc.26 Summary • Recommended practices for engineers – Good communication with Legal • Documentation – Separate user data and analytical data • De-identify all analytical data • Permission control • Data retention period
  • 27. © 2019 Trend Micro Inc.27 Q & A
  • 28. Automated hybrid cloud workload protection via calls to Trend Micro APIs. Created with real data by Trend Micro threat researcher and artist Jindrich Karasek.
  • 29. © 2019 Trend Micro Inc.29 Reference [1] https://eugdpr.org/ [2] https://gdpr-info.eu [3] https://blog.infodiagram.com/2018/05/present- gdpr-diagram-data-privacy-ppt-template.html