SlideShare una empresa de Scribd logo
1 de 11
Descargar para leer sin conexión
GDPR
The new era
of data protection
www.wearesegment.com
3
GDPR: THE NEW ERA OF DATA PROTECTION
There are only two types of companies:
those that have been hacked
and those that will be hacked.
Robert Mueller - FBI Director, 2012
INDEX
BRIEFLY
GDPR regulation	4
GDPR subject 	 5
Personal data	 6
Specific categories of sensitive data	 7
Data handling process	 8
Key concepts	 10
Corporate vision on privacy	 12
WHO MUST BE INVOLVED
IT security	 14
OUR SOLUTION
Proarx the future of data protection	 16
4 5
GDPR: THE NEW ERA OF DATA PROTECTION GDPR: THE NEW ERA OF DATA PROTECTION
IN SHORT
GDPR SUBJECT
The new regulation explicitly proclaims the safeguard to the
right of personal data protection, interpreted as a fundamental
right of the individuals, under art. 1 par. 2.
Personal data represents the technical-juridical instrument
through which the whole of the rights linked to the personal
identity are protected.
Personal data is a dynamic concept, which always needs to
be referred to the framework it has to do with, that is: if an
isolated piece of information can not lead to the identification
of somebody, the fact that that fragment of info can be used
for the very identification through its crossing with other
data, determines the nature of “personal detail” of it.
Besides, it is not necessary that the information were able to
physically identify the person to be considered personal data.
Within the macro category of personal data, 3 more
significant types of data are outlined:
•	 Identifying, which allow direct identification (e.g. personal
details - name and surname - pictures...)
•	 Sensitive, so-called in the previous legislation - revealing
racial and ethnic origin, religious, philosophical or other
beliefs, political opinions; parties, unions, associations
or religious organizations membership - with the new
regulation it has emerged the importance of genetic data
- to identify the state of health and/or sexual history - and
biometric data - e.g. a group of photos uploaded online with
the unique aim of recognizing somebody, such as at the
airports where images of the individuals are scanned for
identification
•	 Judicial, indicating the existence of certain judicial
measures subject to registration in the criminal record (e.g.
final penal sentence, probation, prohibition or obligation
of residence, alternative measures to detention - or the
position of defendant or suspected).
The GDPR gives considerable importance to personal data and
to specific categories of personal data, namely those subject
to special processing.
IN SHORT
GDPR REGULATION
Published in the European Official Journal on May 4 2016 and become
effective on May 24 2016, at a distance of two years, the legislation that will
reform the European legislation on protection of data, matches its direct
implementation in Italy.
The General Data Protection Regulation, better known as GDPR, will enter into
force on May 25 2018: the legislation is going to make a significant change on
how data is managed and protected by – and from - private companies.
THE GDPR, IN FACT, WILL BE APPLIED TO THE PROCESSING OF:
•	 Data handled by holders and controllers in the European Union regardless
of whether or not processing takes place in the EU;
•	 Personal data of EU citizens handled by holders entitled of the extra-EU
processing, related to the supply of goods and services to EU citizens or to
the monitoring of behaviors occurring in the EU territory.
THE GDPR IS
INTENDED TO
Harmonising data protection
regulations across Europe
Redraft corporate approach
to data protection
Returning EU citizens control
and protection of their data privacy
MILLION OF € OF TOTAL ANNUAL
WORLDWIDE
REVENUE
20 OR 4%
FINE UP TO
6 7
GDPR: THE NEW ERA OF DATA PROTECTIONGDPR: THE NEW ERA OF DATA PROTECTION
The GDPR defines as personal data any piece of information (name, social
security number, picture, voice, fingerprint, phone record) concerning an
identified or identifiable natural person, even indirectly, or information relating
somebody of known identity or detectable through additional information.
In the particular categories of personal data are enclosed those, known as
sensitive, already protected by the Convention 108 (to which protection is
strengthened through the statute of explicit consent) to guarantee the freedom of
thought and opinion, human dignity and freedom from possible discrimination, plus
it is made explicit the fundamental introduction of genetic and biometric data.
IN SHORT
PERSONAL
DATA
IN SHORT
SPECIFIC CATEGORIES
OF SENSITIVE DATA
« »
IP ADDRESS
LOCATION DATA
COOKIE DATA
RFID TAG
IDENTIFICATIONS DATA
NAME
DATA ON RACIAL OR ETHNIC ORIGIN
GENETIC DATA
POLITICAL OPINIONS
BIOMETRIC DATA
SEXUAL ORIENTATION
HEALTH DATA
The GDPR applies to all companies
that collect and process data of EU citizens,
regardless of geographic location.
GDPR: LA NUOVA ERA DELLA PROTEZIONE DEI DATI
8 9
PERSON INVOLVED
Company
DATA CONTROLLER*
Service provider
DATA PROCESSOR**
DATA PROTECTION
AUTHORITY
PERSONAL DATA DATA
PROCESSING
Data handling legal basis Contract
IN SHORT
DATA
HANDLING
PROCESS
** Reference is made to any natural or legal person who process
personal data on behalf of the holders.
* Natural or legal person who defines the purposes and means of
processing personal data and is responsible to guarantee the
regulation is complied. Data-holders must ensure the presence
of contracts regulating the processing of data.
GDPR: THE NEW ERA OF DATA PROTECTIONGDPR: THE NEW ERA OF DATA PROTECTION
10 11
GDPR: THE NEW ERA OF DATA PROTECTIONGDPR: THE NEW ERA OF DATA PROTECTION
IN SHORT
KEY CONCEPTS
ACCOUNTABILITY
Proof of compliance
with the rules
COMPLIANCE
Verification of rules’
compliance
MANAGEMENT
Constant data protection
and protection’s monitoring
In the new regulation the principle of informational self-determination is
pivotal and is a concept that has already emerged in a previous judgment of
the Constitutional Court which indicates it as a necessary condition for the free
development of the personality of citizen as well as an essential element of a
democratic society.
Moreover, the strong emphasis placed on accountability * - improperly translated
with “responsibilization” - of the holders and the controllers, guides towards the
real adoption of proactive behaviors to demonstrate the concrete (and not purely
formal) application of the regulation that intends to ascend to framework for
creating a culture of data protection within organizations.
There is a clear need to implement measures to safeguard and guarantee the
processed data, with a completely new approach which will transfer to the
holders the task of deciding independently the ways and limits of data processing
according to the criteria specified in the regulation.
Consent
The consent of the person concerned shall
define any manifestation of free, specific,
informed and unequivocal will with which
the latters agree with the processing of their
personal data, provided it occured through
positive statement or action.
Privacy by Design
According to this principle, products and services
must be designed from the outset with due
attention to the protection of users’ privacy, i.e.
the processing must be planned and configured
from the start by including the guarantees to
protect the rights of the parties concerned.
Transparency
The concept of transparency implies that
companies should provide clear, concise,
transparent, comprehensive and easily
accessible information to those requiring
information on the processing of their data.
Privacy by Default
New customers’ purchases - thanks to
this principle – benefit from the strictest
privacy settings by default; or rather, manual
modifications to the privacy settings should not
be required by the customer.
Impact
assessment (PIA)
As known as PIA, Privacy Impact Assessment
– it is crucial for the protection of the privacy
and conformity of processes and services to
the regulation. In particular, it aims to narrate
the approach a company can adopt in order to
reduce possible risks, or rather, systematically
describing the planned data processing activities
and the legal basis underneath them.
Pseudonymization
Privacy protection technique for which the
personal data processed are not imputable
to a specific person and needing additional
information - preserved separately and subject
to organizational controls and other measures -
to specifically identify a person.
PROOF MANAGEMENT EXECUTION
12 13
GDPR: THE NEW ERA OF DATA PROTECTIONGDPR: THE NEW ERA OF DATA PROTECTION
BUSINESS
PROCESSES
IT
SYSTEMSA BThis should guide requirements and activities compliance
with the regulation, in the long term.
It should steer the activities of reducing
data violations.
Management and mitigation of quantified risk flow Data flow diagrams
Legal contracts Security checks
High-level information diagrams Alignment between technical
implementation and processing description
Description and lawfulness of data processing API and API contacts
Data life-cycle, from the standpoint
of a process/customer journey
Data life-cycle treatment, from the point
of view of the technical implementation
IN SHORT
CORPORATE VISION
ON PRIVACY
Compliance with the regulation results in profound changes in the various organizational functions
by making the diversity of risks related to GDPR or privacy emerge, too. The procedure for the
privacy of data should allow to differentiate the various risk scenarios and provide reasonable
strategies of reduction of the latters.
Generally companies should act on two fronts: business processes and IT systems.
14 15
GDPR: THE NEW ERA OF DATA PROTECTIONGDPR: THE NEW ERA OF DATA PROTECTION
1 32 4
INVOLVEMENT
IT SECURITY
The most important role which needs to be established for the enforcement of the
GDPR is the DPO - Data Protection Officer - as the highest level decision maker in
the field of IT security and corporate protection from attacks involving data loss. This
professional must be autonomous and independent, and may be internal or external
to the company.
DPO’s involvement is crucial to the definition of GDPR plans, which are fundamental
for some regulatory changes in the field of data privacy and infringement.
ANYONE DEALING WITH IT SECURITY NEEDS TO STRIVE HARD
WITHIN SOME GENERAL AREAS
GDPR’S PRELIMINARY PHASE:
IT security teams need to know specifically which personal
data of EU citizens are collected and whether exposure can
be defined as a GDPR violation.
PREVENTING VIOLATIONS:
This means minimizing the degree of risk of data breach
thanks to security measures that can make the attack less
straightforward.
VIOLATIONS DETECTION AND QUICK RESPONSE:
Notifying within 72 hours involves a prompt responsiveness
of the security teams to the violation.
BEYOND THE GDPR:
Security teams should consider other aspects
of the risks that impact cyber security albeit not explicitly
stated in GDPR.
ART 5
Personal data processing: protection
against unauthorized processing,
accidental loss, destruction and damage
ART 32
Processing security: ability to guarantee
the confidentiality, integrity, availability
and resilience of processing systems
and services.
ART 33
Violation of personal data: procedures for
detecting and investigating personal data
violations and reporting within 72 hours to
the competent authority.
LAWS THAT INVOLVE IT SECURITY
16 17
GDPR: THE NEW ERA OF DATA PROTECTIONGDPR: THE NEW ERA OF DATA PROTECTION
OUR SOLUTION
PROARX
THE FUTURE OF DATA PROTECTION
Proarx is a hardware and software platform for the continuative
delivery of cybersecurity services developed by We Are Segment.
The hardware architecture has been calibrated to manage
small business networks. However, the software architecture
can also handle larger networks without the need for further
implementations.
Proarx is a complete product that covers all the needs of a
company in the field of data protection and information security.
Features
Asset Management
Automatic tracking and managing of all devices connected to the network
Vulnerability Assesment
Discover the weak spots in your network
Data Protection
Firewall with Intrusion and Prevention System (IPS)
Hardware & Software Database
Mapping of software devices
GDPR Document
Pre-assesment survey for compliance status
External Security
External Network Vulnerability Assessment
Report
Downloadable documentation for GDPR and security activities
Data Management
Data aggregation on the Cloud platform
ENFORCEMENT OF GDPR
Proarx is a computer solution able to help you in the management
of the conditions required by GDPR. The pre-assessment
survey allows to verify the compliance status of the companies,
processes and procedures in use in the field of data processing. It
also allows you to determine the action to implement to comply
with GDPR’s standards.
18
GDPR: THE NEW ERA OF DATA PROTECTION
Everyone has the right to life,
liberty and security
of person.
Universal Declaration of Human Rights,
Article 3, 1948
info@wearesegment.com
Segment srl
Via Miranese, 91 - 30174 Venice-Mestre (VE) - Italy
+39 041 5354800 - info@wearesegment.com www.wearesegment.com

Más contenido relacionado

La actualidad más candente

Building a register of data processing
Building a register of data processingBuilding a register of data processing
Building a register of data processingTim Gough
 
The General Data Protection Regulation ("GDPR")
The General Data Protection Regulation ("GDPR")The General Data Protection Regulation ("GDPR")
The General Data Protection Regulation ("GDPR")Parsons Behle & Latimer
 
The Essential Guide to GDPR
The Essential Guide to GDPRThe Essential Guide to GDPR
The Essential Guide to GDPRTim Hyman LLB
 
Presentation on GDPR
Presentation on GDPRPresentation on GDPR
Presentation on GDPRDipanjanDey12
 
GDPR Guide: The ICO's 12 Recommended Steps To Take Now
GDPR Guide: The ICO's 12 Recommended Steps To Take NowGDPR Guide: The ICO's 12 Recommended Steps To Take Now
GDPR Guide: The ICO's 12 Recommended Steps To Take NowHackerOne
 
Regulation (EU) 2016_679_GDPR_Overview_June 2016
Regulation (EU) 2016_679_GDPR_Overview_June 2016Regulation (EU) 2016_679_GDPR_Overview_June 2016
Regulation (EU) 2016_679_GDPR_Overview_June 2016John Greenwood
 
General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...IISPEastMids
 
The Privacy Advantage 2016 - Wojciech Wiewiorowski
The Privacy Advantage 2016 - Wojciech WiewiorowskiThe Privacy Advantage 2016 - Wojciech Wiewiorowski
The Privacy Advantage 2016 - Wojciech WiewiorowskiKrowdthink
 
Intercity technology - GDPR your training toolkit
Intercity technology - GDPR your training toolkitIntercity technology - GDPR your training toolkit
Intercity technology - GDPR your training toolkitjoshquarrie
 
Guide to-the-general-data-protection-regulation
Guide to-the-general-data-protection-regulationGuide to-the-general-data-protection-regulation
Guide to-the-general-data-protection-regulationN N
 
"The EU General Data Protection Regulation: GDPR" - TRA Annual Meeting 2018
"The EU General Data Protection Regulation: GDPR" - TRA Annual Meeting 2018"The EU General Data Protection Regulation: GDPR" - TRA Annual Meeting 2018
"The EU General Data Protection Regulation: GDPR" - TRA Annual Meeting 2018TRA - Tax Representative Alliance
 
Complete Guide to General Data Protection Regulation (GDPR)
Complete Guide to General Data Protection Regulation (GDPR)Complete Guide to General Data Protection Regulation (GDPR)
Complete Guide to General Data Protection Regulation (GDPR)Happiest Minds Technologies
 
General data protection regulation
General data protection regulationGeneral data protection regulation
General data protection regulationFahad Ameen
 
NetSquared London - GDPR for charities
NetSquared London - GDPR for charitiesNetSquared London - GDPR for charities
NetSquared London - GDPR for charitiesTech Trust
 
Gdpr compliance. Presentation for Consulegis Lawyers network
Gdpr compliance.  Presentation  for Consulegis Lawyers networkGdpr compliance.  Presentation  for Consulegis Lawyers network
Gdpr compliance. Presentation for Consulegis Lawyers networkBart Van Den Brande
 
General data protection regulation - European union
General data protection regulation  - European unionGeneral data protection regulation  - European union
General data protection regulation - European unionRohana K Amarakoon
 
CMR - GDPR - general introduction for marketeers
CMR  -  GDPR - general introduction for marketeersCMR  -  GDPR - general introduction for marketeers
CMR - GDPR - general introduction for marketeersThe CMR Agency
 

La actualidad más candente (19)

Building a register of data processing
Building a register of data processingBuilding a register of data processing
Building a register of data processing
 
The General Data Protection Regulation ("GDPR")
The General Data Protection Regulation ("GDPR")The General Data Protection Regulation ("GDPR")
The General Data Protection Regulation ("GDPR")
 
GDPR 11/1/2017
GDPR 11/1/2017GDPR 11/1/2017
GDPR 11/1/2017
 
The Essential Guide to GDPR
The Essential Guide to GDPRThe Essential Guide to GDPR
The Essential Guide to GDPR
 
Presentation on GDPR
Presentation on GDPRPresentation on GDPR
Presentation on GDPR
 
EU GDPR (training)
EU GDPR (training)  EU GDPR (training)
EU GDPR (training)
 
GDPR Guide: The ICO's 12 Recommended Steps To Take Now
GDPR Guide: The ICO's 12 Recommended Steps To Take NowGDPR Guide: The ICO's 12 Recommended Steps To Take Now
GDPR Guide: The ICO's 12 Recommended Steps To Take Now
 
Regulation (EU) 2016_679_GDPR_Overview_June 2016
Regulation (EU) 2016_679_GDPR_Overview_June 2016Regulation (EU) 2016_679_GDPR_Overview_June 2016
Regulation (EU) 2016_679_GDPR_Overview_June 2016
 
General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...
 
The Privacy Advantage 2016 - Wojciech Wiewiorowski
The Privacy Advantage 2016 - Wojciech WiewiorowskiThe Privacy Advantage 2016 - Wojciech Wiewiorowski
The Privacy Advantage 2016 - Wojciech Wiewiorowski
 
Intercity technology - GDPR your training toolkit
Intercity technology - GDPR your training toolkitIntercity technology - GDPR your training toolkit
Intercity technology - GDPR your training toolkit
 
Guide to-the-general-data-protection-regulation
Guide to-the-general-data-protection-regulationGuide to-the-general-data-protection-regulation
Guide to-the-general-data-protection-regulation
 
"The EU General Data Protection Regulation: GDPR" - TRA Annual Meeting 2018
"The EU General Data Protection Regulation: GDPR" - TRA Annual Meeting 2018"The EU General Data Protection Regulation: GDPR" - TRA Annual Meeting 2018
"The EU General Data Protection Regulation: GDPR" - TRA Annual Meeting 2018
 
Complete Guide to General Data Protection Regulation (GDPR)
Complete Guide to General Data Protection Regulation (GDPR)Complete Guide to General Data Protection Regulation (GDPR)
Complete Guide to General Data Protection Regulation (GDPR)
 
General data protection regulation
General data protection regulationGeneral data protection regulation
General data protection regulation
 
NetSquared London - GDPR for charities
NetSquared London - GDPR for charitiesNetSquared London - GDPR for charities
NetSquared London - GDPR for charities
 
Gdpr compliance. Presentation for Consulegis Lawyers network
Gdpr compliance.  Presentation  for Consulegis Lawyers networkGdpr compliance.  Presentation  for Consulegis Lawyers network
Gdpr compliance. Presentation for Consulegis Lawyers network
 
General data protection regulation - European union
General data protection regulation  - European unionGeneral data protection regulation  - European union
General data protection regulation - European union
 
CMR - GDPR - general introduction for marketeers
CMR  -  GDPR - general introduction for marketeersCMR  -  GDPR - general introduction for marketeers
CMR - GDPR - general introduction for marketeers
 

Similar a GDPR - The new era of data protection

The Essential Guide to GDPR
The Essential Guide to GDPRThe Essential Guide to GDPR
The Essential Guide to GDPRTim Hyman LLB
 
GDPR Changing Mindset
GDPR Changing MindsetGDPR Changing Mindset
GDPR Changing MindsetNetworkIQ
 
Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)Acquia
 
A Brave New World Of Data Protection. Ready? Counting down to GDPR.
A Brave New World Of Data Protection. Ready? Counting down to GDPR. A Brave New World Of Data Protection. Ready? Counting down to GDPR.
A Brave New World Of Data Protection. Ready? Counting down to GDPR. dan hyde
 
GDPR- Get the facts and prepare your business
GDPR- Get the facts and prepare your businessGDPR- Get the facts and prepare your business
GDPR- Get the facts and prepare your businessMark Baker
 
My presentation- Ala about privacy and GDPR
My presentation- Ala about privacy and GDPRMy presentation- Ala about privacy and GDPR
My presentation- Ala about privacy and GDPRzayadeen2003
 
Are you GDPR ready?
Are you GDPR ready?Are you GDPR ready?
Are you GDPR ready?INSZoom
 
How IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity LegislationHow IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity LegislationIBM Security
 
UAE-Personal-Data-Protection-Law.pdf
UAE-Personal-Data-Protection-Law.pdfUAE-Personal-Data-Protection-Law.pdf
UAE-Personal-Data-Protection-Law.pdfDaviesParker
 
Cognizant business consulting the impacts of gdpr
Cognizant business consulting   the impacts of gdprCognizant business consulting   the impacts of gdpr
Cognizant business consulting the impacts of gdpraudrey miguel
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...Symantec
 
Key Issues on the new General Data Protection Regulation
Key Issues on the new General Data Protection RegulationKey Issues on the new General Data Protection Regulation
Key Issues on the new General Data Protection RegulationOlivier Vandeputte
 
Horner Downey & Co Newsletter- GDPR
Horner Downey & Co Newsletter- GDPRHorner Downey & Co Newsletter- GDPR
Horner Downey & Co Newsletter- GDPRJenny Ferguson
 
GDPR master class accountable research organisations (january 2018)
GDPR master class   accountable research organisations (january 2018)GDPR master class   accountable research organisations (january 2018)
GDPR master class accountable research organisations (january 2018)MRS
 
delphix-wp-gdpr-for-data-masking
delphix-wp-gdpr-for-data-maskingdelphix-wp-gdpr-for-data-masking
delphix-wp-gdpr-for-data-maskingJes Breslaw
 
GDPRIBMWhitePaper
GDPRIBMWhitePaperGDPRIBMWhitePaper
GDPRIBMWhitePaperJim Wilson
 

Similar a GDPR - The new era of data protection (20)

The Essential Guide to GDPR
The Essential Guide to GDPRThe Essential Guide to GDPR
The Essential Guide to GDPR
 
GDPR Changing Mindset
GDPR Changing MindsetGDPR Changing Mindset
GDPR Changing Mindset
 
GDPR
GDPRGDPR
GDPR
 
Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)
 
A Brave New World Of Data Protection. Ready? Counting down to GDPR.
A Brave New World Of Data Protection. Ready? Counting down to GDPR. A Brave New World Of Data Protection. Ready? Counting down to GDPR.
A Brave New World Of Data Protection. Ready? Counting down to GDPR.
 
GDPR- Get the facts and prepare your business
GDPR- Get the facts and prepare your businessGDPR- Get the facts and prepare your business
GDPR- Get the facts and prepare your business
 
GDPR: how IT works
GDPR: how IT worksGDPR: how IT works
GDPR: how IT works
 
My presentation- Ala about privacy and GDPR
My presentation- Ala about privacy and GDPRMy presentation- Ala about privacy and GDPR
My presentation- Ala about privacy and GDPR
 
Are you GDPR ready?
Are you GDPR ready?Are you GDPR ready?
Are you GDPR ready?
 
GDPR for Dummies
GDPR for DummiesGDPR for Dummies
GDPR for Dummies
 
How IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity LegislationHow IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity Legislation
 
Data protection
Data protectionData protection
Data protection
 
UAE-Personal-Data-Protection-Law.pdf
UAE-Personal-Data-Protection-Law.pdfUAE-Personal-Data-Protection-Law.pdf
UAE-Personal-Data-Protection-Law.pdf
 
Cognizant business consulting the impacts of gdpr
Cognizant business consulting   the impacts of gdprCognizant business consulting   the impacts of gdpr
Cognizant business consulting the impacts of gdpr
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
 
Key Issues on the new General Data Protection Regulation
Key Issues on the new General Data Protection RegulationKey Issues on the new General Data Protection Regulation
Key Issues on the new General Data Protection Regulation
 
Horner Downey & Co Newsletter- GDPR
Horner Downey & Co Newsletter- GDPRHorner Downey & Co Newsletter- GDPR
Horner Downey & Co Newsletter- GDPR
 
GDPR master class accountable research organisations (january 2018)
GDPR master class   accountable research organisations (january 2018)GDPR master class   accountable research organisations (january 2018)
GDPR master class accountable research organisations (january 2018)
 
delphix-wp-gdpr-for-data-masking
delphix-wp-gdpr-for-data-maskingdelphix-wp-gdpr-for-data-masking
delphix-wp-gdpr-for-data-masking
 
GDPRIBMWhitePaper
GDPRIBMWhitePaperGDPRIBMWhitePaper
GDPRIBMWhitePaper
 

Más de Interlogica

Big Data: The business of Information (ENG)
Big Data: The business of Information (ENG)Big Data: The business of Information (ENG)
Big Data: The business of Information (ENG)Interlogica
 
Big Data: The business of Information (ITA)
Big Data: The business of Information (ITA)Big Data: The business of Information (ITA)
Big Data: The business of Information (ITA)Interlogica
 
How transactions work on Lightning Network
How transactions work on Lightning NetworkHow transactions work on Lightning Network
How transactions work on Lightning NetworkInterlogica
 
L'evoluzione dei chatbot
L'evoluzione dei chatbotL'evoluzione dei chatbot
L'evoluzione dei chatbotInterlogica
 
Come funziona in pratica la Lightning Network
Come funziona in pratica la Lightning NetworkCome funziona in pratica la Lightning Network
Come funziona in pratica la Lightning NetworkInterlogica
 
Il Regolamento GDPR | Tutto quello che c'è da sapere
Il Regolamento GDPR | Tutto quello che c'è da sapereIl Regolamento GDPR | Tutto quello che c'è da sapere
Il Regolamento GDPR | Tutto quello che c'è da sapereInterlogica
 
UNDERSTANDING THE GRID
UNDERSTANDING THE GRIDUNDERSTANDING THE GRID
UNDERSTANDING THE GRIDInterlogica
 
Dalla rete elettrica tradizionale alla Smart Grid
Dalla rete elettrica tradizionale alla Smart GridDalla rete elettrica tradizionale alla Smart Grid
Dalla rete elettrica tradizionale alla Smart GridInterlogica
 
SMART OFFICE SPAZI DI LAVORO DISTRIBUITI
SMART OFFICE SPAZI DI LAVORO DISTRIBUITISMART OFFICE SPAZI DI LAVORO DISTRIBUITI
SMART OFFICE SPAZI DI LAVORO DISTRIBUITIInterlogica
 
Distributed work environments smart office
Distributed work environments smart officeDistributed work environments smart office
Distributed work environments smart officeInterlogica
 

Más de Interlogica (10)

Big Data: The business of Information (ENG)
Big Data: The business of Information (ENG)Big Data: The business of Information (ENG)
Big Data: The business of Information (ENG)
 
Big Data: The business of Information (ITA)
Big Data: The business of Information (ITA)Big Data: The business of Information (ITA)
Big Data: The business of Information (ITA)
 
How transactions work on Lightning Network
How transactions work on Lightning NetworkHow transactions work on Lightning Network
How transactions work on Lightning Network
 
L'evoluzione dei chatbot
L'evoluzione dei chatbotL'evoluzione dei chatbot
L'evoluzione dei chatbot
 
Come funziona in pratica la Lightning Network
Come funziona in pratica la Lightning NetworkCome funziona in pratica la Lightning Network
Come funziona in pratica la Lightning Network
 
Il Regolamento GDPR | Tutto quello che c'è da sapere
Il Regolamento GDPR | Tutto quello che c'è da sapereIl Regolamento GDPR | Tutto quello che c'è da sapere
Il Regolamento GDPR | Tutto quello che c'è da sapere
 
UNDERSTANDING THE GRID
UNDERSTANDING THE GRIDUNDERSTANDING THE GRID
UNDERSTANDING THE GRID
 
Dalla rete elettrica tradizionale alla Smart Grid
Dalla rete elettrica tradizionale alla Smart GridDalla rete elettrica tradizionale alla Smart Grid
Dalla rete elettrica tradizionale alla Smart Grid
 
SMART OFFICE SPAZI DI LAVORO DISTRIBUITI
SMART OFFICE SPAZI DI LAVORO DISTRIBUITISMART OFFICE SPAZI DI LAVORO DISTRIBUITI
SMART OFFICE SPAZI DI LAVORO DISTRIBUITI
 
Distributed work environments smart office
Distributed work environments smart officeDistributed work environments smart office
Distributed work environments smart office
 

Último

KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxKEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxRRR Chambers
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueSkyLaw Professional Corporation
 
一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书SS A
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxMollyBrown86
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm2020000445musaib
 
PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxca2or2tx
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteDeepikaK245113
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxRRR Chambers
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxnyabatejosphat1
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULEsreeramsaipranitha
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labourBhavikaGholap1
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdflaysamaeguardiano
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubham Wadhonkar
 
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxMunicipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxSHIVAMGUPTA671167
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsAurora Consulting
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptxPamelaAbegailMonsant2
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxfilippoluciani9
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)Delhi Call girls
 
Relationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfRelationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfKelechi48
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxRRR Chambers
 

Último (20)

KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxKEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
 
一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm
 
PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptx
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statute
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptx
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labour
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptx
 
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxMunicipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction Fails
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptx
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
 
Relationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfRelationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdf
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptx
 

GDPR - The new era of data protection

  • 1. GDPR The new era of data protection www.wearesegment.com
  • 2. 3 GDPR: THE NEW ERA OF DATA PROTECTION There are only two types of companies: those that have been hacked and those that will be hacked. Robert Mueller - FBI Director, 2012 INDEX BRIEFLY GDPR regulation 4 GDPR subject 5 Personal data 6 Specific categories of sensitive data 7 Data handling process 8 Key concepts 10 Corporate vision on privacy 12 WHO MUST BE INVOLVED IT security 14 OUR SOLUTION Proarx the future of data protection 16
  • 3. 4 5 GDPR: THE NEW ERA OF DATA PROTECTION GDPR: THE NEW ERA OF DATA PROTECTION IN SHORT GDPR SUBJECT The new regulation explicitly proclaims the safeguard to the right of personal data protection, interpreted as a fundamental right of the individuals, under art. 1 par. 2. Personal data represents the technical-juridical instrument through which the whole of the rights linked to the personal identity are protected. Personal data is a dynamic concept, which always needs to be referred to the framework it has to do with, that is: if an isolated piece of information can not lead to the identification of somebody, the fact that that fragment of info can be used for the very identification through its crossing with other data, determines the nature of “personal detail” of it. Besides, it is not necessary that the information were able to physically identify the person to be considered personal data. Within the macro category of personal data, 3 more significant types of data are outlined: • Identifying, which allow direct identification (e.g. personal details - name and surname - pictures...) • Sensitive, so-called in the previous legislation - revealing racial and ethnic origin, religious, philosophical or other beliefs, political opinions; parties, unions, associations or religious organizations membership - with the new regulation it has emerged the importance of genetic data - to identify the state of health and/or sexual history - and biometric data - e.g. a group of photos uploaded online with the unique aim of recognizing somebody, such as at the airports where images of the individuals are scanned for identification • Judicial, indicating the existence of certain judicial measures subject to registration in the criminal record (e.g. final penal sentence, probation, prohibition or obligation of residence, alternative measures to detention - or the position of defendant or suspected). The GDPR gives considerable importance to personal data and to specific categories of personal data, namely those subject to special processing. IN SHORT GDPR REGULATION Published in the European Official Journal on May 4 2016 and become effective on May 24 2016, at a distance of two years, the legislation that will reform the European legislation on protection of data, matches its direct implementation in Italy. The General Data Protection Regulation, better known as GDPR, will enter into force on May 25 2018: the legislation is going to make a significant change on how data is managed and protected by – and from - private companies. THE GDPR, IN FACT, WILL BE APPLIED TO THE PROCESSING OF: • Data handled by holders and controllers in the European Union regardless of whether or not processing takes place in the EU; • Personal data of EU citizens handled by holders entitled of the extra-EU processing, related to the supply of goods and services to EU citizens or to the monitoring of behaviors occurring in the EU territory. THE GDPR IS INTENDED TO Harmonising data protection regulations across Europe Redraft corporate approach to data protection Returning EU citizens control and protection of their data privacy MILLION OF € OF TOTAL ANNUAL WORLDWIDE REVENUE 20 OR 4% FINE UP TO
  • 4. 6 7 GDPR: THE NEW ERA OF DATA PROTECTIONGDPR: THE NEW ERA OF DATA PROTECTION The GDPR defines as personal data any piece of information (name, social security number, picture, voice, fingerprint, phone record) concerning an identified or identifiable natural person, even indirectly, or information relating somebody of known identity or detectable through additional information. In the particular categories of personal data are enclosed those, known as sensitive, already protected by the Convention 108 (to which protection is strengthened through the statute of explicit consent) to guarantee the freedom of thought and opinion, human dignity and freedom from possible discrimination, plus it is made explicit the fundamental introduction of genetic and biometric data. IN SHORT PERSONAL DATA IN SHORT SPECIFIC CATEGORIES OF SENSITIVE DATA « » IP ADDRESS LOCATION DATA COOKIE DATA RFID TAG IDENTIFICATIONS DATA NAME DATA ON RACIAL OR ETHNIC ORIGIN GENETIC DATA POLITICAL OPINIONS BIOMETRIC DATA SEXUAL ORIENTATION HEALTH DATA The GDPR applies to all companies that collect and process data of EU citizens, regardless of geographic location.
  • 5. GDPR: LA NUOVA ERA DELLA PROTEZIONE DEI DATI 8 9 PERSON INVOLVED Company DATA CONTROLLER* Service provider DATA PROCESSOR** DATA PROTECTION AUTHORITY PERSONAL DATA DATA PROCESSING Data handling legal basis Contract IN SHORT DATA HANDLING PROCESS ** Reference is made to any natural or legal person who process personal data on behalf of the holders. * Natural or legal person who defines the purposes and means of processing personal data and is responsible to guarantee the regulation is complied. Data-holders must ensure the presence of contracts regulating the processing of data. GDPR: THE NEW ERA OF DATA PROTECTIONGDPR: THE NEW ERA OF DATA PROTECTION
  • 6. 10 11 GDPR: THE NEW ERA OF DATA PROTECTIONGDPR: THE NEW ERA OF DATA PROTECTION IN SHORT KEY CONCEPTS ACCOUNTABILITY Proof of compliance with the rules COMPLIANCE Verification of rules’ compliance MANAGEMENT Constant data protection and protection’s monitoring In the new regulation the principle of informational self-determination is pivotal and is a concept that has already emerged in a previous judgment of the Constitutional Court which indicates it as a necessary condition for the free development of the personality of citizen as well as an essential element of a democratic society. Moreover, the strong emphasis placed on accountability * - improperly translated with “responsibilization” - of the holders and the controllers, guides towards the real adoption of proactive behaviors to demonstrate the concrete (and not purely formal) application of the regulation that intends to ascend to framework for creating a culture of data protection within organizations. There is a clear need to implement measures to safeguard and guarantee the processed data, with a completely new approach which will transfer to the holders the task of deciding independently the ways and limits of data processing according to the criteria specified in the regulation. Consent The consent of the person concerned shall define any manifestation of free, specific, informed and unequivocal will with which the latters agree with the processing of their personal data, provided it occured through positive statement or action. Privacy by Design According to this principle, products and services must be designed from the outset with due attention to the protection of users’ privacy, i.e. the processing must be planned and configured from the start by including the guarantees to protect the rights of the parties concerned. Transparency The concept of transparency implies that companies should provide clear, concise, transparent, comprehensive and easily accessible information to those requiring information on the processing of their data. Privacy by Default New customers’ purchases - thanks to this principle – benefit from the strictest privacy settings by default; or rather, manual modifications to the privacy settings should not be required by the customer. Impact assessment (PIA) As known as PIA, Privacy Impact Assessment – it is crucial for the protection of the privacy and conformity of processes and services to the regulation. In particular, it aims to narrate the approach a company can adopt in order to reduce possible risks, or rather, systematically describing the planned data processing activities and the legal basis underneath them. Pseudonymization Privacy protection technique for which the personal data processed are not imputable to a specific person and needing additional information - preserved separately and subject to organizational controls and other measures - to specifically identify a person. PROOF MANAGEMENT EXECUTION
  • 7. 12 13 GDPR: THE NEW ERA OF DATA PROTECTIONGDPR: THE NEW ERA OF DATA PROTECTION BUSINESS PROCESSES IT SYSTEMSA BThis should guide requirements and activities compliance with the regulation, in the long term. It should steer the activities of reducing data violations. Management and mitigation of quantified risk flow Data flow diagrams Legal contracts Security checks High-level information diagrams Alignment between technical implementation and processing description Description and lawfulness of data processing API and API contacts Data life-cycle, from the standpoint of a process/customer journey Data life-cycle treatment, from the point of view of the technical implementation IN SHORT CORPORATE VISION ON PRIVACY Compliance with the regulation results in profound changes in the various organizational functions by making the diversity of risks related to GDPR or privacy emerge, too. The procedure for the privacy of data should allow to differentiate the various risk scenarios and provide reasonable strategies of reduction of the latters. Generally companies should act on two fronts: business processes and IT systems.
  • 8. 14 15 GDPR: THE NEW ERA OF DATA PROTECTIONGDPR: THE NEW ERA OF DATA PROTECTION 1 32 4 INVOLVEMENT IT SECURITY The most important role which needs to be established for the enforcement of the GDPR is the DPO - Data Protection Officer - as the highest level decision maker in the field of IT security and corporate protection from attacks involving data loss. This professional must be autonomous and independent, and may be internal or external to the company. DPO’s involvement is crucial to the definition of GDPR plans, which are fundamental for some regulatory changes in the field of data privacy and infringement. ANYONE DEALING WITH IT SECURITY NEEDS TO STRIVE HARD WITHIN SOME GENERAL AREAS GDPR’S PRELIMINARY PHASE: IT security teams need to know specifically which personal data of EU citizens are collected and whether exposure can be defined as a GDPR violation. PREVENTING VIOLATIONS: This means minimizing the degree of risk of data breach thanks to security measures that can make the attack less straightforward. VIOLATIONS DETECTION AND QUICK RESPONSE: Notifying within 72 hours involves a prompt responsiveness of the security teams to the violation. BEYOND THE GDPR: Security teams should consider other aspects of the risks that impact cyber security albeit not explicitly stated in GDPR. ART 5 Personal data processing: protection against unauthorized processing, accidental loss, destruction and damage ART 32 Processing security: ability to guarantee the confidentiality, integrity, availability and resilience of processing systems and services. ART 33 Violation of personal data: procedures for detecting and investigating personal data violations and reporting within 72 hours to the competent authority. LAWS THAT INVOLVE IT SECURITY
  • 9. 16 17 GDPR: THE NEW ERA OF DATA PROTECTIONGDPR: THE NEW ERA OF DATA PROTECTION OUR SOLUTION PROARX THE FUTURE OF DATA PROTECTION Proarx is a hardware and software platform for the continuative delivery of cybersecurity services developed by We Are Segment. The hardware architecture has been calibrated to manage small business networks. However, the software architecture can also handle larger networks without the need for further implementations. Proarx is a complete product that covers all the needs of a company in the field of data protection and information security. Features Asset Management Automatic tracking and managing of all devices connected to the network Vulnerability Assesment Discover the weak spots in your network Data Protection Firewall with Intrusion and Prevention System (IPS) Hardware & Software Database Mapping of software devices GDPR Document Pre-assesment survey for compliance status External Security External Network Vulnerability Assessment Report Downloadable documentation for GDPR and security activities Data Management Data aggregation on the Cloud platform ENFORCEMENT OF GDPR Proarx is a computer solution able to help you in the management of the conditions required by GDPR. The pre-assessment survey allows to verify the compliance status of the companies, processes and procedures in use in the field of data processing. It also allows you to determine the action to implement to comply with GDPR’s standards.
  • 10. 18 GDPR: THE NEW ERA OF DATA PROTECTION Everyone has the right to life, liberty and security of person. Universal Declaration of Human Rights, Article 3, 1948 info@wearesegment.com
  • 11. Segment srl Via Miranese, 91 - 30174 Venice-Mestre (VE) - Italy +39 041 5354800 - info@wearesegment.com www.wearesegment.com