SlideShare une entreprise Scribd logo
1  sur  49
Télécharger pour lire hors ligne
GDPR Overview
Carlin Dornbusch, CISSP
American Cyber Security Management
http://americancsm.com/
●EU Privacy History
●GDPR Outline & Terms
●GDPR Principles
●Subject Rights
●Controller and Processor Responsibilities
- Privacy by Design and Privacy by Default
●Governance - Data Protection Officer, DPIA
●GDPR 2016-2018 Timeline
●GDPR vs Privacy Shield
●Projects vs Strategy
Overview
EU Privacy History
Privacy Shield & GDPR Timing
GDPR Summary
New Data Subject Rights:
• Right to Access
• Right to Rectify
• Right to Erasure
• Right to Restriction
• Data Portability
• Right to Object
Are you ready for May 25th 2018?
New Scope New Rights
New
REGULATION
New Penalties
New Scope:
• PII of Data Subject
• Processors
• Controllers
• Any Location
• Goods & Services
• Monitoring
New Penalties:
• 4% or €20M
• 2% - No Docs, DPIA
• Processors
• Controllers
●EU Privacy History
●GDPR Outline & Terms
●GDPR Principles
●Subject Rights
●Controller and Processor Responsibilities
- Privacy by Design and Privacy by Default
●Governance - Data Protection Officer, DPIA
●GDPR 2016-2018 Timeline
●GDPR vs Privacy Shield
●Projects vs Strategy
Overview
GDPR Outline (1 of 3)
Chapter 1 General Provisions
Objective, Scope, Definitions (Article 1-4)
Chapter 2 Principles
Lawfulness, Consent, Special Categories, no ID Required (Article 5-11)
Chapter 3 Right of the Data Subjects
Section 1 – Transparency & modalities (Article 12)
Section 2 – Information & access to personal data (Article 13 – 15)
Section 3 – Rectification & erasure (Article 16 – 20)
Section 4 - Right to object & automation (Article 21 – 22)
Section 5 – Restrictions (Article 23)
GDPR Outline (2 of 3)
Chapter 4 Controller & Processor
Section 1 – General obligations (Article 24-31)
Section 2 – Security of personal data (Article 32- 34)
Section 3 – DPIA & prior consultation (Article 35 – 36)
Section 4 – DPO (Article 37 - 39)
Section 5 – Code of Conduct & certs (Article 40-43)
Chapter 5 Transfers of personal data to 3rd countries or Int’l org’s
General principles for transfer (Article 44-50)
Chapter 6 Independent Supervisory Authorities
Section 1 Independent status (Article 51-54)
Section 2 Competence, task and powers (Article 55 -59)
GDPR Outline (3 of 3)
Chapter 7 Cooperation & Consistency
Section 1 Cooperation (Article 60-62)
Section 2 Consistency (Article 63 – 67)
Section 3 European data protection board (Article 68 - 76)
Chapter 8 Remedies, Liability, and penalties
Complaints, Representation, Fines (Article 77-84)
Chapter 9 Provisions relating to specific processing situations
Freedom of expression, public access, Secrecy, Church (Article 85-91)
Chapter 10 Delegated acts and implementing acts
Exercise of delegation, committee procedure (Article 92-93)
Chapter 11 Final Provisions Chapter
95/46/EC, 2002/58/EC, Prior to May 24, 2016, Commission reports,
legal acts, force and application (Article 94-99)
GDPR Terminology(1 of 2 )
• Personal Data – any information relating to an identified or
identifiable natural person (‘data subject’)
• Data Subject – any person who can be identified by
reference to a name, an identification number, location
data, an online identifier or to one or more factors specific
to the physical, physiological, genetic, mental, economic,
cultural or social identity of that natural person
• Processing – any operation which is performed on personal
data, such as collection, recording, organization, structuring,
storage, adaptation or alteration, retrieval, consultation,
use, disclosure by transmission, dissemination or otherwise
making available, alignment or combination, restriction,
erasure or destruction
Article 4
GDPR Terminology(2 of 2)
• Data Controller – the one who determines the purposes
and means of the processing of personal data
• Data Processor – the one who processes personal data on
behalf of the controller
• Personal Data Breach – Breach of security leading to the
accidental or unlawful destruction, loss, alteration,
unauthorized disclosure of, or access to, personal data
transmitted, stored or otherwise processed
• Consent – any freely given, specific, informed and
unambiguous indication of the data subject's wishes by
which he or she, by a statement or by a clear affirmative
action, signifies agreement to the processing of personal
data relating to him or her
Article 4
●EU Privacy History
●GDPR Outline & Terms
●GDPR Principles
●Subject Rights
●Controller and Processor Responsibilities
- Privacy by Design and Privacy by Default
●Governance - Data Protection Officer, DPIA
●GDPR 2016-2018 Timeline
●GDPR vs Privacy Shield
●Projects vs Strategy
Overview
● Lawfulness, fairness, and transparency
● Explicit purpose limitation
● Data minimization
● Accuracy
● Storage limitation
● Integrity and confidentiality
● Accountability GDPR
Article 5-11
GDPR Principles
You can process personal data if one of these is true:
● Data subject gave consent
● Necessary to perform contract with data subject
● Required for compliance
● Required to protect vital interests of data subject
● Required to execute tasks in public interest
● Legitimate interests
Article 6
Lawful Processing
●EU Privacy History
●GDPR Outline & Terms
●GDPR Principles
●Subject Rights
●Controller and Processor Responsibilities
- Privacy by Design and Privacy by Default
●Governance - Data Protection Officer, DPIA
●GDPR 2016-2018 Timeline
●GDPR vs Privacy Shield
●Projects vs Strategy
Overview
• Transparency & Modalities - Article 12
• Collection of Data - Article 13
• Obtained from Another Source - Article 14
• Right of Access – Article 15
• Right of Rectification – Article 16
• Right of Erasure – Article 17
• Right of Restricted Processing – Article 18
• Right of 3rd-Party Notification– Article 19
• Right of Data Portability – Article 20
• Right to Object – Article 21
• Automated Processing – Article 22
• Restrictions - Article 23
Data Subjects Rights
Data subjects has the right to understand the following:
● Purpose data is being processed
● “Categories” of personal data
● “Recipient” of data (including third countries)
● Period of retention
● Request the deletion or restrict the access to data
● How to lodge a complaint
● The source of the data, when the data is not personal data
● The existence of automated decision making, including
profiling
● How to request a copy of the data
Article 15
Right of Access
Data subjects have the right to:
● Modify inaccurate personal data
● Have incomplete personal data completed
Article 16
Right of Rectification
Data subjects have the right to have their personal data
deleted when:
● The data is no longer relevant to its intended
purpose
● Consent is withdrawn by the data subject
● The data subject objects to its use
● The personal data was unlawfully processed
● For compliance reasons
● Related to Article 8 (1) Children’s information
Article 17
Right of Erasure (1 of 2)
When the controller has made the personal data public:
● The controller may take “reasonable steps” depending on
available technology and cost to inform the processor to
delete the personal data of the data subject including links and
backups.
This right doesn’t apply if:
● It violates the right of freedom of expression
● It is carried out in the public interest
● The reason is public interest related to public health
● Scientific or historical research
● Establishment, exercise, or defense of a legal claim
Article 17
Right of Erasure (2 of 2)
Data subjects have the right to restrict the processing
of their data:
● If there is a dispute, during the period it takes to
verify it
● If they don’t want their data deleted but would
rather have it restricted
● If the data can’t be deleted for legal reasons
And be informed when the restriction is lifted
Article 18
Right of Restricted Processing
The controller must notify the recipient when
● Rectification is carried out (Article 16)
● Erasure of personal data is complete (Article 17)
● or Restriction of Processing is complete (Article 18)
Data Subjects may request a list of the recipients.
Article 19
Right of 3rd Party Notification
The data subject has the right to move their personal
data from one controller to another.
● Receive the personal data in a common, easy to
use format
● If it is technically feasible, the transfer can be done
automatically at the data subject’s request
● This doesn’t apply to processing which is in the
public interest
● And this shall not adversely affect others.
Article 20
Right of Data Portability
The data subject has the right to object to processing!
● Controller must stop, unless for legal reasons
● This includes direct marketing campaigns
Unless the processing is for scientific or historical
purposes AND it is for reasons of public interest.
Article 21
Right to Object
The data subject has the right to not be subjected to
automated processing, unless it:
● Contractually is necessary for Controller/Processor
● Authorized by the EU
● Explicit consent is given
Controllers must ensure data subjects can engage for
objections to the automated processing.
Article 22
Profiling
●EU Privacy History
●GDPR Outline & Terms
●GDPR Principles
●Subject Rights
●Controller and Processor Responsibilities
- Privacy by Design and Privacy by Default
●Governance - Data Protection Officer, DPIA
●GDPR 2016-2018 Timeline
●GDPR vs Privacy Shield
●Projects vs Strategy
Overview
Controller Responsibilities
The controller shall implement appropriate technical and
organizational measures and they will be reviewed and
updated as necessary.
If needed, the controller will also implement appropriate
data protection policies.
Compliance can be through either an ‘approved’ code of
conduct or ‘approved’ certification mechanism.
Code of Conduct Article 40 approved by Article 55
Certification Article 42 approved by Article 55/56
Article 24
Processor Responsibilities
Only use processors with sufficient guarantees of
technical and organizational measures.
The processor may not use another processor without
prior specific or general written authorization.
The controller has the opportunity to object to the
change.
Article 28
Secure Processing
The Controller/Processor are responsible for:
• The pseudonymization and encryption of data
• Ensuring ongoing CIA and resilience of systems
• Ensuring the recovery of personal data in any incident
• Regular testing, assessing, and evaluating of the system
• Ensuring accidental or unlawful destruction, loss,
alteration, or unauthorized disclosure are minimized.
• Ensuring that ‘natural persons’ only act under the
authority of the controller.
Article 32
Breach Notice to Authorities
The Controller must notify supervisory authorities in 72hrs
with:
• nature of breach and volume
• contact info of DPO
• likely consequences of breach
• measures to be taken for mitigation
If discovered by the Processor, the Processor must notify
the Controller.
Controller must control the documentation
Article 33
Breach Notice to Data Subject
The Controller must notify data subjects “without undue
delay” with:
• contact info of DPO
• likely consequences of breach
• measures to be taken for mitigation
Except in the cases of:
• data was encrypted
• the high risk will not materialize
• disproportionate effort of communication - use public
communications
Article 34
Data Protection – by design & default
Privacy By Design
Controllers should take appropriate measures for
processing including implementing data protection
principles:
• Pseudonymization
• Data minimization
Article 25
Technical and Organizational Controls are Required
Data Protection – by design & default
By Default
Ensuring only required data is collected and by default:
• The amount of data is limited
• The extent of processing and accessibility is
limited
• The period of storage is defined and limited
Article 25
Technical and Organizational Controls are Required
●EU Privacy History
●GDPR Outline & Terms
●GDPR Principles
●Subject Rights
●Controller and Processor Responsibilities
- Privacy by Design and Privacy by Default
●Governance - Data Protection Officer, DPIA
●GDPR 2016-2018 Timeline
●GDPR vs Privacy Shield
●Projects vs Strategy
Overview
Data Protection Officer
Data Protection Officer (DPO) – Oversees the data
protection responsibilities within the organization and
ensures compliance with the privacy regulations and
laws
• Works independently
• Directs and oversees all data protection activities
• Creates the policies and procedures around data protection
• Ensures staff are trained
• Manages third party vendors
• Global coordination
• Handles public request for personal data
• Primary POC for regulatory authorities
Article 39
DPO Assignment
You must assign a DPO if:
- You are a public processor
- You regularly and systematically monitor data
subjects on a large scale
- You are processing on a large scale any special
categories of data pursuant to Article 9 and
personal data relating to criminal convictions and
offences referred to in Article 10
Article 37
DPO Reporting
The DPO must:
• Be involved in all issues of personal data protection
• Be resourced to carry out tasks and maintain
knowledge
• Not be dismissed or penalized for job execution
• Report to the highest level of management
• Be available to service data subject requests
• Be bound to secrecy or confidentiality
• Execute other tasks, as necessary, that do not
conflict
Article 38
Data Protection Impact Assessments (DPIA’s)
Controllers must determine if DPIA is required via Risk Analysis
• If processing produces a legal effect on subjects
• Criminal data types
• Large scale monitoring
• Review the types of processing governed by the EU
Must perform DPIA PRIOR to processing
Must involve the DPO
Article 35
DPIA’s (2 of 2)
DPIA’s must contain:
• Processing operations descriptions
• Assessment of necessity and proportionality
• Assessment of Risks to the subject’s rights
• Risks mitigation plan
DPIA’s must be compliant to codes of conduct
DPIA’s shall incorporate Subject feedback
DPIA’s must be executed as risk changes
Article 35
●EU Privacy History
●GDPR Outline & Terms
●GDPR Principles
●Subject Rights
●Controller and Processor Responsibilities
- Privacy by Design and Privacy by Default
●Governance - Data Protection Officer, DPIA
●GDPR 2016-2018 Timeline
●GDPR vs Privacy Shield
●Projects vs Strategy
Overview
2016 2017 2018
Program
Team
Assess
Risk
Awareness
Define
Controls
Implement
Controls
Measure
Controls
Demonstrate
Maintain
Adoption Transition Assess
GDPR Operational Timeline
●EU Privacy History
●GDPR Outline & Terms
●GDPR Principles
●Subject Rights
●Controller and Processor Responsibilities
- Privacy by Design and Privacy by Default
●Governance - Data Protection Officer, DPIA
●GDPR 2016-2018 Timeline
●GDPR vs Privacy Shield
●Projects vs Strategy
Overview
GDPR
● Principles
● Lawfulness, fair,
transparent
● Explicit purpose
● Data minimization
● Accuracy
● Storage Limitation
● Integrity and Confidentiality
● Accountability
● Enables Selling to EU
● Auditable
● Enforced by EU
Privacy Shield
● Principles:
● Notice
● Choice
● Accountability for Onward Transfer
● Security
● Data Integrity and Purpose
Limitation
● Access
● Recourse, Enforcement and Liability
● Allows EU-to-US data transfer
● Self Audit
● Enforced by U.S.
GDPR
GDPR vs. Privacy Shield
●EU Privacy History
●GDPR Outline & Terms
●GDPR Principles
●Subject Rights
●Controller and Processor Responsibilities
- Privacy by Design and Privacy by Default
●Governance - Data Protection Officer, DPIA
●GDPR 2016-2018 Timeline
●GDPR vs Privacy Shield
●Projects vs Strategy
Overview
• 92% of US multinational companies think compliance
with GDPR is a top data protection priority
• 68% will spend between $1-10M on GDPR readiness
• Fear is a big motivator
• Concerns over consumer trust because of data
breaches which leads to lost revenue and fines.
CID 1-26-17
https://www.cio.com/article/3161920/privacy/article.html
GDPR as a Priority
If GDPR applies to your company:
• When did you last update your Privacy/Cookie Policy?
• How do you protect customer PII?
• Do you collect explicit consent from your customers?
• Can you remove individual data from your systems?
• Is your data anonymized and encrypted?
• Are your vendor contracts up-to-date?
• Is your Incident Response Plan tested?
Are You Ready for GDPR?
• Organize – Assign a DPO (Data Leader)
• Find Your Data
• Know your Data Flows
• Determine Your Risks
• Assess your Controls
• Implement Privacy Shield for EU to US data access
• Comply to Local, State, Federal and Intern’l Laws
• Begin DPIA’s
• Document, Document, Document
• Improve your Incident Mgmt/Breach Notification
GDPR Planning
Data Inventory
Data Flows
Controls Review
Questionnaires
Risk Analysis
Cookie Compliance
Recommendations
Remediation
Member
Next Step: GDPR Assessment
Thank You
Carlin Dornbusch, CISSP
Carlin@AmericanCSM.com
http://www.americancsm.com
https://youtu.be/Dq2CCJ4ruqc

Contenu connexe

Tendances

General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...Cvent
 
Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)Acquia
 
California Consumer Privacy Act (CCPA): Countdown to Compliance
California Consumer Privacy Act (CCPA): Countdown to ComplianceCalifornia Consumer Privacy Act (CCPA): Countdown to Compliance
California Consumer Privacy Act (CCPA): Countdown to ComplianceTinuiti
 
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEnabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEryk Budi Pratama
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and PrivacyVertex Holdings
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data SecurityWilmerHale
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_indiaAltacit Global
 
Data protection ppt
Data protection pptData protection ppt
Data protection pptgrahamwell
 

Tendances (20)

General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
Introduction to GDPR
Introduction to GDPRIntroduction to GDPR
Introduction to GDPR
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection Regulation
 
Data Privacy & Security
Data Privacy & SecurityData Privacy & Security
Data Privacy & Security
 
General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...
 
Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)
 
GDPR infographic
GDPR infographicGDPR infographic
GDPR infographic
 
California Consumer Privacy Act (CCPA): Countdown to Compliance
California Consumer Privacy Act (CCPA): Countdown to ComplianceCalifornia Consumer Privacy Act (CCPA): Countdown to Compliance
California Consumer Privacy Act (CCPA): Countdown to Compliance
 
GDPR and Security.pdf
GDPR and Security.pdfGDPR and Security.pdf
GDPR and Security.pdf
 
GDPR
GDPRGDPR
GDPR
 
GDPR Demystified
GDPR DemystifiedGDPR Demystified
GDPR Demystified
 
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEnabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
 
Data protection
Data protectionData protection
Data protection
 
GDPR RACI.pdf
GDPR RACI.pdfGDPR RACI.pdf
GDPR RACI.pdf
 
An Overview of GDPR
An Overview of GDPR An Overview of GDPR
An Overview of GDPR
 
Gdpr presentation
Gdpr presentationGdpr presentation
Gdpr presentation
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and Privacy
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_india
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 

Similaire à GDPR Overview for Compliance

Niall Rooney FD Event 05.09.19
Niall Rooney FD Event 05.09.19Niall Rooney FD Event 05.09.19
Niall Rooney FD Event 05.09.19Niall Rooney
 
GDPR for public sector DPO's seminar, April 2018, Manchester
GDPR for public sector DPO's seminar, April 2018, ManchesterGDPR for public sector DPO's seminar, April 2018, Manchester
GDPR for public sector DPO's seminar, April 2018, ManchesterBrowne Jacobson LLP
 
DPOs in the public sector, May 2018, Birmingham
DPOs in the public sector, May 2018, BirminghamDPOs in the public sector, May 2018, Birmingham
DPOs in the public sector, May 2018, BirminghamBrowne Jacobson LLP
 
GDPR for public sector DPO's, April 2018, Nottingham
GDPR for public sector DPO's, April 2018, NottinghamGDPR for public sector DPO's, April 2018, Nottingham
GDPR for public sector DPO's, April 2018, NottinghamBrowne Jacobson LLP
 
DPOs in the public sector, May 2018, London
DPOs in the public sector, May 2018, LondonDPOs in the public sector, May 2018, London
DPOs in the public sector, May 2018, LondonBrowne Jacobson LLP
 
GDPR and eHealth for the pharma industry (VFenR presentation)
GDPR and eHealth for the pharma industry (VFenR presentation)GDPR and eHealth for the pharma industry (VFenR presentation)
GDPR and eHealth for the pharma industry (VFenR presentation)Erik Vollebregt
 
Data Protection Seminar_GDPR_ISOLAS_26-06-17
Data Protection Seminar_GDPR_ISOLAS_26-06-17Data Protection Seminar_GDPR_ISOLAS_26-06-17
Data Protection Seminar_GDPR_ISOLAS_26-06-17Michael Adamberry
 
"Legal tips and compliance requirements" - Anastasia Botsi, ICT Legal
"Legal tips and compliance requirements" - Anastasia Botsi, ICT Legal"Legal tips and compliance requirements" - Anastasia Botsi, ICT Legal
"Legal tips and compliance requirements" - Anastasia Botsi, ICT LegalCyber Watching
 
Tech Connect Live 30th May 2018 ,GDPR Summit John Ghent
Tech Connect Live 30th May 2018 ,GDPR Summit John GhentTech Connect Live 30th May 2018 ,GDPR Summit John Ghent
Tech Connect Live 30th May 2018 ,GDPR Summit John GhentEvents2018
 
An Overview of GDPR by Pathway Group
An Overview of GDPR by Pathway GroupAn Overview of GDPR by Pathway Group
An Overview of GDPR by Pathway GroupThe Pathway Group
 
Impact of GDPR on User Experience
Impact of GDPR on User ExperienceImpact of GDPR on User Experience
Impact of GDPR on User ExperienceWSO2
 
EU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingEU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingIT Governance Ltd
 
GDPR and API Security
GDPR and API SecurityGDPR and API Security
GDPR and API SecurityWSO2
 
GDPR - are you ready for the challenge?
GDPR - are you ready for the challenge?GDPR - are you ready for the challenge?
GDPR - are you ready for the challenge?Sage HR
 
Changing legislation – General Data Protection Regulation (GDPR) and librarie...
Changing legislation – General Data Protection Regulation (GDPR) and librarie...Changing legislation – General Data Protection Regulation (GDPR) and librarie...
Changing legislation – General Data Protection Regulation (GDPR) and librarie...CILIPScotland
 
EU General Data Protection Regulation top 8 operational impacts in personal c...
EU General Data Protection Regulation top 8 operational impacts in personal c...EU General Data Protection Regulation top 8 operational impacts in personal c...
EU General Data Protection Regulation top 8 operational impacts in personal c...Erik Vollebregt
 

Similaire à GDPR Overview for Compliance (20)

Niall Rooney FD Event 05.09.19
Niall Rooney FD Event 05.09.19Niall Rooney FD Event 05.09.19
Niall Rooney FD Event 05.09.19
 
GDPR for public sector DPO's seminar, April 2018, Manchester
GDPR for public sector DPO's seminar, April 2018, ManchesterGDPR for public sector DPO's seminar, April 2018, Manchester
GDPR for public sector DPO's seminar, April 2018, Manchester
 
DPOs in the public sector, May 2018, Birmingham
DPOs in the public sector, May 2018, BirminghamDPOs in the public sector, May 2018, Birmingham
DPOs in the public sector, May 2018, Birmingham
 
GDPR for public sector DPO's, April 2018, Nottingham
GDPR for public sector DPO's, April 2018, NottinghamGDPR for public sector DPO's, April 2018, Nottingham
GDPR for public sector DPO's, April 2018, Nottingham
 
DPOs in the public sector, May 2018, London
DPOs in the public sector, May 2018, LondonDPOs in the public sector, May 2018, London
DPOs in the public sector, May 2018, London
 
GDPR and eHealth for the pharma industry (VFenR presentation)
GDPR and eHealth for the pharma industry (VFenR presentation)GDPR and eHealth for the pharma industry (VFenR presentation)
GDPR and eHealth for the pharma industry (VFenR presentation)
 
Data Protection Seminar_GDPR_ISOLAS_26-06-17
Data Protection Seminar_GDPR_ISOLAS_26-06-17Data Protection Seminar_GDPR_ISOLAS_26-06-17
Data Protection Seminar_GDPR_ISOLAS_26-06-17
 
"Legal tips and compliance requirements" - Anastasia Botsi, ICT Legal
"Legal tips and compliance requirements" - Anastasia Botsi, ICT Legal"Legal tips and compliance requirements" - Anastasia Botsi, ICT Legal
"Legal tips and compliance requirements" - Anastasia Botsi, ICT Legal
 
GDPR and Personal Data Transfers 1.1.pdf
GDPR and Personal Data Transfers 1.1.pdfGDPR and Personal Data Transfers 1.1.pdf
GDPR and Personal Data Transfers 1.1.pdf
 
GDPR, Data Privacy.
GDPR, Data Privacy.GDPR, Data Privacy.
GDPR, Data Privacy.
 
Tech Connect Live 30th May 2018 ,GDPR Summit John Ghent
Tech Connect Live 30th May 2018 ,GDPR Summit John GhentTech Connect Live 30th May 2018 ,GDPR Summit John Ghent
Tech Connect Live 30th May 2018 ,GDPR Summit John Ghent
 
An Overview of GDPR by Pathway Group
An Overview of GDPR by Pathway GroupAn Overview of GDPR by Pathway Group
An Overview of GDPR by Pathway Group
 
GDPR 101
GDPR 101 GDPR 101
GDPR 101
 
Impact of GDPR on User Experience
Impact of GDPR on User ExperienceImpact of GDPR on User Experience
Impact of GDPR on User Experience
 
EU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingEU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketing
 
GDPR and API Security
GDPR and API SecurityGDPR and API Security
GDPR and API Security
 
GDPR - are you ready for the challenge?
GDPR - are you ready for the challenge?GDPR - are you ready for the challenge?
GDPR - are you ready for the challenge?
 
Changing legislation – General Data Protection Regulation (GDPR) and librarie...
Changing legislation – General Data Protection Regulation (GDPR) and librarie...Changing legislation – General Data Protection Regulation (GDPR) and librarie...
Changing legislation – General Data Protection Regulation (GDPR) and librarie...
 
EU General Data Protection Regulation top 8 operational impacts in personal c...
EU General Data Protection Regulation top 8 operational impacts in personal c...EU General Data Protection Regulation top 8 operational impacts in personal c...
EU General Data Protection Regulation top 8 operational impacts in personal c...
 
GDPR and Research Data Management
GDPR and Research Data ManagementGDPR and Research Data Management
GDPR and Research Data Management
 

Plus de Trish McGinity, CCSK

Csa privacy by design & gdpr austin chambers 11-4-17
Csa   privacy by design & gdpr austin chambers 11-4-17Csa   privacy by design & gdpr austin chambers 11-4-17
Csa privacy by design & gdpr austin chambers 11-4-17Trish McGinity, CCSK
 
Token Binding as the Foundation for a More Secure Web
Token Binding as the Foundation for a More Secure WebToken Binding as the Foundation for a More Secure Web
Token Binding as the Foundation for a More Secure WebTrish McGinity, CCSK
 
Security and Automation: Can they work together? Can we survive if they don't?
Security and Automation: Can they work together?  Can we survive if they don't?Security and Automation: Can they work together?  Can we survive if they don't?
Security and Automation: Can they work together? Can we survive if they don't?Trish McGinity, CCSK
 
Practical AWS Security - Scott Hogg
Practical AWS Security - Scott HoggPractical AWS Security - Scott Hogg
Practical AWS Security - Scott HoggTrish McGinity, CCSK
 
CSA colorado 2016 presentation CloudPassage
CSA colorado 2016 presentation CloudPassageCSA colorado 2016 presentation CloudPassage
CSA colorado 2016 presentation CloudPassageTrish McGinity, CCSK
 
Csa presentation november 2016 sloane ghx
Csa presentation november 2016 sloane ghxCsa presentation november 2016 sloane ghx
Csa presentation november 2016 sloane ghxTrish McGinity, CCSK
 
Privileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA TechnologiesPrivileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA TechnologiesTrish McGinity, CCSK
 
Andrew Useckas Csa presentation hacking custom webapps 4 3
Andrew Useckas Csa presentation   hacking custom webapps 4 3Andrew Useckas Csa presentation   hacking custom webapps 4 3
Andrew Useckas Csa presentation hacking custom webapps 4 3Trish McGinity, CCSK
 
Steve Kosten - Exploiting common web application vulnerabilities
Steve Kosten - Exploiting common web application vulnerabilities Steve Kosten - Exploiting common web application vulnerabilities
Steve Kosten - Exploiting common web application vulnerabilities Trish McGinity, CCSK
 
Larry Whiteside - Optiv Cloud ready or steam rolled csa version
Larry Whiteside - Optiv Cloud ready or steam rolled csa versionLarry Whiteside - Optiv Cloud ready or steam rolled csa version
Larry Whiteside - Optiv Cloud ready or steam rolled csa versionTrish McGinity, CCSK
 
Scott Hogg - Gtri cloud security knowledge and certs
Scott Hogg - Gtri cloud security knowledge and certsScott Hogg - Gtri cloud security knowledge and certs
Scott Hogg - Gtri cloud security knowledge and certsTrish McGinity, CCSK
 

Plus de Trish McGinity, CCSK (16)

Csa privacy by design & gdpr austin chambers 11-4-17
Csa   privacy by design & gdpr austin chambers 11-4-17Csa   privacy by design & gdpr austin chambers 11-4-17
Csa privacy by design & gdpr austin chambers 11-4-17
 
Privacy 101
Privacy 101Privacy 101
Privacy 101
 
Cloud Seeding
Cloud SeedingCloud Seeding
Cloud Seeding
 
Token Binding as the Foundation for a More Secure Web
Token Binding as the Foundation for a More Secure WebToken Binding as the Foundation for a More Secure Web
Token Binding as the Foundation for a More Secure Web
 
Security and Automation: Can they work together? Can we survive if they don't?
Security and Automation: Can they work together?  Can we survive if they don't?Security and Automation: Can they work together?  Can we survive if they don't?
Security and Automation: Can they work together? Can we survive if they don't?
 
Practical AWS Security - Scott Hogg
Practical AWS Security - Scott HoggPractical AWS Security - Scott Hogg
Practical AWS Security - Scott Hogg
 
CSA colorado 2016 presentation CloudPassage
CSA colorado 2016 presentation CloudPassageCSA colorado 2016 presentation CloudPassage
CSA colorado 2016 presentation CloudPassage
 
Csa presentation november 2016 sloane ghx
Csa presentation november 2016 sloane ghxCsa presentation november 2016 sloane ghx
Csa presentation november 2016 sloane ghx
 
Privileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA TechnologiesPrivileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA Technologies
 
Andrew Useckas Csa presentation hacking custom webapps 4 3
Andrew Useckas Csa presentation   hacking custom webapps 4 3Andrew Useckas Csa presentation   hacking custom webapps 4 3
Andrew Useckas Csa presentation hacking custom webapps 4 3
 
Steve Kosten - Exploiting common web application vulnerabilities
Steve Kosten - Exploiting common web application vulnerabilities Steve Kosten - Exploiting common web application vulnerabilities
Steve Kosten - Exploiting common web application vulnerabilities
 
Shawn Harris - CCSP SAH v2
Shawn Harris - CCSP SAH v2Shawn Harris - CCSP SAH v2
Shawn Harris - CCSP SAH v2
 
Larry Whiteside - Optiv Cloud ready or steam rolled csa version
Larry Whiteside - Optiv Cloud ready or steam rolled csa versionLarry Whiteside - Optiv Cloud ready or steam rolled csa version
Larry Whiteside - Optiv Cloud ready or steam rolled csa version
 
Ed Rios - New ncc brief
Ed Rios - New ncc briefEd Rios - New ncc brief
Ed Rios - New ncc brief
 
Scott Hogg - Gtri cloud security knowledge and certs
Scott Hogg - Gtri cloud security knowledge and certsScott Hogg - Gtri cloud security knowledge and certs
Scott Hogg - Gtri cloud security knowledge and certs
 
Davitt Potter - CSA Arrow
Davitt Potter - CSA ArrowDavitt Potter - CSA Arrow
Davitt Potter - CSA Arrow
 

Dernier

Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 

Dernier (20)

Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 

GDPR Overview for Compliance

  • 1. GDPR Overview Carlin Dornbusch, CISSP American Cyber Security Management http://americancsm.com/
  • 2. ●EU Privacy History ●GDPR Outline & Terms ●GDPR Principles ●Subject Rights ●Controller and Processor Responsibilities - Privacy by Design and Privacy by Default ●Governance - Data Protection Officer, DPIA ●GDPR 2016-2018 Timeline ●GDPR vs Privacy Shield ●Projects vs Strategy Overview
  • 4. Privacy Shield & GDPR Timing
  • 5. GDPR Summary New Data Subject Rights: • Right to Access • Right to Rectify • Right to Erasure • Right to Restriction • Data Portability • Right to Object Are you ready for May 25th 2018? New Scope New Rights New REGULATION New Penalties New Scope: • PII of Data Subject • Processors • Controllers • Any Location • Goods & Services • Monitoring New Penalties: • 4% or €20M • 2% - No Docs, DPIA • Processors • Controllers
  • 6. ●EU Privacy History ●GDPR Outline & Terms ●GDPR Principles ●Subject Rights ●Controller and Processor Responsibilities - Privacy by Design and Privacy by Default ●Governance - Data Protection Officer, DPIA ●GDPR 2016-2018 Timeline ●GDPR vs Privacy Shield ●Projects vs Strategy Overview
  • 7. GDPR Outline (1 of 3) Chapter 1 General Provisions Objective, Scope, Definitions (Article 1-4) Chapter 2 Principles Lawfulness, Consent, Special Categories, no ID Required (Article 5-11) Chapter 3 Right of the Data Subjects Section 1 – Transparency & modalities (Article 12) Section 2 – Information & access to personal data (Article 13 – 15) Section 3 – Rectification & erasure (Article 16 – 20) Section 4 - Right to object & automation (Article 21 – 22) Section 5 – Restrictions (Article 23)
  • 8. GDPR Outline (2 of 3) Chapter 4 Controller & Processor Section 1 – General obligations (Article 24-31) Section 2 – Security of personal data (Article 32- 34) Section 3 – DPIA & prior consultation (Article 35 – 36) Section 4 – DPO (Article 37 - 39) Section 5 – Code of Conduct & certs (Article 40-43) Chapter 5 Transfers of personal data to 3rd countries or Int’l org’s General principles for transfer (Article 44-50) Chapter 6 Independent Supervisory Authorities Section 1 Independent status (Article 51-54) Section 2 Competence, task and powers (Article 55 -59)
  • 9. GDPR Outline (3 of 3) Chapter 7 Cooperation & Consistency Section 1 Cooperation (Article 60-62) Section 2 Consistency (Article 63 – 67) Section 3 European data protection board (Article 68 - 76) Chapter 8 Remedies, Liability, and penalties Complaints, Representation, Fines (Article 77-84) Chapter 9 Provisions relating to specific processing situations Freedom of expression, public access, Secrecy, Church (Article 85-91) Chapter 10 Delegated acts and implementing acts Exercise of delegation, committee procedure (Article 92-93) Chapter 11 Final Provisions Chapter 95/46/EC, 2002/58/EC, Prior to May 24, 2016, Commission reports, legal acts, force and application (Article 94-99)
  • 10. GDPR Terminology(1 of 2 ) • Personal Data – any information relating to an identified or identifiable natural person (‘data subject’) • Data Subject – any person who can be identified by reference to a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person • Processing – any operation which is performed on personal data, such as collection, recording, organization, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction, erasure or destruction Article 4
  • 11. GDPR Terminology(2 of 2) • Data Controller – the one who determines the purposes and means of the processing of personal data • Data Processor – the one who processes personal data on behalf of the controller • Personal Data Breach – Breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmitted, stored or otherwise processed • Consent – any freely given, specific, informed and unambiguous indication of the data subject's wishes by which he or she, by a statement or by a clear affirmative action, signifies agreement to the processing of personal data relating to him or her Article 4
  • 12. ●EU Privacy History ●GDPR Outline & Terms ●GDPR Principles ●Subject Rights ●Controller and Processor Responsibilities - Privacy by Design and Privacy by Default ●Governance - Data Protection Officer, DPIA ●GDPR 2016-2018 Timeline ●GDPR vs Privacy Shield ●Projects vs Strategy Overview
  • 13. ● Lawfulness, fairness, and transparency ● Explicit purpose limitation ● Data minimization ● Accuracy ● Storage limitation ● Integrity and confidentiality ● Accountability GDPR Article 5-11 GDPR Principles
  • 14. You can process personal data if one of these is true: ● Data subject gave consent ● Necessary to perform contract with data subject ● Required for compliance ● Required to protect vital interests of data subject ● Required to execute tasks in public interest ● Legitimate interests Article 6 Lawful Processing
  • 15. ●EU Privacy History ●GDPR Outline & Terms ●GDPR Principles ●Subject Rights ●Controller and Processor Responsibilities - Privacy by Design and Privacy by Default ●Governance - Data Protection Officer, DPIA ●GDPR 2016-2018 Timeline ●GDPR vs Privacy Shield ●Projects vs Strategy Overview
  • 16. • Transparency & Modalities - Article 12 • Collection of Data - Article 13 • Obtained from Another Source - Article 14 • Right of Access – Article 15 • Right of Rectification – Article 16 • Right of Erasure – Article 17 • Right of Restricted Processing – Article 18 • Right of 3rd-Party Notification– Article 19 • Right of Data Portability – Article 20 • Right to Object – Article 21 • Automated Processing – Article 22 • Restrictions - Article 23 Data Subjects Rights
  • 17. Data subjects has the right to understand the following: ● Purpose data is being processed ● “Categories” of personal data ● “Recipient” of data (including third countries) ● Period of retention ● Request the deletion or restrict the access to data ● How to lodge a complaint ● The source of the data, when the data is not personal data ● The existence of automated decision making, including profiling ● How to request a copy of the data Article 15 Right of Access
  • 18. Data subjects have the right to: ● Modify inaccurate personal data ● Have incomplete personal data completed Article 16 Right of Rectification
  • 19. Data subjects have the right to have their personal data deleted when: ● The data is no longer relevant to its intended purpose ● Consent is withdrawn by the data subject ● The data subject objects to its use ● The personal data was unlawfully processed ● For compliance reasons ● Related to Article 8 (1) Children’s information Article 17 Right of Erasure (1 of 2)
  • 20. When the controller has made the personal data public: ● The controller may take “reasonable steps” depending on available technology and cost to inform the processor to delete the personal data of the data subject including links and backups. This right doesn’t apply if: ● It violates the right of freedom of expression ● It is carried out in the public interest ● The reason is public interest related to public health ● Scientific or historical research ● Establishment, exercise, or defense of a legal claim Article 17 Right of Erasure (2 of 2)
  • 21. Data subjects have the right to restrict the processing of their data: ● If there is a dispute, during the period it takes to verify it ● If they don’t want their data deleted but would rather have it restricted ● If the data can’t be deleted for legal reasons And be informed when the restriction is lifted Article 18 Right of Restricted Processing
  • 22. The controller must notify the recipient when ● Rectification is carried out (Article 16) ● Erasure of personal data is complete (Article 17) ● or Restriction of Processing is complete (Article 18) Data Subjects may request a list of the recipients. Article 19 Right of 3rd Party Notification
  • 23. The data subject has the right to move their personal data from one controller to another. ● Receive the personal data in a common, easy to use format ● If it is technically feasible, the transfer can be done automatically at the data subject’s request ● This doesn’t apply to processing which is in the public interest ● And this shall not adversely affect others. Article 20 Right of Data Portability
  • 24. The data subject has the right to object to processing! ● Controller must stop, unless for legal reasons ● This includes direct marketing campaigns Unless the processing is for scientific or historical purposes AND it is for reasons of public interest. Article 21 Right to Object
  • 25. The data subject has the right to not be subjected to automated processing, unless it: ● Contractually is necessary for Controller/Processor ● Authorized by the EU ● Explicit consent is given Controllers must ensure data subjects can engage for objections to the automated processing. Article 22 Profiling
  • 26. ●EU Privacy History ●GDPR Outline & Terms ●GDPR Principles ●Subject Rights ●Controller and Processor Responsibilities - Privacy by Design and Privacy by Default ●Governance - Data Protection Officer, DPIA ●GDPR 2016-2018 Timeline ●GDPR vs Privacy Shield ●Projects vs Strategy Overview
  • 27. Controller Responsibilities The controller shall implement appropriate technical and organizational measures and they will be reviewed and updated as necessary. If needed, the controller will also implement appropriate data protection policies. Compliance can be through either an ‘approved’ code of conduct or ‘approved’ certification mechanism. Code of Conduct Article 40 approved by Article 55 Certification Article 42 approved by Article 55/56 Article 24
  • 28. Processor Responsibilities Only use processors with sufficient guarantees of technical and organizational measures. The processor may not use another processor without prior specific or general written authorization. The controller has the opportunity to object to the change. Article 28
  • 29. Secure Processing The Controller/Processor are responsible for: • The pseudonymization and encryption of data • Ensuring ongoing CIA and resilience of systems • Ensuring the recovery of personal data in any incident • Regular testing, assessing, and evaluating of the system • Ensuring accidental or unlawful destruction, loss, alteration, or unauthorized disclosure are minimized. • Ensuring that ‘natural persons’ only act under the authority of the controller. Article 32
  • 30. Breach Notice to Authorities The Controller must notify supervisory authorities in 72hrs with: • nature of breach and volume • contact info of DPO • likely consequences of breach • measures to be taken for mitigation If discovered by the Processor, the Processor must notify the Controller. Controller must control the documentation Article 33
  • 31. Breach Notice to Data Subject The Controller must notify data subjects “without undue delay” with: • contact info of DPO • likely consequences of breach • measures to be taken for mitigation Except in the cases of: • data was encrypted • the high risk will not materialize • disproportionate effort of communication - use public communications Article 34
  • 32. Data Protection – by design & default Privacy By Design Controllers should take appropriate measures for processing including implementing data protection principles: • Pseudonymization • Data minimization Article 25 Technical and Organizational Controls are Required
  • 33. Data Protection – by design & default By Default Ensuring only required data is collected and by default: • The amount of data is limited • The extent of processing and accessibility is limited • The period of storage is defined and limited Article 25 Technical and Organizational Controls are Required
  • 34. ●EU Privacy History ●GDPR Outline & Terms ●GDPR Principles ●Subject Rights ●Controller and Processor Responsibilities - Privacy by Design and Privacy by Default ●Governance - Data Protection Officer, DPIA ●GDPR 2016-2018 Timeline ●GDPR vs Privacy Shield ●Projects vs Strategy Overview
  • 35. Data Protection Officer Data Protection Officer (DPO) – Oversees the data protection responsibilities within the organization and ensures compliance with the privacy regulations and laws • Works independently • Directs and oversees all data protection activities • Creates the policies and procedures around data protection • Ensures staff are trained • Manages third party vendors • Global coordination • Handles public request for personal data • Primary POC for regulatory authorities Article 39
  • 36. DPO Assignment You must assign a DPO if: - You are a public processor - You regularly and systematically monitor data subjects on a large scale - You are processing on a large scale any special categories of data pursuant to Article 9 and personal data relating to criminal convictions and offences referred to in Article 10 Article 37
  • 37. DPO Reporting The DPO must: • Be involved in all issues of personal data protection • Be resourced to carry out tasks and maintain knowledge • Not be dismissed or penalized for job execution • Report to the highest level of management • Be available to service data subject requests • Be bound to secrecy or confidentiality • Execute other tasks, as necessary, that do not conflict Article 38
  • 38. Data Protection Impact Assessments (DPIA’s) Controllers must determine if DPIA is required via Risk Analysis • If processing produces a legal effect on subjects • Criminal data types • Large scale monitoring • Review the types of processing governed by the EU Must perform DPIA PRIOR to processing Must involve the DPO Article 35
  • 39. DPIA’s (2 of 2) DPIA’s must contain: • Processing operations descriptions • Assessment of necessity and proportionality • Assessment of Risks to the subject’s rights • Risks mitigation plan DPIA’s must be compliant to codes of conduct DPIA’s shall incorporate Subject feedback DPIA’s must be executed as risk changes Article 35
  • 40. ●EU Privacy History ●GDPR Outline & Terms ●GDPR Principles ●Subject Rights ●Controller and Processor Responsibilities - Privacy by Design and Privacy by Default ●Governance - Data Protection Officer, DPIA ●GDPR 2016-2018 Timeline ●GDPR vs Privacy Shield ●Projects vs Strategy Overview
  • 42. ●EU Privacy History ●GDPR Outline & Terms ●GDPR Principles ●Subject Rights ●Controller and Processor Responsibilities - Privacy by Design and Privacy by Default ●Governance - Data Protection Officer, DPIA ●GDPR 2016-2018 Timeline ●GDPR vs Privacy Shield ●Projects vs Strategy Overview
  • 43. GDPR ● Principles ● Lawfulness, fair, transparent ● Explicit purpose ● Data minimization ● Accuracy ● Storage Limitation ● Integrity and Confidentiality ● Accountability ● Enables Selling to EU ● Auditable ● Enforced by EU Privacy Shield ● Principles: ● Notice ● Choice ● Accountability for Onward Transfer ● Security ● Data Integrity and Purpose Limitation ● Access ● Recourse, Enforcement and Liability ● Allows EU-to-US data transfer ● Self Audit ● Enforced by U.S. GDPR GDPR vs. Privacy Shield
  • 44. ●EU Privacy History ●GDPR Outline & Terms ●GDPR Principles ●Subject Rights ●Controller and Processor Responsibilities - Privacy by Design and Privacy by Default ●Governance - Data Protection Officer, DPIA ●GDPR 2016-2018 Timeline ●GDPR vs Privacy Shield ●Projects vs Strategy Overview
  • 45. • 92% of US multinational companies think compliance with GDPR is a top data protection priority • 68% will spend between $1-10M on GDPR readiness • Fear is a big motivator • Concerns over consumer trust because of data breaches which leads to lost revenue and fines. CID 1-26-17 https://www.cio.com/article/3161920/privacy/article.html GDPR as a Priority
  • 46. If GDPR applies to your company: • When did you last update your Privacy/Cookie Policy? • How do you protect customer PII? • Do you collect explicit consent from your customers? • Can you remove individual data from your systems? • Is your data anonymized and encrypted? • Are your vendor contracts up-to-date? • Is your Incident Response Plan tested? Are You Ready for GDPR?
  • 47. • Organize – Assign a DPO (Data Leader) • Find Your Data • Know your Data Flows • Determine Your Risks • Assess your Controls • Implement Privacy Shield for EU to US data access • Comply to Local, State, Federal and Intern’l Laws • Begin DPIA’s • Document, Document, Document • Improve your Incident Mgmt/Breach Notification GDPR Planning
  • 48. Data Inventory Data Flows Controls Review Questionnaires Risk Analysis Cookie Compliance Recommendations Remediation Member Next Step: GDPR Assessment
  • 49. Thank You Carlin Dornbusch, CISSP Carlin@AmericanCSM.com http://www.americancsm.com https://youtu.be/Dq2CCJ4ruqc