SlideShare une entreprise Scribd logo
1  sur  31
Télécharger pour lire hors ligne
The first steps towards GDPR
compliance
Presented by:
• Alan Calder, Founder and Executive Chairman, IT Governance
27 July 2017
TM
Copyright IT Governance Ltd 2017 – v1.1
www.itgovernance.co.uk
Introduction
• Alan Calder
• Founder – IT Governance
• The single source for everything to do with IT governance, cyber risk
management and IT compliance
• IT Governance: An International Guide to Data Security and ISO 27001/ISO
27002, 6th Edition (Open University textbook)
• www.itgovernance.co.uk
•
TM
Copyright IT Governance Ltd 2017 – v1.1
www.itgovernance.co.uk
IT Governance Ltd: GRC One-Stop-Shop
All verticals, all sectors, all organizational sizes
TM
Copyright IT Governance Ltd 2017 – v1.1
www.itgovernance.co.uk
• An overview of the regulatory landscape and territorial scope
• Principles of the EU GDPR
• Breach notification rules
• Data subject rights
• Changes to consent
• Processor liabilities
• Role of the Data Protection Officer
• International transfers
• Regulators and pan-European consistency
Agenda
Copyright IT Governance Ltd 2017 – v1.0
TM
Copyright IT Governance Ltd 2017 – v1.1
www.itgovernance.co.uk
The nature of European law
Copyright IT Governance Ltd 2017 – v1.0
• Require individual implementation in each Member State
• Implemented by the creation of national laws approved
by the parliaments of each Member State
• European Directive 95/46/EC is a Directive
• UK Data Protection Act 1998
Directives
• Immediately applicable in each Member State
• Require no local implementing legislation
• EU GDPR is a Regulation
Regulations
Two main types of legislation:
Data protection model under GDPR
Information Commissioner’s Office (ICO)
(supervising authority)
Data controller
(organisations/
local authority)
Data subject
(individuals)
Data
processor
Third
countries
Third
parties
Duties
Rights
Disclosure?
Inform?
Security?
Guarantees?
Assessment
Enforcement
European Data Protection Board
Copyright IT Governance Ltd 2017 – v1.0
TM
Copyright IT Governance Ltd 2017 – v1.1
www.itgovernance.co.uk
Material and territorial scope
Natural person = a living individual
• Natural persons have rights
associated with:
– The protection of personal
data.
– The protection of the
processing of personal data.
– The unrestricted movement of
personal data within the EU.
• In material scope:
– Personal data that is
processed wholly or partly by
automated means.
– Personal data that is part of a
filing system, or intended to
be.
– The Regulation applies to
controllers and processors in
the EU, irrespective of where
processing takes place.
Copyright IT Governance Ltd 2017 – v1.0
TM
Copyright IT Governance Ltd 2017 – v1.1
www.itgovernance.co.uk
Penalties
Administrative fines
– In each case, fines will be effective, proportionate and dissuasive
– Fines administrated will take into account technical and organisational
measures implemented.
– €10,000,000 or, in the case of an undertaking, up to 2% of the total worldwide
annual turnover of the preceding financial year.
– €20,000,000 or, in case of an undertaking, up to 4% of the total worldwide
annual turnover in the preceding financial year.
Copyright IT Governance Ltd 2017 – v1.0
TM
Copyright IT Governance Ltd 2017 – v1.1
www.itgovernance.co.uk
Data breaches under the GDPR
Definition
• Notify supervisory authority no
later than 72 hours after
discovery
• Must describe the nature of
the breach
• No requirement to notify if no
risk to rights and freedoms of
natural persons
• Failure to report within 72
hours requires explanation
• Notify the data controller of a
breach without delay
• All data breaches have to be
reported (no exemptions)
• European Data Protection
Board (EDPB) to issue
clarification with regard to
‘undue delay
Controller obligations Processor obligations
A 'personal data breach' means a breach of security leading to the accidental or
unlawful destruction, loss, alteration, unauthorised disclosure of, or access to,
personal data transmitted, stored or otherwise processed.
TM
Copyright IT Governance Ltd 2017 – v1.1
www.itgovernance.co.uk
Article 99: Entry into force and application
• The GDPR will be enforced from 25 May 2018.
• UK organisations that process the personal data of EU residents have only a short time to
ensure that they are compliant.
• The Regulation extends the data rights of individuals, and requires organisations to develop
clear policies and procedures to protect personal data, and adopt appropriate technical and
organisational measures.
“This Regulation shall be binding in its entirety and directly
applicable in all Member States.”
Final text of the Regulation:
http://eur-lex.europa.eu/legal-content/en/TXT/?uri=CELEX%3A32016R0679
8 April 2016
The Council
adopted the
GDPR
12 April 2016
The GDPR was
adopted by the
European
Parliament.
4 May 2016
The official text
of the Regulation
was published in
the EU Official
Journal
24 May 2016
The Regulation
entered into
force
25 May 2018
The GDPR will
apply
TM
Copyright IT Governance Ltd 2017 – v1.1
www.itgovernance.co.uk
The rights of data subjects
Copyright IT Governance Ltd 2017 – v1.0
1. The right to be informed;
2. The right of access;
3. The right to rectification;
4. The right to erasure;
5. The right to restrict processing;
6. The right to data portability;
7. The right to object;
8. Rights in relation to automated
decision making and profiling.
Article 12, clause 2 (& recital 59):
• The controller must facilitate the
exercise of data subject rights;
• The controller shall not refuse to
act on the request of the data
subject to exercise the rights
unless unable to identify the data
subject
The controller shall take appropriate measures to provide any information …
relating to processing to the data subject in a concise, transparent, intelligible and
easily accessible form, using clear and plain language (Article 11-1)
TM
Copyright IT Governance Ltd 2017 – v1.1
www.itgovernance.co.uk
The principle of Accountability
• Article 5: Principles relating to processing of personal data
• “The controller shall be responsible for, and be able to demonstrate
compliance with, paragraph 1 ('accountability'). “
1 • Processed lawfully, fairly and in a transparent manner
2 • Collected for specified, explicit and legitimate purposes
3 • Adequate, relevant and limited to what is necessary
4 • Accurate and, where necessary, kept up to date
5 • Retained only for as long as necessary
6 • Processed in an appropriate manner to maintain security
Accountability
TM
Copyright IT Governance Ltd 2017 – v1.1
www.itgovernance.co.uk
ICO on Accountability
• “The new legislation creates an onus on companies to understand
the risks that they create for others, and to mitigate those risks. It’s
about moving away from seeing the law as a box ticking exercise,
and instead to work on a framework that can be used to build a
culture of privacy that pervades an entire organisation.”
• “The GDPR mandates organisations to put into place
comprehensive but proportionate governance measures.”
• “It means a change to the culture of an organisation. That isn’t an
easy thing to do, and it’s certainly true that accountability cannot be
bolted on: it needs to be a part of the company’s overall systems
approach to how it manages and processes personal data.”
• Speech to ICAEW 17 January 2017
TM
Copyright IT Governance Ltd 2017 – v1.1
www.itgovernance.co.uk
Application of the principle of accountability
• Governance: Board accountability
– Corporate risk register
– Nominated responsible director
• Clear roles and responsibilities
– Data Protection Officer
• Privacy Compliance Framework
– PIMS/ISMS
– Records of processing (Article 30)
– Cyber incident response
– Cyber Essentials a minimum security standard
– Certification and data seals (Article 42) – ISO 27001
• Data Protection by Design and by Default
– Data Flow Audits
– Data Protection Impact Assessments (DPIA)
º Mandatory for many organizations
º Legal requirements around how performed and data collected
TM
Copyright IT Governance Ltd 2017 – v1.1
www.itgovernance.co.uk
Article 5 & 6: Lawfulness
• Secure against accidental loss, destruction or damage
• Processing must be lawful – which means, inter alia:
– Data subject must give consent for specific purposes
– Other specific circumstances where consent is not required
º So that controller can comply with legal obligations etc
• One month to respond to Subject Access Requests – & no charges
• Controllers and processors clearly distinguished
– Clearly identified obligations
– Controllers responsible for ensuring processors comply with contractual terms for
processing information
– Processors must operate under a legally binding contract
º And note issues around extra-territoriality
TM
Copyright IT Governance Ltd 2017 – v1.1
www.itgovernance.co.uk
Articles 7 - 9: Consent
• Consent must be clear and affirmative
– Must be able to demonstrate that consent was given
– Silence or inactivity does not constitute consent
– Written consent must be clear, intelligible, easily accessible, else not binding;
– Consent can be withdrawn any time, and as easy to withdraw consent as give it;
• Special conditions apply for child (under 16) to give consent
• Explicit consent must be given for processing sensitive personal
data
– Race, ethnic origin, political beliefs, etc
– Specific circumstances allow non-consensual processing eg to protect vital
interests of the data subject
• Secure against accidental loss, destruction or damage (article 5)
TM
Copyright IT Governance Ltd 2017 – v1.1
www.itgovernance.co.uk
Articles 12 - 18: Transparency
• Any communications with a data subject must be concise,
transparent, intelligible
• Controller must be transparent in providing information about itself
and the purposes of the processing
• Controller must provide data subject with information about their
rights
• Specific provisions (Article 14) covering data not obtained directly
from the data subject
• Rights to access, rectification, erasure (‘right to be forgotten’), to
restriction of processing, and data portability
TM
Copyright IT Governance Ltd 2017 – v1.1
www.itgovernance.co.uk
Article 25 et seq: Privacy by Design
• Privacy must now be designed into data processing by default
• Data controllers/processors not established in the EU must
designate a representative
• Data Privacy Impact Assessments mandatory (article 35)
– For technologies and processes that are likely to result in a high risk to rights of
data subjects
• Data audits
– GDPR applies to existing data, as well as future data
– Privacy may have to be designed in retrospectively
– Organizations need to identify what personal data they hold, where, on what
grounds, and how it is secured in a way that will meet requirements of GDPR
TM
Copyright IT Governance Ltd 2017 – v1.1
www.itgovernance.co.uk
Security of Processing
– Pseudonymisation and
encryption of personal data
– Measures to ensure the
ongoing confidentiality,
integrity and availability of
systems
– A process for regularly
testing, assessing and
evaluating the effectiveness
of security measures
It is a requirement for data controllers
and data processors to implement a level
of security appropriate to the risk. This
includes
Security measures taken need to comply
with the concept of privacy by design.
Copyright IT Governance Ltd 2017 – v1.0
TM
Copyright IT Governance Ltd 2017 – v1.1
www.itgovernance.co.ukPrivacy
Compliance
Framework
A privacy compliance
framework, including a
personal information
management system,
provides a framework for
maintaining and
improving compliance
with data protection
requirements and good
practice.
TM
Copyright IT Governance Ltd 2017 – v1.1
www.itgovernance.co.uk
Data protection officer (DPO) (Art. 37 et seq.)
• DPOs are mandatory for processing by public
authorities except courts acting in their judicial
capacity,
• Public authorities are allowed to share a DPO. Article
37(1a) and (3).
• It is a protected position, reporting directly to senior
management
– Appropriately qualified
– Consulted in respect of all data processing activities
• Will be a ‘good practice’ appointment outside the
mandatory appointments
• Most staff dealing with personal data (e.g. HR,
marketing) will need at least basic training
• Staff awareness training also critical (accidental
release of personal data could have financially
damaging consequences)
www.itgovernance.co.uk/shop/p-1833-certified-eu-general-data-protection-
regulation-gdpr-foundation-and-practitioner-combination-online-course.aspx
TM
Copyright IT Governance Ltd 2017 – v1.1
www.itgovernance.co.uk
Article 40 et seq: Certifications
• Requirement is to apply appropriate administrative organizational
and administrative measures.
• How can you demonstrate this?
– Codes of conduct and certifications may be used to demonstrate compliance with
GDPR
– Recognised international standards (eg ISO/IEC 27001)
– Recognised national management standards (eg BS 10012 – for a PIMS or
Personal Information Management System)
– Recognised national technical standards (eg Cyber Essentials in the UK)
– Emergence of new standards, privacy seals etc across EU
• Certification does not absolve controller of need to comply
TM
Copyright IT Governance Ltd 2017 – v1.1
www.itgovernance.co.uk
Article 44: International Transfers
• Any transfer of personal data by controller or processor shall take place
only if certain conditions are complied with:
– Transfers on the basis of adequacy;
– Transfers subject to the appropriate safeguards
– Binding corporate rules apply.
• All provisions shall be applied to ensure the protection of natural
persons is not undermined.
• To countries with similar data protection regulations
– Cloud providers are a key risk area
– Highest penalties apply to breaches of these provisions
• October 2015: Court of Justice declared Safe Harbor invalid
• April 2016: serious flaws in Privacy Shield:
– fails to meet EU adequacy standards;
– lack of a data retention principle;
– indiscriminate collection of data for national security purposes;
– insufficiency of legal remedies.
– Privacy Shield discussions still ongoing
TM
Copyright IT Governance Ltd 2017 – v1.1
www.itgovernance.co.uk
Independent Supervisory Authorities
• Member states must create independent supervisory authorities and
resource them appropriately
– Tasks:
– Monitor and enforce
– Communicate
– Promote awareness
• Powers:
– To investigate, correct, advise, enforce
• Leading Supervisory Authority for multi-state controllers
TM
Copyright IT Governance Ltd 2017 – v1.1
www.itgovernance.co.uk
European Data Protection Board (EDPB)
• Ensure cooperation, communication, consistency and mutual
assistance between national supervisory authorities
• Monitor and ensure correct application of the Regulation
• Examine any question dealing with its application
• Ie: Ensure a level playing field
TM
Copyright IT Governance Ltd 2017 – v1.1
www.itgovernance.co.uk
ICO – Final Words
• “Accountability encourages an upfront investment in privacy fundamentals, but it offers a payoff
down the line, not just in better legal compliance, but a competitive edge. We believe there is a
real opportunity for organisations to present themselves on the basis of how they respect the
privacy of individuals and over time this can play more of a role in consumer choice.
• That’s the carrot for getting it right. And there’s a pretty big stick too.
• I mentioned earlier that the GDPR will increase regulatory powers.
• For the most serious violations of the law, my office will have the power to fine companies up to
twenty million Euros or four per cent of a company’s total annual worldwide turnover for the
preceding year.
• In an ideal world we wouldn’t need to use those sticks, but policy makers are clear that breaches
of personal privacy are a serious matter. Last year we issued more than one million pounds in
fines for breaches of the Data Protection Act, so it’s not a power we’re afraid to use.
• And our enforcement powers aren’t just for ‘typical’ data breaches, like laptops left on trains or
information left open to a cyber attack. The GDPR gives regulators the power to enforce in the
context of accountability – data protection by design, failure to conduct a data protection impact
assessment, DPOs and documentation. If a business can’t show that good data protection is a
cornerstone of their practices, they’re leaving themselves open to a fine or other enforcement
action that could damage bank balance or business reputation.”
• Speech to ICAEW 17 January 2017
TM
Copyright IT Governance Ltd 2017 – v1.1
www.itgovernance.co.uk
Nine Steps to GDPR compliance
1. Establish governance framework – board awareness, risk register,
accountability framework, review
2. Appoint and train a DPO/SDPO
3. Data inventory – identify processors, unlawfully held data
4. Data flow audit
5. Compliance gap analysis
1. Ensure Privacy Notice and SAR documents and processes are robust and legal
2. Records of processing
6. PIA and security gap analysis
7. Remediate
1. Privacy compliance framework
2. Cyber Essentials/Ten Steps to Cyber Security/ISO 27001
8. Data breach response process (NB: Test!)
9. Monitor, audit and continually improve
NB: steps can be tackled in parallel
TM
Copyright IT Governance Ltd 2017 – v1.1
www.itgovernance.co.uk
IT Governance: GDPR one-stop shop
Self-help materials
A Pocket guide
www.itgovernance.co.uk/shop/P
roduct/eu-gdpr-a-pocket-guide
Implementation manual
www.itgovernance.co.uk/shop/Pr
oduct/eu-general-data-protection-
regulation-gdpr-an-
implementation-and-compliance-
guide
Documentation toolkit
www.itgovernance.co.uk/shop/P
roduct/eu-general-data-
protection-regulation-gdpr-
documentation-toolkit
Compliance gap assessment
tool
www.itgovernance.co.uk/shop/Pr
oduct/eu-gdpr-compliance-gap-
assessment-tool
TM
Copyright IT Governance Ltd 2017 – v1.1
www.itgovernance.co.uk
IT Governance: GDPR one-stop shop
Training courses
One-Day accredited Foundation course (classroom, online, distance
learning)
www.itgovernance.co.uk/shop/Product/certified-eu-general-data-
protection-regulation-foundation-gdpr-training-course
Four-Day accredited Practitioner course (classroom, online, distance
learning)
www.itgovernance.co.uk/shop/Product/certified-eu-general-data-
protection-regulation-practitioner-gdpr-training-course
One-Day data protection impact assessment (DPIA) workshop
(classroom)
www.itgovernance.co.uk/shop/Product/data-protection-impact-
assessment-dpia-workshop
TM
Copyright IT Governance Ltd 2017 – v1.1
www.itgovernance.co.uk
• Gap analysis
• Our experienced data protection consultants can assess the exact standing of your current legal
situation, security practices and operating procedures in relation to the DPA or the GDPR.
• Data flow audit
• Data mapping involves plotting out all of your data flows, which involves drawing up an extensive
inventory of the data to understand where the data flows from, within and to. This type of analysis
is a key requirement of the GDPR.
• Information Commissioner notification support (a legal requirement for DPA compliance)
• Organisations that process personal data must complete a notification with the Information
Commissioner under the DPA.
• Implementing a personal information management system (PIMS)
• Establishing a PIMS as part of your overall business management system will ensure that data
protection management is placed within a robust framework, which will be looked upon favourably
by the regulator when it comes to DPA compliance.
• Implementing an ISMS compliant with ISO 27001
• We offer flexible and cost-effective consultancy packages, and a comprehensive range of
bespoke ISO 27001 consultancy services, that will help you implement an ISO 27001-compliant
ISMS quickly and without the hassle, no matter where your business is located.
• Cyber health check
• The two-day Cyber Health Check combines on-site consultancy and audit with remote
vulnerability assessments to assess your cyber risk exposure.
IT Governance: GDPR one-stop shop
GDPR consultancy
Questions?

Contenu connexe

Tendances

EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer IT Governance Ltd
 
Addressing penetration testing and vulnerabilities, and adding verification m...
Addressing penetration testing and vulnerabilities, and adding verification m...Addressing penetration testing and vulnerabilities, and adding verification m...
Addressing penetration testing and vulnerabilities, and adding verification m...IT Governance Ltd
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...IT Governance Ltd
 
NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...IT Governance Ltd
 
Data Breaches and the EU GDPR
Data Breaches and the EU GDPRData Breaches and the EU GDPR
Data Breaches and the EU GDPRIT Governance Ltd
 
Revising policies and procedures under the new EU GDPR
Revising policies and procedures under the new EU GDPRRevising policies and procedures under the new EU GDPR
Revising policies and procedures under the new EU GDPRIT Governance Ltd
 
Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?IT Governance Ltd
 
Privacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failingPrivacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failingIT Governance Ltd
 
GDPR in practice
GDPR in practiceGDPR in practice
GDPR in practiceZoneFox
 
Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRIT Governance Ltd
 
EU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingEU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingIT Governance Ltd
 
11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines 11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines Skyhigh Networks
 
Datum DPO outsourced May 2016
Datum DPO outsourced May 2016Datum DPO outsourced May 2016
Datum DPO outsourced May 2016Mark Honeyball
 
GDPR in a nutshell
GDPR in a nutshellGDPR in a nutshell
GDPR in a nutshellInitio
 
Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRIT Governance Ltd
 
GDPR what you should know and how to minimize impact on your business
GDPR what you should know and how to minimize impact on your businessGDPR what you should know and how to minimize impact on your business
GDPR what you should know and how to minimize impact on your businessOlivier BARROT
 
GDPR practical info session for development
GDPR practical info session for developmentGDPR practical info session for development
GDPR practical info session for developmentTomppa Järvinen
 
Preparing for general data protection regulations (gdpr) within the hous...
Preparing for general data protection regulations (gdpr) within the hous...Preparing for general data protection regulations (gdpr) within the hous...
Preparing for general data protection regulations (gdpr) within the hous...Stephanie Vasey
 

Tendances (20)

EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer
 
Addressing penetration testing and vulnerabilities, and adding verification m...
Addressing penetration testing and vulnerabilities, and adding verification m...Addressing penetration testing and vulnerabilities, and adding verification m...
Addressing penetration testing and vulnerabilities, and adding verification m...
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...
 
NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...
 
Data Breaches and the EU GDPR
Data Breaches and the EU GDPRData Breaches and the EU GDPR
Data Breaches and the EU GDPR
 
Revising policies and procedures under the new EU GDPR
Revising policies and procedures under the new EU GDPRRevising policies and procedures under the new EU GDPR
Revising policies and procedures under the new EU GDPR
 
Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?
 
Privacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failingPrivacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failing
 
GDPR in practice
GDPR in practiceGDPR in practice
GDPR in practice
 
Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPR
 
20170323 are you ready the new gdpr is here
20170323 are you ready the new gdpr is here20170323 are you ready the new gdpr is here
20170323 are you ready the new gdpr is here
 
EU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingEU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketing
 
11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines 11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines
 
Datum DPO outsourced May 2016
Datum DPO outsourced May 2016Datum DPO outsourced May 2016
Datum DPO outsourced May 2016
 
GDPR in a nutshell
GDPR in a nutshellGDPR in a nutshell
GDPR in a nutshell
 
Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPR
 
GDPR what you should know and how to minimize impact on your business
GDPR what you should know and how to minimize impact on your businessGDPR what you should know and how to minimize impact on your business
GDPR what you should know and how to minimize impact on your business
 
2016 11-17-gdpr-integro-webinar
2016 11-17-gdpr-integro-webinar2016 11-17-gdpr-integro-webinar
2016 11-17-gdpr-integro-webinar
 
GDPR practical info session for development
GDPR practical info session for developmentGDPR practical info session for development
GDPR practical info session for development
 
Preparing for general data protection regulations (gdpr) within the hous...
Preparing for general data protection regulations (gdpr) within the hous...Preparing for general data protection regulations (gdpr) within the hous...
Preparing for general data protection regulations (gdpr) within the hous...
 

Similaire à The first steps towards GDPR compliance 

GDPR: The Catalyst for Customer 360
GDPR: The Catalyst for Customer 360GDPR: The Catalyst for Customer 360
GDPR: The Catalyst for Customer 360DataStax
 
The General Data Protection Regulation ("GDPR")
The General Data Protection Regulation ("GDPR")The General Data Protection Regulation ("GDPR")
The General Data Protection Regulation ("GDPR")Parsons Behle & Latimer
 
General Data Protection Regulation (GDPR) Implications for Canadian Firms
General Data Protection Regulation (GDPR) Implications for Canadian FirmsGeneral Data Protection Regulation (GDPR) Implications for Canadian Firms
General Data Protection Regulation (GDPR) Implications for Canadian Firmsaccenture
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and PrivacyVertex Holdings
 
EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?VYTIS MALECKAS
 
The Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPRThe Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPRCase IQ
 
How IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity LegislationHow IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity LegislationIBM Security
 
General Data Protection Regulation (GDPR) - Moving from confusion to readiness
General Data Protection Regulation (GDPR) - Moving from confusion to readinessGeneral Data Protection Regulation (GDPR) - Moving from confusion to readiness
General Data Protection Regulation (GDPR) - Moving from confusion to readinessOmo Osagiede
 
GDPR- Get the facts and prepare your business
GDPR- Get the facts and prepare your businessGDPR- Get the facts and prepare your business
GDPR- Get the facts and prepare your businessMark Baker
 
GDPR - Context, Principles, Implementation, Operation, Impact on Outsourcing,...
GDPR - Context, Principles, Implementation, Operation, Impact on Outsourcing,...GDPR - Context, Principles, Implementation, Operation, Impact on Outsourcing,...
GDPR - Context, Principles, Implementation, Operation, Impact on Outsourcing,...Alan McSweeney
 
Kawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the CloudKawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the CloudGurbir Singh
 
GDPR – what does it mean for charities and what you need to consider - Iain P...
GDPR – what does it mean for charities and what you need to consider - Iain P...GDPR – what does it mean for charities and what you need to consider - Iain P...
GDPR – what does it mean for charities and what you need to consider - Iain P...m-hance
 
How to Work With 3rd Party Software Providers Under GDPR - A Digital Marketin...
How to Work With 3rd Party Software Providers Under GDPR - A Digital Marketin...How to Work With 3rd Party Software Providers Under GDPR - A Digital Marketin...
How to Work With 3rd Party Software Providers Under GDPR - A Digital Marketin...Mailjet
 
Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)Acquia
 
The GDPR: Common misunderstandings and lessons learned so far
The GDPR: Common misunderstandings and lessons learned so farThe GDPR: Common misunderstandings and lessons learned so far
The GDPR: Common misunderstandings and lessons learned so farPECB
 

Similaire à The first steps towards GDPR compliance  (20)

GDPR: The Catalyst for Customer 360
GDPR: The Catalyst for Customer 360GDPR: The Catalyst for Customer 360
GDPR: The Catalyst for Customer 360
 
Gdpr action plan
Gdpr action plan Gdpr action plan
Gdpr action plan
 
The General Data Protection Regulation ("GDPR")
The General Data Protection Regulation ("GDPR")The General Data Protection Regulation ("GDPR")
The General Data Protection Regulation ("GDPR")
 
General Data Protection Regulation (GDPR) Implications for Canadian Firms
General Data Protection Regulation (GDPR) Implications for Canadian FirmsGeneral Data Protection Regulation (GDPR) Implications for Canadian Firms
General Data Protection Regulation (GDPR) Implications for Canadian Firms
 
GDPRR: The Key Changes
GDPRR: The Key ChangesGDPRR: The Key Changes
GDPRR: The Key Changes
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and Privacy
 
EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?
 
The Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPRThe Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPR
 
How IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity LegislationHow IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity Legislation
 
General Data Protection Regulation (GDPR) - Moving from confusion to readiness
General Data Protection Regulation (GDPR) - Moving from confusion to readinessGeneral Data Protection Regulation (GDPR) - Moving from confusion to readiness
General Data Protection Regulation (GDPR) - Moving from confusion to readiness
 
GDPR: Key Article Overview
GDPR: Key Article OverviewGDPR: Key Article Overview
GDPR: Key Article Overview
 
GDPR- Get the facts and prepare your business
GDPR- Get the facts and prepare your businessGDPR- Get the facts and prepare your business
GDPR- Get the facts and prepare your business
 
The general data protection act overview
The general data protection act overviewThe general data protection act overview
The general data protection act overview
 
GDPR - Context, Principles, Implementation, Operation, Impact on Outsourcing,...
GDPR - Context, Principles, Implementation, Operation, Impact on Outsourcing,...GDPR - Context, Principles, Implementation, Operation, Impact on Outsourcing,...
GDPR - Context, Principles, Implementation, Operation, Impact on Outsourcing,...
 
GDPR SECURITY ISSUES
GDPR SECURITY ISSUESGDPR SECURITY ISSUES
GDPR SECURITY ISSUES
 
Kawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the CloudKawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the Cloud
 
GDPR – what does it mean for charities and what you need to consider - Iain P...
GDPR – what does it mean for charities and what you need to consider - Iain P...GDPR – what does it mean for charities and what you need to consider - Iain P...
GDPR – what does it mean for charities and what you need to consider - Iain P...
 
How to Work With 3rd Party Software Providers Under GDPR - A Digital Marketin...
How to Work With 3rd Party Software Providers Under GDPR - A Digital Marketin...How to Work With 3rd Party Software Providers Under GDPR - A Digital Marketin...
How to Work With 3rd Party Software Providers Under GDPR - A Digital Marketin...
 
Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)
 
The GDPR: Common misunderstandings and lessons learned so far
The GDPR: Common misunderstandings and lessons learned so farThe GDPR: Common misunderstandings and lessons learned so far
The GDPR: Common misunderstandings and lessons learned so far
 

Plus de IT Governance Ltd

GDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risksGDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risksIT Governance Ltd
 
Business Continuity Management: How to get started
Business Continuity Management: How to get startedBusiness Continuity Management: How to get started
Business Continuity Management: How to get startedIT Governance Ltd
 
Staff awareness: developing a security culture
Staff awareness: developing a security cultureStaff awareness: developing a security culture
Staff awareness: developing a security cultureIT Governance Ltd
 
GDPR compliance: getting everyone in the organisation on board
GDPR compliance: getting everyone in the organisation on boardGDPR compliance: getting everyone in the organisation on board
GDPR compliance: getting everyone in the organisation on boardIT Governance Ltd
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceIT Governance Ltd
 
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...IT Governance Ltd
 
Creating an effective cyber security awareness programme
Creating an effective cyber security awareness programmeCreating an effective cyber security awareness programme
Creating an effective cyber security awareness programmeIT Governance Ltd
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurityIT Governance Ltd
 
Using international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityUsing international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityIT Governance Ltd
 
Using international standards to improve EU cyber security
Using international standards to improve EU cyber securityUsing international standards to improve EU cyber security
Using international standards to improve EU cyber securityIT Governance Ltd
 
Implementing PCI DSS v 2.0 and v 3.0
Implementing PCI DSS v 2.0 and v 3.0Implementing PCI DSS v 2.0 and v 3.0
Implementing PCI DSS v 2.0 and v 3.0IT Governance Ltd
 

Plus de IT Governance Ltd (11)

GDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risksGDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risks
 
Business Continuity Management: How to get started
Business Continuity Management: How to get startedBusiness Continuity Management: How to get started
Business Continuity Management: How to get started
 
Staff awareness: developing a security culture
Staff awareness: developing a security cultureStaff awareness: developing a security culture
Staff awareness: developing a security culture
 
GDPR compliance: getting everyone in the organisation on board
GDPR compliance: getting everyone in the organisation on boardGDPR compliance: getting everyone in the organisation on board
GDPR compliance: getting everyone in the organisation on board
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to compliance
 
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
 
Creating an effective cyber security awareness programme
Creating an effective cyber security awareness programmeCreating an effective cyber security awareness programme
Creating an effective cyber security awareness programme
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurity
 
Using international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityUsing international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber security
 
Using international standards to improve EU cyber security
Using international standards to improve EU cyber securityUsing international standards to improve EU cyber security
Using international standards to improve EU cyber security
 
Implementing PCI DSS v 2.0 and v 3.0
Implementing PCI DSS v 2.0 and v 3.0Implementing PCI DSS v 2.0 and v 3.0
Implementing PCI DSS v 2.0 and v 3.0
 

Dernier

Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsIndiaMART InterMESH Limited
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...Operational Excellence Consulting
 
MEP Plans in Construction of Building and Industrial Projects 2024
MEP Plans in Construction of Building and Industrial Projects 2024MEP Plans in Construction of Building and Industrial Projects 2024
MEP Plans in Construction of Building and Industrial Projects 2024Chandresh Chudasama
 
Fundamentals Welcome and Inclusive DEIB
Fundamentals Welcome and  Inclusive DEIBFundamentals Welcome and  Inclusive DEIB
Fundamentals Welcome and Inclusive DEIBGregory DeShields
 
Entrepreneurial ecosystem- Wider context
Entrepreneurial ecosystem- Wider contextEntrepreneurial ecosystem- Wider context
Entrepreneurial ecosystem- Wider contextP&CO
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifeBhavana Pujan Kendra
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdfMintel Group
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsKnowledgeSeed
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingrajputmeenakshi733
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers referencessuser2c065e
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamArik Fletcher
 
Darshan Hiranandani (Son of Niranjan Hiranandani).pdf
Darshan Hiranandani (Son of Niranjan Hiranandani).pdfDarshan Hiranandani (Son of Niranjan Hiranandani).pdf
Darshan Hiranandani (Son of Niranjan Hiranandani).pdfShashank Mehta
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...Hector Del Castillo, CPM, CPMM
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesDoe Paoro
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOne Monitar
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreNZSG
 
Simplify Your Funding: Quick and Easy Business Loans
Simplify Your Funding: Quick and Easy Business LoansSimplify Your Funding: Quick and Easy Business Loans
Simplify Your Funding: Quick and Easy Business LoansNugget Global
 

Dernier (20)

The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptxThe Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan Dynamics
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
 
MEP Plans in Construction of Building and Industrial Projects 2024
MEP Plans in Construction of Building and Industrial Projects 2024MEP Plans in Construction of Building and Industrial Projects 2024
MEP Plans in Construction of Building and Industrial Projects 2024
 
Fundamentals Welcome and Inclusive DEIB
Fundamentals Welcome and  Inclusive DEIBFundamentals Welcome and  Inclusive DEIB
Fundamentals Welcome and Inclusive DEIB
 
Entrepreneurial ecosystem- Wider context
Entrepreneurial ecosystem- Wider contextEntrepreneurial ecosystem- Wider context
Entrepreneurial ecosystem- Wider context
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in Life
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applications
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketing
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers reference
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management Team
 
Darshan Hiranandani (Son of Niranjan Hiranandani).pdf
Darshan Hiranandani (Son of Niranjan Hiranandani).pdfDarshan Hiranandani (Son of Niranjan Hiranandani).pdf
Darshan Hiranandani (Son of Niranjan Hiranandani).pdf
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic Experiences
 
Toyota and Seven Parts Storage Techniques
Toyota and Seven Parts Storage TechniquesToyota and Seven Parts Storage Techniques
Toyota and Seven Parts Storage Techniques
 
WAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdfWAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdf
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource Centre
 
Simplify Your Funding: Quick and Easy Business Loans
Simplify Your Funding: Quick and Easy Business LoansSimplify Your Funding: Quick and Easy Business Loans
Simplify Your Funding: Quick and Easy Business Loans
 

The first steps towards GDPR compliance 

  • 1. The first steps towards GDPR compliance Presented by: • Alan Calder, Founder and Executive Chairman, IT Governance 27 July 2017
  • 2. TM Copyright IT Governance Ltd 2017 – v1.1 www.itgovernance.co.uk Introduction • Alan Calder • Founder – IT Governance • The single source for everything to do with IT governance, cyber risk management and IT compliance • IT Governance: An International Guide to Data Security and ISO 27001/ISO 27002, 6th Edition (Open University textbook) • www.itgovernance.co.uk •
  • 3. TM Copyright IT Governance Ltd 2017 – v1.1 www.itgovernance.co.uk IT Governance Ltd: GRC One-Stop-Shop All verticals, all sectors, all organizational sizes
  • 4. TM Copyright IT Governance Ltd 2017 – v1.1 www.itgovernance.co.uk • An overview of the regulatory landscape and territorial scope • Principles of the EU GDPR • Breach notification rules • Data subject rights • Changes to consent • Processor liabilities • Role of the Data Protection Officer • International transfers • Regulators and pan-European consistency Agenda Copyright IT Governance Ltd 2017 – v1.0
  • 5. TM Copyright IT Governance Ltd 2017 – v1.1 www.itgovernance.co.uk The nature of European law Copyright IT Governance Ltd 2017 – v1.0 • Require individual implementation in each Member State • Implemented by the creation of national laws approved by the parliaments of each Member State • European Directive 95/46/EC is a Directive • UK Data Protection Act 1998 Directives • Immediately applicable in each Member State • Require no local implementing legislation • EU GDPR is a Regulation Regulations Two main types of legislation:
  • 6. Data protection model under GDPR Information Commissioner’s Office (ICO) (supervising authority) Data controller (organisations/ local authority) Data subject (individuals) Data processor Third countries Third parties Duties Rights Disclosure? Inform? Security? Guarantees? Assessment Enforcement European Data Protection Board Copyright IT Governance Ltd 2017 – v1.0
  • 7. TM Copyright IT Governance Ltd 2017 – v1.1 www.itgovernance.co.uk Material and territorial scope Natural person = a living individual • Natural persons have rights associated with: – The protection of personal data. – The protection of the processing of personal data. – The unrestricted movement of personal data within the EU. • In material scope: – Personal data that is processed wholly or partly by automated means. – Personal data that is part of a filing system, or intended to be. – The Regulation applies to controllers and processors in the EU, irrespective of where processing takes place. Copyright IT Governance Ltd 2017 – v1.0
  • 8. TM Copyright IT Governance Ltd 2017 – v1.1 www.itgovernance.co.uk Penalties Administrative fines – In each case, fines will be effective, proportionate and dissuasive – Fines administrated will take into account technical and organisational measures implemented. – €10,000,000 or, in the case of an undertaking, up to 2% of the total worldwide annual turnover of the preceding financial year. – €20,000,000 or, in case of an undertaking, up to 4% of the total worldwide annual turnover in the preceding financial year. Copyright IT Governance Ltd 2017 – v1.0
  • 9. TM Copyright IT Governance Ltd 2017 – v1.1 www.itgovernance.co.uk Data breaches under the GDPR Definition • Notify supervisory authority no later than 72 hours after discovery • Must describe the nature of the breach • No requirement to notify if no risk to rights and freedoms of natural persons • Failure to report within 72 hours requires explanation • Notify the data controller of a breach without delay • All data breaches have to be reported (no exemptions) • European Data Protection Board (EDPB) to issue clarification with regard to ‘undue delay Controller obligations Processor obligations A 'personal data breach' means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data transmitted, stored or otherwise processed.
  • 10. TM Copyright IT Governance Ltd 2017 – v1.1 www.itgovernance.co.uk Article 99: Entry into force and application • The GDPR will be enforced from 25 May 2018. • UK organisations that process the personal data of EU residents have only a short time to ensure that they are compliant. • The Regulation extends the data rights of individuals, and requires organisations to develop clear policies and procedures to protect personal data, and adopt appropriate technical and organisational measures. “This Regulation shall be binding in its entirety and directly applicable in all Member States.” Final text of the Regulation: http://eur-lex.europa.eu/legal-content/en/TXT/?uri=CELEX%3A32016R0679 8 April 2016 The Council adopted the GDPR 12 April 2016 The GDPR was adopted by the European Parliament. 4 May 2016 The official text of the Regulation was published in the EU Official Journal 24 May 2016 The Regulation entered into force 25 May 2018 The GDPR will apply
  • 11. TM Copyright IT Governance Ltd 2017 – v1.1 www.itgovernance.co.uk The rights of data subjects Copyright IT Governance Ltd 2017 – v1.0 1. The right to be informed; 2. The right of access; 3. The right to rectification; 4. The right to erasure; 5. The right to restrict processing; 6. The right to data portability; 7. The right to object; 8. Rights in relation to automated decision making and profiling. Article 12, clause 2 (& recital 59): • The controller must facilitate the exercise of data subject rights; • The controller shall not refuse to act on the request of the data subject to exercise the rights unless unable to identify the data subject The controller shall take appropriate measures to provide any information … relating to processing to the data subject in a concise, transparent, intelligible and easily accessible form, using clear and plain language (Article 11-1)
  • 12. TM Copyright IT Governance Ltd 2017 – v1.1 www.itgovernance.co.uk The principle of Accountability • Article 5: Principles relating to processing of personal data • “The controller shall be responsible for, and be able to demonstrate compliance with, paragraph 1 ('accountability'). “ 1 • Processed lawfully, fairly and in a transparent manner 2 • Collected for specified, explicit and legitimate purposes 3 • Adequate, relevant and limited to what is necessary 4 • Accurate and, where necessary, kept up to date 5 • Retained only for as long as necessary 6 • Processed in an appropriate manner to maintain security Accountability
  • 13. TM Copyright IT Governance Ltd 2017 – v1.1 www.itgovernance.co.uk ICO on Accountability • “The new legislation creates an onus on companies to understand the risks that they create for others, and to mitigate those risks. It’s about moving away from seeing the law as a box ticking exercise, and instead to work on a framework that can be used to build a culture of privacy that pervades an entire organisation.” • “The GDPR mandates organisations to put into place comprehensive but proportionate governance measures.” • “It means a change to the culture of an organisation. That isn’t an easy thing to do, and it’s certainly true that accountability cannot be bolted on: it needs to be a part of the company’s overall systems approach to how it manages and processes personal data.” • Speech to ICAEW 17 January 2017
  • 14. TM Copyright IT Governance Ltd 2017 – v1.1 www.itgovernance.co.uk Application of the principle of accountability • Governance: Board accountability – Corporate risk register – Nominated responsible director • Clear roles and responsibilities – Data Protection Officer • Privacy Compliance Framework – PIMS/ISMS – Records of processing (Article 30) – Cyber incident response – Cyber Essentials a minimum security standard – Certification and data seals (Article 42) – ISO 27001 • Data Protection by Design and by Default – Data Flow Audits – Data Protection Impact Assessments (DPIA) º Mandatory for many organizations º Legal requirements around how performed and data collected
  • 15. TM Copyright IT Governance Ltd 2017 – v1.1 www.itgovernance.co.uk Article 5 & 6: Lawfulness • Secure against accidental loss, destruction or damage • Processing must be lawful – which means, inter alia: – Data subject must give consent for specific purposes – Other specific circumstances where consent is not required º So that controller can comply with legal obligations etc • One month to respond to Subject Access Requests – & no charges • Controllers and processors clearly distinguished – Clearly identified obligations – Controllers responsible for ensuring processors comply with contractual terms for processing information – Processors must operate under a legally binding contract º And note issues around extra-territoriality
  • 16. TM Copyright IT Governance Ltd 2017 – v1.1 www.itgovernance.co.uk Articles 7 - 9: Consent • Consent must be clear and affirmative – Must be able to demonstrate that consent was given – Silence or inactivity does not constitute consent – Written consent must be clear, intelligible, easily accessible, else not binding; – Consent can be withdrawn any time, and as easy to withdraw consent as give it; • Special conditions apply for child (under 16) to give consent • Explicit consent must be given for processing sensitive personal data – Race, ethnic origin, political beliefs, etc – Specific circumstances allow non-consensual processing eg to protect vital interests of the data subject • Secure against accidental loss, destruction or damage (article 5)
  • 17. TM Copyright IT Governance Ltd 2017 – v1.1 www.itgovernance.co.uk Articles 12 - 18: Transparency • Any communications with a data subject must be concise, transparent, intelligible • Controller must be transparent in providing information about itself and the purposes of the processing • Controller must provide data subject with information about their rights • Specific provisions (Article 14) covering data not obtained directly from the data subject • Rights to access, rectification, erasure (‘right to be forgotten’), to restriction of processing, and data portability
  • 18. TM Copyright IT Governance Ltd 2017 – v1.1 www.itgovernance.co.uk Article 25 et seq: Privacy by Design • Privacy must now be designed into data processing by default • Data controllers/processors not established in the EU must designate a representative • Data Privacy Impact Assessments mandatory (article 35) – For technologies and processes that are likely to result in a high risk to rights of data subjects • Data audits – GDPR applies to existing data, as well as future data – Privacy may have to be designed in retrospectively – Organizations need to identify what personal data they hold, where, on what grounds, and how it is secured in a way that will meet requirements of GDPR
  • 19. TM Copyright IT Governance Ltd 2017 – v1.1 www.itgovernance.co.uk Security of Processing – Pseudonymisation and encryption of personal data – Measures to ensure the ongoing confidentiality, integrity and availability of systems – A process for regularly testing, assessing and evaluating the effectiveness of security measures It is a requirement for data controllers and data processors to implement a level of security appropriate to the risk. This includes Security measures taken need to comply with the concept of privacy by design. Copyright IT Governance Ltd 2017 – v1.0
  • 20. TM Copyright IT Governance Ltd 2017 – v1.1 www.itgovernance.co.ukPrivacy Compliance Framework A privacy compliance framework, including a personal information management system, provides a framework for maintaining and improving compliance with data protection requirements and good practice.
  • 21. TM Copyright IT Governance Ltd 2017 – v1.1 www.itgovernance.co.uk Data protection officer (DPO) (Art. 37 et seq.) • DPOs are mandatory for processing by public authorities except courts acting in their judicial capacity, • Public authorities are allowed to share a DPO. Article 37(1a) and (3). • It is a protected position, reporting directly to senior management – Appropriately qualified – Consulted in respect of all data processing activities • Will be a ‘good practice’ appointment outside the mandatory appointments • Most staff dealing with personal data (e.g. HR, marketing) will need at least basic training • Staff awareness training also critical (accidental release of personal data could have financially damaging consequences) www.itgovernance.co.uk/shop/p-1833-certified-eu-general-data-protection- regulation-gdpr-foundation-and-practitioner-combination-online-course.aspx
  • 22. TM Copyright IT Governance Ltd 2017 – v1.1 www.itgovernance.co.uk Article 40 et seq: Certifications • Requirement is to apply appropriate administrative organizational and administrative measures. • How can you demonstrate this? – Codes of conduct and certifications may be used to demonstrate compliance with GDPR – Recognised international standards (eg ISO/IEC 27001) – Recognised national management standards (eg BS 10012 – for a PIMS or Personal Information Management System) – Recognised national technical standards (eg Cyber Essentials in the UK) – Emergence of new standards, privacy seals etc across EU • Certification does not absolve controller of need to comply
  • 23. TM Copyright IT Governance Ltd 2017 – v1.1 www.itgovernance.co.uk Article 44: International Transfers • Any transfer of personal data by controller or processor shall take place only if certain conditions are complied with: – Transfers on the basis of adequacy; – Transfers subject to the appropriate safeguards – Binding corporate rules apply. • All provisions shall be applied to ensure the protection of natural persons is not undermined. • To countries with similar data protection regulations – Cloud providers are a key risk area – Highest penalties apply to breaches of these provisions • October 2015: Court of Justice declared Safe Harbor invalid • April 2016: serious flaws in Privacy Shield: – fails to meet EU adequacy standards; – lack of a data retention principle; – indiscriminate collection of data for national security purposes; – insufficiency of legal remedies. – Privacy Shield discussions still ongoing
  • 24. TM Copyright IT Governance Ltd 2017 – v1.1 www.itgovernance.co.uk Independent Supervisory Authorities • Member states must create independent supervisory authorities and resource them appropriately – Tasks: – Monitor and enforce – Communicate – Promote awareness • Powers: – To investigate, correct, advise, enforce • Leading Supervisory Authority for multi-state controllers
  • 25. TM Copyright IT Governance Ltd 2017 – v1.1 www.itgovernance.co.uk European Data Protection Board (EDPB) • Ensure cooperation, communication, consistency and mutual assistance between national supervisory authorities • Monitor and ensure correct application of the Regulation • Examine any question dealing with its application • Ie: Ensure a level playing field
  • 26. TM Copyright IT Governance Ltd 2017 – v1.1 www.itgovernance.co.uk ICO – Final Words • “Accountability encourages an upfront investment in privacy fundamentals, but it offers a payoff down the line, not just in better legal compliance, but a competitive edge. We believe there is a real opportunity for organisations to present themselves on the basis of how they respect the privacy of individuals and over time this can play more of a role in consumer choice. • That’s the carrot for getting it right. And there’s a pretty big stick too. • I mentioned earlier that the GDPR will increase regulatory powers. • For the most serious violations of the law, my office will have the power to fine companies up to twenty million Euros or four per cent of a company’s total annual worldwide turnover for the preceding year. • In an ideal world we wouldn’t need to use those sticks, but policy makers are clear that breaches of personal privacy are a serious matter. Last year we issued more than one million pounds in fines for breaches of the Data Protection Act, so it’s not a power we’re afraid to use. • And our enforcement powers aren’t just for ‘typical’ data breaches, like laptops left on trains or information left open to a cyber attack. The GDPR gives regulators the power to enforce in the context of accountability – data protection by design, failure to conduct a data protection impact assessment, DPOs and documentation. If a business can’t show that good data protection is a cornerstone of their practices, they’re leaving themselves open to a fine or other enforcement action that could damage bank balance or business reputation.” • Speech to ICAEW 17 January 2017
  • 27. TM Copyright IT Governance Ltd 2017 – v1.1 www.itgovernance.co.uk Nine Steps to GDPR compliance 1. Establish governance framework – board awareness, risk register, accountability framework, review 2. Appoint and train a DPO/SDPO 3. Data inventory – identify processors, unlawfully held data 4. Data flow audit 5. Compliance gap analysis 1. Ensure Privacy Notice and SAR documents and processes are robust and legal 2. Records of processing 6. PIA and security gap analysis 7. Remediate 1. Privacy compliance framework 2. Cyber Essentials/Ten Steps to Cyber Security/ISO 27001 8. Data breach response process (NB: Test!) 9. Monitor, audit and continually improve NB: steps can be tackled in parallel
  • 28. TM Copyright IT Governance Ltd 2017 – v1.1 www.itgovernance.co.uk IT Governance: GDPR one-stop shop Self-help materials A Pocket guide www.itgovernance.co.uk/shop/P roduct/eu-gdpr-a-pocket-guide Implementation manual www.itgovernance.co.uk/shop/Pr oduct/eu-general-data-protection- regulation-gdpr-an- implementation-and-compliance- guide Documentation toolkit www.itgovernance.co.uk/shop/P roduct/eu-general-data- protection-regulation-gdpr- documentation-toolkit Compliance gap assessment tool www.itgovernance.co.uk/shop/Pr oduct/eu-gdpr-compliance-gap- assessment-tool
  • 29. TM Copyright IT Governance Ltd 2017 – v1.1 www.itgovernance.co.uk IT Governance: GDPR one-stop shop Training courses One-Day accredited Foundation course (classroom, online, distance learning) www.itgovernance.co.uk/shop/Product/certified-eu-general-data- protection-regulation-foundation-gdpr-training-course Four-Day accredited Practitioner course (classroom, online, distance learning) www.itgovernance.co.uk/shop/Product/certified-eu-general-data- protection-regulation-practitioner-gdpr-training-course One-Day data protection impact assessment (DPIA) workshop (classroom) www.itgovernance.co.uk/shop/Product/data-protection-impact- assessment-dpia-workshop
  • 30. TM Copyright IT Governance Ltd 2017 – v1.1 www.itgovernance.co.uk • Gap analysis • Our experienced data protection consultants can assess the exact standing of your current legal situation, security practices and operating procedures in relation to the DPA or the GDPR. • Data flow audit • Data mapping involves plotting out all of your data flows, which involves drawing up an extensive inventory of the data to understand where the data flows from, within and to. This type of analysis is a key requirement of the GDPR. • Information Commissioner notification support (a legal requirement for DPA compliance) • Organisations that process personal data must complete a notification with the Information Commissioner under the DPA. • Implementing a personal information management system (PIMS) • Establishing a PIMS as part of your overall business management system will ensure that data protection management is placed within a robust framework, which will be looked upon favourably by the regulator when it comes to DPA compliance. • Implementing an ISMS compliant with ISO 27001 • We offer flexible and cost-effective consultancy packages, and a comprehensive range of bespoke ISO 27001 consultancy services, that will help you implement an ISO 27001-compliant ISMS quickly and without the hassle, no matter where your business is located. • Cyber health check • The two-day Cyber Health Check combines on-site consultancy and audit with remote vulnerability assessments to assess your cyber risk exposure. IT Governance: GDPR one-stop shop GDPR consultancy