SlideShare una empresa de Scribd logo
1 de 13
DataPrivacyfor
InformationSecurityProfessionals
(Part1)
Dione McBride, CISSP, CIPP/E
Data Protection, Privacy, and Security Lead
PS Innovations
Linkedin.com/in/DMcBinDallas
October, 2017
2
2000's Growing need to prevent terrorism but concerns with Surveillance1990's Growth of the
Internet & Databases
1980's Growth of
Federal Privacy Regulations
1970's Growth of
Government
Surveillance
2020
OCT 2017
1970 1976 1982 1988 1994 2000 2006 2012 2018
Fair Credit Reporting Act - 1970
Bank Secrecy Act - 1970
US Health & Human Services - Code of Fair
Information Principles - 1971
Sweden's National Privacy Law - 1973
Privacy Act of 1974
Foreign Intelligence Surveillance Act - 1978
Right to Financial Privacy Act - 1978
OECD (US, EU, Japan) - 1981
Cable Communications Policy Act - 1984
Electronic Communications
Privacy Act - 1986
Computer Matching and Privacy Protection Act - 1988
Employee Polygraph Protection Act - 1988
Video Privacy Protection Act - 1988
Do Not Call Registry - 1991
Driver's Privacy Protection Act - 1994
HIPAA - 1996
COPPA - 1998
GLBA - 1999
US - EU Safe Harbor - 2000
USA PATRIOT Act - 2001
Homeland Security Act - 2002
California SB 1386 - 2003
FACTA - 2003
Asia Pacific (APEC) Privacy Framework - 2004
PCI Standard - 2004
Edward Snowden NSA Revelations - 2013
Canada Anti-Spam (CASL) - 2014
Equifax Data Breach - 2017
7/29/2017
Family Educational Rights & Privacy Act - 1974
Privacy Protection Act - 1980
Convention of Europe (COE) - 1981 EU Directive - 1995
CAN-SPAM Act - 2003
Real ID Act - 2005
US - EU Safe Harbor Invalidated - 2015
General Data Protection
Regulation (GDPR)
05/25/2018
Privacy/dataprotectionregulationsandevents
2
3
GDPRisanupdate
When May 25, 2018
Why Twenty five year
evolution
• Directive 95/46/EC – 1995
• GDPR Proposal - 2012
• Two CJEU cases in 2015
o Weltimmo – one-stop shop on regulations
o Shrems – collapse of EU-US Safe Harbor
program
• Adopted April, 2016 (173 reasons/recitals)
Scope Regardless of physical
company or
processing location
1. Processing EU citizen data
2. Offer goods/services
3. Monitor behavior in EU
Primary
changes
1. Extra-territorial applicability
2. Penalties
3. Consent
4. Data Subject rights (including damages)
5. Unexpected design and security impacts for most
2 year advance notice
4
GDPRScope
Expanded definition of Personal Data (PD)
“…an identifiable natural person is one who can be identified,
directly or indirectly, in particular by reference to an identifier such
as a name, an identification number, location data, an online
identifier or to one or more factors specific to the physical,
physiological, genetic, mental, economic, cultural or social identity
of that natural person…”
• Enforcement
• Applies equally to data controllers and processors
• No minimum number of subjects
• Not limited to digital data
4
5
Specificpenalties
• The higher of €10m or 2% annual global
revenue onTOMs and breach notification)1
• The higher of €20m or 4% annual global
revenue for violations of2
• Basic principles
• Data subject rights
• Transfers third countries or internal organization
• Member state laws
1 Articles 8, 11, 25 – 39 , 42 – 43
2 Articles 5 – 7, 9, 12 – 22, 44-49,
6
Impact#1-Protections
• AppropriateTOM
• State of the art
• Cost
• Nature, scope, context and purpose
• Risk and severity for data subject rights
• Requires data controller and data processor
• Pseudonymization and encryption of personal data
• Ensure ongoingCIA and system resilience
• Timely restoration of availability and access after incidents
• Regularly test effectiveness ofTOMs
• Ensures those authorized to access do not process except on
instructions from the controller
• Encourages certifications recognized by DPAs
7
Impact#2-DataSubjectrights
Rights Operational Impact
Transparency Data collected, purpose, protections in place, retention, recipients
Information Where collected from data subject
Where obtained by third parties if combined
Access Design new user interfaces (online)
Extracting all data (offline)
Rectification New user interfaces (online)
Written procedures completed with 30 days (offline)
Restrict processing Flag data /hold future processing (other than storage)
Erasure
(Right to be Forgotten)
No overriding legitimate interests, unlawfully processed, legal purpose
Reasonable steps to remove links to publically available data and inform
data recipients to delete
Portability Where applicable, extract of all data
Object Object to processing, and for direct marketing – default isOpt-out
Restrict automated
decisions
Restrict profiling & automated decisions
In particular special categories of data require suitable safeguards
8
Impact#2–supportingDataSubjectrights
• Identification/verification for access
• Response w/in 30 days (explain if/when it will
be > 30 days)
• Address 1:1 vs. 1:many
• Free (unless excessive or unfounded)
• Additional technical/customer staff access
• Cross compliance challenges (PCI, HIPAA)
• Higher insider risk
9
Impact#3–Processingrecords
• Processing records (registers)
• Name/contact of controllers/co-controllers
• Purpose of processing
• Categories of data subjects
• Data elements (flag sensitive data)
• Recipients
• If applicable
 Transfers to third country or international
organization (named)
 Documented safeguards
• Retention for different categories or data
• TOMs
• Available upon DPA request
• Likely required for breach notification
10
Impact#4-breachnotification
• Authorizes class action lawsuits against large data
controllers and processors
• Controllers & processor records must show processing
conforms to the GDPR
• Required notification to DPA
• Nature of breach
• Numbers/categories of data subjects & records
• DPO contact
• Likely consequence for data subjects
• Plans to address issue &/or mitigation
• Proof of limited data risk for data subjects
• Data processors must inform the controllers ASAP
72 Hours
11
Impact#4–EUvsU.Sbreachlaws
GDPR U.S. state laws (examples)
“ A breach of security leading to the
accidental or unlawful destruction,
loss, alteration, unauthorized
disclosure of, or access to, personal
data transmitted, stored or otherwise
processed”
TX “ unauthorized acquisition of computerized
data that compromises the security,
confidentiality, or integrity of sensitive personal
information maintained by a person, including
data that is encrypted if the person accessing
the data has the key required to decrypt the
data”
Notification to a DPA within 72 hrs. Notification to state government
• Only 29 states requireAG or agency notice
• Only 10 states have prescribed notification period ranging
from 5 to 90 days and most are to citizens
Controller may have to prove absence
of risk to DPA to avoid citizen notice
Most states specify conditions that eliminate
citizen notice
All citizens have private right of action
• Actions can be taken against the
controller or processors (whichever
may be in country)
Only 16 states allow citizens a private right of
action
• Actions are limited to the company
collecting/owning the data
12
Impact#5–Newsystemsorapplications
• Security and privacy options enabled by default
• Data lifecycle use cases/ stories for all SaaS products
• New functionality
• Data subject identification, access, and request processes
(technical/operational support)
• Data retention and erasure throughout
 Databases and data warehouses
 Logs
 Backups and archives
• Data portability options (where applicable)
• Tokenization and encryption at rest
Genuine design
prowess
required!
13
Summary
GDPR > Data protection > compliance
• Evidence based accountability
• Data subject rights b4 business wants
• Data breach notification by default
• Protection & Privacy by Design – PPbD
• Don’t retain data
• Encryption &/or pseudonymization expected

Más contenido relacionado

La actualidad más candente

Quick Guide to GDPR
Quick Guide to GDPRQuick Guide to GDPR
Quick Guide to GDPR
Pavol Balaj
 

La actualidad más candente (20)

Presentation on GDPR
Presentation on GDPRPresentation on GDPR
Presentation on GDPR
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
 
Privacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffinPrivacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffin
 
Gdpr overview ciso platform presentation
Gdpr overview ciso platform presentationGdpr overview ciso platform presentation
Gdpr overview ciso platform presentation
 
Privacy 101
Privacy 101Privacy 101
Privacy 101
 
Get you and your business GDPR ready
Get you and your business GDPR readyGet you and your business GDPR ready
Get you and your business GDPR ready
 
GDPR-Overview
GDPR-OverviewGDPR-Overview
GDPR-Overview
 
General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...
 
Privacy Practice Fundamentals: Understanding Compliance Regimes and Requirements
Privacy Practice Fundamentals: Understanding Compliance Regimes and RequirementsPrivacy Practice Fundamentals: Understanding Compliance Regimes and Requirements
Privacy Practice Fundamentals: Understanding Compliance Regimes and Requirements
 
The Essential Guide to GDPR
The Essential Guide to GDPRThe Essential Guide to GDPR
The Essential Guide to GDPR
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
GDPR Introduction and overview
GDPR Introduction and overviewGDPR Introduction and overview
GDPR Introduction and overview
 
EU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingEU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketing
 
GDPR clinic - CloudWATCH at Cloud Security Expo 2017
GDPR clinic - CloudWATCH at Cloud Security Expo 2017GDPR clinic - CloudWATCH at Cloud Security Expo 2017
GDPR clinic - CloudWATCH at Cloud Security Expo 2017
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protection
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
Data protection
Data protectionData protection
Data protection
 
Sophie's Privacy - a story about GDPR
Sophie's Privacy - a story about GDPRSophie's Privacy - a story about GDPR
Sophie's Privacy - a story about GDPR
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business Advisors
 
Quick Guide to GDPR
Quick Guide to GDPRQuick Guide to GDPR
Quick Guide to GDPR
 

Similar a Data Privacy for Information Security Professionals Part 1

Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Dr. Donald Macfarlane
 

Similar a Data Privacy for Information Security Professionals Part 1 (20)

The Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPRThe Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPR
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready?
 
GDPR (En) JM Tyszka
GDPR (En)  JM TyszkaGDPR (En)  JM Tyszka
GDPR (En) JM Tyszka
 
Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...
 
Introduction to EU General Data Protection Regulation: Planning, Implementat...
 Introduction to EU General Data Protection Regulation: Planning, Implementat... Introduction to EU General Data Protection Regulation: Planning, Implementat...
Introduction to EU General Data Protection Regulation: Planning, Implementat...
 
NetSquared London - GDPR for charities
NetSquared London - GDPR for charitiesNetSquared London - GDPR for charities
NetSquared London - GDPR for charities
 
Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...
 
GDPR in the Healthcare Industry
GDPR in the Healthcare IndustryGDPR in the Healthcare Industry
GDPR in the Healthcare Industry
 
Data Protection Seminar_GDPR_ISOLAS_26-06-17
Data Protection Seminar_GDPR_ISOLAS_26-06-17Data Protection Seminar_GDPR_ISOLAS_26-06-17
Data Protection Seminar_GDPR_ISOLAS_26-06-17
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
 
ZyLAB ACEDS Webinar- GDPR
ZyLAB ACEDS Webinar- GDPR ZyLAB ACEDS Webinar- GDPR
ZyLAB ACEDS Webinar- GDPR
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by Qualsys
 
GDPR
GDPRGDPR
GDPR
 
Data Protection: Transitioning to the GDPR
Data Protection: Transitioning to the GDPRData Protection: Transitioning to the GDPR
Data Protection: Transitioning to the GDPR
 
9 Practical Steps 2 GDPR Compliance
9 Practical Steps 2 GDPR Compliance9 Practical Steps 2 GDPR Compliance
9 Practical Steps 2 GDPR Compliance
 
GDPR 101
GDPR 101 GDPR 101
GDPR 101
 
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
 
Payslip gdpr deck nov 2017
Payslip gdpr deck nov 2017Payslip gdpr deck nov 2017
Payslip gdpr deck nov 2017
 
GDPR – Readiness in IT offshore organization
GDPR – Readiness in IT offshore organization  GDPR – Readiness in IT offshore organization
GDPR – Readiness in IT offshore organization
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Data Privacy for Information Security Professionals Part 1

  • 1. DataPrivacyfor InformationSecurityProfessionals (Part1) Dione McBride, CISSP, CIPP/E Data Protection, Privacy, and Security Lead PS Innovations Linkedin.com/in/DMcBinDallas October, 2017
  • 2. 2 2000's Growing need to prevent terrorism but concerns with Surveillance1990's Growth of the Internet & Databases 1980's Growth of Federal Privacy Regulations 1970's Growth of Government Surveillance 2020 OCT 2017 1970 1976 1982 1988 1994 2000 2006 2012 2018 Fair Credit Reporting Act - 1970 Bank Secrecy Act - 1970 US Health & Human Services - Code of Fair Information Principles - 1971 Sweden's National Privacy Law - 1973 Privacy Act of 1974 Foreign Intelligence Surveillance Act - 1978 Right to Financial Privacy Act - 1978 OECD (US, EU, Japan) - 1981 Cable Communications Policy Act - 1984 Electronic Communications Privacy Act - 1986 Computer Matching and Privacy Protection Act - 1988 Employee Polygraph Protection Act - 1988 Video Privacy Protection Act - 1988 Do Not Call Registry - 1991 Driver's Privacy Protection Act - 1994 HIPAA - 1996 COPPA - 1998 GLBA - 1999 US - EU Safe Harbor - 2000 USA PATRIOT Act - 2001 Homeland Security Act - 2002 California SB 1386 - 2003 FACTA - 2003 Asia Pacific (APEC) Privacy Framework - 2004 PCI Standard - 2004 Edward Snowden NSA Revelations - 2013 Canada Anti-Spam (CASL) - 2014 Equifax Data Breach - 2017 7/29/2017 Family Educational Rights & Privacy Act - 1974 Privacy Protection Act - 1980 Convention of Europe (COE) - 1981 EU Directive - 1995 CAN-SPAM Act - 2003 Real ID Act - 2005 US - EU Safe Harbor Invalidated - 2015 General Data Protection Regulation (GDPR) 05/25/2018 Privacy/dataprotectionregulationsandevents 2
  • 3. 3 GDPRisanupdate When May 25, 2018 Why Twenty five year evolution • Directive 95/46/EC – 1995 • GDPR Proposal - 2012 • Two CJEU cases in 2015 o Weltimmo – one-stop shop on regulations o Shrems – collapse of EU-US Safe Harbor program • Adopted April, 2016 (173 reasons/recitals) Scope Regardless of physical company or processing location 1. Processing EU citizen data 2. Offer goods/services 3. Monitor behavior in EU Primary changes 1. Extra-territorial applicability 2. Penalties 3. Consent 4. Data Subject rights (including damages) 5. Unexpected design and security impacts for most 2 year advance notice
  • 4. 4 GDPRScope Expanded definition of Personal Data (PD) “…an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person…” • Enforcement • Applies equally to data controllers and processors • No minimum number of subjects • Not limited to digital data 4
  • 5. 5 Specificpenalties • The higher of €10m or 2% annual global revenue onTOMs and breach notification)1 • The higher of €20m or 4% annual global revenue for violations of2 • Basic principles • Data subject rights • Transfers third countries or internal organization • Member state laws 1 Articles 8, 11, 25 – 39 , 42 – 43 2 Articles 5 – 7, 9, 12 – 22, 44-49,
  • 6. 6 Impact#1-Protections • AppropriateTOM • State of the art • Cost • Nature, scope, context and purpose • Risk and severity for data subject rights • Requires data controller and data processor • Pseudonymization and encryption of personal data • Ensure ongoingCIA and system resilience • Timely restoration of availability and access after incidents • Regularly test effectiveness ofTOMs • Ensures those authorized to access do not process except on instructions from the controller • Encourages certifications recognized by DPAs
  • 7. 7 Impact#2-DataSubjectrights Rights Operational Impact Transparency Data collected, purpose, protections in place, retention, recipients Information Where collected from data subject Where obtained by third parties if combined Access Design new user interfaces (online) Extracting all data (offline) Rectification New user interfaces (online) Written procedures completed with 30 days (offline) Restrict processing Flag data /hold future processing (other than storage) Erasure (Right to be Forgotten) No overriding legitimate interests, unlawfully processed, legal purpose Reasonable steps to remove links to publically available data and inform data recipients to delete Portability Where applicable, extract of all data Object Object to processing, and for direct marketing – default isOpt-out Restrict automated decisions Restrict profiling & automated decisions In particular special categories of data require suitable safeguards
  • 8. 8 Impact#2–supportingDataSubjectrights • Identification/verification for access • Response w/in 30 days (explain if/when it will be > 30 days) • Address 1:1 vs. 1:many • Free (unless excessive or unfounded) • Additional technical/customer staff access • Cross compliance challenges (PCI, HIPAA) • Higher insider risk
  • 9. 9 Impact#3–Processingrecords • Processing records (registers) • Name/contact of controllers/co-controllers • Purpose of processing • Categories of data subjects • Data elements (flag sensitive data) • Recipients • If applicable  Transfers to third country or international organization (named)  Documented safeguards • Retention for different categories or data • TOMs • Available upon DPA request • Likely required for breach notification
  • 10. 10 Impact#4-breachnotification • Authorizes class action lawsuits against large data controllers and processors • Controllers & processor records must show processing conforms to the GDPR • Required notification to DPA • Nature of breach • Numbers/categories of data subjects & records • DPO contact • Likely consequence for data subjects • Plans to address issue &/or mitigation • Proof of limited data risk for data subjects • Data processors must inform the controllers ASAP 72 Hours
  • 11. 11 Impact#4–EUvsU.Sbreachlaws GDPR U.S. state laws (examples) “ A breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmitted, stored or otherwise processed” TX “ unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of sensitive personal information maintained by a person, including data that is encrypted if the person accessing the data has the key required to decrypt the data” Notification to a DPA within 72 hrs. Notification to state government • Only 29 states requireAG or agency notice • Only 10 states have prescribed notification period ranging from 5 to 90 days and most are to citizens Controller may have to prove absence of risk to DPA to avoid citizen notice Most states specify conditions that eliminate citizen notice All citizens have private right of action • Actions can be taken against the controller or processors (whichever may be in country) Only 16 states allow citizens a private right of action • Actions are limited to the company collecting/owning the data
  • 12. 12 Impact#5–Newsystemsorapplications • Security and privacy options enabled by default • Data lifecycle use cases/ stories for all SaaS products • New functionality • Data subject identification, access, and request processes (technical/operational support) • Data retention and erasure throughout  Databases and data warehouses  Logs  Backups and archives • Data portability options (where applicable) • Tokenization and encryption at rest Genuine design prowess required!
  • 13. 13 Summary GDPR > Data protection > compliance • Evidence based accountability • Data subject rights b4 business wants • Data breach notification by default • Protection & Privacy by Design – PPbD • Don’t retain data • Encryption &/or pseudonymization expected