SlideShare une entreprise Scribd logo
1  sur  10
GDPR – The next steps !
KEY TERMS IN GDPR
Personal Data - Your customer and suppliers - includes online and offline information,
such as Names, addresses, IP addresses and phone numbers. If you have DPA
compliance, then the data you need to secure is very similar to GDPR.
Data Subject – a living individual about who your personal data relates.
Data Controller – a person who determines the uses and purposes for the personal
data (in your company)
Data Processor – a person who acts on the Controller’s behalf (this could be a third
party under subcontract to you)
Sensitive personal data – data revealing racial or ethnic origin, political opinions,
religious or philosophical beliefs, trade-union membership, or data concerning health
or sex life.
Personal Data Breach – a breach of security leading to the destruction, loss, alteration,
unauthorised disclosure of, or access to, personal data.
2016 TALKTALK FINED
£400,000 FINE FOR
SECURITY FAILINGS
• October 2015 – Cyber Attack losing over
150,000 Data Subject records.
• HOW ?
• The company had not encrypted some
personal details of customers.
• The company bought Tiscali and failed to
ensure the Tiscali Web pages were
adequately secure allowing hackers
access to the network and the
unencrypted database
• TalkTalk also avoided “two warnings”
prior to the hack which should have
alerted the firm to the problems with its
1 - Existing business processes
The way you capture, handle and process data
today could be your biggest problem. To comply
with the GDPR your business will need to keep a
rigid record of how, when, and why stored data was
used. You must also delete and update data where
necessary.
Carry out a Data Mapping Exercise and/or a Gap
Analysis – Call the Owl, I can help !
THREE CORE CAUSES OF DATA BREACHES
THREE CORE CAUSES OF DATA BREACHES
2 - Staff
Your whole company (full time, part time and contractors) needs
to understand the significance of GDPR and the risks relating to
breaches. Without the right training, Staff could unintentionally
facilitate a cyber-attack or disclose personal data.
Training in all aspects of Cybersecurity are widely available but
beware of the validity and the relevance vs the cost !!
IT Governance is, in the Owls opinion one of the better
https://www.itgovernance.co.uk/shop/product/gdpr-staff-
awareness-e-learning-course
£25 + VAT per course
3 - Cybersecurity
Almost half of UK companies
identified a cyber breach or attack in
2017.
Companies commonly known to hold
personal data are about 50% more
likely to be attacked than those that
don’t.
The most common Cybersecurity
threats, leading to breaches are:-
• fraudulent emails
• viruses and malware.
• people impersonating organisations
online and
• ransomware
THREE CORE CAUSES OF DATA BREACHES
Almost ALL of these attacks could have been prevented with the right
Awareness, Vigilance and Cyber Security
NEXT STEPS….
Carry out a Data Audit
• What do I have ?
• How do I get it ?
• Where do I store it ?
• Locally (digital), Locally (Physical) or Cloud digital
• Who has access to it
• How secure is it ?
NOTE: GDPR applies to customers AND suppliers
Documentation, Documentation, Documentation
• Document the above
• Proof of consent from all Data Subjects
• Statements about information collected and
processed and purpose
• Documented process for protecting data
• Information Security Policy etc.
Secure that Data !
• “Appropriate technical and organisational Measures”
(ISO/IEC 27001 ISMS)
NEXT STEPS….
Documentation and processes
• IT Governance offer complete set of mandatory and
supporting documentation templates “that are easy to
use, customisable and ensure do a full compliance”
• Data protection policy
• Training policy
• Information security policy
• Data protection impact assessment procedure
• Retention of records procedure
• Subject access request form and procedure
• Privacy procedure
• International data transfer procedure
• Data portability procedure
• Data protection officer (DPO) job description
• Complaints procedure
• Audit checklist for compliance
• Privacy notice
• And more….
More info -
https://www.itgovernance.co.uk/shop
/Product/eu-general-data-
protection-regulation-gdpr-
documentation-toolkit
NEXT STEPS….
Map that Data and Secure that Data !
Owltech can help you here
• Perform a Data Mapping exercise andGap Analysis
• Factor in current security systems in the above and
• Recommend any new requirements for security for
compliance
• General Data Security best practice
• AntiVirus and AntiMalware
• Encryption
• E-Mail encryption and security
• Cloud computing security
Owltech can also deliver and manage these systems for you
Thank
You !

Contenu connexe

Tendances

The Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection RegulationThe Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection Regulation
Ghostery, Inc.
 
Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?
PECB
 
Preparing for general data protection regulations (gdpr) within the hous...
Preparing for general data protection regulations (gdpr) within the hous...Preparing for general data protection regulations (gdpr) within the hous...
Preparing for general data protection regulations (gdpr) within the hous...
Stephanie Vasey
 

Tendances (20)

Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
 
Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)
 
GDPR The New Data Protection Law coming into effect May 2018. What does it me...
GDPR The New Data Protection Law coming into effect May 2018. What does it me...GDPR The New Data Protection Law coming into effect May 2018. What does it me...
GDPR The New Data Protection Law coming into effect May 2018. What does it me...
 
GDPR for Dummies
GDPR for DummiesGDPR for Dummies
GDPR for Dummies
 
Scott Appleton: GDPR - Big Bang or Data Evolution?
Scott Appleton: GDPR - Big Bang or Data Evolution?Scott Appleton: GDPR - Big Bang or Data Evolution?
Scott Appleton: GDPR - Big Bang or Data Evolution?
 
What does GDPR mean for your charity?
What does GDPR mean for your charity?What does GDPR mean for your charity?
What does GDPR mean for your charity?
 
GDPR From the Trenches - Real-world examples of how companies are approaching...
GDPR From the Trenches - Real-world examples of how companies are approaching...GDPR From the Trenches - Real-world examples of how companies are approaching...
GDPR From the Trenches - Real-world examples of how companies are approaching...
 
Training privacy by design
Training privacy by designTraining privacy by design
Training privacy by design
 
Beyond GDPR Compliance - Role of Internal Audit
Beyond GDPR Compliance - Role of Internal AuditBeyond GDPR Compliance - Role of Internal Audit
Beyond GDPR Compliance - Role of Internal Audit
 
Ardoq in Edinburgh - Events - Building Resilience in a Post-GDPR World (14-au...
Ardoq in Edinburgh - Events - Building Resilience in a Post-GDPR World (14-au...Ardoq in Edinburgh - Events - Building Resilience in a Post-GDPR World (14-au...
Ardoq in Edinburgh - Events - Building Resilience in a Post-GDPR World (14-au...
 
Geek Sync | Tackling Key GDPR Challenges with Data Modeling and Governance
Geek Sync | Tackling Key GDPR Challenges with Data Modeling and GovernanceGeek Sync | Tackling Key GDPR Challenges with Data Modeling and Governance
Geek Sync | Tackling Key GDPR Challenges with Data Modeling and Governance
 
The Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection RegulationThe Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection Regulation
 
GDPR: Is Your Organization Ready for the General Data Protection Regulation?
GDPR: Is Your Organization Ready for the General Data Protection Regulation?GDPR: Is Your Organization Ready for the General Data Protection Regulation?
GDPR: Is Your Organization Ready for the General Data Protection Regulation?
 
How does GDPR affect your business?
How does GDPR affect your business?How does GDPR affect your business?
How does GDPR affect your business?
 
GDPR Privacy Introduction
GDPR Privacy IntroductionGDPR Privacy Introduction
GDPR Privacy Introduction
 
Evolving international privacy regulations and cross border data transfer - g...
Evolving international privacy regulations and cross border data transfer - g...Evolving international privacy regulations and cross border data transfer - g...
Evolving international privacy regulations and cross border data transfer - g...
 
Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?
 
Preparing for general data protection regulations (gdpr) within the hous...
Preparing for general data protection regulations (gdpr) within the hous...Preparing for general data protection regulations (gdpr) within the hous...
Preparing for general data protection regulations (gdpr) within the hous...
 
GDPR what you should know and how to minimize impact on your business
GDPR what you should know and how to minimize impact on your businessGDPR what you should know and how to minimize impact on your business
GDPR what you should know and how to minimize impact on your business
 
GDPR security services - Areyou ready ?
GDPR security services - Areyou ready ?GDPR security services - Areyou ready ?
GDPR security services - Areyou ready ?
 

Similaire à CBC GDPR The Physics

Similaire à CBC GDPR The Physics (20)

GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
 
GDPR in the Healthcare Industry
GDPR in the Healthcare IndustryGDPR in the Healthcare Industry
GDPR in the Healthcare Industry
 
Data compliance - get it right the first time (Black/White printable PDF)
Data compliance - get it right the first time (Black/White printable PDF)Data compliance - get it right the first time (Black/White printable PDF)
Data compliance - get it right the first time (Black/White printable PDF)
 
Data compliance - get it right the first time (Full color PDF)
Data compliance - get it right the first time (Full color PDF)Data compliance - get it right the first time (Full color PDF)
Data compliance - get it right the first time (Full color PDF)
 
Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR Success
 
12th July GDPR event slides
12th July GDPR event slides12th July GDPR event slides
12th July GDPR event slides
 
GDPR: Your Journey to Compliance
GDPR: Your Journey to ComplianceGDPR: Your Journey to Compliance
GDPR: Your Journey to Compliance
 
PREPARING FOR THE GDPR
PREPARING FOR THE GDPRPREPARING FOR THE GDPR
PREPARING FOR THE GDPR
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
 
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfWhat Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
 
Kevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram Security Summit
Kevin Wharram Security Summit
 
Data Privacy and Security in UAE.pptx
Data Privacy and Security in UAE.pptxData Privacy and Security in UAE.pptx
Data Privacy and Security in UAE.pptx
 
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in ComplianceThe GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
 
GDPR Benefits and a Technical Overview
GDPR  Benefits and a Technical OverviewGDPR  Benefits and a Technical Overview
GDPR Benefits and a Technical Overview
 
General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001
 
Cybersecurity & Data Challenges
Cybersecurity & Data ChallengesCybersecurity & Data Challenges
Cybersecurity & Data Challenges
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Wipo smes ge_08_topic07
Wipo smes ge_08_topic07Wipo smes ge_08_topic07
Wipo smes ge_08_topic07
 
What's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesWhat's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) Changes
 

Plus de Jason Chapman

Rare Design Case Study Mead Open Farm
Rare Design Case Study Mead Open FarmRare Design Case Study Mead Open Farm
Rare Design Case Study Mead Open Farm
Jason Chapman
 
Rare Design Case Study Vodafone
Rare Design Case Study VodafoneRare Design Case Study Vodafone
Rare Design Case Study Vodafone
Jason Chapman
 

Plus de Jason Chapman (20)

Maths hub workgroup overview 2018 19
Maths hub workgroup overview 2018 19Maths hub workgroup overview 2018 19
Maths hub workgroup overview 2018 19
 
CBC – Wills and Lasting Powers of Attorney
CBC – Wills and Lasting Powers of AttorneyCBC – Wills and Lasting Powers of Attorney
CBC – Wills and Lasting Powers of Attorney
 
Ppt11 portfolio v2 slide share
Ppt11 portfolio v2 slide sharePpt11 portfolio v2 slide share
Ppt11 portfolio v2 slide share
 
CBC GDPR – 1 month to go
CBC GDPR –  1 month to goCBC GDPR –  1 month to go
CBC GDPR – 1 month to go
 
CBC GDPR April 2018
CBC GDPR April 2018CBC GDPR April 2018
CBC GDPR April 2018
 
GDPR Jan 2018 1
GDPR  Jan 2018 1GDPR  Jan 2018 1
GDPR Jan 2018 1
 
Referrals
ReferralsReferrals
Referrals
 
CBC Referrals
CBC ReferralsCBC Referrals
CBC Referrals
 
Rare design portfolio presentation 10
Rare design portfolio presentation 10Rare design portfolio presentation 10
Rare design portfolio presentation 10
 
Ppt9 portfolio
Ppt9 portfolioPpt9 portfolio
Ppt9 portfolio
 
CBC Presentation 22-May-2017
CBC Presentation 22-May-2017CBC Presentation 22-May-2017
CBC Presentation 22-May-2017
 
Mind Keys
Mind KeysMind Keys
Mind Keys
 
Cma cbc overview 280217
Cma cbc overview 280217Cma cbc overview 280217
Cma cbc overview 280217
 
CBC Action Coach (Mind Body Heart Spirit Presentation)
CBC Action Coach (Mind Body Heart Spirit Presentation)CBC Action Coach (Mind Body Heart Spirit Presentation)
CBC Action Coach (Mind Body Heart Spirit Presentation)
 
Rare portfolio dec16
Rare portfolio dec16Rare portfolio dec16
Rare portfolio dec16
 
PPT7 portfolio
PPT7 portfolioPPT7 portfolio
PPT7 portfolio
 
PPT6 portfolio
PPT6 portfolioPPT6 portfolio
PPT6 portfolio
 
Rare Design Case Study Mead Open Farm
Rare Design Case Study Mead Open FarmRare Design Case Study Mead Open Farm
Rare Design Case Study Mead Open Farm
 
Rare Design Case Study Vodafone
Rare Design Case Study VodafoneRare Design Case Study Vodafone
Rare Design Case Study Vodafone
 
Rare Case Study Ibicus
Rare Case Study IbicusRare Case Study Ibicus
Rare Case Study Ibicus
 

Dernier

!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
DUBAI (+971)581248768 BUY ABORTION PILLS IN ABU dhabi...Qatar
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
daisycvs
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
 

Dernier (20)

Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow ChallengesFalcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
Falcon Invoice Discounting: Tailored Financial Wings
Falcon Invoice Discounting: Tailored Financial WingsFalcon Invoice Discounting: Tailored Financial Wings
Falcon Invoice Discounting: Tailored Financial Wings
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Cracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' SlideshareCracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' Slideshare
 
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Buy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail AccountsBuy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail Accounts
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck Template
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdfTVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
 

CBC GDPR The Physics

  • 1. GDPR – The next steps !
  • 2. KEY TERMS IN GDPR Personal Data - Your customer and suppliers - includes online and offline information, such as Names, addresses, IP addresses and phone numbers. If you have DPA compliance, then the data you need to secure is very similar to GDPR. Data Subject – a living individual about who your personal data relates. Data Controller – a person who determines the uses and purposes for the personal data (in your company) Data Processor – a person who acts on the Controller’s behalf (this could be a third party under subcontract to you) Sensitive personal data – data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, trade-union membership, or data concerning health or sex life. Personal Data Breach – a breach of security leading to the destruction, loss, alteration, unauthorised disclosure of, or access to, personal data.
  • 3. 2016 TALKTALK FINED £400,000 FINE FOR SECURITY FAILINGS • October 2015 – Cyber Attack losing over 150,000 Data Subject records. • HOW ? • The company had not encrypted some personal details of customers. • The company bought Tiscali and failed to ensure the Tiscali Web pages were adequately secure allowing hackers access to the network and the unencrypted database • TalkTalk also avoided “two warnings” prior to the hack which should have alerted the firm to the problems with its
  • 4. 1 - Existing business processes The way you capture, handle and process data today could be your biggest problem. To comply with the GDPR your business will need to keep a rigid record of how, when, and why stored data was used. You must also delete and update data where necessary. Carry out a Data Mapping Exercise and/or a Gap Analysis – Call the Owl, I can help ! THREE CORE CAUSES OF DATA BREACHES
  • 5. THREE CORE CAUSES OF DATA BREACHES 2 - Staff Your whole company (full time, part time and contractors) needs to understand the significance of GDPR and the risks relating to breaches. Without the right training, Staff could unintentionally facilitate a cyber-attack or disclose personal data. Training in all aspects of Cybersecurity are widely available but beware of the validity and the relevance vs the cost !! IT Governance is, in the Owls opinion one of the better https://www.itgovernance.co.uk/shop/product/gdpr-staff- awareness-e-learning-course £25 + VAT per course
  • 6. 3 - Cybersecurity Almost half of UK companies identified a cyber breach or attack in 2017. Companies commonly known to hold personal data are about 50% more likely to be attacked than those that don’t. The most common Cybersecurity threats, leading to breaches are:- • fraudulent emails • viruses and malware. • people impersonating organisations online and • ransomware THREE CORE CAUSES OF DATA BREACHES Almost ALL of these attacks could have been prevented with the right Awareness, Vigilance and Cyber Security
  • 7. NEXT STEPS…. Carry out a Data Audit • What do I have ? • How do I get it ? • Where do I store it ? • Locally (digital), Locally (Physical) or Cloud digital • Who has access to it • How secure is it ? NOTE: GDPR applies to customers AND suppliers Documentation, Documentation, Documentation • Document the above • Proof of consent from all Data Subjects • Statements about information collected and processed and purpose • Documented process for protecting data • Information Security Policy etc. Secure that Data ! • “Appropriate technical and organisational Measures” (ISO/IEC 27001 ISMS)
  • 8. NEXT STEPS…. Documentation and processes • IT Governance offer complete set of mandatory and supporting documentation templates “that are easy to use, customisable and ensure do a full compliance” • Data protection policy • Training policy • Information security policy • Data protection impact assessment procedure • Retention of records procedure • Subject access request form and procedure • Privacy procedure • International data transfer procedure • Data portability procedure • Data protection officer (DPO) job description • Complaints procedure • Audit checklist for compliance • Privacy notice • And more…. More info - https://www.itgovernance.co.uk/shop /Product/eu-general-data- protection-regulation-gdpr- documentation-toolkit
  • 9. NEXT STEPS…. Map that Data and Secure that Data ! Owltech can help you here • Perform a Data Mapping exercise andGap Analysis • Factor in current security systems in the above and • Recommend any new requirements for security for compliance • General Data Security best practice • AntiVirus and AntiMalware • Encryption • E-Mail encryption and security • Cloud computing security Owltech can also deliver and manage these systems for you

Notes de l'éditeur

  1. Carry out a Data Mapping Exercise and a Gap Analysis
  2. Latest GDPR news 19/06/2017: 23% of small UK firms haven't started preparations for GDPR Nearly a quarter of small UK businesses still haven't started preparing for data protection rules that are less than a year away, according to a survey.