SlideShare une entreprise Scribd logo
1  sur  8
General Data Protection
Regulation (GDPR)
IBM APPROACH DESCRIPTION
IBM Security Services
19 September 2016
2 IBM Security
• GDPR will replace national data protection laws of all
28 EU member states in May 2018
• GDPR also has international reach – applying to any
organization that processes data of EU data subjects.
• Fines for non-compliance will increase substantially up
to a maximum fine of € 20 million or 4% of global
annual sales, whichever is higher
• GDPR will fundamentally change the way companies
must manage personal data
10/31/201
GDPR = General Data Protection Regulation
IBM is getting ready: as large data processor IBM understands its responsibilities and
has set up an Advanced Data Protection Program that will also help its customers
addressing the GDPR!
2
3 IBM Security
Supervisory Authority:
• Data protection regulators.
• One-Stop shop: Companies active in multiple EU countries can choose a first point of contact,
e.g, a central supervisory authority for all their business in the EU. This lead supervisory
authority then supervises all processing activities throughout the EU.
• The EU will create a European Data Protection Board (EDPB) to arbitrate during disputes
arising from supervisory authority decisions.
Data Protection Officer (DPO):
• Advises & monitors GDPR/privacy law/policy compliance, conducts awareness trainings,
advises wrt privacy impact assessments (PIA) / audits, contact for supervisory authorities.
• A DPO can be a member of staff or a hired contractor. Group companies can share a DPO.
• DPO's contact details must be published.
• Public authorities (with some minor exceptions).
• Any organisation that processes personal data on a "large scale" or that monitor personal
data.
• Companies in e.g., Germany (national law).
Processor:
• Person (legal entity or individual) that processes personal data on behalf of the controller
• Example: typically IBM in the context of providing services to a client (e.g., client payroll)
Controller:
• Person (legal entity or individual) that determines the purpose and the means of the
processing of personal data
• The controller has responsibility to determine and implement appropriate technical and
organizational measures to protect the personal data against accidental or unlawful destruction
or accidental loss, alteration, unauthorized disclosure or access
• Example: If IBM runs the payroll service for a client, the client has to fulfill the role of controller
to ensure that the payroll service is getting only the information necessary for processing
Processing:
• operations performed on personal data
• EU Directive gives examples: collection, recording, organization, storage, adaptation or
alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise
making available, alignment or combination, blocking, erasure or destruction
Sensitive Personal Data: Subcategory of Personal Data
• Gets extra protection under the law information about racial or ethnic origin, political opinions,
religious or philosophical beliefs, trade-union membership, health, sex life (again not closed
list; can be extended based on the national legislation)
Personal Data:
• information that can identify a person (individual), not a legal person (e.g., a company).
There’s no closed list on what personal data is.
• Examples are: name, email address, telephone number, address, license plate, an IP
address, a photo, a combination of info that could lead to identifying a person.
• In other parts of the world (e.g,. In the US and thus also IBM internally) the term “Personal
Identifiable Information” (PII) is often used. Rather similar term (ignoring legal subtleties)
Supervisory
Authority
Terms
The most important terms you need to know when talking about Data Privacy.
Personal Data
• Sensitive
Personal Data
Controller
Data
Protection
Officer
Processing Processor
Personal Data
• Sensitive
• Personal Data
Controller
Data
Protection
Officer
Processing Processor
Supervisory
Authority
View slide in presentation mode!
4 IBM Security
Ready for GDPR? Questions to Ask Yourself
• Where do you process personal data? Where do you store personal data? Do
you move personal data outside the EU?
• Do you deploy privacy by design techniques? Have you set up organizational and
technical measures to prevent uncontrolled collection, unauthorized access and
retrieval of personal data?
• Do you have a data classification program to produce a copy on record of
personal data?
• Do you have a response process to address requests by individuals? Are you
able to provide evidence that you deleted personal data as requested?
• Do you have a data governance program in place? Have you set up
organizational measures (access limitation, processes, governance, collection
minimization)
• Do you actively monitor external news on data breaches? Do you have a
remediation process to address data breaches? Do you have an established
ERS?
Do you collect
personal
data?
Do you move
personal data
outside the
EU?
Have you set up organizational
and technical measures to
prevent uncontrolled
collection, unauthorized
access and retrieval of
personal data?
Do you have a
data
classification
program?
Do you collect
sensitive
personal
data?
Do you have a
data
governance
program in
place?
Do you have a
response
process to
address
requests by
individuals?
Are you able
to produce a
copy on
record of
personal data
on request?
Do you have a
designated
responsible
for privacy in
your
organization?
Where do you
store personal
data?
Do you have a remediation
process to address data
breaches? Do you have an
established ERS?
Do you
actively
monitor
external news
on data
breaches?
Do you deploy
privacy by
design
techniques?
5 IBM Security
Legal
Getting
Ready
Program Setup
Program Execution and
Implementation
Why IBM?
Readiness
Assessments
(Legal)
Consulting
Services
Security
Software
Implementation
Guidance
IBM covers the full program with
• Legally-trained consultants for the readiness phase
• Data protection experts for consulting services for
business
• Industry-leading security tools
• Implementation specialists
6 IBM Security
IBM helps addressing Protection of Personal Data in all Phases.
IDENTIFY
personal data
Security
Intelligence
Awareness
Gap Analysis
Identification of
Personal Data
PREVENT
privacy violations
Identity&Access
Management
Database
Security
Privacy by
Design
Data Masking &
Encryption
MANAGE
personal data
Third-Party
Management
Data
Governance
Privacy
Officer
Information
Requests
DETECT & RESPOND
data breach handling
PersonalDataProtectionProgram
Emergency
Response Services
Monitoring &
Detection Remediation
Resilient
Systems
Access Rights
Mapping
7 IBM Security
Roadmap GDPR Program (Example 1)
Manufacturer w existing SIEM / SOC (8x5) capabilities.
IT environment managed by third party.
Delivery team: Data Privacy Experts and SOC/SIEM consultants.
2016 2017 2018
Phase Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4
Project Mobilization & Identification of Personal Data
Set up Data Protection Governance
IDENTIFYMANAGEPREVENT
Work Stream 1
Work Stream 2
Work Stream 3
Embedding Privacy by Design
Establishing Data Breach Protection & Monitoring
GDPR Enforcement
May 2018
DETECT&
RESPOND
Work Stream 4
Continuous Data Protection
capabilities delivery
Applied PbD Compliance Model
New Trends &
Technologies
ibm.com/security
securityintelligence.com
xforce.ibmcloud.com
@ibmsecurity
youtube/user/ibmsecuritysolutions
© Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind,
express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products
and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service
marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your
enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others.
No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems,
products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products
or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.
FOLLOW US ON:
THANK YOU

Contenu connexe

Tendances

The Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection RegulationThe Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection Regulation
Ghostery, Inc.
 
Preparing for general data protection regulations (gdpr) within the hous...
Preparing for general data protection regulations (gdpr) within the hous...Preparing for general data protection regulations (gdpr) within the hous...
Preparing for general data protection regulations (gdpr) within the hous...
Stephanie Vasey
 

Tendances (20)

GDPR what you should know and how to minimize impact on your business
GDPR what you should know and how to minimize impact on your businessGDPR what you should know and how to minimize impact on your business
GDPR what you should know and how to minimize impact on your business
 
The Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection RegulationThe Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection Regulation
 
12 steps to gdpr compliance unleashed
12 steps to gdpr compliance   unleashed12 steps to gdpr compliance   unleashed
12 steps to gdpr compliance unleashed
 
Findability Day 2016 - What is GDPR?
Findability Day 2016 - What is GDPR?Findability Day 2016 - What is GDPR?
Findability Day 2016 - What is GDPR?
 
GDPR practical info session for development
GDPR practical info session for developmentGDPR practical info session for development
GDPR practical info session for development
 
Introduction to gdpr
Introduction to gdprIntroduction to gdpr
Introduction to gdpr
 
GDPR for Dummies
GDPR for DummiesGDPR for Dummies
GDPR for Dummies
 
3GRC approach to GDPR V 0.1 www.3grc.co.uk
3GRC  approach to GDPR V 0.1 www.3grc.co.uk3GRC  approach to GDPR V 0.1 www.3grc.co.uk
3GRC approach to GDPR V 0.1 www.3grc.co.uk
 
2016 11-17-gdpr-integro-webinar
2016 11-17-gdpr-integro-webinar2016 11-17-gdpr-integro-webinar
2016 11-17-gdpr-integro-webinar
 
How IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity LegislationHow IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity Legislation
 
GDPR – The Practicalities of a New Reality
GDPR – The Practicalities of a New Reality GDPR – The Practicalities of a New Reality
GDPR – The Practicalities of a New Reality
 
GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection Regulation
 
The Essential Guide to GDPR
The Essential Guide to GDPRThe Essential Guide to GDPR
The Essential Guide to GDPR
 
GDPR for dummies
GDPR for dummies  GDPR for dummies
GDPR for dummies
 
GDPR and Irish SMEs May 2017
GDPR and Irish SMEs May 2017GDPR and Irish SMEs May 2017
GDPR and Irish SMEs May 2017
 
EU GDPR - 12 Steps To Compliance
EU GDPR - 12 Steps To Compliance EU GDPR - 12 Steps To Compliance
EU GDPR - 12 Steps To Compliance
 
Preparing for general data protection regulations (gdpr) within the hous...
Preparing for general data protection regulations (gdpr) within the hous...Preparing for general data protection regulations (gdpr) within the hous...
Preparing for general data protection regulations (gdpr) within the hous...
 
EU General Data Protection: Implications for Smart Metering
EU General Data Protection: Implications for Smart MeteringEU General Data Protection: Implications for Smart Metering
EU General Data Protection: Implications for Smart Metering
 
How does GDPR affect your business?
How does GDPR affect your business?How does GDPR affect your business?
How does GDPR affect your business?
 

En vedette

General Data Protection Regulation s apekta revizora IS-a
General Data Protection Regulation s apekta revizora IS-aGeneral Data Protection Regulation s apekta revizora IS-a
General Data Protection Regulation s apekta revizora IS-a
Luka Čirjak, CISA, CISM, AMBCI
 

En vedette (15)

Webianr: GDPR: How to build a data protection framework
Webianr: GDPR: How to build a data protection frameworkWebianr: GDPR: How to build a data protection framework
Webianr: GDPR: How to build a data protection framework
 
General Data Protection Regulation s apekta revizora IS-a
General Data Protection Regulation s apekta revizora IS-aGeneral Data Protection Regulation s apekta revizora IS-a
General Data Protection Regulation s apekta revizora IS-a
 
Armin Dinar, PwC Rumunija: „Upravljanja IT aktivnostima (IT Governance) u mod...
Armin Dinar, PwC Rumunija: „Upravljanja IT aktivnostima (IT Governance) u mod...Armin Dinar, PwC Rumunija: „Upravljanja IT aktivnostima (IT Governance) u mod...
Armin Dinar, PwC Rumunija: „Upravljanja IT aktivnostima (IT Governance) u mod...
 
Branko Subotić, PwC Srbija: “IT Strategija - metodološki pristup i praksa”
Branko Subotić, PwC Srbija: “IT Strategija - metodološki pristup i praksa”Branko Subotić, PwC Srbija: “IT Strategija - metodološki pristup i praksa”
Branko Subotić, PwC Srbija: “IT Strategija - metodološki pristup i praksa”
 
Nick Stringer - Five Key Things EU General Data Protection Regulation (GDPR) ...
Nick Stringer - Five Key Things EU General Data Protection Regulation (GDPR) ...Nick Stringer - Five Key Things EU General Data Protection Regulation (GDPR) ...
Nick Stringer - Five Key Things EU General Data Protection Regulation (GDPR) ...
 
Data protection webinar presentation AIG ecoDa FERMA 23 feb 2016
Data protection webinar presentation AIG ecoDa FERMA 23 feb 2016Data protection webinar presentation AIG ecoDa FERMA 23 feb 2016
Data protection webinar presentation AIG ecoDa FERMA 23 feb 2016
 
DAMA Ireland - GDPR
DAMA Ireland - GDPRDAMA Ireland - GDPR
DAMA Ireland - GDPR
 
Preparing for EU GDPR
Preparing for EU GDPRPreparing for EU GDPR
Preparing for EU GDPR
 
Go-to-Market Strategy with Jon Dogterom - Entrepreneurship 101
Go-to-Market Strategy with Jon Dogterom - Entrepreneurship 101Go-to-Market Strategy with Jon Dogterom - Entrepreneurship 101
Go-to-Market Strategy with Jon Dogterom - Entrepreneurship 101
 
Complying with Singapore Personal Data Protection Act - A Practical Guide
Complying with Singapore Personal Data Protection Act - A Practical GuideComplying with Singapore Personal Data Protection Act - A Practical Guide
Complying with Singapore Personal Data Protection Act - A Practical Guide
 
EU General Data Protection Regulation
EU General Data Protection RegulationEU General Data Protection Regulation
EU General Data Protection Regulation
 
Preparing to the GDPR - the next steps
Preparing to the GDPR - the next stepsPreparing to the GDPR - the next steps
Preparing to the GDPR - the next steps
 
Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Office 365 security concerns, EU General Data Protection Regulation (GDPR) Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Office 365 security concerns, EU General Data Protection Regulation (GDPR)
 
What changes for Internet of Things technologies with the EU Data Protection ...
What changes for Internet of Things technologies with the EU Data Protection ...What changes for Internet of Things technologies with the EU Data Protection ...
What changes for Internet of Things technologies with the EU Data Protection ...
 
What does the Proposed EU General Data Protection Regulation (GDPR) mean for ...
What does the Proposed EU General Data Protection Regulation (GDPR) mean for ...What does the Proposed EU General Data Protection Regulation (GDPR) mean for ...
What does the Proposed EU General Data Protection Regulation (GDPR) mean for ...
 

Similaire à GDPR security services - Areyou ready ?

Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Dr. Donald Macfarlane
 

Similaire à GDPR security services - Areyou ready ? (20)

GDPR 101
GDPR 101GDPR 101
GDPR 101
 
1 -2-6 kista watson summit-gdpr ibm pov hogg-sm
1 -2-6 kista watson summit-gdpr ibm pov hogg-sm1 -2-6 kista watson summit-gdpr ibm pov hogg-sm
1 -2-6 kista watson summit-gdpr ibm pov hogg-sm
 
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...
Symantec Webinar Part 4 of 6  GDPR Compliance, What NAM Organizations Need to...Symantec Webinar Part 4 of 6  GDPR Compliance, What NAM Organizations Need to...
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...
 
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
 
Flash Friday: Data Quality & GDPR
Flash Friday: Data Quality & GDPRFlash Friday: Data Quality & GDPR
Flash Friday: Data Quality & GDPR
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
 
Security in the Cognitive Era: Why it matters more than ever
Security in the Cognitive Era: Why it matters more than everSecurity in the Cognitive Era: Why it matters more than ever
Security in the Cognitive Era: Why it matters more than ever
 
Explain your algorithmic decisions for gdpr
Explain your algorithmic decisions for gdprExplain your algorithmic decisions for gdpr
Explain your algorithmic decisions for gdpr
 
BigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesBigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar Slides
 
5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR Compliance5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR Compliance
 
Automatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy StandardsAutomatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy Standards
 
3 minute reading time on how you can comply with GDPR.
3 minute reading time on how you can comply with GDPR.3 minute reading time on how you can comply with GDPR.
3 minute reading time on how you can comply with GDPR.
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity Fundamentals
 
GDPR: The Application Security Twist
GDPR: The Application Security TwistGDPR: The Application Security Twist
GDPR: The Application Security Twist
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
 
Big Data Requires Big Protection
Big Data Requires Big ProtectionBig Data Requires Big Protection
Big Data Requires Big Protection
 
GDPR in the Healthcare Industry
GDPR in the Healthcare IndustryGDPR in the Healthcare Industry
GDPR in the Healthcare Industry
 
The EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organizationThe EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organization
 

Dernier

一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书
E LSS
 
Appeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdfAppeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdf
PoojaGadiya1
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书
E LSS
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
ShashankKumar441258
 
PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptx
ca2or2tx
 
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptx
nyabatejosphat1
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书
SS A
 

Dernier (20)

Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptxPresentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction Fails
 
The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书
 
Appeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdfAppeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdf
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
 
Clarifying Land Donation Issues Memo for
Clarifying Land Donation Issues Memo forClarifying Land Donation Issues Memo for
Clarifying Land Donation Issues Memo for
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书
 
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxpnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
 
3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
 
PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptx
 
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptx
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
 

GDPR security services - Areyou ready ?

  • 1. General Data Protection Regulation (GDPR) IBM APPROACH DESCRIPTION IBM Security Services 19 September 2016
  • 2. 2 IBM Security • GDPR will replace national data protection laws of all 28 EU member states in May 2018 • GDPR also has international reach – applying to any organization that processes data of EU data subjects. • Fines for non-compliance will increase substantially up to a maximum fine of € 20 million or 4% of global annual sales, whichever is higher • GDPR will fundamentally change the way companies must manage personal data 10/31/201 GDPR = General Data Protection Regulation IBM is getting ready: as large data processor IBM understands its responsibilities and has set up an Advanced Data Protection Program that will also help its customers addressing the GDPR! 2
  • 3. 3 IBM Security Supervisory Authority: • Data protection regulators. • One-Stop shop: Companies active in multiple EU countries can choose a first point of contact, e.g, a central supervisory authority for all their business in the EU. This lead supervisory authority then supervises all processing activities throughout the EU. • The EU will create a European Data Protection Board (EDPB) to arbitrate during disputes arising from supervisory authority decisions. Data Protection Officer (DPO): • Advises & monitors GDPR/privacy law/policy compliance, conducts awareness trainings, advises wrt privacy impact assessments (PIA) / audits, contact for supervisory authorities. • A DPO can be a member of staff or a hired contractor. Group companies can share a DPO. • DPO's contact details must be published. • Public authorities (with some minor exceptions). • Any organisation that processes personal data on a "large scale" or that monitor personal data. • Companies in e.g., Germany (national law). Processor: • Person (legal entity or individual) that processes personal data on behalf of the controller • Example: typically IBM in the context of providing services to a client (e.g., client payroll) Controller: • Person (legal entity or individual) that determines the purpose and the means of the processing of personal data • The controller has responsibility to determine and implement appropriate technical and organizational measures to protect the personal data against accidental or unlawful destruction or accidental loss, alteration, unauthorized disclosure or access • Example: If IBM runs the payroll service for a client, the client has to fulfill the role of controller to ensure that the payroll service is getting only the information necessary for processing Processing: • operations performed on personal data • EU Directive gives examples: collection, recording, organization, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, blocking, erasure or destruction Sensitive Personal Data: Subcategory of Personal Data • Gets extra protection under the law information about racial or ethnic origin, political opinions, religious or philosophical beliefs, trade-union membership, health, sex life (again not closed list; can be extended based on the national legislation) Personal Data: • information that can identify a person (individual), not a legal person (e.g., a company). There’s no closed list on what personal data is. • Examples are: name, email address, telephone number, address, license plate, an IP address, a photo, a combination of info that could lead to identifying a person. • In other parts of the world (e.g,. In the US and thus also IBM internally) the term “Personal Identifiable Information” (PII) is often used. Rather similar term (ignoring legal subtleties) Supervisory Authority Terms The most important terms you need to know when talking about Data Privacy. Personal Data • Sensitive Personal Data Controller Data Protection Officer Processing Processor Personal Data • Sensitive • Personal Data Controller Data Protection Officer Processing Processor Supervisory Authority View slide in presentation mode!
  • 4. 4 IBM Security Ready for GDPR? Questions to Ask Yourself • Where do you process personal data? Where do you store personal data? Do you move personal data outside the EU? • Do you deploy privacy by design techniques? Have you set up organizational and technical measures to prevent uncontrolled collection, unauthorized access and retrieval of personal data? • Do you have a data classification program to produce a copy on record of personal data? • Do you have a response process to address requests by individuals? Are you able to provide evidence that you deleted personal data as requested? • Do you have a data governance program in place? Have you set up organizational measures (access limitation, processes, governance, collection minimization) • Do you actively monitor external news on data breaches? Do you have a remediation process to address data breaches? Do you have an established ERS? Do you collect personal data? Do you move personal data outside the EU? Have you set up organizational and technical measures to prevent uncontrolled collection, unauthorized access and retrieval of personal data? Do you have a data classification program? Do you collect sensitive personal data? Do you have a data governance program in place? Do you have a response process to address requests by individuals? Are you able to produce a copy on record of personal data on request? Do you have a designated responsible for privacy in your organization? Where do you store personal data? Do you have a remediation process to address data breaches? Do you have an established ERS? Do you actively monitor external news on data breaches? Do you deploy privacy by design techniques?
  • 5. 5 IBM Security Legal Getting Ready Program Setup Program Execution and Implementation Why IBM? Readiness Assessments (Legal) Consulting Services Security Software Implementation Guidance IBM covers the full program with • Legally-trained consultants for the readiness phase • Data protection experts for consulting services for business • Industry-leading security tools • Implementation specialists
  • 6. 6 IBM Security IBM helps addressing Protection of Personal Data in all Phases. IDENTIFY personal data Security Intelligence Awareness Gap Analysis Identification of Personal Data PREVENT privacy violations Identity&Access Management Database Security Privacy by Design Data Masking & Encryption MANAGE personal data Third-Party Management Data Governance Privacy Officer Information Requests DETECT & RESPOND data breach handling PersonalDataProtectionProgram Emergency Response Services Monitoring & Detection Remediation Resilient Systems Access Rights Mapping
  • 7. 7 IBM Security Roadmap GDPR Program (Example 1) Manufacturer w existing SIEM / SOC (8x5) capabilities. IT environment managed by third party. Delivery team: Data Privacy Experts and SOC/SIEM consultants. 2016 2017 2018 Phase Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Project Mobilization & Identification of Personal Data Set up Data Protection Governance IDENTIFYMANAGEPREVENT Work Stream 1 Work Stream 2 Work Stream 3 Embedding Privacy by Design Establishing Data Breach Protection & Monitoring GDPR Enforcement May 2018 DETECT& RESPOND Work Stream 4 Continuous Data Protection capabilities delivery Applied PbD Compliance Model New Trends & Technologies
  • 8. ibm.com/security securityintelligence.com xforce.ibmcloud.com @ibmsecurity youtube/user/ibmsecuritysolutions © Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party. FOLLOW US ON: THANK YOU