SlideShare una empresa de Scribd logo
1 de 51
Descargar para leer sin conexión


Methods	and	Tools	for	GDPR	Compliance	through	
Privacy	and	Data	
Protection	4	Engineering


Methods	and	tools	for


privacy	and	data	protection	


assurance
Tecnalia,	UPM
10/03/2020
2
Outline
➢Privacy	and	data	protection	assurance


❑	Problem	and	context


➢Proposed	method


❑	GDPR	modelling


❑	Assurance	cases


❑	Evidence	accountability


➢Tool	support	for	the	method


❑	Eclipse	OpenCert
10/03/2020 2
3
10/03/2020 3
GDPR


Article	5


Principles	
relating	to	
processing	of	
personal	data
4
Methods	and	Tools	for	Assurance
A	method	to	support	the	systematic	capture,	
traceability	and	argumentation	of	evidence	so	as	
to	demonstrate	compliance	with	GDPR	(and	
comply	with	the	principle	of	accountability),	and	
a	tool	to	guide	and	partially	automate	that	
method
10/03/2020 4
5
Assurance	-	Definition
10/03/2020 5
Assurance grounds for confidence that the other four security
goals (integrity, availability, confidentiality, and accountability)
have been adequately met by a specific implementation.
“Adequately met” includes:
1
Functionality that performs correctly,
2
Sufficient protection against unintentional errors (by users or software),
and
3
Sufficient resistance to intentional penetration or by-pass.
[NIST Special Publication 800-27 Rev A]
6
Problem	and	context
➢GDPR	became	mandatory	in	May	2018,	but	the	legal	approach	is	not	enough,	we	
need	to	come	along	with	technical	measures.


❑How	is	GDPR	translated	into	operational	work	items	and	activities	for	the	development	
project?


❑Do	we	have	a	method	for	systematic	capture	of	evidences	and	their	association	with	GDPR	
derived	requirements	and	artefacts?


❑How	can	we	track	evidence	evolution?


❑Do	we	have	a	method	to	provide	a	clear	argumentation	about	compliance?
10/03/2020 6
7
Context
10/03/2020 7
(Independent )
Safety	Assessment
Safety
Assessment
Certification
Liaison
Privacy


Assessment
(Independent)


Privacy	Assessment
7
Context
10/03/2020 7
Product	Engineering
“Project”
Quality
Management
Implementation
Validation	&
Verification
Design
(Independent )
Safety	Assessment
Safety
Assessment
Certification
Liaison
Privacy


Assessment
(Independent)


Privacy	Assessment
7
Context
10/03/2020 7
Product	Engineering
“Project”
Quality
Management
Implementation
Validation	&
Verification
Design
(Independent )
Safety	Assessment
Safety
Assessment
Certification
Liaison
Privacy


Assessment
(Independent)


Privacy	Assessment
Standards	&	Regulations
Information	Management
Interpretation
Standards
Specification
7
Context
10/03/2020 7
Supplier	Chain
Component
Release
Module	Assurance
Case	Development
Product	Engineering
“Project”
Quality
Management
Implementation
Validation	&
Verification
Design
(Independent )
Safety	Assessment
Safety
Assessment
Certification
Liaison
Privacy


Assessment
(Independent)


Privacy	Assessment
Standards	&	Regulations
Information	Management
Interpretation
Standards
Specification
7
Context
10/03/2020 7
Supplier	Chain
Component
Release
Module	Assurance
Case	Development
Product	Engineering
“Project”
Quality
Management
Implementation
Validation	&
Verification
Design
(Independent )
Safety	Assessment
Safety
Assessment
Certification
Liaison
Privacy


Assessment
(Independent)


Privacy	Assessment
Assurance
“Project”
Assurance	Case
Development
Evidence
Management Assurance	Process
Management
Compliance
Management
Standards	&	Regulations
Information	Management
Interpretation
Standards
Specification
8
➢This	is	Alex.	She	is	a	system	
engineer	who	works	as	the	
technical	lead	in	a	company


➢She	is	NOT	a	lawyer	and	she	finds	
GDPR	hard	to	interpret


➢She	has	identified	3	privacy	related	
standards:


❑ GDPR


❑ 27001


❑ NIST


➢What	has	PDP4E	to	offer	for	her	
work?
8
10/03/2020
9
Modelling	standards
➢Modelling	standards	provides:


❑An	unambiguous	way	to	show	the	explicit	process	for	standards	compliance


❑A	systematic	way	for	the	different	roles	to	share	the	same	view	on	standards	compliance


❑Mappings	between	concepts	and	terminology	between	standards


❑Models	to	capture	the	context	in	which	concepts	apply	in	the	standards


❑A	way	to	see	where	things	match,	and	also	identify	gaps


➢Main	challenges	behind


❑GDPR	is	not	a	technical	standard	developed	by	engineers	but	by	lawyers


❑There	is	not	an	explicit	process	behind


❑Standards	ecosystems


▪ Legal	à GDPR


▪ Good	practices	à 27001


▪ Implementation	standards	à NIST
10/03/2020 9
10
Assurance	method	concepts
➢Prescriptive	Knowledge	Management	is	the	assurance	area	
concerned	with	the	specification	and	handling	of	standards’	
and	normative	information,	as	well	as	any	other	information	
derived	from	or	based	on	them	(interpretations,	tailoring,	
mapping	between	standards,	etc.)	This	is	done	by	means	of	
reference	assurance	frameworks.
10/03/2020 10
11
Assurance	method	concepts
➢Equivalence	mappings
10/03/2020 11
RefFramework


Model	


(e.g.	GDPR)
Icon Element
Activity
Role
Artefact
Input	(Artefact	to	Activity)	
Output	(Activity	to	Artefact)
Participation	(Role	to	Activity)
Precedence	(Activity	to	Activity)
N/A	(box	
within	box)
Containment	(Activity	to	Activity)
RefFramework


Model	


(e.g.	27001)
Equivalence


Map	Model
RefFramework


Model	


(e.g.	NIST)
Equivalence


Map	Model
Regulation	Modelling Equivalences	Modelling
11
Assurance	method	concepts
➢Equivalence	mappings
10/03/2020 11
RefFramework


Model	


(e.g.	GDPR)
Icon Element
Activity
Role
Artefact
Input	(Artefact	to	Activity)	
Output	(Activity	to	Artefact)
Participation	(Role	to	Activity)
Precedence	(Activity	to	Activity)
N/A	(box	
within	box)
Containment	(Activity	to	Activity)
RefFramework


Model	


(e.g.	27001)
Equivalence


Map	Model
RefFramework


Model	


(e.g.	NIST)
Equivalence


Map	Model
Regulation	Modelling Equivalences	Modelling
➢Model	Instantiation	for	a	specific	project
11
Assurance	method	concepts
➢Equivalence	mappings
10/03/2020 11
RefFramework


Model	


(e.g.	GDPR)
Icon Element
Activity
Role
Artefact
Input	(Artefact	to	Activity)	
Output	(Activity	to	Artefact)
Participation	(Role	to	Activity)
Precedence	(Activity	to	Activity)
N/A	(box	
within	box)
Containment	(Activity	to	Activity)
RefFramework


Model	


(e.g.	27001)
Equivalence


Map	Model
RefFramework


Model	


(e.g.	NIST)
Equivalence


Map	Model
Baseline


Model	


(e.g.	Smart	Grid)
Baseline


Model	


(e.g.	Connected


vehicle)
Assurance	Project	(e.g.	Smart	Grids	or	Connected	vehicle)
Regulation	Modelling Equivalences	Modelling
➢Model	Instantiation	for	a	specific	project
11
Assurance	method	concepts
➢Equivalence	mappings
10/03/2020 11
RefFramework


Model	


(e.g.	GDPR)
Icon Element
Activity
Role
Artefact
Input	(Artefact	to	Activity)	
Output	(Activity	to	Artefact)
Participation	(Role	to	Activity)
Precedence	(Activity	to	Activity)
N/A	(box	
within	box)
Containment	(Activity	to	Activity)
RefFramework


Model	


(e.g.	27001)
Equivalence


Map	Model
RefFramework


Model	


(e.g.	NIST)
Equivalence


Map	Model
Baseline


Model	


(e.g.	Smart	Grid)
Baseline


Model	


(e.g.	Connected


vehicle)
Assurance	Project	(e.g.	Smart	Grids	or	Connected	vehicle)
Tailoring


(RefFramework	subset)
Regulation	Modelling Equivalences	Modelling
➢Model	Instantiation	for	a	specific	project
11
Assurance	method	concepts
➢Equivalence	mappings
10/03/2020 11
RefFramework


Model	


(e.g.	GDPR)
Icon Element
Activity
Role
Artefact
Input	(Artefact	to	Activity)	
Output	(Activity	to	Artefact)
Participation	(Role	to	Activity)
Precedence	(Activity	to	Activity)
N/A	(box	
within	box)
Containment	(Activity	to	Activity)
RefFramework


Model	


(e.g.	27001)
Equivalence


Map	Model
RefFramework


Model	


(e.g.	NIST)
Equivalence


Map	Model
Baseline


Model	


(e.g.	Smart	Grid)
Baseline


Model	


(e.g.	Connected


vehicle)
Assurance	Project	(e.g.	Smart	Grids	or	Connected	vehicle)
Tailoring


(RefFramework	subset)
Tailoring


(RefFramework	subset)
Regulation	Modelling Equivalences	Modelling
➢Model	Instantiation	for	a	specific	project
12
10/03/2020 12
➢Alex	is	part	of	a	team


➢How	can	they	provide	justification	for	compliance?


➢How	can	they	trace	the	evidences	with	the	supporting	requirements	and	the	
proposed	treatments	to	solve	privacy	concerns?


➢Is	there	a	way	to	reproduce	and	systematize	good	practices	for	compliance	
and	the	rationale	behind?
13
Assurance	cases	approach
➢Assurance	cases	were	originally	used	to	show	that	systems	satisfied	their	safety-
critical	properties.	In	this	usage,	they	were	(and	are)	called	safety	cases.
10/03/2020 13
13
Assurance	cases	approach
➢Assurance	cases	were	originally	used	to	show	that	systems	satisfied	their	safety-
critical	properties.	In	this	usage,	they	were	(and	are)	called	safety	cases.
An	assurance	case	consists	of	documented	body	of	evidence	that	
provides	a	convincing	and	valid	argument	that	a	specified	set	of	critical	
claims	regarding	a	system´s	properties	are	adequately	justified	for	a	
given	application	in	a	given	environment.	
10/03/2020 13
13
Assurance	cases	approach
➢Assurance	cases	were	originally	used	to	show	that	systems	satisfied	their	safety-
critical	properties.	In	this	usage,	they	were	(and	are)	called	safety	cases.
An	assurance	case	consists	of	documented	body	of	evidence	that	
provides	a	convincing	and	valid	argument	that	a	specified	set	of	critical	
claims	regarding	a	system´s	properties	are	adequately	justified	for	a	
given	application	in	a	given	environment.	
➢Main	problems:


- It	is	easy	to	present	long	reports	referencing	evidences	but	with	no	real	connection	on	how	those	
evidences	relates	with	the	safety	requirements	à lack	of	clarity


- Some	times	the	reports	offers	argumentation	without	evidences	that	support	it		à unconvincing


- It	is	hard	to	inform	third	parties	the	rationale	behind	some	developments
10/03/2020 13
13
Assurance	cases	approach
➢Assurance	cases	were	originally	used	to	show	that	systems	satisfied	their	safety-
critical	properties.	In	this	usage,	they	were	(and	are)	called	safety	cases.
An	assurance	case	consists	of	documented	body	of	evidence	that	
provides	a	convincing	and	valid	argument	that	a	specified	set	of	critical	
claims	regarding	a	system´s	properties	are	adequately	justified	for	a	
given	application	in	a	given	environment.	
Assurance	cases	put	in	relation


evidences	and	objectives
➢Main	problems:


- It	is	easy	to	present	long	reports	referencing	evidences	but	with	no	real	connection	on	how	those	
evidences	relates	with	the	safety	requirements	à lack	of	clarity


- Some	times	the	reports	offers	argumentation	without	evidences	that	support	it		à unconvincing


- It	is	hard	to	inform	third	parties	the	rationale	behind	some	developments
10/03/2020 13
14
Privacy	argument	fragment
➢Within	the	limits	defined	in	[scope]	the	application	[system	description]	is	
privacy	ensured	because	all	identified	threats	[system	threats]	and	requirements	
[privacy	requirements]	have	been	addressed.	Threats	have	been	sufficiently		
controlled	and	mitigated	[Risk	reduction	measures]	according	to	the	privacy	risk	
exposure	[Risk	assessment].	Evidence	[Privacy	analysis/test]	is	provided	that	
demonstrated	the	effectiveness	and	sufficiency	of	these	measures.	Appropriate	
roles,	responsibilities	and	methods	were	defined	throughout	the	development	of	
this	system	[Development	process	justification]	[Privacy	management	system]	
and	defined	future	operation	
10/03/2020 14
14
Privacy	argument	fragment
➢Within	the	limits	defined	in	[scope]	the	application	[system	description]	is	
privacy	ensured	because	all	identified	threats	[system	threats]	and	requirements	
[privacy	requirements]	have	been	addressed.	Threats	have	been	sufficiently		
controlled	and	mitigated	[Risk	reduction	measures]	according	to	the	privacy	risk	
exposure	[Risk	assessment].	Evidence	[Privacy	analysis/test]	is	provided	that	
demonstrated	the	effectiveness	and	sufficiency	of	these	measures.	Appropriate	
roles,	responsibilities	and	methods	were	defined	throughout	the	development	of	
this	system	[Development	process	justification]	[Privacy	management	system]	
and	defined	future	operation	
10/03/2020 14
15
Argument decomposition
10/03/2020 15
Context Goal
Strategy
Solution
Justification
J
Assumption
A
Solved	by
In	the	context	of
Graphical	notation	GSN
16
10/03/2020 16
16
10/03/2020 16
Security	Requirements	&	Objectives
16
10/03/2020 16
Security	Requirements	&	Objectives
Security	Evidence
16
10/03/2020 16
Security	Requirements	&	Objectives
Security	Evidence
Security	Argument
17
Evidence	model	and	compliance	models
➢Information	required	to	characterize	evidence	artefacts


❑Who	produced	it


❑Revision	and	configuration	management


❑“Trustworthiness”


➢Links	to	:


❑Engineering	process	results,


❑Standard	objectives/requirements,


❑And	to	argument	claims	
10/03/2020 17
18
Evidence	management
Determine	the	
evidence	to	
provide
Collect	
evidence	item	
information
Specify	traceability	
between		
evidence	items
Evaluate	evidence	
item
Is	the	
evidence	
adequate? Yes
No
Address	issues
10/03/2020 18
19
Assurance	management	concepts
➢Assurance	Project	Management,	determines	the	baseline	elements	of	an	
assurance	project	from	reference	assurance	frameworks


➢Evidence	Management	whose	information	is	mapped	to	baseline	elements	
for	specifying	compliance	with	a	reference	assurance	framework	(information	
to	collect)


➢Argumentation	Management,	which	can	refer	to	compliance	with	a	reference	
assurance	framework	(compliance	argument)
10/03/2020 19
20
Evidence	model
➢Information	or	objective	artefacts	being	offered	in	support	of	one	or	more	claims	
[SACM]


➢Overall,	there	are	two	types	of	privacy	evidence


❑Compliance(process)-based	evidence	vs.	product-based	evidence


➢Traceability	(and	dependency)	exists	between	pieces	of	evidence


➢Artefacts	can	be	defined	at	several	granularity	levels


❑Reqs.	specification	document	vs.	single	requirement
Artefact Evidence Claim
used	as supports
10/03/2020 20
21
Concepts	for	accountability
Evidences


Model	
Compliance


Map	Model
Argumentation	


model
Baseline


Model	


(e.g.	SmartGrid)
Assurance	Project	(e.g.	Smart	Grids	or	Connected	vehicle)
What	is	plan	to	Do What	has	Been	Done
Compliance	maps	are	the	responsable	for	tracing	
standard	derived	artefacts
10/03/2020 21
22
Tool	support	for	the	method
10/03/2020 22
https://www.eclipse.org/opencert/
23
Assurance	
Project	
Definition
Assurance	Case	
Management
Evidence	
Management
Compliance	
Management
Reporting
Regulation	Modelling Equivalences	Modelling
Assurance	methodology
10/03/2020 23
24
Tool	support	for	the	method
Evidence


Management
Prescriptive


Knowledge


Management
Privacy


Argumentation


Management
Assurance Project


Lifecycle


Management
Project


Repository
Measurement


&


Transparency
Assurance Configuration


Management
System Management
Standards &


Understandings
Argument


Patterns
Risk	Control


Product


Engineering


Tools	


Requirements,


Models
Link
Connect
10/03/2020 24
24
Tool	support	for	the	method
Evidence


Management
Prescriptive


Knowledge


Management
Privacy


Argumentation


Management
Assurance Project


Lifecycle


Management
Project


Repository
Measurement


&


Transparency
Assurance Configuration


Management
System Management
Standards &


Understandings
Argument


Patterns
Risk	Control


Product


Engineering


Tools	


Requirements,


Models
Link
Connect
10/03/2020 24
24
Tool	support	for	the	method
Evidence


Management
Prescriptive


Knowledge


Management
Privacy


Argumentation


Management
Assurance Project


Lifecycle


Management
Project


Repository
Measurement


&


Transparency
Assurance Configuration


Management
System Management
Standards &


Understandings
Argument


Patterns
Risk	Control


Product


Engineering


Tools	


Requirements,


Models
Link
Connect
10/03/2020 24
24
Tool	support	for	the	method
Evidence


Management
Prescriptive


Knowledge


Management
Privacy


Argumentation


Management
Assurance Project


Lifecycle


Management
Project


Repository
Measurement


&


Transparency
Assurance Configuration


Management
System Management
Standards &


Understandings
Argument


Patterns
Risk	Control


Product


Engineering


Tools	


Requirements,


Models
Link
Connect
10/03/2020 24
24
Tool	support	for	the	method
Evidence


Management
Prescriptive


Knowledge


Management
Privacy


Argumentation


Management
Assurance Project


Lifecycle


Management
Project


Repository
Measurement


&


Transparency
Assurance Configuration


Management
System Management
Standards &


Understandings
Argument


Patterns
Risk	Control


Product


Engineering


Tools	


Requirements,


Models
Link
Connect
10/03/2020 24
24
Tool	support	for	the	method
Evidence


Management
Prescriptive


Knowledge


Management
Privacy


Argumentation


Management
Assurance Project


Lifecycle


Management
Project


Repository
Measurement


&


Transparency
Assurance Configuration


Management
System Management
Standards &


Understandings
Argument


Patterns
Risk	Control


Product


Engineering


Tools	


Requirements,


Models
Link
Connect
10/03/2020 24
25
10/03/2020 25
26
10/03/2020 26
27
10/03/2020 27
28
10/03/2020 28
29
10/03/2020 29
30
10/03/2020 30


Methods	and	Tools	for	GDPR	Compliance	through	
Privacy	and	Data	
Protection	4	Engineering


Reference	frameworks


Explicit	evidences


Explicit	and	clear	argumentation


Explicit	traceability	to	reference	
frameworks


Jabier	Martinez	(Tecnalia)


jabier.martinez@tecnalia.com

Más contenido relacionado

La actualidad más candente

ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
Ulf Mattsson
 
Emerging application and data protection for multi cloud
Emerging application and data protection for multi cloudEmerging application and data protection for multi cloud
Emerging application and data protection for multi cloud
Ulf Mattsson
 

La actualidad más candente (20)

H2020 project WITDOM overview
H2020 project WITDOM overviewH2020 project WITDOM overview
H2020 project WITDOM overview
 
Book
BookBook
Book
 
ETIS Information Security Benchmark Successful Practices in telco security
ETIS Information Security Benchmark Successful Practices in telco securityETIS Information Security Benchmark Successful Practices in telco security
ETIS Information Security Benchmark Successful Practices in telco security
 
New technologies for data protection
New technologies for data protectionNew technologies for data protection
New technologies for data protection
 
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaPrivacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA Atlanta
 
N-able webinar:Build recurring revenue in 45 days
N-able webinar:Build recurring revenue in 45 daysN-able webinar:Build recurring revenue in 45 days
N-able webinar:Build recurring revenue in 45 days
 
Witdom overview 2016
Witdom overview 2016Witdom overview 2016
Witdom overview 2016
 
Practical risk management for the multi cloud
Practical risk management for the multi cloudPractical risk management for the multi cloud
Practical risk management for the multi cloud
 
Data Virtualization for Accelerated Digital Transformation in Banking and Fin...
Data Virtualization for Accelerated Digital Transformation in Banking and Fin...Data Virtualization for Accelerated Digital Transformation in Banking and Fin...
Data Virtualization for Accelerated Digital Transformation in Banking and Fin...
 
Future data security ‘will come from several sources’
Future data security ‘will come from several sources’Future data security ‘will come from several sources’
Future data security ‘will come from several sources’
 
Privacy preserving computing and secure multi party computation
Privacy preserving computing and secure multi party computationPrivacy preserving computing and secure multi party computation
Privacy preserving computing and secure multi party computation
 
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpa
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 
ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...
 
Isaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacyIsaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacy
 
Unlock the potential of data security 2020
Unlock the potential of data security 2020Unlock the potential of data security 2020
Unlock the potential of data security 2020
 
Emerging application and data protection for multi cloud
Emerging application and data protection for multi cloudEmerging application and data protection for multi cloud
Emerging application and data protection for multi cloud
 
Toreon adding privacy by design in secure application development oss18 v20...
Toreon adding privacy by design in secure application development   oss18 v20...Toreon adding privacy by design in secure application development   oss18 v20...
Toreon adding privacy by design in secure application development oss18 v20...
 
Migration approachquestionnaire checklist
Migration approachquestionnaire checklistMigration approachquestionnaire checklist
Migration approachquestionnaire checklist
 

Similar a Wp6 workshop 10_march2020

MRS Operations Network: GDPR - Organisational Measures
MRS Operations Network: GDPR - Organisational MeasuresMRS Operations Network: GDPR - Organisational Measures
MRS Operations Network: GDPR - Organisational Measures
MRS
 

Similar a Wp6 workshop 10_march2020 (20)

Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
 
GDPR and Security.pdf
GDPR and Security.pdfGDPR and Security.pdf
GDPR and Security.pdf
 
DEFeND Project Presentation - July 2018
DEFeND Project Presentation - July 2018DEFeND Project Presentation - July 2018
DEFeND Project Presentation - July 2018
 
Privacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMSPrivacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMS
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
 
Mcis 2018 DEFeND Project
Mcis 2018 DEFeND Project Mcis 2018 DEFeND Project
Mcis 2018 DEFeND Project
 
GDPR How to get started?
GDPR  How to get started?GDPR  How to get started?
GDPR How to get started?
 
Privacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationPrivacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program Implementation
 
Privacy by Design: legal perspective
Privacy by Design: legal perspectivePrivacy by Design: legal perspective
Privacy by Design: legal perspective
 
EXPERT WEBINAR: Convergence of Cybersecurity & Privacy with Herjavec Group
EXPERT WEBINAR: Convergence of Cybersecurity & Privacy with Herjavec GroupEXPERT WEBINAR: Convergence of Cybersecurity & Privacy with Herjavec Group
EXPERT WEBINAR: Convergence of Cybersecurity & Privacy with Herjavec Group
 
5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR Compliance5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR Compliance
 
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
 
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELINGDESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
 
Privacy Data Protection for Engineers - PDP4E
Privacy Data Protection for Engineers - PDP4EPrivacy Data Protection for Engineers - PDP4E
Privacy Data Protection for Engineers - PDP4E
 
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
 
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining ApproachPrivacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
 
Is Encryption the Only Key to GDPR?
Is Encryption the Only Key to GDPR?Is Encryption the Only Key to GDPR?
Is Encryption the Only Key to GDPR?
 
GDPR: Protecting Your Data
GDPR: Protecting Your DataGDPR: Protecting Your Data
GDPR: Protecting Your Data
 
MRS Operations Network: GDPR - Organisational Measures
MRS Operations Network: GDPR - Organisational MeasuresMRS Operations Network: GDPR - Organisational Measures
MRS Operations Network: GDPR - Organisational Measures
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 

Más de Privacy Data Protection for Engineering

Más de Privacy Data Protection for Engineering (11)

Paris wp5 pd-pb_d
Paris wp5 pd-pb_dParis wp5 pd-pb_d
Paris wp5 pd-pb_d
 
Beawre pitch
Beawre pitchBeawre pitch
Beawre pitch
 
Pdp4e IPEN-2019
Pdp4e  IPEN-2019Pdp4e  IPEN-2019
Pdp4e IPEN-2019
 
Long term security evolution of ai and data protection antonio kung trialog...
Long term security evolution of ai and data protection   antonio kung trialog...Long term security evolution of ai and data protection   antonio kung trialog...
Long term security evolution of ai and data protection antonio kung trialog...
 
Granular or holistic approaches - Antonio Kung
Granular or holistic approaches - Antonio KungGranular or holistic approaches - Antonio Kung
Granular or holistic approaches - Antonio Kung
 
Granular or holistic approaches 210126 Alejandra Ruiz
Granular or holistic approaches 210126 Alejandra RuizGranular or holistic approaches 210126 Alejandra Ruiz
Granular or holistic approaches 210126 Alejandra Ruiz
 
Antonio kung impact of ai on privacy sept 10
Antonio kung impact of ai on privacy   sept 10Antonio kung impact of ai on privacy   sept 10
Antonio kung impact of ai on privacy sept 10
 
Antonio kung - pdp4e privacy engineering oxford sept 9 - v2
Antonio kung - pdp4e privacy engineering oxford   sept 9 - v2Antonio kung - pdp4e privacy engineering oxford   sept 9 - v2
Antonio kung - pdp4e privacy engineering oxford sept 9 - v2
 
Pdp4 e privacy engineering toolkit ipen 2019
Pdp4 e privacy engineering toolkit   ipen 2019Pdp4 e privacy engineering toolkit   ipen 2019
Pdp4 e privacy engineering toolkit ipen 2019
 
Ipen 2019 roma status of privacy engineering standardisation v2
Ipen 2019 roma   status of privacy engineering standardisation v2Ipen 2019 roma   status of privacy engineering standardisation v2
Ipen 2019 roma status of privacy engineering standardisation v2
 
Ipen2018
Ipen2018Ipen2018
Ipen2018
 

Último

Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 

Último (20)

Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 

Wp6 workshop 10_march2020