SlideShare una empresa de Scribd logo
1 de 17
Descargar para leer sin conexión
GDPR Compliance 2018
Gary Dodson
28th February 2018
30 minute GDPR Agenda
• Who are Greenlight Computers? (1 slide)
• GDPR Introduction & Facts (3 slides)
• 7 Steps to Compliance (6 slides)
– Data Architecture
– Data Protection Officer
– Privacy Impact Assessment
• Wider Cyber Security (1 slide)
• Useful tools & links (1 slide)
• Practical Actions (3 slides)
Greenlight Services 2018
Greenlight
Computers
Single Point of
Service Desk
Product Supply
Practice
IT Infrastructure
Practice
Cloud Solutions
Practice
Digital Marketing
Practice
Cyber Security
Practice
NEW 2018
Unified
Communications
IT Strategy &
Outsourcing
Consultancy
People &
Resourcing
Centre
Hardware
Software
Networking
Peripherals
Audio Visual
Leasing
Refurbished
Broadband
Networking/WIFI
Cabling
Servers
Virtualisation
User Computing
Storage/Backup
O365
Sharepoint
CRM
Intranet
Extranet
Collaboration
App develop
Backup/DR
Instant Messaging
VOIP Telephony
WIFI
CCTV
Video Conference
Digital Signage
Data Protection
GDPR
Data Recovery
Disaster Recovery
Pen Testing
Security Audit
IT Governance
Policy & Procedure
SEO
Google Manager
Digital Benchmark
Web Development
Hosting
Social Media
Email Marketing
Lead Generation
Locations
Alderley Park
Manchester (HQ)
University of Manchester
Stevenage Bioscience
Catalyst
About Us
Established 2006
18 Staff
200 ish clients
Always learning
GDPR Introduction & Facts
On 25 May 2018 most processing of personal data by organisations will
have to comply with the General Data Protection Regulation.
Information Commissioners Office (ICO) website front page statement
• GDPR has been adopted by UK despite BREXIT
• GDPR non-compliance fine 4% of Turnover
• GDPR is not just an IT thing
• If you hold and process personal information about your clients,
employees or suppliers, you are legally obliged to protect that
information.
GDPR is not just an IT thing
• HR - will need to check that your terms of employment
comply with GDPR & allow you to access the users
company data
• Finance – will need to ensure personal financial data is
only retained as per internal procedure & GDPR
• Management – will need to ensure your Data Protection
policy is up to date & complies with GDPR
• CCTV – is deemed as potentially sensitive data & if used
should be included in policies
• Paper Data – needs to be protected, not just digital
GDPR - controller V processor
• “data controller” means a person who (either alone or jointly)
determines the purposes for which and the manner in which any
personal data are to be processed
• “data processor”, in relation to personal data, means any person (other
than an employee of the data controller) who processes the data on
behalf of the data controller.
• “processing”, in relation to information or data means obtaining,
recording or holding the information or data or carrying out any
operation or set of operations on the information or data, including:
a) organisation, adaptation or alteration of the information or data
b) retrieval, consultation or use of the information or data
c) disclosure of the information or data by transmission
dissemination or otherwise making available
d) alignment, combination, blocking, erasure or destruction of the
information or data
7 Steps to GDPR Compliance
0. Read the ICO GDPR rules & registration
1. Complete a Data Audit (or have it done for you)
2. Review your Data Architecture
3. Review Responsibilities & Procedures
4. Data Protection Officer & Risk Register
5. Staff Training
6. Privacy Impact Assessments
7. Cyber Security
Data Architecture
All 21st century Directors need to be familiar with this term
Firewall
Router
Shared data
Non-sensitive
Sensitive
Selective secure access
Need to know access
All staff access
3rd Party
Supplier/Partner/
Customer/Contractor
Ideally, should not have access
to sensitive data. It makes
protection much harder.
Treat Personal Data as securely as IP Data
Segregated Filing
Don’t hold personal sensitive data
locally. It presents your biggest risk
of a breach.
Common Sense?
An easy way to look at Data Protection is your Possessions
Spare Change
Wallet of Cash
Valuable Jewellery
Selective secure access
Lock in a cupboard
All family access
Treat Personal Data as securely as Possessions
In the Safe
Its probably risky to carry your
£10,000 necklace in your handbag!!
So why hold sensitive data on your
laptop??
You wouldn’t send your bank
statement or house deeds as a paper
aeroplane!! But do you send salary
details to payroll unencrypted??
You outsource the responsibility for
your Gold to the experts at the bank.
Get the experts to protect your
sensitive data securely in the Cloud??
Data Protection Officer (DPO)
The GDPR makes it a requirement that organisations appoint a data
protection officer (DPO) in some circumstances.
Under the GDPR, you must appoint a DPO if you:
• are a public authority (except for courts acting in their judicial capacity);
• carry out large scale systematic monitoring of individuals (for example, online
behaviour tracking); or
• carry out large scale processing of special categories of data or data relating to criminal
convictions and offences.
Any organisation is able to appoint a DPO. Regardless of whether the GDPR
obliges you to appoint a DPO, you must ensure that your organisation has
sufficient staff and skills to discharge your obligations under the GDPR.
Greenlight recommends our clients appoint a DPO.
Privacy Impact Assessments (PIA’s)
ICO definition
A PIA is a process which helps an organisation to identify and reduce the privacy risks of a
project. An effective PIA will be used throughout the development and implementation of
a project, using existing project management processes. A PIA enables an organisation to
systematically and thoroughly analyse how a particular project or system will affect the
privacy of the individuals involved.
In essence this means you need to look at worst case scenarios & then
plan to mitigate against them or stop the practice:
e.g. CEO retains staff personal records on laptop & loses laptop
e.g. 3rd party consultant is given access to your server but has no Anti-
virus and a virus penetrates your server
e.g. Disgruntled ex-employee asks to see their records & you find they
are spread around the business
GDPR – ICO Summary
Cyber Security
• GDPR compliance relies on Cyber Security discipline
• Cyber Security is about minimising risk
5 Key questions
• Do you have a Cyber Security Plan?
• Do you budget for an annual Cyber Security audit & actions
required?
• When was your last audit/spot check?
• Do you maintain a Cyber Security/GDPR risk register?
• Do you educate your team on staying Cyber Safe?
Your security is only as good as the weakest link
A topic for next time?
Useful links & tools
ICO key page for SME’s on GDPR
https://ico.org.uk/for-organisations/business/
National Cyber Security Centre
https://www.ncsc.gov.uk/guidance/10-steps-cyber-security
ISO27001 in user speak
https://www.itgovernance.co.uk/iso27001
BSI train & accredit Auditors for ISO27001/9001 etc
https://www.bsigroup.com/en-GB/Cyber-Security/
For a longer discussion or simple English
garydodson@greenlightcomputers.co.uk 0792 630 8824
kris@greenlightcomputers.co.uk 0161 883 1685
1. GDPR Gap Analysis
GDPR Gap Analysis Audit
Start your GDPR compliance with benchmarking where you are now & what needs to change.
This is GDPR gap analysis process flow and areas that we would focus on during assessment
• GDPR scope, project resourcing and current DPA evaluation
• Data Protection Governance and Awareness
• Data Protection by Design
• Document Review – policies, procedures and practices
• Consent and Privacy Notice evaluation and compliance
• Critical asset identification and evaluation
• Personal Data identification and classification
• Lawful basis for processing Personal Data
• Information Management System and Personal Data flow
• Information Security Roles and Responsibilities
• Risk identifications, management and review
• Individual Rights and Data subjects request
• Data breach escalation and checklist
• Information Technology Security
• Information Communication Security - Network Security
• Physical Security
SME Audit packages start from £1500 for a GDPR Assessment Report, Risk Register & Action Recommendation
Led by Greenlight Computers Cyber Security / ISO Lead Auditor - Kris Bednarczyk
2. GDPR User Risk View
Risk View (NEW TECHNOLOGY)
Audit tool to analyse data on your user devices
& report risks of GDPR/IP/PCI leakages
Using an agent on each device this tool:
• Analyses data of all types on the user computer
• Grades each item of data for non-compliance
• Identifies data breach risks on the device
• Creates a series of reports for the device
• Creates an aggregated report for all devices
• Provides a Risk dashboard
Potentially really useful in a BYOD environment
http://www.ddc-as.com/risk-view
3. ESET Endpoint Encryption
ESET Endpoint Encryption
De-risk a data breach by adopting encryption across the business
https://www.eset.com/uk/business/endpoint-security/encryption/
Welcome Rob Fearnley from ESET, a Greenlight partner that spends all day
protecting SME’s against Cyber Crime

Más contenido relacionado

La actualidad más candente

GDPR From the Trenches - Real-world examples of how companies are approaching...
GDPR From the Trenches - Real-world examples of how companies are approaching...GDPR From the Trenches - Real-world examples of how companies are approaching...
GDPR From the Trenches - Real-world examples of how companies are approaching...Ardoq
 
Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...Peter Procházka
 
May 6 evolving international privacy regulations and cross border data tran...
May 6   evolving international privacy regulations and cross border data tran...May 6   evolving international privacy regulations and cross border data tran...
May 6 evolving international privacy regulations and cross border data tran...Ulf Mattsson
 
Beginning your General Data Protection Regulation (GDPR) Journey
Beginning your General Data Protection Regulation (GDPR) JourneyBeginning your General Data Protection Regulation (GDPR) Journey
Beginning your General Data Protection Regulation (GDPR) JourneyMicrosoft Österreich
 
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and ExperianHow to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and ExperianPECB
 
Everything you Need to Know about The Data Protection Officer Role
Everything you Need to Know about The Data Protection Officer Role Everything you Need to Know about The Data Protection Officer Role
Everything you Need to Know about The Data Protection Officer Role HackerOne
 
Enlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter GridEnlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter Gridbradley_g
 
Cross border - off-shoring and outsourcing privacy sensitive data
Cross border - off-shoring and outsourcing privacy sensitive dataCross border - off-shoring and outsourcing privacy sensitive data
Cross border - off-shoring and outsourcing privacy sensitive dataUlf Mattsson
 
How Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedHow Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedJerry Paul Acosta
 
Impact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A SecurityImpact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A SecurityEQS Group
 
Ardoq in Edinburgh - Events - Building Resilience in a Post-GDPR World (14-au...
Ardoq in Edinburgh - Events - Building Resilience in a Post-GDPR World (14-au...Ardoq in Edinburgh - Events - Building Resilience in a Post-GDPR World (14-au...
Ardoq in Edinburgh - Events - Building Resilience in a Post-GDPR World (14-au...Ardoq
 
Mastering Article 30 Compliance: Conducting, Maintaining & Reporting on your ...
Mastering Article 30 Compliance: Conducting, Maintaining & Reporting on your ...Mastering Article 30 Compliance: Conducting, Maintaining & Reporting on your ...
Mastering Article 30 Compliance: Conducting, Maintaining & Reporting on your ...TrustArc
 
Personal Data Protection in Indonesia
Personal Data Protection in IndonesiaPersonal Data Protection in Indonesia
Personal Data Protection in IndonesiaEryk Budi Pratama
 
Big Data, Security Intelligence, (And Why I Hate This Title)
Big Data, Security Intelligence, (And Why I Hate This Title) Big Data, Security Intelligence, (And Why I Hate This Title)
Big Data, Security Intelligence, (And Why I Hate This Title) Coastal Pet Products, Inc.
 
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...DATUM LLC
 
Splunk: How Machine Data Supports GDPR Compliance
Splunk: How Machine Data Supports GDPR ComplianceSplunk: How Machine Data Supports GDPR Compliance
Splunk: How Machine Data Supports GDPR ComplianceMarketingArrowECS_CZ
 
Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...
Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...
Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...Synopsys Software Integrity Group
 

La actualidad más candente (20)

GDPR From the Trenches - Real-world examples of how companies are approaching...
GDPR From the Trenches - Real-world examples of how companies are approaching...GDPR From the Trenches - Real-world examples of how companies are approaching...
GDPR From the Trenches - Real-world examples of how companies are approaching...
 
Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...
 
GDPR How to get started?
GDPR  How to get started?GDPR  How to get started?
GDPR How to get started?
 
May 6 evolving international privacy regulations and cross border data tran...
May 6   evolving international privacy regulations and cross border data tran...May 6   evolving international privacy regulations and cross border data tran...
May 6 evolving international privacy regulations and cross border data tran...
 
Beginning your General Data Protection Regulation (GDPR) Journey
Beginning your General Data Protection Regulation (GDPR) JourneyBeginning your General Data Protection Regulation (GDPR) Journey
Beginning your General Data Protection Regulation (GDPR) Journey
 
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and ExperianHow to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
 
Everything you Need to Know about The Data Protection Officer Role
Everything you Need to Know about The Data Protection Officer Role Everything you Need to Know about The Data Protection Officer Role
Everything you Need to Know about The Data Protection Officer Role
 
Enlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter GridEnlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter Grid
 
Cross border - off-shoring and outsourcing privacy sensitive data
Cross border - off-shoring and outsourcing privacy sensitive dataCross border - off-shoring and outsourcing privacy sensitive data
Cross border - off-shoring and outsourcing privacy sensitive data
 
How Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedHow Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is Implemented
 
Impact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A SecurityImpact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A Security
 
GDPR Workshop
GDPR WorkshopGDPR Workshop
GDPR Workshop
 
Ardoq in Edinburgh - Events - Building Resilience in a Post-GDPR World (14-au...
Ardoq in Edinburgh - Events - Building Resilience in a Post-GDPR World (14-au...Ardoq in Edinburgh - Events - Building Resilience in a Post-GDPR World (14-au...
Ardoq in Edinburgh - Events - Building Resilience in a Post-GDPR World (14-au...
 
Mastering Article 30 Compliance: Conducting, Maintaining & Reporting on your ...
Mastering Article 30 Compliance: Conducting, Maintaining & Reporting on your ...Mastering Article 30 Compliance: Conducting, Maintaining & Reporting on your ...
Mastering Article 30 Compliance: Conducting, Maintaining & Reporting on your ...
 
Personal Data Protection in Indonesia
Personal Data Protection in IndonesiaPersonal Data Protection in Indonesia
Personal Data Protection in Indonesia
 
Big Data, Security Intelligence, (And Why I Hate This Title)
Big Data, Security Intelligence, (And Why I Hate This Title) Big Data, Security Intelligence, (And Why I Hate This Title)
Big Data, Security Intelligence, (And Why I Hate This Title)
 
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...
 
Splunk: How Machine Data Supports GDPR Compliance
Splunk: How Machine Data Supports GDPR ComplianceSplunk: How Machine Data Supports GDPR Compliance
Splunk: How Machine Data Supports GDPR Compliance
 
Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...
Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...
Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...
 
Payroll Data & GDPR: What you need to know?
Payroll Data & GDPR: What you need to know?Payroll Data & GDPR: What you need to know?
Payroll Data & GDPR: What you need to know?
 

Similar a GDPR solutions (JS Event 28/2/18) | Greenlight Computers

Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRMatt Stubbs
 
BigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesBigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesDimitri Sirota
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceAdrian Dumitrescu
 
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"Ragnar Heil
 
Toreon adding privacy by design in secure application development oss18 v20...
Toreon adding privacy by design in secure application development   oss18 v20...Toreon adding privacy by design in secure application development   oss18 v20...
Toreon adding privacy by design in secure application development oss18 v20...Sebastien Deleersnyder
 
Data compliance - get it right the first time (Full color PDF)
Data compliance - get it right the first time (Full color PDF)Data compliance - get it right the first time (Full color PDF)
Data compliance - get it right the first time (Full color PDF)Peter GEELEN ✔
 
GDPR Scotland 2017
GDPR Scotland 2017GDPR Scotland 2017
GDPR Scotland 2017Ray Bugg
 
Data compliance - get it right the first time (Black/White printable PDF)
Data compliance - get it right the first time (Black/White printable PDF)Data compliance - get it right the first time (Black/White printable PDF)
Data compliance - get it right the first time (Black/White printable PDF)Peter GEELEN ✔
 
CyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPRCyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPRIryna Chekanava
 
CBC GDPR The Physics
CBC GDPR The PhysicsCBC GDPR The Physics
CBC GDPR The PhysicsJason Chapman
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Andy Talbot
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? SecurityScorecard
 
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec
 
Data protection within development
Data protection within developmentData protection within development
Data protection within developmentowaspsuffolk
 
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) planCWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) planCapgemini
 
CyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRCyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRShadi A. Razak
 
GDPR: The Application Security Twist
GDPR: The Application Security TwistGDPR: The Application Security Twist
GDPR: The Application Security TwistSecurity Innovation
 

Similar a GDPR solutions (JS Event 28/2/18) | Greenlight Computers (20)

Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
 
BigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesBigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar Slides
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"
 
Toreon adding privacy by design in secure application development oss18 v20...
Toreon adding privacy by design in secure application development   oss18 v20...Toreon adding privacy by design in secure application development   oss18 v20...
Toreon adding privacy by design in secure application development oss18 v20...
 
Data compliance - get it right the first time (Full color PDF)
Data compliance - get it right the first time (Full color PDF)Data compliance - get it right the first time (Full color PDF)
Data compliance - get it right the first time (Full color PDF)
 
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
 
GDPR Scotland 2017
GDPR Scotland 2017GDPR Scotland 2017
GDPR Scotland 2017
 
Data compliance - get it right the first time (Black/White printable PDF)
Data compliance - get it right the first time (Black/White printable PDF)Data compliance - get it right the first time (Black/White printable PDF)
Data compliance - get it right the first time (Black/White printable PDF)
 
CyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPRCyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPR
 
CBC GDPR The Physics
CBC GDPR The PhysicsCBC GDPR The Physics
CBC GDPR The Physics
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready?
 
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
 
Data protection within development
Data protection within developmentData protection within development
Data protection within development
 
The general data protection act overview
The general data protection act overviewThe general data protection act overview
The general data protection act overview
 
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) planCWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
 
CyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRCyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPR
 
GDPR: The Application Security Twist
GDPR: The Application Security TwistGDPR: The Application Security Twist
GDPR: The Application Security Twist
 

Último

Sangareddy Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Sangareddy Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceSangareddy Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Sangareddy Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verified
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verifiedConnaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verified
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verifiedDelhi Call girls
 
Karol Bagh, Delhi Call girls :8448380779 Model Escorts | 100% verified
Karol Bagh, Delhi Call girls :8448380779 Model Escorts | 100% verifiedKarol Bagh, Delhi Call girls :8448380779 Model Escorts | 100% verified
Karol Bagh, Delhi Call girls :8448380779 Model Escorts | 100% verifiedDelhi Call girls
 
Hyderabad Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Hyderabad Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceHyderabad Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Hyderabad Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 
Dehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Dehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Dehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 
Dàni Velvet Personal Brand Exploration (1).pptx
Dàni Velvet Personal Brand Exploration (1).pptxDàni Velvet Personal Brand Exploration (1).pptx
Dàni Velvet Personal Brand Exploration (1).pptxdmtillman
 
Sohna Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Sohna Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceSohna Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Sohna Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceDamini Dixit
 
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedDelhi Call girls
 
EV Electric Vehicle Startup Pitch Deck- StartupSprouts.in
EV Electric Vehicle Startup Pitch Deck- StartupSprouts.inEV Electric Vehicle Startup Pitch Deck- StartupSprouts.in
EV Electric Vehicle Startup Pitch Deck- StartupSprouts.inStartupSprouts.in
 
Famedesired Project portfolio1 . Fullsail
Famedesired Project portfolio1 . FullsailFamedesired Project portfolio1 . Fullsail
Famedesired Project portfolio1 . Fullsailfergusonamani
 
Bangalore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Bangalore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceBangalore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Bangalore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 
Shareholders Agreement Template for Compulsorily Convertible Debt Funding- St...
Shareholders Agreement Template for Compulsorily Convertible Debt Funding- St...Shareholders Agreement Template for Compulsorily Convertible Debt Funding- St...
Shareholders Agreement Template for Compulsorily Convertible Debt Funding- St...StartupSprouts.in
 
Lucknow Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Lucknow Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceLucknow Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Lucknow Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 
NEON LIGHT CITY pitch deck for the new PC game
NEON LIGHT CITY pitch deck for the new PC gameNEON LIGHT CITY pitch deck for the new PC game
NEON LIGHT CITY pitch deck for the new PC gametess51
 
Tirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Tirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceTirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Tirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 
Call girls in Andheri with phone number 9892124323
Call girls in Andheri with phone number 9892124323Call girls in Andheri with phone number 9892124323
Call girls in Andheri with phone number 9892124323Pooja Nehwal
 

Último (16)

Sangareddy Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Sangareddy Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceSangareddy Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Sangareddy Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verified
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verifiedConnaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verified
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verified
 
Karol Bagh, Delhi Call girls :8448380779 Model Escorts | 100% verified
Karol Bagh, Delhi Call girls :8448380779 Model Escorts | 100% verifiedKarol Bagh, Delhi Call girls :8448380779 Model Escorts | 100% verified
Karol Bagh, Delhi Call girls :8448380779 Model Escorts | 100% verified
 
Hyderabad Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Hyderabad Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceHyderabad Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Hyderabad Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
Dehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Dehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Dehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
Dàni Velvet Personal Brand Exploration (1).pptx
Dàni Velvet Personal Brand Exploration (1).pptxDàni Velvet Personal Brand Exploration (1).pptx
Dàni Velvet Personal Brand Exploration (1).pptx
 
Sohna Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Sohna Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceSohna Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Sohna Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
 
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
 
EV Electric Vehicle Startup Pitch Deck- StartupSprouts.in
EV Electric Vehicle Startup Pitch Deck- StartupSprouts.inEV Electric Vehicle Startup Pitch Deck- StartupSprouts.in
EV Electric Vehicle Startup Pitch Deck- StartupSprouts.in
 
Famedesired Project portfolio1 . Fullsail
Famedesired Project portfolio1 . FullsailFamedesired Project portfolio1 . Fullsail
Famedesired Project portfolio1 . Fullsail
 
Bangalore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Bangalore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceBangalore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Bangalore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
Shareholders Agreement Template for Compulsorily Convertible Debt Funding- St...
Shareholders Agreement Template for Compulsorily Convertible Debt Funding- St...Shareholders Agreement Template for Compulsorily Convertible Debt Funding- St...
Shareholders Agreement Template for Compulsorily Convertible Debt Funding- St...
 
Lucknow Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Lucknow Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceLucknow Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Lucknow Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
NEON LIGHT CITY pitch deck for the new PC game
NEON LIGHT CITY pitch deck for the new PC gameNEON LIGHT CITY pitch deck for the new PC game
NEON LIGHT CITY pitch deck for the new PC game
 
Tirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Tirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceTirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Tirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
Call girls in Andheri with phone number 9892124323
Call girls in Andheri with phone number 9892124323Call girls in Andheri with phone number 9892124323
Call girls in Andheri with phone number 9892124323
 

GDPR solutions (JS Event 28/2/18) | Greenlight Computers

  • 1. GDPR Compliance 2018 Gary Dodson 28th February 2018
  • 2. 30 minute GDPR Agenda • Who are Greenlight Computers? (1 slide) • GDPR Introduction & Facts (3 slides) • 7 Steps to Compliance (6 slides) – Data Architecture – Data Protection Officer – Privacy Impact Assessment • Wider Cyber Security (1 slide) • Useful tools & links (1 slide) • Practical Actions (3 slides)
  • 3. Greenlight Services 2018 Greenlight Computers Single Point of Service Desk Product Supply Practice IT Infrastructure Practice Cloud Solutions Practice Digital Marketing Practice Cyber Security Practice NEW 2018 Unified Communications IT Strategy & Outsourcing Consultancy People & Resourcing Centre Hardware Software Networking Peripherals Audio Visual Leasing Refurbished Broadband Networking/WIFI Cabling Servers Virtualisation User Computing Storage/Backup O365 Sharepoint CRM Intranet Extranet Collaboration App develop Backup/DR Instant Messaging VOIP Telephony WIFI CCTV Video Conference Digital Signage Data Protection GDPR Data Recovery Disaster Recovery Pen Testing Security Audit IT Governance Policy & Procedure SEO Google Manager Digital Benchmark Web Development Hosting Social Media Email Marketing Lead Generation Locations Alderley Park Manchester (HQ) University of Manchester Stevenage Bioscience Catalyst About Us Established 2006 18 Staff 200 ish clients Always learning
  • 4. GDPR Introduction & Facts On 25 May 2018 most processing of personal data by organisations will have to comply with the General Data Protection Regulation. Information Commissioners Office (ICO) website front page statement • GDPR has been adopted by UK despite BREXIT • GDPR non-compliance fine 4% of Turnover • GDPR is not just an IT thing • If you hold and process personal information about your clients, employees or suppliers, you are legally obliged to protect that information.
  • 5. GDPR is not just an IT thing • HR - will need to check that your terms of employment comply with GDPR & allow you to access the users company data • Finance – will need to ensure personal financial data is only retained as per internal procedure & GDPR • Management – will need to ensure your Data Protection policy is up to date & complies with GDPR • CCTV – is deemed as potentially sensitive data & if used should be included in policies • Paper Data – needs to be protected, not just digital
  • 6. GDPR - controller V processor • “data controller” means a person who (either alone or jointly) determines the purposes for which and the manner in which any personal data are to be processed • “data processor”, in relation to personal data, means any person (other than an employee of the data controller) who processes the data on behalf of the data controller. • “processing”, in relation to information or data means obtaining, recording or holding the information or data or carrying out any operation or set of operations on the information or data, including: a) organisation, adaptation or alteration of the information or data b) retrieval, consultation or use of the information or data c) disclosure of the information or data by transmission dissemination or otherwise making available d) alignment, combination, blocking, erasure or destruction of the information or data
  • 7. 7 Steps to GDPR Compliance 0. Read the ICO GDPR rules & registration 1. Complete a Data Audit (or have it done for you) 2. Review your Data Architecture 3. Review Responsibilities & Procedures 4. Data Protection Officer & Risk Register 5. Staff Training 6. Privacy Impact Assessments 7. Cyber Security
  • 8. Data Architecture All 21st century Directors need to be familiar with this term Firewall Router Shared data Non-sensitive Sensitive Selective secure access Need to know access All staff access 3rd Party Supplier/Partner/ Customer/Contractor Ideally, should not have access to sensitive data. It makes protection much harder. Treat Personal Data as securely as IP Data Segregated Filing Don’t hold personal sensitive data locally. It presents your biggest risk of a breach.
  • 9. Common Sense? An easy way to look at Data Protection is your Possessions Spare Change Wallet of Cash Valuable Jewellery Selective secure access Lock in a cupboard All family access Treat Personal Data as securely as Possessions In the Safe Its probably risky to carry your £10,000 necklace in your handbag!! So why hold sensitive data on your laptop?? You wouldn’t send your bank statement or house deeds as a paper aeroplane!! But do you send salary details to payroll unencrypted?? You outsource the responsibility for your Gold to the experts at the bank. Get the experts to protect your sensitive data securely in the Cloud??
  • 10. Data Protection Officer (DPO) The GDPR makes it a requirement that organisations appoint a data protection officer (DPO) in some circumstances. Under the GDPR, you must appoint a DPO if you: • are a public authority (except for courts acting in their judicial capacity); • carry out large scale systematic monitoring of individuals (for example, online behaviour tracking); or • carry out large scale processing of special categories of data or data relating to criminal convictions and offences. Any organisation is able to appoint a DPO. Regardless of whether the GDPR obliges you to appoint a DPO, you must ensure that your organisation has sufficient staff and skills to discharge your obligations under the GDPR. Greenlight recommends our clients appoint a DPO.
  • 11. Privacy Impact Assessments (PIA’s) ICO definition A PIA is a process which helps an organisation to identify and reduce the privacy risks of a project. An effective PIA will be used throughout the development and implementation of a project, using existing project management processes. A PIA enables an organisation to systematically and thoroughly analyse how a particular project or system will affect the privacy of the individuals involved. In essence this means you need to look at worst case scenarios & then plan to mitigate against them or stop the practice: e.g. CEO retains staff personal records on laptop & loses laptop e.g. 3rd party consultant is given access to your server but has no Anti- virus and a virus penetrates your server e.g. Disgruntled ex-employee asks to see their records & you find they are spread around the business
  • 12. GDPR – ICO Summary
  • 13. Cyber Security • GDPR compliance relies on Cyber Security discipline • Cyber Security is about minimising risk 5 Key questions • Do you have a Cyber Security Plan? • Do you budget for an annual Cyber Security audit & actions required? • When was your last audit/spot check? • Do you maintain a Cyber Security/GDPR risk register? • Do you educate your team on staying Cyber Safe? Your security is only as good as the weakest link A topic for next time?
  • 14. Useful links & tools ICO key page for SME’s on GDPR https://ico.org.uk/for-organisations/business/ National Cyber Security Centre https://www.ncsc.gov.uk/guidance/10-steps-cyber-security ISO27001 in user speak https://www.itgovernance.co.uk/iso27001 BSI train & accredit Auditors for ISO27001/9001 etc https://www.bsigroup.com/en-GB/Cyber-Security/ For a longer discussion or simple English garydodson@greenlightcomputers.co.uk 0792 630 8824 kris@greenlightcomputers.co.uk 0161 883 1685
  • 15. 1. GDPR Gap Analysis GDPR Gap Analysis Audit Start your GDPR compliance with benchmarking where you are now & what needs to change. This is GDPR gap analysis process flow and areas that we would focus on during assessment • GDPR scope, project resourcing and current DPA evaluation • Data Protection Governance and Awareness • Data Protection by Design • Document Review – policies, procedures and practices • Consent and Privacy Notice evaluation and compliance • Critical asset identification and evaluation • Personal Data identification and classification • Lawful basis for processing Personal Data • Information Management System and Personal Data flow • Information Security Roles and Responsibilities • Risk identifications, management and review • Individual Rights and Data subjects request • Data breach escalation and checklist • Information Technology Security • Information Communication Security - Network Security • Physical Security SME Audit packages start from £1500 for a GDPR Assessment Report, Risk Register & Action Recommendation Led by Greenlight Computers Cyber Security / ISO Lead Auditor - Kris Bednarczyk
  • 16. 2. GDPR User Risk View Risk View (NEW TECHNOLOGY) Audit tool to analyse data on your user devices & report risks of GDPR/IP/PCI leakages Using an agent on each device this tool: • Analyses data of all types on the user computer • Grades each item of data for non-compliance • Identifies data breach risks on the device • Creates a series of reports for the device • Creates an aggregated report for all devices • Provides a Risk dashboard Potentially really useful in a BYOD environment http://www.ddc-as.com/risk-view
  • 17. 3. ESET Endpoint Encryption ESET Endpoint Encryption De-risk a data breach by adopting encryption across the business https://www.eset.com/uk/business/endpoint-security/encryption/ Welcome Rob Fearnley from ESET, a Greenlight partner that spends all day protecting SME’s against Cyber Crime