SlideShare una empresa de Scribd logo
1 de 41
Descargar para leer sin conexión
Baker Tilly refers to Baker Tilly Virchow Krause, LLP,
an independently owned and managed member of Baker Tilly International.
Privacy Shield: What you
need to know
German American Chamber of Commerce
of the Midwest, Inc.
Nick Graham
Partner
Dentons UK
Jan Hertzberg
Director
Baker Tilly
• European Commission of the European Union (EU) and the US
Department of Commerce reached agreement on a new pact
for data transfers (February 2, 2016)
• “Safe Harbor” agreement was invalidated after the European
Court of Justice found that the US had violated the privacy of
its citizens
• Privacy Shield imposes:
− Stronger obligations on US companies to protect the personal data of EU
citizens
− Stronger monitoring, oversight and enforcement of the agreement
− Limitations and oversight on US government access to data
− US privacy office established to handle complaints of EU citizens
− Annual review of US commitments and performance against the Privacy
Shield agreement
Setting the Scene
2
Privacy Rules (current and future)
Privacy Shield
Securing Personally Identifiable Information (PII)
Wrap-up and takeaways
Q&A
Agenda
3
Baker Tilly refers to Baker Tilly Virchow Krause, LLP,
an independently owned and managed member of Baker Tilly International.
Privacy Rules:
Current Landscape
EU versus US – Treatment of Privacy
European US
Privacy is a human right Privacy is a consumer
protection issue
"Personal Data" "PII" (Personally Identifiable
Information)
No processing of personal
information is the default
The commercial use of
personal information is
acceptable as the default
• Cultural conflicts: e-discovery/litigation 5
Current German Legal Structure deriving
from EU Directive
Each of the other 27 EU
member states have similar
data protection regimes.
Comparable data protection
laws also apply outside the
EU (e.g. Russia).
EU Data Protection Directive
1995
6
When do the rules apply?
The EU rules apply when there is:
− processing
− of personal data
− by a data controller
− established in the EU (in the context of that establishment) or
(where the data controller is established outside of the EEA) using
equipment in the EU.
7
Controllers and Processors
Data Controller:
A person who determines the purposes and means of the processing of
personal data
Data Processor:
A person who processes personal data on behalf of the data controller
ABC KGaA
(Data Controller)
Employee
(Data Subject)
Microsoft
(Data Processor) 8
You will be required to:
• Comply with the Data Protection Principles
• Comply with the Rights of Data Subjects
• Notify its data processing to certain regulators
• Take the Consequences if it fails to comply
What does it mean if EU rules apply?
9
• Transparency: privacy policies and notices
• Comply: with one of the conditions for processing (e.g. consent/necessary to
perform a contract)
• Purpose limitation: only use personal data for specified and lawful
purposes; no incompatible purposes
• Proportionality: personal data to be adequate, relevant and not excessive
• Accuracy: personal data to be accurate/kept up-to-date
• Retention: personal data not to be retained for longer than necessary
• Individual rights: to access, correct and object as well as claim
compensation
• Security: appropriate measures to protect data required
• Exports: no transfers of personal data outside of the EEA without adequate
protection
Data Protection Principles
10
• Regulators can fine us
• Regulators may also have the ability to:
− issue an information notice
− issue an enforcement notice
− seek to bring criminal proceedings
• Compensation
• Bad publicity and reputational harm
• Personal liability for individuals who violate the rules
What happens if we get it wrong?
11
Baker Tilly refers to Baker Tilly Virchow Krause, LLP,
an independently owned and managed member of Baker Tilly International.
Privacy Rules:
Changing Landscape
EU Data Protection Regulation
• Scope: EEA, overseas and processors
• Model: "one stop shop"
• Governance: DPO and "privacy office;" refresh
policies and procedures; training; audit
• Privacy by design
• Privacy by default
IN FORCE FROM 25 MAY 2018
13
EU Data Protection Regulation
• Enhanced rights and duties of transparency and proportionality
• Data breach notification: to be a legal requirement
• Penalties: fines of up to 4% of annual worldwide revenue or EUR 20 million
(USD 22.6 million)
• Risk control: new "principle of accountability." This requires "control
framework" of polices, procedures, training and audit to manage and mitigate
global privacy risk.
14
Baker Tilly refers to Baker Tilly Virchow Krause, LLP,
an independently owned and managed member of Baker Tilly International.
EU-US Privacy Shield
Max Schrems complaint against
Facebook
Safe Harbor declared invalid 6 October 2015
Explore alternative transfer tools
Privacy Shield
Safe Harbor: The Case
16
Privacy Shield: The 7 Principles
• Notice
• Choice
• Accountability for onward transfer
• Security
• Data Integrity and Purpose Limitation
• Access
• Recourse, Enforcement and Liability
17
Old World: Safe Harbor New World : Privacy Shield
"Essentially
equivalent"
• Annual self-certification
• Notice
• Choice
• Onward Transfer
• Security
• Data Integrity / Purpose
Limitation
• Access
• Much more detailed privacy notices
• Onward transfer accountability:
• Agreement with Controllers
• Liability for Processor non-
compliance
Remedies /
individual
Redress
• Federal Trade Commission
Complaint
• Private dispute resolution
• Direct complaint - 45 days response
• ADR / DP Panel
• DP Authority complaints
• DoC Complaints
• Binding arbitration / Privacy Shield Panel
• Ombudsman for National Security
queries
Oversight • Federal Trade Commission
(but no control over public
authorities)
• Foreign Intelligence Services
Court - ex parte proceedings
• Proactive DoC investigation and extra
resource
• Name & shame for removal
• Release of Privacy Shield sections of
compliance reports
• Annual verification
• DP Authorities (especially HR data)
• Ombudsman: all US transfers
• Annual review of Privacy Shield
• Privacy Shield may be suspended
Safe Harbor v Privacy Shield
18
• Who can apply?
• Effective: Aug 1, 2016
• 9 month grace period on vendor contract review (if signed up by
Sept 30, 2016)
• Who have signed up?
Privacy Shield: Implementation
19
Put in place governance - who will own Privacy Shield?
Update notices to data subjects and create Privacy Shield
Privacy Policy
Set-up procedures to enable customers to opt-out, access
their personal information and the ability to correct, amend
or delete the data
Establish an annual compliance review
Set up a complaint handling process
Choose independent dispute resolution body
Update contracts with vendors/suppliers
Privacy Shield: Checklist for applying







20
Upsides
• Provides "adequate protection"
• Stepping stone for BCRs
• Less cumbersome contract
negotiations
Privacy Shield: Upsides and Downsides
Downsides
• Only transfers to the US
• Regulatory scrutiny
• Upgrade to policies/procedures
• FTC enforcement risk
• Annual verification
• Court challenge 21
https://www.privacyshield.gov/welcome
http://ec.europa.eu/justice/data-protection/international-transfers/eu-us-privacy-
shield/index_en.htm
Privacy Shield: How to apply?
22
• Consent from individuals - dubious validity
• Model Clauses - "snap shot" only, so require refreshing
• Binding Corporate Rules - Platinum standard; control framework
Alternative Data Transfer Options?
23
Baker Tilly refers to Baker Tilly Virchow Krause, LLP,
an independently owned and managed member of Baker Tilly International.
Securing Personally
Identifiable Information (PII)
Society Has Become Highly Digital
Hyper-Connectivity
Hyper-Mobility
Highly Sophisticated
Adversaries
Hyper-Sociability
Cyber-Physical “Things”
Physical Cyber “Things”
Smart fridge
can track what it stores,
alerting when products
expire, & even add items to
smartphone shopping list
Sources: Forbes, Vice, Cisco IBSG, University of Michigan, ABC News, Qmed, Network World
Security cameras & systems
can be remotely armed &
checked, get alerts or review
your security feeds from
any location
Lighting systems
can be controlled using a
smartphone app or via the web, as
can fans, hot tubs, water pumps,
thermostats, even door openers
Personal medical devices
can be implantable or
external & allow remote
monitoring / treatment
Today’s cars
are computer-guided and
wirelessly connected via Bluetooth,
GPS, radio protocols
F-35 fighter jet
has a highly advanced computerized
logistics system designed to minimize
repair and re-equipping turnaround
times by monitoring the plane’s status
and pre-emptively making service
decisions so that ground crews are
ready to go before the plane even lands
Smart TVs
connect to the Internet for web
browsing, image sharing, gaming,
or watching streaming video
Sources: http://krebsonsecurity.com/2016/04/fbi-2-3-billion-lost-to-ceo-email-scams/
https://www.fbi.gov/phoenix/press-releases/2016/fbi-warns-of-dramatic-increase-in-business-e-mail-scams
From October 2013 through February
2016, law enforcement received reports
from 17,642 victims.
Total Exposed Loss =
$2.3 billion since 2013
Business Email Compromise:
A Special Kind of “Phish”
The FBI has identified a 270% increase in BEC
attacks victims and exposed loss since Jan. 2015.
Law enforcement globally has received
complaints from victims in every U.S.
state & 95 countries.
In Arizona the average loss per scam is
between $25,000 and $75,000.
Strategies must be Intelligence-Driven
Business Lines
Require AGILITY and fast time
to market to meet business
goals and customer demand
Cyber-Threats
Require us to have MATURE
prevention, detection and
recovery controls to keep pace
Employees
Strive for excellence and are
interested in how and where they
WORK.
Shareholders
Require we protect revenue
to enable GROWTH
Customers
Place TRUST in us and demand we
are careful stewards of their data and
transactions
Regulators
Expect we provide evidence
of a STRONG information
security program
Client and
Strategies must also be Comprehensive
NETWORKS
Are monitored 24x7
IDENTITY & ACCESS
Is appropriate based
on job role
INDUSTRY &
PARTNERSHIPS
Provide actionable cost-
effective threat and risk
intelligence
DATA &
INFORMATION
Is secure at rest
and in transit
APPLICATIONS
Are secure in development
and production
CUSTOMERS & CLIENTS
Are educated on cyber-risks and
their role protecting their devices
Eight Security Ecosystem
Components
ANTICIPATE
emerging threats & risks
ENABLE
business growth while protecting existing revenue
SAFEGUARD
Information & assets
THIRD PARTIES
& VENDORS
Control parity is risk-based and
protections are appropriate
DEVICES
Are secure and patched
regularly to keep
secure over time
Information Security Program
Developed, documented, approved, and implemented security
program. Includes the following:
– Risk Assessment and treatment
– Security policy
– Organization of information security
– Asset management
– Human resources security
– Physical and environmental security
– Communications and operations management
– Access control
– Information systems acquisition, development, and maintenance
– Business continuity management
– Compliance
Security for Privacy Requirements
30
Logical Access Controls
Access to personal information is restricted by procedures that address
the following:
– Authorizing and registering internal personnel
– Identifying & authenticating internal personnel
– Changes and updating access profiles
– Granting permissions for access to IT infrastructure components and
personal information
– Preventing individuals from accessing anything other than their own or
sensitive information
– Limiting access to personal information only to authorized internal
personnel
– Restricting logical access to offline storage, backup data, systems and
media
– Restricting access to system configurations, superuser functionality,
master passwords, powerful utilities, and security devices
– Preventing the introduction of viruses, and malicious code
Security for Privacy Requirements (Cont.)
31
Physical Access Controls
• Restricted to personal information in any form (including the
components of the entity’s system(s) that contain or protect
personal information).
• Examples include:
− Theft
− Espionage
− Dumpster diving
− Social engineering (including phishing)
− Shoulder “surfing”
Security for Privacy Requirements (Cont.)
32
Environmental Safeguards
• Personal information, in all forms, is protected against accidental
disclosure due to natural disasters and environmental hazards
Security for Privacy Requirements (Cont.)
33
Transmitted Personal Information
• Personal information is protected when transmitted by mail or other
physical means such as:
− Emailing data from one person to another
− Faxing data from one person to another
− Updating or editing database information
− Storing data on USB drives, CDs, floppy disks (called “removable
media”)
− Storing data on a computer hard drive or networked drive (called “fixed
media”)
− Deleting information from fixed or removable media
− Scanning of a document and emailing to yourself
• Personal information collected and transmitted over the Internet is
protected by deploying industry-standard encryption technology for
transferring and receiving personal information
Security for Privacy Requirements (Cont.)
34
Personal Information on Portable Media
• Personal information stored on portable media or devices is
protected from unauthorized access.
Security for Privacy Requirements (Cont.)
35
Centralized Device Management
Automatically register user to devices and implements policies
• Low System overhead and limited support staff required
Manage Multiple Device Types and Brands
• Leverages existing investment
Provide Forensic Level Auditing
File level blocking by type and name
Manage Devices off the network
Remote Kill of Devices
Device Coverage:
Optical Products - CD/DVD
USB Flash Drives
External Hard Disk Drives
Multiple Authentication Methods
Password (hardware rules)
Biometric + Password
Validated Encryption
Security for Privacy Requirements (Cont.)
36
Testing Security Safeguards
• Test of the effectiveness of the key administrative, technical, and
physical safeguards protecting personal information are conducted
at least annually.
Security Risk Assessment
• Understand all information systems at a granular level
• Determine what assets really matter (crown jewels)
• Translate and align to business objectives and priorities
• A clear definition of risk tolerance levels is required
• The assessment must be unique to the company and its industry
• The process must be iterative and dynamic to adopt to constant
change
• Standard frameworks improve effectiveness (e.g., NIST, ISO)
Security for Privacy Criteria (Cont.)
37
NIST Cybersecurity Framework
Framework
Categories
Asset Management
Business Environment
Governance
Risk Assessment
Risk Management
Strategy
Access Control
Awareness and Training
Data Security
Information Protection Processes
Maintenance
Protective Technology
Anomalies and Events
Security Continuous
Monitoring
Response Planning
Detection Processes
Communications
Analysis
Mitigation
Improvements
Recovery Planning
Improvements
Communications
• Know your data (mapping)
• Check EU compliance
• Implement PIA
• Implement data transfer solution
• Understand the risks based on the agreement
• Evaluate and Implement data transfer solution
• Conduct a Security Assessment
• Closely Monitor developments
Wrap-up and Takeaways
39
Questions?
40
Contact
41
NICK GRAHAM
PARTNER / GLOBAL CO-CHAIR,
PRIVACY & CYBERSECURITY GROUP
Dentons
Nick.Graham@dentons.com
44 20 7320 6907
JAN HERTZBERG
DIRECTOR,
IL RISK & INTERNAL AUDIT
Baker Tilly
Jan.Hertzberg@bakertilly.com
312 729 8067

Más contenido relacionado

La actualidad más candente

Interoperable Solutions for Cross Border Data Transfers – APEC, CBPR, BCR fro...
Interoperable Solutions for Cross Border Data Transfers – APEC, CBPR, BCR fro...Interoperable Solutions for Cross Border Data Transfers – APEC, CBPR, BCR fro...
Interoperable Solutions for Cross Border Data Transfers – APEC, CBPR, BCR fro...TrustArc
 
The GDPR: What About Data Stored or Transmitted Outside the EU?
The GDPR: What About Data Stored or Transmitted Outside the EU?The GDPR: What About Data Stored or Transmitted Outside the EU?
The GDPR: What About Data Stored or Transmitted Outside the EU?TAG Alliances
 
The Meaning and Impact of the General Data Protection Regulation
The Meaning and Impact of the General Data Protection RegulationThe Meaning and Impact of the General Data Protection Regulation
The Meaning and Impact of the General Data Protection RegulationJake DiMare
 
Regulation (EU) 2016_679_GDPR_Overview_June 2016
Regulation (EU) 2016_679_GDPR_Overview_June 2016Regulation (EU) 2016_679_GDPR_Overview_June 2016
Regulation (EU) 2016_679_GDPR_Overview_June 2016John Greenwood
 
EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?VYTIS MALECKAS
 
What is the new data protection regulation GDPR and why should you care? Jesp...
What is the new data protection regulation GDPR and why should you care? Jesp...What is the new data protection regulation GDPR and why should you care? Jesp...
What is the new data protection regulation GDPR and why should you care? Jesp...Exove
 
Replacement standard contractual clauses
Replacement standard contractual clausesReplacement standard contractual clauses
Replacement standard contractual clausesBrian Miller, Solicitor
 
EU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingEU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingIT Governance Ltd
 
EU General Data Protection Regulation - Update 2017
EU General Data Protection Regulation - Update 2017EU General Data Protection Regulation - Update 2017
EU General Data Protection Regulation - Update 2017Cliff Ashcroft
 
[Webinar Slides] Privacy Shield is Here – What You Need to Know
[Webinar Slides] Privacy Shield is Here – What You Need to Know[Webinar Slides] Privacy Shield is Here – What You Need to Know
[Webinar Slides] Privacy Shield is Here – What You Need to KnowTrustArc
 
GDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpGDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpJason Lackey
 
GDPR: Are you Ready?
GDPR: Are you Ready?GDPR: Are you Ready?
GDPR: Are you Ready?EngageHub
 
EU US Privacy Shield vs. GDPR Infographic from TRUSTe
EU US Privacy Shield vs. GDPR Infographic from TRUSTeEU US Privacy Shield vs. GDPR Infographic from TRUSTe
EU US Privacy Shield vs. GDPR Infographic from TRUSTeTrustArc
 
Revising policies and procedures under the new EU GDPR
Revising policies and procedures under the new EU GDPRRevising policies and procedures under the new EU GDPR
Revising policies and procedures under the new EU GDPRIT Governance Ltd
 
Datum DPO outsourced May 2016
Datum DPO outsourced May 2016Datum DPO outsourced May 2016
Datum DPO outsourced May 2016Mark Honeyball
 
Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRIT Governance Ltd
 
Data Breaches and the EU GDPR
Data Breaches and the EU GDPRData Breaches and the EU GDPR
Data Breaches and the EU GDPRIT Governance Ltd
 
EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer IT Governance Ltd
 

La actualidad más candente (20)

GDPR: Key Article Overview
GDPR: Key Article OverviewGDPR: Key Article Overview
GDPR: Key Article Overview
 
Interoperable Solutions for Cross Border Data Transfers – APEC, CBPR, BCR fro...
Interoperable Solutions for Cross Border Data Transfers – APEC, CBPR, BCR fro...Interoperable Solutions for Cross Border Data Transfers – APEC, CBPR, BCR fro...
Interoperable Solutions for Cross Border Data Transfers – APEC, CBPR, BCR fro...
 
The GDPR: What About Data Stored or Transmitted Outside the EU?
The GDPR: What About Data Stored or Transmitted Outside the EU?The GDPR: What About Data Stored or Transmitted Outside the EU?
The GDPR: What About Data Stored or Transmitted Outside the EU?
 
The Meaning and Impact of the General Data Protection Regulation
The Meaning and Impact of the General Data Protection RegulationThe Meaning and Impact of the General Data Protection Regulation
The Meaning and Impact of the General Data Protection Regulation
 
Regulation (EU) 2016_679_GDPR_Overview_June 2016
Regulation (EU) 2016_679_GDPR_Overview_June 2016Regulation (EU) 2016_679_GDPR_Overview_June 2016
Regulation (EU) 2016_679_GDPR_Overview_June 2016
 
EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?
 
What is the new data protection regulation GDPR and why should you care? Jesp...
What is the new data protection regulation GDPR and why should you care? Jesp...What is the new data protection regulation GDPR and why should you care? Jesp...
What is the new data protection regulation GDPR and why should you care? Jesp...
 
Replacement standard contractual clauses
Replacement standard contractual clausesReplacement standard contractual clauses
Replacement standard contractual clauses
 
EU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingEU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketing
 
EU General Data Protection Regulation - Update 2017
EU General Data Protection Regulation - Update 2017EU General Data Protection Regulation - Update 2017
EU General Data Protection Regulation - Update 2017
 
[Webinar Slides] Privacy Shield is Here – What You Need to Know
[Webinar Slides] Privacy Shield is Here – What You Need to Know[Webinar Slides] Privacy Shield is Here – What You Need to Know
[Webinar Slides] Privacy Shield is Here – What You Need to Know
 
GDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpGDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can Help
 
GDPR: Are you Ready?
GDPR: Are you Ready?GDPR: Are you Ready?
GDPR: Are you Ready?
 
EU US Privacy Shield vs. GDPR Infographic from TRUSTe
EU US Privacy Shield vs. GDPR Infographic from TRUSTeEU US Privacy Shield vs. GDPR Infographic from TRUSTe
EU US Privacy Shield vs. GDPR Infographic from TRUSTe
 
Revising policies and procedures under the new EU GDPR
Revising policies and procedures under the new EU GDPRRevising policies and procedures under the new EU GDPR
Revising policies and procedures under the new EU GDPR
 
GDPR-Overview
GDPR-OverviewGDPR-Overview
GDPR-Overview
 
Datum DPO outsourced May 2016
Datum DPO outsourced May 2016Datum DPO outsourced May 2016
Datum DPO outsourced May 2016
 
Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPR
 
Data Breaches and the EU GDPR
Data Breaches and the EU GDPRData Breaches and the EU GDPR
Data Breaches and the EU GDPR
 
EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer
 

Destacado

The New Privacy Shield for Trans-Atlantic Data - Is the Shield Better, Differ...
The New Privacy Shield for Trans-Atlantic Data - Is the Shield Better, Differ...The New Privacy Shield for Trans-Atlantic Data - Is the Shield Better, Differ...
The New Privacy Shield for Trans-Atlantic Data - Is the Shield Better, Differ...Mark Aldrich
 
How to comply with Privacy Shield
How to comply with Privacy ShieldHow to comply with Privacy Shield
How to comply with Privacy Shieldtermsfeed
 
EU-U.S. Privacy Shield: Should You Sign Up?
EU-U.S. Privacy Shield: Should You Sign Up?EU-U.S. Privacy Shield: Should You Sign Up?
EU-U.S. Privacy Shield: Should You Sign Up?Winston & Strawn LLP
 
Webinar Herramientas de Marketing para aumentar tus ingresos en 2016
Webinar Herramientas de Marketing para aumentar tus ingresos en 2016Webinar Herramientas de Marketing para aumentar tus ingresos en 2016
Webinar Herramientas de Marketing para aumentar tus ingresos en 2016FLOWww Gestión y Marketing
 
High Availability (HA) Explained - second edition
High Availability (HA) Explained - second editionHigh Availability (HA) Explained - second edition
High Availability (HA) Explained - second editionMaciej Lasyk
 
Preparing for Biosimilars: Key Points for Participating in the U.S. Regulator...
Preparing for Biosimilars: Key Points for Participating in the U.S. Regulator...Preparing for Biosimilars: Key Points for Participating in the U.S. Regulator...
Preparing for Biosimilars: Key Points for Participating in the U.S. Regulator...Knobbe Martens - Intellectual Property Law
 
US Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSA
US Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSAUS Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSA
US Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSATrustArc
 
EU Safe Harbor – What Now?
EU Safe Harbor – What Now?EU Safe Harbor – What Now?
EU Safe Harbor – What Now?TrustArc
 
The State of Sales & Marketing at the 50 Fastest-Growing B2B Companies
The State of Sales & Marketing at the 50 Fastest-Growing B2B CompaniesThe State of Sales & Marketing at the 50 Fastest-Growing B2B Companies
The State of Sales & Marketing at the 50 Fastest-Growing B2B CompaniesDrift
 
Effective Dashboard Design: Why Your Baby is Ugly
Effective Dashboard Design: Why Your Baby is UglyEffective Dashboard Design: Why Your Baby is Ugly
Effective Dashboard Design: Why Your Baby is UglyAaron Hursman
 
Design Principles of Excel Dashboards & Reports
Design Principles of Excel Dashboards & ReportsDesign Principles of Excel Dashboards & Reports
Design Principles of Excel Dashboards & ReportsWiley
 
A Quick Simple MS Excel Dashboard
A Quick Simple MS Excel DashboardA Quick Simple MS Excel Dashboard
A Quick Simple MS Excel DashboardPranav Ghode
 
Dashboard - definition, examples
Dashboard - definition, examplesDashboard - definition, examples
Dashboard - definition, examplesMatthieu Aubry
 
Shall we play a game?
Shall we play a game?Shall we play a game?
Shall we play a game?Maciej Lasyk
 
Visual Design with Data
Visual Design with DataVisual Design with Data
Visual Design with DataSeth Familian
 
3 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 20173 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 2017Drift
 
STOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
STOP! VIEW THIS! 10-Step Checklist When Uploading to SlideshareSTOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
STOP! VIEW THIS! 10-Step Checklist When Uploading to SlideshareEmpowered Presentations
 

Destacado (20)

The New Privacy Shield for Trans-Atlantic Data - Is the Shield Better, Differ...
The New Privacy Shield for Trans-Atlantic Data - Is the Shield Better, Differ...The New Privacy Shield for Trans-Atlantic Data - Is the Shield Better, Differ...
The New Privacy Shield for Trans-Atlantic Data - Is the Shield Better, Differ...
 
How to comply with Privacy Shield
How to comply with Privacy ShieldHow to comply with Privacy Shield
How to comply with Privacy Shield
 
EU-U.S. Privacy Shield: Should You Sign Up?
EU-U.S. Privacy Shield: Should You Sign Up?EU-U.S. Privacy Shield: Should You Sign Up?
EU-U.S. Privacy Shield: Should You Sign Up?
 
Webinar Herramientas de Marketing para aumentar tus ingresos en 2016
Webinar Herramientas de Marketing para aumentar tus ingresos en 2016Webinar Herramientas de Marketing para aumentar tus ingresos en 2016
Webinar Herramientas de Marketing para aumentar tus ingresos en 2016
 
High Availability (HA) Explained - second edition
High Availability (HA) Explained - second editionHigh Availability (HA) Explained - second edition
High Availability (HA) Explained - second edition
 
Preparing for Biosimilars: Key Points for Participating in the U.S. Regulator...
Preparing for Biosimilars: Key Points for Participating in the U.S. Regulator...Preparing for Biosimilars: Key Points for Participating in the U.S. Regulator...
Preparing for Biosimilars: Key Points for Participating in the U.S. Regulator...
 
US Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSA
US Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSAUS Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSA
US Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSA
 
EU Safe Harbor – What Now?
EU Safe Harbor – What Now?EU Safe Harbor – What Now?
EU Safe Harbor – What Now?
 
6 Reasons Why Hawaii Is #1
6 Reasons Why Hawaii Is #16 Reasons Why Hawaii Is #1
6 Reasons Why Hawaii Is #1
 
The State of Sales & Marketing at the 50 Fastest-Growing B2B Companies
The State of Sales & Marketing at the 50 Fastest-Growing B2B CompaniesThe State of Sales & Marketing at the 50 Fastest-Growing B2B Companies
The State of Sales & Marketing at the 50 Fastest-Growing B2B Companies
 
Effective Dashboard Design: Why Your Baby is Ugly
Effective Dashboard Design: Why Your Baby is UglyEffective Dashboard Design: Why Your Baby is Ugly
Effective Dashboard Design: Why Your Baby is Ugly
 
Design Principles of Excel Dashboards & Reports
Design Principles of Excel Dashboards & ReportsDesign Principles of Excel Dashboards & Reports
Design Principles of Excel Dashboards & Reports
 
A Quick Simple MS Excel Dashboard
A Quick Simple MS Excel DashboardA Quick Simple MS Excel Dashboard
A Quick Simple MS Excel Dashboard
 
Rundeck & Ansible
Rundeck & AnsibleRundeck & Ansible
Rundeck & Ansible
 
Dashboard - definition, examples
Dashboard - definition, examplesDashboard - definition, examples
Dashboard - definition, examples
 
Shall we play a game?
Shall we play a game?Shall we play a game?
Shall we play a game?
 
Visual Design with Data
Visual Design with DataVisual Design with Data
Visual Design with Data
 
3 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 20173 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 2017
 
Build Features, Not Apps
Build Features, Not AppsBuild Features, Not Apps
Build Features, Not Apps
 
STOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
STOP! VIEW THIS! 10-Step Checklist When Uploading to SlideshareSTOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
STOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
 

Similar a EU-US Privacy Shield - Safe Harbor Replacement

Safe Harbor Webinar
Safe Harbor WebinarSafe Harbor Webinar
Safe Harbor WebinarEthisphere
 
ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...Ulf Mattsson
 
Privacy shield: What You Need To Know About Storing EU Data
Privacy shield: What You Need To Know About Storing EU DataPrivacy shield: What You Need To Know About Storing EU Data
Privacy shield: What You Need To Know About Storing EU DataSchellman & Company
 
Privacy shield what you need to know about storing eu data slideshare
Privacy shield what you need to know about storing  eu data slidesharePrivacy shield what you need to know about storing  eu data slideshare
Privacy shield what you need to know about storing eu data slideshareFreddy Ntwari
 
Gdpr and usa data privacy issues
Gdpr and usa data privacy issuesGdpr and usa data privacy issues
Gdpr and usa data privacy issuesStefan Schippers
 
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...Brian Miller, Solicitor
 
Members evening - data protection
Members evening - data protectionMembers evening - data protection
Members evening - data protectionMRS
 
Data Privacy vs. National Security post Safe Harbor
Data Privacy vs. National Security post Safe HarborData Privacy vs. National Security post Safe Harbor
Data Privacy vs. National Security post Safe HarborGayle Gorvett
 
Ipswitch and cordery on the road " All you need to know about GDPR but are t...
Ipswitch and cordery on the road  " All you need to know about GDPR but are t...Ipswitch and cordery on the road  " All you need to know about GDPR but are t...
Ipswitch and cordery on the road " All you need to know about GDPR but are t...Sébastien Roques
 
ISO-IEC 27701 and EU-U.S. Privacy Regulations What’s next.pptx
ISO-IEC 27701 and EU-U.S. Privacy Regulations What’s next.pptxISO-IEC 27701 and EU-U.S. Privacy Regulations What’s next.pptx
ISO-IEC 27701 and EU-U.S. Privacy Regulations What’s next.pptxPECB
 
Cross Border Data Transfers and the Privacy Shield
Cross Border Data Transfers and the Privacy ShieldCross Border Data Transfers and the Privacy Shield
Cross Border Data Transfers and the Privacy ShieldParsons Behle & Latimer
 
Taking the Fear Out of GDPR
Taking the Fear Out of GDPRTaking the Fear Out of GDPR
Taking the Fear Out of GDPRNate Stockard
 
What's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesWhat's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesOgilvy Consulting
 
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada SymposiumImpact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada SymposiumConstantine Karbaliotis
 
Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214Francoise Gilbert
 
Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Financial Poise
 
DMA Legal update: autumn 2013 - Tuesday 1 October
DMA Legal update: autumn 2013 - Tuesday 1 OctoberDMA Legal update: autumn 2013 - Tuesday 1 October
DMA Legal update: autumn 2013 - Tuesday 1 OctoberRachel Aldighieri
 
TrustArc Webinar: New EU-US Data Transfer Agreement - An Important Milestone ...
TrustArc Webinar: New EU-US Data Transfer Agreement - An Important Milestone ...TrustArc Webinar: New EU-US Data Transfer Agreement - An Important Milestone ...
TrustArc Webinar: New EU-US Data Transfer Agreement - An Important Milestone ...TrustArc
 

Similar a EU-US Privacy Shield - Safe Harbor Replacement (20)

Safe Harbor Webinar
Safe Harbor WebinarSafe Harbor Webinar
Safe Harbor Webinar
 
ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...
 
Privacy shield: What You Need To Know About Storing EU Data
Privacy shield: What You Need To Know About Storing EU DataPrivacy shield: What You Need To Know About Storing EU Data
Privacy shield: What You Need To Know About Storing EU Data
 
Privacy shield what you need to know about storing eu data slideshare
Privacy shield what you need to know about storing  eu data slidesharePrivacy shield what you need to know about storing  eu data slideshare
Privacy shield what you need to know about storing eu data slideshare
 
Gdpr and usa data privacy issues
Gdpr and usa data privacy issuesGdpr and usa data privacy issues
Gdpr and usa data privacy issues
 
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
 
Members evening - data protection
Members evening - data protectionMembers evening - data protection
Members evening - data protection
 
Data Privacy vs. National Security post Safe Harbor
Data Privacy vs. National Security post Safe HarborData Privacy vs. National Security post Safe Harbor
Data Privacy vs. National Security post Safe Harbor
 
Gdpr action plan
Gdpr action plan Gdpr action plan
Gdpr action plan
 
Ipswitch and cordery on the road " All you need to know about GDPR but are t...
Ipswitch and cordery on the road  " All you need to know about GDPR but are t...Ipswitch and cordery on the road  " All you need to know about GDPR but are t...
Ipswitch and cordery on the road " All you need to know about GDPR but are t...
 
ISO-IEC 27701 and EU-U.S. Privacy Regulations What’s next.pptx
ISO-IEC 27701 and EU-U.S. Privacy Regulations What’s next.pptxISO-IEC 27701 and EU-U.S. Privacy Regulations What’s next.pptx
ISO-IEC 27701 and EU-U.S. Privacy Regulations What’s next.pptx
 
Cross Border Data Transfers and the Privacy Shield
Cross Border Data Transfers and the Privacy ShieldCross Border Data Transfers and the Privacy Shield
Cross Border Data Transfers and the Privacy Shield
 
Taking the Fear Out of GDPR
Taking the Fear Out of GDPRTaking the Fear Out of GDPR
Taking the Fear Out of GDPR
 
What's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesWhat's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) Changes
 
EU Trade Secrets Directive & Data Protection Changes
EU Trade Secrets Directive & Data Protection ChangesEU Trade Secrets Directive & Data Protection Changes
EU Trade Secrets Directive & Data Protection Changes
 
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada SymposiumImpact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
 
Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214
 
Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...
 
DMA Legal update: autumn 2013 - Tuesday 1 October
DMA Legal update: autumn 2013 - Tuesday 1 OctoberDMA Legal update: autumn 2013 - Tuesday 1 October
DMA Legal update: autumn 2013 - Tuesday 1 October
 
TrustArc Webinar: New EU-US Data Transfer Agreement - An Important Milestone ...
TrustArc Webinar: New EU-US Data Transfer Agreement - An Important Milestone ...TrustArc Webinar: New EU-US Data Transfer Agreement - An Important Milestone ...
TrustArc Webinar: New EU-US Data Transfer Agreement - An Important Milestone ...
 

Último

VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...Suhani Kapoor
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptxAnupama Kate
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfLars Albertsson
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxJohnnyPlasten
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptSonatrach
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingNeil Barnes
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystSamantha Rae Coolbeth
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998YohFuh
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubaihf8803863
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSAishani27
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsappssapnasaifi408
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxolyaivanovalion
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxolyaivanovalion
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusTimothy Spann
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiSuhani Kapoor
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxolyaivanovalion
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一ffjhghh
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionfulawalesam
 

Último (20)

VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
 
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data Storytelling
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data Analyst
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
 
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICS
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptx
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptx
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and Milvus
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptx
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interaction
 

EU-US Privacy Shield - Safe Harbor Replacement

  • 1. Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Privacy Shield: What you need to know German American Chamber of Commerce of the Midwest, Inc. Nick Graham Partner Dentons UK Jan Hertzberg Director Baker Tilly
  • 2. • European Commission of the European Union (EU) and the US Department of Commerce reached agreement on a new pact for data transfers (February 2, 2016) • “Safe Harbor” agreement was invalidated after the European Court of Justice found that the US had violated the privacy of its citizens • Privacy Shield imposes: − Stronger obligations on US companies to protect the personal data of EU citizens − Stronger monitoring, oversight and enforcement of the agreement − Limitations and oversight on US government access to data − US privacy office established to handle complaints of EU citizens − Annual review of US commitments and performance against the Privacy Shield agreement Setting the Scene 2
  • 3. Privacy Rules (current and future) Privacy Shield Securing Personally Identifiable Information (PII) Wrap-up and takeaways Q&A Agenda 3
  • 4. Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Privacy Rules: Current Landscape
  • 5. EU versus US – Treatment of Privacy European US Privacy is a human right Privacy is a consumer protection issue "Personal Data" "PII" (Personally Identifiable Information) No processing of personal information is the default The commercial use of personal information is acceptable as the default • Cultural conflicts: e-discovery/litigation 5
  • 6. Current German Legal Structure deriving from EU Directive Each of the other 27 EU member states have similar data protection regimes. Comparable data protection laws also apply outside the EU (e.g. Russia). EU Data Protection Directive 1995 6
  • 7. When do the rules apply? The EU rules apply when there is: − processing − of personal data − by a data controller − established in the EU (in the context of that establishment) or (where the data controller is established outside of the EEA) using equipment in the EU. 7
  • 8. Controllers and Processors Data Controller: A person who determines the purposes and means of the processing of personal data Data Processor: A person who processes personal data on behalf of the data controller ABC KGaA (Data Controller) Employee (Data Subject) Microsoft (Data Processor) 8
  • 9. You will be required to: • Comply with the Data Protection Principles • Comply with the Rights of Data Subjects • Notify its data processing to certain regulators • Take the Consequences if it fails to comply What does it mean if EU rules apply? 9
  • 10. • Transparency: privacy policies and notices • Comply: with one of the conditions for processing (e.g. consent/necessary to perform a contract) • Purpose limitation: only use personal data for specified and lawful purposes; no incompatible purposes • Proportionality: personal data to be adequate, relevant and not excessive • Accuracy: personal data to be accurate/kept up-to-date • Retention: personal data not to be retained for longer than necessary • Individual rights: to access, correct and object as well as claim compensation • Security: appropriate measures to protect data required • Exports: no transfers of personal data outside of the EEA without adequate protection Data Protection Principles 10
  • 11. • Regulators can fine us • Regulators may also have the ability to: − issue an information notice − issue an enforcement notice − seek to bring criminal proceedings • Compensation • Bad publicity and reputational harm • Personal liability for individuals who violate the rules What happens if we get it wrong? 11
  • 12. Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Privacy Rules: Changing Landscape
  • 13. EU Data Protection Regulation • Scope: EEA, overseas and processors • Model: "one stop shop" • Governance: DPO and "privacy office;" refresh policies and procedures; training; audit • Privacy by design • Privacy by default IN FORCE FROM 25 MAY 2018 13
  • 14. EU Data Protection Regulation • Enhanced rights and duties of transparency and proportionality • Data breach notification: to be a legal requirement • Penalties: fines of up to 4% of annual worldwide revenue or EUR 20 million (USD 22.6 million) • Risk control: new "principle of accountability." This requires "control framework" of polices, procedures, training and audit to manage and mitigate global privacy risk. 14
  • 15. Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. EU-US Privacy Shield
  • 16. Max Schrems complaint against Facebook Safe Harbor declared invalid 6 October 2015 Explore alternative transfer tools Privacy Shield Safe Harbor: The Case 16
  • 17. Privacy Shield: The 7 Principles • Notice • Choice • Accountability for onward transfer • Security • Data Integrity and Purpose Limitation • Access • Recourse, Enforcement and Liability 17
  • 18. Old World: Safe Harbor New World : Privacy Shield "Essentially equivalent" • Annual self-certification • Notice • Choice • Onward Transfer • Security • Data Integrity / Purpose Limitation • Access • Much more detailed privacy notices • Onward transfer accountability: • Agreement with Controllers • Liability for Processor non- compliance Remedies / individual Redress • Federal Trade Commission Complaint • Private dispute resolution • Direct complaint - 45 days response • ADR / DP Panel • DP Authority complaints • DoC Complaints • Binding arbitration / Privacy Shield Panel • Ombudsman for National Security queries Oversight • Federal Trade Commission (but no control over public authorities) • Foreign Intelligence Services Court - ex parte proceedings • Proactive DoC investigation and extra resource • Name & shame for removal • Release of Privacy Shield sections of compliance reports • Annual verification • DP Authorities (especially HR data) • Ombudsman: all US transfers • Annual review of Privacy Shield • Privacy Shield may be suspended Safe Harbor v Privacy Shield 18
  • 19. • Who can apply? • Effective: Aug 1, 2016 • 9 month grace period on vendor contract review (if signed up by Sept 30, 2016) • Who have signed up? Privacy Shield: Implementation 19
  • 20. Put in place governance - who will own Privacy Shield? Update notices to data subjects and create Privacy Shield Privacy Policy Set-up procedures to enable customers to opt-out, access their personal information and the ability to correct, amend or delete the data Establish an annual compliance review Set up a complaint handling process Choose independent dispute resolution body Update contracts with vendors/suppliers Privacy Shield: Checklist for applying        20
  • 21. Upsides • Provides "adequate protection" • Stepping stone for BCRs • Less cumbersome contract negotiations Privacy Shield: Upsides and Downsides Downsides • Only transfers to the US • Regulatory scrutiny • Upgrade to policies/procedures • FTC enforcement risk • Annual verification • Court challenge 21
  • 23. • Consent from individuals - dubious validity • Model Clauses - "snap shot" only, so require refreshing • Binding Corporate Rules - Platinum standard; control framework Alternative Data Transfer Options? 23
  • 24. Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Securing Personally Identifiable Information (PII)
  • 25. Society Has Become Highly Digital Hyper-Connectivity Hyper-Mobility Highly Sophisticated Adversaries Hyper-Sociability Cyber-Physical “Things”
  • 26. Physical Cyber “Things” Smart fridge can track what it stores, alerting when products expire, & even add items to smartphone shopping list Sources: Forbes, Vice, Cisco IBSG, University of Michigan, ABC News, Qmed, Network World Security cameras & systems can be remotely armed & checked, get alerts or review your security feeds from any location Lighting systems can be controlled using a smartphone app or via the web, as can fans, hot tubs, water pumps, thermostats, even door openers Personal medical devices can be implantable or external & allow remote monitoring / treatment Today’s cars are computer-guided and wirelessly connected via Bluetooth, GPS, radio protocols F-35 fighter jet has a highly advanced computerized logistics system designed to minimize repair and re-equipping turnaround times by monitoring the plane’s status and pre-emptively making service decisions so that ground crews are ready to go before the plane even lands Smart TVs connect to the Internet for web browsing, image sharing, gaming, or watching streaming video
  • 27. Sources: http://krebsonsecurity.com/2016/04/fbi-2-3-billion-lost-to-ceo-email-scams/ https://www.fbi.gov/phoenix/press-releases/2016/fbi-warns-of-dramatic-increase-in-business-e-mail-scams From October 2013 through February 2016, law enforcement received reports from 17,642 victims. Total Exposed Loss = $2.3 billion since 2013 Business Email Compromise: A Special Kind of “Phish” The FBI has identified a 270% increase in BEC attacks victims and exposed loss since Jan. 2015. Law enforcement globally has received complaints from victims in every U.S. state & 95 countries. In Arizona the average loss per scam is between $25,000 and $75,000.
  • 28. Strategies must be Intelligence-Driven Business Lines Require AGILITY and fast time to market to meet business goals and customer demand Cyber-Threats Require us to have MATURE prevention, detection and recovery controls to keep pace Employees Strive for excellence and are interested in how and where they WORK. Shareholders Require we protect revenue to enable GROWTH Customers Place TRUST in us and demand we are careful stewards of their data and transactions Regulators Expect we provide evidence of a STRONG information security program Client and
  • 29. Strategies must also be Comprehensive NETWORKS Are monitored 24x7 IDENTITY & ACCESS Is appropriate based on job role INDUSTRY & PARTNERSHIPS Provide actionable cost- effective threat and risk intelligence DATA & INFORMATION Is secure at rest and in transit APPLICATIONS Are secure in development and production CUSTOMERS & CLIENTS Are educated on cyber-risks and their role protecting their devices Eight Security Ecosystem Components ANTICIPATE emerging threats & risks ENABLE business growth while protecting existing revenue SAFEGUARD Information & assets THIRD PARTIES & VENDORS Control parity is risk-based and protections are appropriate DEVICES Are secure and patched regularly to keep secure over time
  • 30. Information Security Program Developed, documented, approved, and implemented security program. Includes the following: – Risk Assessment and treatment – Security policy – Organization of information security – Asset management – Human resources security – Physical and environmental security – Communications and operations management – Access control – Information systems acquisition, development, and maintenance – Business continuity management – Compliance Security for Privacy Requirements 30
  • 31. Logical Access Controls Access to personal information is restricted by procedures that address the following: – Authorizing and registering internal personnel – Identifying & authenticating internal personnel – Changes and updating access profiles – Granting permissions for access to IT infrastructure components and personal information – Preventing individuals from accessing anything other than their own or sensitive information – Limiting access to personal information only to authorized internal personnel – Restricting logical access to offline storage, backup data, systems and media – Restricting access to system configurations, superuser functionality, master passwords, powerful utilities, and security devices – Preventing the introduction of viruses, and malicious code Security for Privacy Requirements (Cont.) 31
  • 32. Physical Access Controls • Restricted to personal information in any form (including the components of the entity’s system(s) that contain or protect personal information). • Examples include: − Theft − Espionage − Dumpster diving − Social engineering (including phishing) − Shoulder “surfing” Security for Privacy Requirements (Cont.) 32
  • 33. Environmental Safeguards • Personal information, in all forms, is protected against accidental disclosure due to natural disasters and environmental hazards Security for Privacy Requirements (Cont.) 33
  • 34. Transmitted Personal Information • Personal information is protected when transmitted by mail or other physical means such as: − Emailing data from one person to another − Faxing data from one person to another − Updating or editing database information − Storing data on USB drives, CDs, floppy disks (called “removable media”) − Storing data on a computer hard drive or networked drive (called “fixed media”) − Deleting information from fixed or removable media − Scanning of a document and emailing to yourself • Personal information collected and transmitted over the Internet is protected by deploying industry-standard encryption technology for transferring and receiving personal information Security for Privacy Requirements (Cont.) 34
  • 35. Personal Information on Portable Media • Personal information stored on portable media or devices is protected from unauthorized access. Security for Privacy Requirements (Cont.) 35
  • 36. Centralized Device Management Automatically register user to devices and implements policies • Low System overhead and limited support staff required Manage Multiple Device Types and Brands • Leverages existing investment Provide Forensic Level Auditing File level blocking by type and name Manage Devices off the network Remote Kill of Devices Device Coverage: Optical Products - CD/DVD USB Flash Drives External Hard Disk Drives Multiple Authentication Methods Password (hardware rules) Biometric + Password Validated Encryption Security for Privacy Requirements (Cont.) 36
  • 37. Testing Security Safeguards • Test of the effectiveness of the key administrative, technical, and physical safeguards protecting personal information are conducted at least annually. Security Risk Assessment • Understand all information systems at a granular level • Determine what assets really matter (crown jewels) • Translate and align to business objectives and priorities • A clear definition of risk tolerance levels is required • The assessment must be unique to the company and its industry • The process must be iterative and dynamic to adopt to constant change • Standard frameworks improve effectiveness (e.g., NIST, ISO) Security for Privacy Criteria (Cont.) 37
  • 38. NIST Cybersecurity Framework Framework Categories Asset Management Business Environment Governance Risk Assessment Risk Management Strategy Access Control Awareness and Training Data Security Information Protection Processes Maintenance Protective Technology Anomalies and Events Security Continuous Monitoring Response Planning Detection Processes Communications Analysis Mitigation Improvements Recovery Planning Improvements Communications
  • 39. • Know your data (mapping) • Check EU compliance • Implement PIA • Implement data transfer solution • Understand the risks based on the agreement • Evaluate and Implement data transfer solution • Conduct a Security Assessment • Closely Monitor developments Wrap-up and Takeaways 39
  • 41. Contact 41 NICK GRAHAM PARTNER / GLOBAL CO-CHAIR, PRIVACY & CYBERSECURITY GROUP Dentons Nick.Graham@dentons.com 44 20 7320 6907 JAN HERTZBERG DIRECTOR, IL RISK & INTERNAL AUDIT Baker Tilly Jan.Hertzberg@bakertilly.com 312 729 8067