SlideShare una empresa de Scribd logo
1 de 32
Descargar para leer sin conexión
Revising policies and procedures
under the new EU GDPR
Richard Campo, CISM
GRC Consultant
IT Governance Ltd
1 Sept 2016
www.itgovernance.co.uk
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Introduction
• Richard Campo
• GRC consultant
– Data protection and information security
– Lead auditor
– Lead ISO27001:2013 implementer
– GDPR compliance
– Enterprise risk management
2
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
IT Governance Ltd: GRC one-stop shop
All verticals, all sectors, all organisational sizes
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Agenda
• An overview of the regulatory landscape
• Territorial scope
• Remedies, liability and penalties
• Principles of the EU GDPR
• Policies - GDPR reference (Recital 78, Articles 4, 24, 39)
• What if we don’t have policies in place?
• What policies are required?
• How to develop a policy?
4
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
The nature of European law
• Two main types of legislation:
– Directives
º Require individual implementation in each Member State
º Implemented by the creation of national laws approved by the parliaments of
each Member State
º European Directive 95/46/EC is a directive
º UK Data Protection Act 1998
– Regulations
º Immediately applicable in each Member State
º Require no local implementing legislation
º EU GDPR is a regulation
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Article 99: Entry into force and
application
This Regulation shall be binding in its entirety and directly
applicable in all Member States.
KEY DATES
• On 8 April 2016 the Council adopted the Regulation.
• On 14 April 2016 the Regulation was adopted by the European Parliament.
• On 4 May 2016, the official text of the Regulation was published in the EU Official
Journal in all the official languages.
• The Regulation entered into force on 24 May 2016, and applies from 25 May 2018.
• http://ec.europa.eu/justice/data-protection/reform/index_en.htm
Final text of the Regulation: http://data.consilium.europa.eu/doc/document/ST-
5419-2016-REV-1/en/pdf
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
GDPR
The GDPR chapters:
1
• Chapter I: General provisions (Articles 1 - 4)
2
• Chapter II: Principles (Articles 5 - 11)
3
• Chapter III: Rights of the data subject (Articles 12 - 23)
4
• Chapter IV: Controller and processor (Articles 24 - 43)
5
• Chapter V: Transfer of personal data to third countries (Articles 44 - 50)
6
• Chapter VI: Independent supervisory authorities (Articles 51 - 59)
7
• Chapter VII: Cooperation and consistency (Articles 60 - 76)
8
• Chapter VIII: Remedies, liability and penalties (Articles 77 - 84)
9
• Chapter IX: Provisions relating to specific processing situations (Articles 85 - 91)
Data protection model
under GDPR
Information Commissioner’s Office (ICO)
(supervisory authority)
Data controller
(organisations)
Data subject
(individuals)
Data
processor
Third
countries
Third
parties
Duties
Rights
Disclosure?
Inform?
Security?
Guarantees?
Assessment
Enforcement
European Data Protection Board
Complaints
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Articles 1 – 3: Who and where?
• Natural person = a living individual
• Natural persons have rights associated with:
– The protection of personal data
– The protection of the processing personal data
– The unrestricted movement of personal data within the EU
• In material scope:
– Personal data that is processed wholly or partly by automated means
– Personal data that is part of a filing system, or intended to be
• The Regulation applies to controllers and processors in the EU,
irrespective of where processing takes place
• It applies to controllers not in the EU
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Remedies, liabilities and penalties
• Article 79: Right to an effective judicial remedy against a
controller or processor
– Judicial remedy where their rights have been infringed as a result of the
processing of personal data.
º In the courts of the Member State where the controller or processor has an establishment.
º In the courts of the Member State where the data subject habitually resides.
• Article 82: Right to compensation and liability
– Any person who has suffered material or non-material damage shall have the
right to receive compensation from the controller or processor.
– Controller involved in processing shall be liable for damage caused by
processing.
• Article 83: General conditions for imposing administrative fines
– Imposition of administrative fines will in each case be effective, proportionate and
dissuasive
º taking into account technical and organisational measures implemented;
– € 20,000,000 or, in case of an undertaking, 4% total worldwide annual
turnover in the preceding financial year (whichever is higher)
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Article 5: Principles – Personal data shall be:
1 • Processed lawfully, fairly and in a transparent manner
2 • Collected for specified, explicit and legitimate purposes
3 • Adequate, relevant and limited to what is necessary
4 • Accurate and, where necessary, kept up to date
5 • Retained only for as long as necessary
6 • Processed in an appropriate manner to maintain security
7.
• Accountability
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Recital 78 – Demonstrating compliance
“In order to be able to demonstrate compliance with this
Regulation, the controller should adopt internal policies and
implement measures which meet in particular the principles of
data protection by design and data protection by default.”
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Article 4 - Definitions (20)
‘Binding corporate rules’ means personal data protection
policies which are adhered to by a controller or processor
established on the territory of a Member State for transfers or a
set of transfers of personal data to a controller or processor in
one or more third countries within a group of undertakings, or
group of enterprises engaged in a joint economic activity.
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Article 24 – Responsibilities of the Data
Controller
Where proportionate in relation to processing
activities, measures shall include the
implementation of appropriate data protection
policies by the controller.
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Article 39 - Tasks of the data protection
officer
To monitor compliance with this Regulation,
with other Union or Member State data
protection provisions and with the policies of
the controller or processor in relation to the
protection of personal data.
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Article 13: Information to be provided where personal data
collected from the data subject
• When obtaining personal data, the controller shall provide the data
subject with all of the following information:
– the identity and contact details of the controller and their representative;
– the contact details of the data protection officer, where applicable;
– the purposes of the processing of as well as the legal basis for the processing;
– the legitimate interests pursued by the controller or by a third party;
– the recipients or categories of recipients of the personal data, if any;
– the fact that the controller intends to transfer personal data to a third country and
the existence of adequacy conditions.
What should a Privacy Policy include?
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
What should a Privacy Policy include?
Article 13: When obtaining personal data the controller shall
provide the data subject with the following further information to
ensure fair and transparent processing:
– the period of time that the data will be stored;
– the right to rectification, erasure, restriction, objection;
– the right to data portability;
– the right to withdraw consent at any time;
– the right to lodge a complaint with a supervisory authority;
– the consequences of the data subject failure to provide data;
– the existence of automated decision-making, including profiling, as well as the
anticipated consequences for the data subject.
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
What should a Privacy Policy include?
Article 14: Information to be provided where the personal data
have not been obtained from the data subject
• Where personal data has not been obtained directly from the data
subject:
– the identity and contact details of the controller and their representative;
– the contact details of the data protection officer, where applicable;
– the purposes as well as the legal basis of the processing;
– the categories of personal data concerned;
– the recipients of the personal data, where applicable;
– the fact that the controller intends to transfer personal data to a third country and
the existence of adequacy conditions.
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Data breaches in the UK
• January to March 2016 - 448 new cases
• Data breaches by sector
– Health (184)
– Local government (43)
– Education (36)
– General business (36)
– Finance, insurance and credit (25)
– Legal (25)
– Charitable and voluntary (23)
– Justice (18)
– Land or property services (17)
– Other (41)
Source: UK Information Commissioner’s Office
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Enforcement action - Principles
Count of enforcement
action against Principles
1 - Fairness &
Lawfulness, 2
3- Proportionality,
1
5 - Data
Retention, 4
6 - Rights of
individuals, 1
7 - Data Security,
58
Source: ICO
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Enforcement action - Reasons
Accidental theft or
loss of data,
8% Cyber attack,
5%
Inappropriate disposal
of data,
2%
Inappropriate
handling of data,
5%
Lack of training,
19%
Lack of sufficient
policy,
16%
Lack of sufficient
contract,
1%
Misdirected
communications,
10%
Processing not in line
with rights,
1%
Public disclosure of
sensitive data,
5%
Unencrypted storage
device lost/ stolen,
13%
Unlawful processing
of data,
2%
Excessive data held,
1%
Unsolicited
marketing,
12%
Source: ICO
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Enforcement action: Monetary penalties
Source: ICO
Unsolicited
marketing,
£610,000.00
Hack / cyber attack,
£450,000.00
Unencrypted data lost
or theft, £385,000.00
Misdirected
communications,
£315,000.00
Public data breach,
£310,000.00
Lack of training/
policy, £270,000.00
Unlawful retention &
inappropriate
disposal, £100,000.00
Inappropriate
disposal, £100,000.00
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
What is a policy?
• Policies are documents that define the objectives of
an organisation.
• A policy is a statement of intent.
• Procedures outline what people must do in order to
deliver the policy objectives.
• Guidelines provide advice on how to comply with
policies.
• Policies are generally adopted by the Board of or
senior governance body within an organisation.
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Documentation structure
1: Policy
(Board)
2: Procedures
(Executive)
3: Work instructions
(Operational)
4: Records
(All users and usages)
Setting the policy – strategic, high level,
relatively unchanging – board approved
Reflect principles and demonstrate board
accountability
Implementing the policy – setting out
business requirements, procedures and
processes – change infrequently but have
multiple overlaps and impacts on
operational activity and business behaviours
Making the policy work – detailed,
step-by-step descriptions of how
to perform individual tasks –
subject to regular review and
improvement
Records of what happened
– minutes, logs, reports,
etc – information about
how the ISMS is performing
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
What policies and procedures are
required?
Data protection
policy
Information security
policy
Public trust charter
Document and record
control policy
Subject access
procedures
Complaints
procedures
Information notices
procedures
Enforcement notices
procedures
Risk management
strategy
Security policies and
procedures
Data quality
procedures
Data retention and
archive procedures
Information
management policy
Data disposal
procedures
System/data-specific
procedures
Data collection
procedures
fair/lawful/adequate
Data use procedures
Third-party exchange
agreements
Notification
procedures
Training and
awareness
programme
Audit and
compliance policy
Internal audit
procedures
Due diligence and
third parties audit
procedures
Compliance
standards
Data processor
standards and
agreements
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Steps to develop a policy?
Step 1: Identify the policy objectives
Identify the needs and expectations of interested parties that should
inform the policy.
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Steps to develop a policy?
Step 2: Develop a policy framework
The policy framework should have a few high-level policies that
inform the more granular components such as procedures and
processes.
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Steps to develop a policy?
Step 3: Communicate and enforce the policies.
Communication should apply to all those within the scope of the
policy. Audit the policies’ effectiveness.
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Steps to develop a policy?
Step 4: Review and update the policies
Policies shouldn’t change too often, but they are living documents
and require periodic reviews to keep them relevant.
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
GDPR - Summary
• Complete overhaul of data protection framework
– Covers all forms of PII, including biometric, genetic and location data
• Applies across all member states of the European Union
• Applies to all organisations processing the data of EU residents –
wherever those organisations are geographically based
• Specific requirements around rights of data subjects, obligations on
controllers and processors, including privacy by design
• Administrative penalties for breach up to 4% revenue or €20 million
– Intended to be “dissuasive”
• Data subjects have a right to bring actions (in their home state) and to
receive damages if their human rights have been breached (“Right to
an effective judicial remedy against a controller or processor”)
• Fines to take into account “the technical and organisational measures
implemented…”
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
IT Governance: GDPR one-stop shop
• Accredited training – 1-Day Foundation Course
– London OR Cambridge: www.itgovernance.co.uk/shop/p-1795-certified-eu-
general-data-protection-regulation-foundation-gdpr-training-course.aspx
– ONLINE www.itgovernance.co.uk/shop/p-1834-certified-eu-general-data-
protection-regulation-foundation-gdpr-online-training-course.aspx
• Practitioner course, classroom or online
– www.itgovernance.co.uk/shop/p-1824-certified-eu-general-data-protection-
regulation-practitioner-gdpr-training-course.aspx
• Pocket guide www.itgovernance.co.uk/shop/p-1830-eu-gdpr-a-pocket-guide.aspx
• Documentation toolkit www.itgovernance.co.uk/shop/p-1796-eu-general-data-
protection-regulation-gdpr-documentation-toolkit.aspx
• Consultancy support
– Data audit
– Transition/implementation consultancy
– www.itgovernance.co.uk/dpa-compliance-consultancy.aspx
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Questions?
rcampo@itgovernance.co.uk
0845 070 1750
www.itgovernance.co.uk

Más contenido relacionado

La actualidad más candente

GDPR: Requirements for Cloud Providers
GDPR: Requirements for Cloud ProvidersGDPR: Requirements for Cloud Providers
GDPR: Requirements for Cloud ProvidersIT Governance Ltd
 
NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...IT Governance Ltd
 
Datum DPO outsourced May 2016
Datum DPO outsourced May 2016Datum DPO outsourced May 2016
Datum DPO outsourced May 2016Mark Honeyball
 
Privacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failingPrivacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failingIT Governance Ltd
 
The first steps towards GDPR compliance 
The first steps towards GDPR compliance The first steps towards GDPR compliance 
The first steps towards GDPR compliance IT Governance Ltd
 
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...IT Governance Ltd
 
EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?VYTIS MALECKAS
 
Regulation (EU) 2016_679_GDPR_Overview_June 2016
Regulation (EU) 2016_679_GDPR_Overview_June 2016Regulation (EU) 2016_679_GDPR_Overview_June 2016
Regulation (EU) 2016_679_GDPR_Overview_June 2016John Greenwood
 
Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRIT Governance Ltd
 
The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...IT Governance Ltd
 
Sophie's Privacy - a story about GDPR
Sophie's Privacy - a story about GDPRSophie's Privacy - a story about GDPR
Sophie's Privacy - a story about GDPRHans Demeyer
 
The GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for complianceThe GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for complianceIT Governance Ltd
 
GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017isc2-hellenic
 
The Essential Guide to GDPR
The Essential Guide to GDPRThe Essential Guide to GDPR
The Essential Guide to GDPRTim Hyman LLB
 
Preparing for general data protection regulations (gdpr) within the hous...
Preparing for general data protection regulations (gdpr) within the hous...Preparing for general data protection regulations (gdpr) within the hous...
Preparing for general data protection regulations (gdpr) within the hous...Stephanie Vasey
 

La actualidad más candente (20)

GDPR: Requirements for Cloud Providers
GDPR: Requirements for Cloud ProvidersGDPR: Requirements for Cloud Providers
GDPR: Requirements for Cloud Providers
 
NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...
 
Datum DPO outsourced May 2016
Datum DPO outsourced May 2016Datum DPO outsourced May 2016
Datum DPO outsourced May 2016
 
Privacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failingPrivacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failing
 
The first steps towards GDPR compliance 
The first steps towards GDPR compliance The first steps towards GDPR compliance 
The first steps towards GDPR compliance 
 
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
 
EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?
 
Regulation (EU) 2016_679_GDPR_Overview_June 2016
Regulation (EU) 2016_679_GDPR_Overview_June 2016Regulation (EU) 2016_679_GDPR_Overview_June 2016
Regulation (EU) 2016_679_GDPR_Overview_June 2016
 
Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPR
 
The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...
 
Sophie's Privacy - a story about GDPR
Sophie's Privacy - a story about GDPRSophie's Privacy - a story about GDPR
Sophie's Privacy - a story about GDPR
 
The GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for complianceThe GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for compliance
 
GDPRR: The Key Changes
GDPRR: The Key ChangesGDPRR: The Key Changes
GDPRR: The Key Changes
 
GDPR: Key Article Overview
GDPR: Key Article OverviewGDPR: Key Article Overview
GDPR: Key Article Overview
 
GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017
 
The Essential Guide to GDPR
The Essential Guide to GDPRThe Essential Guide to GDPR
The Essential Guide to GDPR
 
GDPR 11/1/2017
GDPR 11/1/2017GDPR 11/1/2017
GDPR 11/1/2017
 
Preparing for general data protection regulations (gdpr) within the hous...
Preparing for general data protection regulations (gdpr) within the hous...Preparing for general data protection regulations (gdpr) within the hous...
Preparing for general data protection regulations (gdpr) within the hous...
 
The GDPR for Techies
The GDPR for TechiesThe GDPR for Techies
The GDPR for Techies
 
20170323 are you ready the new gdpr is here
20170323 are you ready the new gdpr is here20170323 are you ready the new gdpr is here
20170323 are you ready the new gdpr is here
 

Destacado

Protecting privacy in practice
Protecting privacy in practiceProtecting privacy in practice
Protecting privacy in practiceLars Albertsson
 
Tomáš Ervín Dombrovský: Pohyb ve světě (práce)
Tomáš Ervín Dombrovský: Pohyb ve světě (práce)Tomáš Ervín Dombrovský: Pohyb ve světě (práce)
Tomáš Ervín Dombrovský: Pohyb ve světě (práce)Tomáš Hajzler
 
Data Governance: Keystone of Information Management Initiatives
Data Governance: Keystone of Information Management InitiativesData Governance: Keystone of Information Management Initiatives
Data Governance: Keystone of Information Management InitiativesAlan McSweeney
 
Tomáš Hajzler: Přednáška Nová práce @ Teal Club
Tomáš Hajzler: Přednáška Nová práce @ Teal ClubTomáš Hajzler: Přednáška Nová práce @ Teal Club
Tomáš Hajzler: Přednáška Nová práce @ Teal ClubTomáš Hajzler
 
Test strategies for data processing pipelines, v2.0
Test strategies for data processing pipelines, v2.0Test strategies for data processing pipelines, v2.0
Test strategies for data processing pipelines, v2.0Lars Albertsson
 

Destacado (6)

Protecting privacy in practice
Protecting privacy in practiceProtecting privacy in practice
Protecting privacy in practice
 
GDPR for Dummies
GDPR for DummiesGDPR for Dummies
GDPR for Dummies
 
Tomáš Ervín Dombrovský: Pohyb ve světě (práce)
Tomáš Ervín Dombrovský: Pohyb ve světě (práce)Tomáš Ervín Dombrovský: Pohyb ve světě (práce)
Tomáš Ervín Dombrovský: Pohyb ve světě (práce)
 
Data Governance: Keystone of Information Management Initiatives
Data Governance: Keystone of Information Management InitiativesData Governance: Keystone of Information Management Initiatives
Data Governance: Keystone of Information Management Initiatives
 
Tomáš Hajzler: Přednáška Nová práce @ Teal Club
Tomáš Hajzler: Přednáška Nová práce @ Teal ClubTomáš Hajzler: Přednáška Nová práce @ Teal Club
Tomáš Hajzler: Přednáška Nová práce @ Teal Club
 
Test strategies for data processing pipelines, v2.0
Test strategies for data processing pipelines, v2.0Test strategies for data processing pipelines, v2.0
Test strategies for data processing pipelines, v2.0
 

Similar a Revising policies and procedures under the new EU GDPR

Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRIT Governance Ltd
 
Data transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPRData transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPRIT Governance Ltd
 
General Data Protection Regulations (GDPR) Summary
General Data Protection Regulations (GDPR) Summary General Data Protection Regulations (GDPR) Summary
General Data Protection Regulations (GDPR) Summary Compliance3
 
"Legal tips and compliance requirements" - Anastasia Botsi, ICT Legal
"Legal tips and compliance requirements" - Anastasia Botsi, ICT Legal"Legal tips and compliance requirements" - Anastasia Botsi, ICT Legal
"Legal tips and compliance requirements" - Anastasia Botsi, ICT LegalCyber Watching
 
The General Data Protection Regulation ("GDPR")
The General Data Protection Regulation ("GDPR")The General Data Protection Regulation ("GDPR")
The General Data Protection Regulation ("GDPR")Parsons Behle & Latimer
 
GDPR: The Catalyst for Customer 360
GDPR: The Catalyst for Customer 360GDPR: The Catalyst for Customer 360
GDPR: The Catalyst for Customer 360DataStax
 
EU GDPR(general data protection regulation)
EU GDPR(general data protection regulation)EU GDPR(general data protection regulation)
EU GDPR(general data protection regulation)RAKESH S
 
GDPR – what does it mean for charities and what you need to consider - Iain P...
GDPR – what does it mean for charities and what you need to consider - Iain P...GDPR – what does it mean for charities and what you need to consider - Iain P...
GDPR – what does it mean for charities and what you need to consider - Iain P...m-hance
 
GDPR - Context, Principles, Implementation, Operation, Impact on Outsourcing,...
GDPR - Context, Principles, Implementation, Operation, Impact on Outsourcing,...GDPR - Context, Principles, Implementation, Operation, Impact on Outsourcing,...
GDPR - Context, Principles, Implementation, Operation, Impact on Outsourcing,...Alan McSweeney
 
An Overview of GDPR by Pathway Group
An Overview of GDPR by Pathway GroupAn Overview of GDPR by Pathway Group
An Overview of GDPR by Pathway GroupThe Pathway Group
 
CyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPRCyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPRIryna Chekanava
 
GDPR: Are you Ready?
GDPR: Are you Ready?GDPR: Are you Ready?
GDPR: Are you Ready?EngageHub
 
Privacy Laws in Europe
Privacy Laws in EuropePrivacy Laws in Europe
Privacy Laws in EuropeMartyn Ripley
 
CyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRCyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRShadi A. Razak
 
Data Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your businessData Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your businessEversheds Sutherland
 
General Data Protection Regulation (GDPR) for Identity Architects
General Data Protection Regulation (GDPR) for Identity ArchitectsGeneral Data Protection Regulation (GDPR) for Identity Architects
General Data Protection Regulation (GDPR) for Identity ArchitectsWSO2
 
SCCE Processors and GDPR
SCCE Processors and GDPRSCCE Processors and GDPR
SCCE Processors and GDPRRobert Bond
 
The GDPR: What About Data Stored or Transmitted Outside the EU?
The GDPR: What About Data Stored or Transmitted Outside the EU?The GDPR: What About Data Stored or Transmitted Outside the EU?
The GDPR: What About Data Stored or Transmitted Outside the EU?TAG Alliances
 
The Future of the Modern Workplace Event 2019 - Data Security and Protection
The Future of the Modern Workplace Event 2019 - Data Security and ProtectionThe Future of the Modern Workplace Event 2019 - Data Security and Protection
The Future of the Modern Workplace Event 2019 - Data Security and ProtectionAtlas_Cloud
 

Similar a Revising policies and procedures under the new EU GDPR (20)

Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPR
 
Data transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPRData transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPR
 
General Data Protection Regulations (GDPR) Summary
General Data Protection Regulations (GDPR) Summary General Data Protection Regulations (GDPR) Summary
General Data Protection Regulations (GDPR) Summary
 
"Legal tips and compliance requirements" - Anastasia Botsi, ICT Legal
"Legal tips and compliance requirements" - Anastasia Botsi, ICT Legal"Legal tips and compliance requirements" - Anastasia Botsi, ICT Legal
"Legal tips and compliance requirements" - Anastasia Botsi, ICT Legal
 
The General Data Protection Regulation ("GDPR")
The General Data Protection Regulation ("GDPR")The General Data Protection Regulation ("GDPR")
The General Data Protection Regulation ("GDPR")
 
GDPR: The Catalyst for Customer 360
GDPR: The Catalyst for Customer 360GDPR: The Catalyst for Customer 360
GDPR: The Catalyst for Customer 360
 
EU GDPR(general data protection regulation)
EU GDPR(general data protection regulation)EU GDPR(general data protection regulation)
EU GDPR(general data protection regulation)
 
GDPR – what does it mean for charities and what you need to consider - Iain P...
GDPR – what does it mean for charities and what you need to consider - Iain P...GDPR – what does it mean for charities and what you need to consider - Iain P...
GDPR – what does it mean for charities and what you need to consider - Iain P...
 
GDPR - Context, Principles, Implementation, Operation, Impact on Outsourcing,...
GDPR - Context, Principles, Implementation, Operation, Impact on Outsourcing,...GDPR - Context, Principles, Implementation, Operation, Impact on Outsourcing,...
GDPR - Context, Principles, Implementation, Operation, Impact on Outsourcing,...
 
An Overview of GDPR
An Overview of GDPR An Overview of GDPR
An Overview of GDPR
 
An Overview of GDPR by Pathway Group
An Overview of GDPR by Pathway GroupAn Overview of GDPR by Pathway Group
An Overview of GDPR by Pathway Group
 
CyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPRCyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPR
 
GDPR: Are you Ready?
GDPR: Are you Ready?GDPR: Are you Ready?
GDPR: Are you Ready?
 
Privacy Laws in Europe
Privacy Laws in EuropePrivacy Laws in Europe
Privacy Laws in Europe
 
CyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRCyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPR
 
Data Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your businessData Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your business
 
General Data Protection Regulation (GDPR) for Identity Architects
General Data Protection Regulation (GDPR) for Identity ArchitectsGeneral Data Protection Regulation (GDPR) for Identity Architects
General Data Protection Regulation (GDPR) for Identity Architects
 
SCCE Processors and GDPR
SCCE Processors and GDPRSCCE Processors and GDPR
SCCE Processors and GDPR
 
The GDPR: What About Data Stored or Transmitted Outside the EU?
The GDPR: What About Data Stored or Transmitted Outside the EU?The GDPR: What About Data Stored or Transmitted Outside the EU?
The GDPR: What About Data Stored or Transmitted Outside the EU?
 
The Future of the Modern Workplace Event 2019 - Data Security and Protection
The Future of the Modern Workplace Event 2019 - Data Security and ProtectionThe Future of the Modern Workplace Event 2019 - Data Security and Protection
The Future of the Modern Workplace Event 2019 - Data Security and Protection
 

Más de IT Governance Ltd

GDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risksGDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risksIT Governance Ltd
 
Business Continuity Management: How to get started
Business Continuity Management: How to get startedBusiness Continuity Management: How to get started
Business Continuity Management: How to get startedIT Governance Ltd
 
Staff awareness: developing a security culture
Staff awareness: developing a security cultureStaff awareness: developing a security culture
Staff awareness: developing a security cultureIT Governance Ltd
 
GDPR compliance: getting everyone in the organisation on board
GDPR compliance: getting everyone in the organisation on boardGDPR compliance: getting everyone in the organisation on board
GDPR compliance: getting everyone in the organisation on boardIT Governance Ltd
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceIT Governance Ltd
 
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...IT Governance Ltd
 
Creating an effective cyber security awareness programme
Creating an effective cyber security awareness programmeCreating an effective cyber security awareness programme
Creating an effective cyber security awareness programmeIT Governance Ltd
 
Risk assessments and applying organisational controls for GDPR compliance
Risk assessments and applying organisational controls for GDPR complianceRisk assessments and applying organisational controls for GDPR compliance
Risk assessments and applying organisational controls for GDPR complianceIT Governance Ltd
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...IT Governance Ltd
 
Addressing penetration testing and vulnerabilities, and adding verification m...
Addressing penetration testing and vulnerabilities, and adding verification m...Addressing penetration testing and vulnerabilities, and adding verification m...
Addressing penetration testing and vulnerabilities, and adding verification m...IT Governance Ltd
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurityIT Governance Ltd
 
Using international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityUsing international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityIT Governance Ltd
 
Using international standards to improve EU cyber security
Using international standards to improve EU cyber securityUsing international standards to improve EU cyber security
Using international standards to improve EU cyber securityIT Governance Ltd
 
Implementing PCI DSS v 2.0 and v 3.0
Implementing PCI DSS v 2.0 and v 3.0Implementing PCI DSS v 2.0 and v 3.0
Implementing PCI DSS v 2.0 and v 3.0IT Governance Ltd
 

Más de IT Governance Ltd (14)

GDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risksGDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risks
 
Business Continuity Management: How to get started
Business Continuity Management: How to get startedBusiness Continuity Management: How to get started
Business Continuity Management: How to get started
 
Staff awareness: developing a security culture
Staff awareness: developing a security cultureStaff awareness: developing a security culture
Staff awareness: developing a security culture
 
GDPR compliance: getting everyone in the organisation on board
GDPR compliance: getting everyone in the organisation on boardGDPR compliance: getting everyone in the organisation on board
GDPR compliance: getting everyone in the organisation on board
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to compliance
 
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
 
Creating an effective cyber security awareness programme
Creating an effective cyber security awareness programmeCreating an effective cyber security awareness programme
Creating an effective cyber security awareness programme
 
Risk assessments and applying organisational controls for GDPR compliance
Risk assessments and applying organisational controls for GDPR complianceRisk assessments and applying organisational controls for GDPR compliance
Risk assessments and applying organisational controls for GDPR compliance
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...
 
Addressing penetration testing and vulnerabilities, and adding verification m...
Addressing penetration testing and vulnerabilities, and adding verification m...Addressing penetration testing and vulnerabilities, and adding verification m...
Addressing penetration testing and vulnerabilities, and adding verification m...
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurity
 
Using international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityUsing international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber security
 
Using international standards to improve EU cyber security
Using international standards to improve EU cyber securityUsing international standards to improve EU cyber security
Using international standards to improve EU cyber security
 
Implementing PCI DSS v 2.0 and v 3.0
Implementing PCI DSS v 2.0 and v 3.0Implementing PCI DSS v 2.0 and v 3.0
Implementing PCI DSS v 2.0 and v 3.0
 

Último

Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifeBhavana Pujan Kendra
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxappkodes
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamArik Fletcher
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfJamesConcepcion7
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryEffective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryWhittensFineJewelry1
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...ssuserf63bd7
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsIndiaMART InterMESH Limited
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerAggregage
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOne Monitar
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdfMintel Group
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdfChris Skinner
 
BAILMENT & PLEDGE business law notes.pptx
BAILMENT & PLEDGE business law notes.pptxBAILMENT & PLEDGE business law notes.pptx
BAILMENT & PLEDGE business law notes.pptxran17april2001
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...SOFTTECHHUB
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...Hector Del Castillo, CPM, CPMM
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckHajeJanKamps
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...ssuserf63bd7
 

Último (20)

Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in Life
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptx
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management Team
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdf
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryEffective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan Dynamics
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon Harmer
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
 
BAILMENT & PLEDGE business law notes.pptx
BAILMENT & PLEDGE business law notes.pptxBAILMENT & PLEDGE business law notes.pptx
BAILMENT & PLEDGE business law notes.pptx
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deck
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
 

Revising policies and procedures under the new EU GDPR

  • 1. Revising policies and procedures under the new EU GDPR Richard Campo, CISM GRC Consultant IT Governance Ltd 1 Sept 2016 www.itgovernance.co.uk
  • 2. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Introduction • Richard Campo • GRC consultant – Data protection and information security – Lead auditor – Lead ISO27001:2013 implementer – GDPR compliance – Enterprise risk management 2
  • 3. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 IT Governance Ltd: GRC one-stop shop All verticals, all sectors, all organisational sizes
  • 4. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Agenda • An overview of the regulatory landscape • Territorial scope • Remedies, liability and penalties • Principles of the EU GDPR • Policies - GDPR reference (Recital 78, Articles 4, 24, 39) • What if we don’t have policies in place? • What policies are required? • How to develop a policy? 4
  • 5. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 The nature of European law • Two main types of legislation: – Directives º Require individual implementation in each Member State º Implemented by the creation of national laws approved by the parliaments of each Member State º European Directive 95/46/EC is a directive º UK Data Protection Act 1998 – Regulations º Immediately applicable in each Member State º Require no local implementing legislation º EU GDPR is a regulation
  • 6. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Article 99: Entry into force and application This Regulation shall be binding in its entirety and directly applicable in all Member States. KEY DATES • On 8 April 2016 the Council adopted the Regulation. • On 14 April 2016 the Regulation was adopted by the European Parliament. • On 4 May 2016, the official text of the Regulation was published in the EU Official Journal in all the official languages. • The Regulation entered into force on 24 May 2016, and applies from 25 May 2018. • http://ec.europa.eu/justice/data-protection/reform/index_en.htm Final text of the Regulation: http://data.consilium.europa.eu/doc/document/ST- 5419-2016-REV-1/en/pdf
  • 7. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 GDPR The GDPR chapters: 1 • Chapter I: General provisions (Articles 1 - 4) 2 • Chapter II: Principles (Articles 5 - 11) 3 • Chapter III: Rights of the data subject (Articles 12 - 23) 4 • Chapter IV: Controller and processor (Articles 24 - 43) 5 • Chapter V: Transfer of personal data to third countries (Articles 44 - 50) 6 • Chapter VI: Independent supervisory authorities (Articles 51 - 59) 7 • Chapter VII: Cooperation and consistency (Articles 60 - 76) 8 • Chapter VIII: Remedies, liability and penalties (Articles 77 - 84) 9 • Chapter IX: Provisions relating to specific processing situations (Articles 85 - 91)
  • 8. Data protection model under GDPR Information Commissioner’s Office (ICO) (supervisory authority) Data controller (organisations) Data subject (individuals) Data processor Third countries Third parties Duties Rights Disclosure? Inform? Security? Guarantees? Assessment Enforcement European Data Protection Board Complaints
  • 9. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Articles 1 – 3: Who and where? • Natural person = a living individual • Natural persons have rights associated with: – The protection of personal data – The protection of the processing personal data – The unrestricted movement of personal data within the EU • In material scope: – Personal data that is processed wholly or partly by automated means – Personal data that is part of a filing system, or intended to be • The Regulation applies to controllers and processors in the EU, irrespective of where processing takes place • It applies to controllers not in the EU
  • 10. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Remedies, liabilities and penalties • Article 79: Right to an effective judicial remedy against a controller or processor – Judicial remedy where their rights have been infringed as a result of the processing of personal data. º In the courts of the Member State where the controller or processor has an establishment. º In the courts of the Member State where the data subject habitually resides. • Article 82: Right to compensation and liability – Any person who has suffered material or non-material damage shall have the right to receive compensation from the controller or processor. – Controller involved in processing shall be liable for damage caused by processing. • Article 83: General conditions for imposing administrative fines – Imposition of administrative fines will in each case be effective, proportionate and dissuasive º taking into account technical and organisational measures implemented; – € 20,000,000 or, in case of an undertaking, 4% total worldwide annual turnover in the preceding financial year (whichever is higher)
  • 11. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Article 5: Principles – Personal data shall be: 1 • Processed lawfully, fairly and in a transparent manner 2 • Collected for specified, explicit and legitimate purposes 3 • Adequate, relevant and limited to what is necessary 4 • Accurate and, where necessary, kept up to date 5 • Retained only for as long as necessary 6 • Processed in an appropriate manner to maintain security 7. • Accountability
  • 12. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Recital 78 – Demonstrating compliance “In order to be able to demonstrate compliance with this Regulation, the controller should adopt internal policies and implement measures which meet in particular the principles of data protection by design and data protection by default.”
  • 13. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Article 4 - Definitions (20) ‘Binding corporate rules’ means personal data protection policies which are adhered to by a controller or processor established on the territory of a Member State for transfers or a set of transfers of personal data to a controller or processor in one or more third countries within a group of undertakings, or group of enterprises engaged in a joint economic activity.
  • 14. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Article 24 – Responsibilities of the Data Controller Where proportionate in relation to processing activities, measures shall include the implementation of appropriate data protection policies by the controller.
  • 15. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Article 39 - Tasks of the data protection officer To monitor compliance with this Regulation, with other Union or Member State data protection provisions and with the policies of the controller or processor in relation to the protection of personal data.
  • 16. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Article 13: Information to be provided where personal data collected from the data subject • When obtaining personal data, the controller shall provide the data subject with all of the following information: – the identity and contact details of the controller and their representative; – the contact details of the data protection officer, where applicable; – the purposes of the processing of as well as the legal basis for the processing; – the legitimate interests pursued by the controller or by a third party; – the recipients or categories of recipients of the personal data, if any; – the fact that the controller intends to transfer personal data to a third country and the existence of adequacy conditions. What should a Privacy Policy include?
  • 17. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 What should a Privacy Policy include? Article 13: When obtaining personal data the controller shall provide the data subject with the following further information to ensure fair and transparent processing: – the period of time that the data will be stored; – the right to rectification, erasure, restriction, objection; – the right to data portability; – the right to withdraw consent at any time; – the right to lodge a complaint with a supervisory authority; – the consequences of the data subject failure to provide data; – the existence of automated decision-making, including profiling, as well as the anticipated consequences for the data subject.
  • 18. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 What should a Privacy Policy include? Article 14: Information to be provided where the personal data have not been obtained from the data subject • Where personal data has not been obtained directly from the data subject: – the identity and contact details of the controller and their representative; – the contact details of the data protection officer, where applicable; – the purposes as well as the legal basis of the processing; – the categories of personal data concerned; – the recipients of the personal data, where applicable; – the fact that the controller intends to transfer personal data to a third country and the existence of adequacy conditions.
  • 19. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Data breaches in the UK • January to March 2016 - 448 new cases • Data breaches by sector – Health (184) – Local government (43) – Education (36) – General business (36) – Finance, insurance and credit (25) – Legal (25) – Charitable and voluntary (23) – Justice (18) – Land or property services (17) – Other (41) Source: UK Information Commissioner’s Office
  • 20. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Enforcement action - Principles Count of enforcement action against Principles 1 - Fairness & Lawfulness, 2 3- Proportionality, 1 5 - Data Retention, 4 6 - Rights of individuals, 1 7 - Data Security, 58 Source: ICO
  • 21. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Enforcement action - Reasons Accidental theft or loss of data, 8% Cyber attack, 5% Inappropriate disposal of data, 2% Inappropriate handling of data, 5% Lack of training, 19% Lack of sufficient policy, 16% Lack of sufficient contract, 1% Misdirected communications, 10% Processing not in line with rights, 1% Public disclosure of sensitive data, 5% Unencrypted storage device lost/ stolen, 13% Unlawful processing of data, 2% Excessive data held, 1% Unsolicited marketing, 12% Source: ICO
  • 22. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Enforcement action: Monetary penalties Source: ICO Unsolicited marketing, £610,000.00 Hack / cyber attack, £450,000.00 Unencrypted data lost or theft, £385,000.00 Misdirected communications, £315,000.00 Public data breach, £310,000.00 Lack of training/ policy, £270,000.00 Unlawful retention & inappropriate disposal, £100,000.00 Inappropriate disposal, £100,000.00
  • 23. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 What is a policy? • Policies are documents that define the objectives of an organisation. • A policy is a statement of intent. • Procedures outline what people must do in order to deliver the policy objectives. • Guidelines provide advice on how to comply with policies. • Policies are generally adopted by the Board of or senior governance body within an organisation.
  • 24. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Documentation structure 1: Policy (Board) 2: Procedures (Executive) 3: Work instructions (Operational) 4: Records (All users and usages) Setting the policy – strategic, high level, relatively unchanging – board approved Reflect principles and demonstrate board accountability Implementing the policy – setting out business requirements, procedures and processes – change infrequently but have multiple overlaps and impacts on operational activity and business behaviours Making the policy work – detailed, step-by-step descriptions of how to perform individual tasks – subject to regular review and improvement Records of what happened – minutes, logs, reports, etc – information about how the ISMS is performing
  • 25. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 What policies and procedures are required? Data protection policy Information security policy Public trust charter Document and record control policy Subject access procedures Complaints procedures Information notices procedures Enforcement notices procedures Risk management strategy Security policies and procedures Data quality procedures Data retention and archive procedures Information management policy Data disposal procedures System/data-specific procedures Data collection procedures fair/lawful/adequate Data use procedures Third-party exchange agreements Notification procedures Training and awareness programme Audit and compliance policy Internal audit procedures Due diligence and third parties audit procedures Compliance standards Data processor standards and agreements
  • 26. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Steps to develop a policy? Step 1: Identify the policy objectives Identify the needs and expectations of interested parties that should inform the policy.
  • 27. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Steps to develop a policy? Step 2: Develop a policy framework The policy framework should have a few high-level policies that inform the more granular components such as procedures and processes.
  • 28. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Steps to develop a policy? Step 3: Communicate and enforce the policies. Communication should apply to all those within the scope of the policy. Audit the policies’ effectiveness.
  • 29. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Steps to develop a policy? Step 4: Review and update the policies Policies shouldn’t change too often, but they are living documents and require periodic reviews to keep them relevant.
  • 30. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 GDPR - Summary • Complete overhaul of data protection framework – Covers all forms of PII, including biometric, genetic and location data • Applies across all member states of the European Union • Applies to all organisations processing the data of EU residents – wherever those organisations are geographically based • Specific requirements around rights of data subjects, obligations on controllers and processors, including privacy by design • Administrative penalties for breach up to 4% revenue or €20 million – Intended to be “dissuasive” • Data subjects have a right to bring actions (in their home state) and to receive damages if their human rights have been breached (“Right to an effective judicial remedy against a controller or processor”) • Fines to take into account “the technical and organisational measures implemented…”
  • 31. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 IT Governance: GDPR one-stop shop • Accredited training – 1-Day Foundation Course – London OR Cambridge: www.itgovernance.co.uk/shop/p-1795-certified-eu- general-data-protection-regulation-foundation-gdpr-training-course.aspx – ONLINE www.itgovernance.co.uk/shop/p-1834-certified-eu-general-data- protection-regulation-foundation-gdpr-online-training-course.aspx • Practitioner course, classroom or online – www.itgovernance.co.uk/shop/p-1824-certified-eu-general-data-protection- regulation-practitioner-gdpr-training-course.aspx • Pocket guide www.itgovernance.co.uk/shop/p-1830-eu-gdpr-a-pocket-guide.aspx • Documentation toolkit www.itgovernance.co.uk/shop/p-1796-eu-general-data- protection-regulation-gdpr-documentation-toolkit.aspx • Consultancy support – Data audit – Transition/implementation consultancy – www.itgovernance.co.uk/dpa-compliance-consultancy.aspx
  • 32. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Questions? rcampo@itgovernance.co.uk 0845 070 1750 www.itgovernance.co.uk