SlideShare una empresa de Scribd logo
1 de 28
Descargar para leer sin conexión
© 2020 TrustArc Inc. Proprietary and Confidential Information.
How to Leverage Your GDPR Compliance
for CCPA, Privacy Shield & More New
Requirements
August 19, 2020
1
How to Leverage Your GDPR Compliance for CCPA, Privacy Shield & More
New Requirements
2
● We will be starting a couple minutes after the hour
● This webinar will be recorded and the recording and slides sent out
later today
● Please use the GoToWebinar control panel on the right hand side to
submit any questions for the speakers
Speakers
3
K Royal
FIP, CIPP/US / E, CIPM, CDPSE
Associate General Counsel,
Privacy Intelligence
TrustArc
Joanne Furtsch
CIPP/C, CIPP/US, CIPT, FIP
Director, Privacy Intelligence Development
TrustArc
Meaghan McCluskey
LL.B., CIPP/US/E, CIPM
Director of Research
TrustArc
Agenda
4
● Key similarities and differences between GDPR and CCPA
● The main compliance areas that can be leveraged for multiple
requirements (including individual rights and consent)
● Recent legislative developments with similarities to GDPR and CCPA
● How a framework based approach helps achieve ongoing compliance for
future legislation
Polling Question 1
Where are you on GDPR to CCPA compliance?
● Both are fully operational
● Both are operational, but more so GDPR
● Both are operational, but more so CCPA
● Neither one are what I would call operational.
5
Using a Framework is Critical
6
● Consistency of approach
● Predictability
● Baseline documentation
● Reduce risk
● Prioritize actions and reactions
© 2019 TrustArc Inc Proprietary and Confidential Information
Key similarities and differences
between GDPR and CCPA
Summary of GDPR and CCPA Mapping
8
Compliance Area GDPR CCPA
Differences Compliance Deadline May 25, 2018 (note: Schrems II) January 1, 2020 (note: Regs approved)
Applicability In the EU and organizations offering goods and
services to people in the EU
California and organizations doing business there
Who it Protects Data protection is seen as a fundamental human
right, so no nationality requirement needed
This legislation focuses on California residents
Area of
Focus
Omnibus – it covers most aspects of data protection Focuses on data subject rights, transparency, third
party management, and training, but compliance is
dependent on privacy program accountability
Similarities Individual Rights Having a mechanism for fielding a broad scope of requests, timely responding to requests, and keeping an
audit trail should be part of an individual rights program.
Consent Having mechanisms for ensuring that data processing is permitted and lawful, such as consent management,
should be part of an overall data privacy management program.
Notice Notice should be part of an overall data privacy management program.
Data
Inventory
Having an up-to-date data inventory that shows what data is being collected, why it is being collected, and
who is using it will help meet compliance requirements.
Final CCPA Regulations Approved and Now Effective Immediately
9
● August 14, 2020: Approved
● Mostly non-substantive, but some areas to note of withdrawn provisions
○ § 999.305(a)(5) - New uses, no consent
■ Not required to directly contact consumers and obtain explicit consent if using PI for purposes that
are materially different than those disclosed in the privacy notice at the time of collection.
○ § 999.306(b)(2) - No offline opt-outs notices
■ Businesses that primarily interact with consumers offline will not be required to provide notice of their
right to opt-out of the sale of their personal information using an offline method.
○ § 999.315(c) - Easy opt-out removed, but does not permit obstructions
■ The provision that was withdrawn (1) required that a business’s opt-out method be “easy for
consumers to execute,” and “require minimal steps to allow the consumer to opt-out,” and (2)
prohibited using a method that intended or had the substantial effect of “subverting or impairing” a
consumer’s decision to opt-out.”
○ § 999.326(c) - Removed for redundancy
■ Businesses may deny requests from authorized agents who do not provide signed written permission
from the consumer demonstrating they have been authorized to act on the consumer’s behalf. Denial
still provided in § 999.315.
© 2019 TrustArc Inc Proprietary and Confidential Information
The main compliance areas that can be
leveraged for multiple requirements
(Individual rights, consent)
Individual Rights / Data Subject Rights
11
Background
● Privacy laws require companies to respond to individual (data subject) requests for
access to their data on specific timelines:
GDPR, General Data Protection Regulation
● Articles 15-23 provide data subjects rights to their data (i.e., right of access;
rectification or erasure; to restrict or object to processing; and to portability);
● Requests must be addressed within one month
CCPA, California Consumer Privacy Act
● Sections 1798.100-120 provide individuals rights of access and data portability,
erasure, information about collection and sales of data, to opt-out of sales.
● Requests must be addressed within 45 days.
Operationalizing Individual Rights under CCPA
12
How you can leverage what you did under GDPR for CCPA
Provide an accessible
mechanism through which
individuals can submit a
request (e.g., on the website,
through a toll-free phone
number, designated email
address, paper forms);
Validate that the mechanism
for receiving requests is
working - requests are
received, date of receipt is
recorded, receipt of request is
acknowledged, identity of the
requestor is verified, requests
are being actioned
appropriately.
Leverage communication
templates and other
mechanisms created for
GDPR:
● Access requests under GDPR
include most of what you need for
CCPA (the biggest challenge will
be providing an accounting of
disclosures/sales)
● Erasure requests - validate the
availability of exclusions;
● Opt-out and objection
mechanisms for marketing and
automated processing can be
retooled for sales of data;
● Data portability treat the same
way (CCPA only applies to
electronic requests).
Submit a Request Request Received
Consent
13
Background
● Privacy laws may require companies to obtain the consent of individuals before
processing the individual’s personal information for certain types of business purposes.
The conditions for consent may depend on the type of individual or information or the
processing purpose.
GDPR, General Data Protection Regulation
● Articles 7 & 8 lay out the conditions for using consent as the basis for processing
● The consent mechanism needs to be clearly presented and easily identified and
distinguished from other content or features
CCPA, California Consumer Privacy Act
● 1798.120(a) gives consumers the right to opt-out of the sale of personal information to
third parties
● § 999.315. Requests to Opt-Out. under the Final CCPA Regulation requires companies to
provide two mechanisms for consumers to opt-out including an interactive form available
on the company’s website or mobile app via a “Do Not Sell My Personal Information” link.
Operationalizing Consent Requirements under CCPA
14
How you can leverage what you did under GDPR for CCPA
Provide a clear, easily
identifiable mechanism(s) to
obtain consent and let
individuals indicate a
preference (e.g., opt-out)
Track that the individual gave
consent or opted-out -
evidence of the individual’s
preference
Enable individuals to withdraw
consent or change their
preference (e.g., it’s okay to
sell my information)
CCPA’s requirements for providing the opt-out mechanism around the sale of personal
information and for obtaining consent for financial incentives are outlined in the Final Text of
the CCPA Regulation
https://www.oag.ca.gov/sites/all/files/agweb/pdfs/privacy/oal-sub-final-text-of-regs.pdf?
Opt-Out Opt-Out Confirmed
Notice
15
Background
● Privacy laws require individuals to be informed of processing activities prior to
collecting their personal information or before using information if received from third
parties.
GDPR, General Data Protection Regulation
● Article 12 - Concise, transparent, intelligible and easily accessible form; in
writing, including electronically.
● Article 13 - 6 mandatory disclosures; 6 additional disclosures if necessary to
ensure fair and lawful processing.
CCPA, California Consumer Privacy Act
● Sec. 130/110 - 4 main disclosures to include in online privacy policies.
● Sec. 135 - disclose that information might be sold and provide an opt-out.
CCPA Regulations adds requirements, including delivery, formatting, language, and content.
Operationalizing Notices under CCPA
16
How you can leverage what you did under GDPR for CCPA
Language is already in a
concise, transparent, intelligible
and easily accessible form,
using clear and plain language
(Art. 12).
Notice is already in writing,
likely electronically, and
possibly scripts have been
developed for providing the
information orally (Art 12).
Leverage mechanisms created
for displaying and providing
GDPR notice:
● In person - hard copy,
posters;
● Online - links (Consider
separate California Privacy
Rights Notice if you already
comply with Shine the Light)
● In apps.
Data Inventory
17
Background
● A data inventory helps companies understand where data is stored and start to
understand their data flows. Some privacy laws explicitly require companies to
maintain records or an inventory of their processing activities.
GDPR, General Data Protection Regulation
● Article 30 - Records of Processing Activities
● Art 30(1) - Data Controllers must maintain a record of data processing
activities
● Art 30(2) - Data Processors are required to maintain a list of processing
activities carried out on behalf of Data Controller
CCPA, California Consumer Privacy Act
● 1798.130 - Inventory of Data Processing requires companies to maintain a
data inventory covering at least the prior 12 month period
Doing your inventory to comply with CCPA
18
Leverage your organization’s
process for creating and
maintaining Records of
Processing Activities used to
generate GDPR Article 30
Reports to create your
Inventory of Data Processing.
Identify processing activities
that include processing data of
California consumers and
update your existing inventory.
Indicate on the record whether
the disclosure of personal
information to a third party is a
sale.
How you can leverage what you did under GDPR for CCPA
© 2019 TrustArc Inc Proprietary and Confidential Information
Main GDPR compliance areas mapped
to other regulations
Main GDPR Compliance Areas Mapped to Other Regulations
20
GDPR CCPA
NZ Privacy
Act 2020
Japan
LPPI
China
Civil Code
Dubai
DPL 2020
Egypt
LPPD
Privacy
Shield
Individual
Rights
X X X X X X X X
Notice X X X X X X X
Consent X X X X X X X X
Data
Inventory
X X X X
Individual Rights Mapped to Other Regulations
21
GDPR CCPA
NZ Privacy
Act 2020
Japan
LPPI*
China
Civil Code
Dubai
DPL 2020
Egypt
LPPD
Privacy
Shield
Access X X X X X X X X
Correction X X X X X X X
Erasure X X X X X X
Object,
Opt-Out
X X X X X X
Portability X X X
*Japan’s Law on the Protection of Personal Information was amended, effective June 12th, to bring in rights of access and cessation of
processing.
© 2019 TrustArc Inc Proprietary and Confidential Information
How a framework based approach helps
achieve ongoing compliance for future
legislation
Polling Question 2
What framework if any do you use in your privacy or security program?
● ISO/IEC
● NIST
● Another recognized framework
● Our own self-developed framework
● None
23
Important Framework Elements
24
Build
● Establish, maintain and continually evolve and improve a privacy
program aligned with other information governance, compliance
and risk management functions such as security, IP and trade
secret protection and e-discovery
● 6 “Build” standards aligned with key laws, regulations and effective
ethics and compliance programs
Implement
● 8 “Implement” standards for designing and/or engineering effective
privacy and data governance controls into organizational processes
products and technologies and maintain or enhance those controls
throughout the lifecycle for the product, process or technology
● Conduct privacy impact assessments (D/PIAs) presents a high
inherent risk of harm to individuals and remediate identified risks
Demonstrate
● 2 “Demonstrate” standards for providing evidence of program and
practices compliance, maturity, responsibility and value
25
© 2019 TrustArc Inc Proprietary and Confidential Information
Q&A
Upcoming Webinars
27
Past Webinars
5 Signs Your Privacy Management Program is
Not Working for You
August 26, 2020 @ 9:00
PST
CCPA Compliance from Ground Zero: Start to
Finish with TrustArc Solutions
Free Download
The Court Speaks: Privacy Shield, Standard
Contractual Clauses and Cookie Consent
Free Download
© 2019 TrustArc Inc Proprietary and Confidential Information
Thank You!
See http://www.trustarc.com/insightseries for the 2020
Privacy Insight Series and past webinar recordings.
If you would like to learn more about how TrustArc can support you with compliance,
please reach out to sales@trustarc.com for a free demo.

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Privacy 2020: Recap & Predictions
Privacy 2020: Recap & PredictionsPrivacy 2020: Recap & Predictions
Privacy 2020: Recap & Predictions
 
Post US Election Privacy Updates & Implications
Post US Election Privacy Updates & ImplicationsPost US Election Privacy Updates & Implications
Post US Election Privacy Updates & Implications
 
5 Signs Your Privacy Management Program is Not Working for You
5 Signs Your Privacy Management Program is Not Working for You5 Signs Your Privacy Management Program is Not Working for You
5 Signs Your Privacy Management Program is Not Working for You
 
EMEA Quarterly Update: GDPR Two Years Later
EMEA Quarterly Update: GDPR Two Years LaterEMEA Quarterly Update: GDPR Two Years Later
EMEA Quarterly Update: GDPR Two Years Later
 
California Consumer Privacy Act (CCPA): Countdown to Compliance
California Consumer Privacy Act (CCPA): Countdown to ComplianceCalifornia Consumer Privacy Act (CCPA): Countdown to Compliance
California Consumer Privacy Act (CCPA): Countdown to Compliance
 
Privacy Frameworks: The Foundation for Every Privacy Program
Privacy Frameworks: The Foundation for Every Privacy ProgramPrivacy Frameworks: The Foundation for Every Privacy Program
Privacy Frameworks: The Foundation for Every Privacy Program
 
2019 10-23 ccpa survival guide
2019 10-23 ccpa survival guide2019 10-23 ccpa survival guide
2019 10-23 ccpa survival guide
 
CCPA for CISOs: What You Need to Know
CCPA for CISOs: What You Need to KnowCCPA for CISOs: What You Need to Know
CCPA for CISOs: What You Need to Know
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
 
*Webinar* CCPA: Get Your Business Ready
*Webinar* CCPA: Get Your Business Ready*Webinar* CCPA: Get Your Business Ready
*Webinar* CCPA: Get Your Business Ready
 
2019 04-17 10 steps to ccpa compliance
2019 04-17 10 steps to ccpa compliance2019 04-17 10 steps to ccpa compliance
2019 04-17 10 steps to ccpa compliance
 
Update Your CCPA Plan with Practical Insights into the Proposed Regulations, ...
Update Your CCPA Plan with Practical Insights into the Proposed Regulations, ...Update Your CCPA Plan with Practical Insights into the Proposed Regulations, ...
Update Your CCPA Plan with Practical Insights into the Proposed Regulations, ...
 
California Consumer Privacy Act: What your brand needs to know
California Consumer Privacy Act: What your brand needs to knowCalifornia Consumer Privacy Act: What your brand needs to know
California Consumer Privacy Act: What your brand needs to know
 
Assessing Risk: How Organizations Can Proactively Manage Privacy Risk
Assessing Risk: How Organizations Can Proactively Manage Privacy RiskAssessing Risk: How Organizations Can Proactively Manage Privacy Risk
Assessing Risk: How Organizations Can Proactively Manage Privacy Risk
 
2019-06-11 What New US State Laws Mean For Your Business
2019-06-11 What New US State Laws  Mean For Your Business2019-06-11 What New US State Laws  Mean For Your Business
2019-06-11 What New US State Laws Mean For Your Business
 
CCPA Webinar: Amendments, Proposed Regulations, New Ballot Initiative, and R...
CCPA Webinar:  Amendments, Proposed Regulations, New Ballot Initiative, and R...CCPA Webinar:  Amendments, Proposed Regulations, New Ballot Initiative, and R...
CCPA Webinar: Amendments, Proposed Regulations, New Ballot Initiative, and R...
 
Do You Have a Roadmap for EU GDPR Compliance?
Do You Have a Roadmap for EU GDPR Compliance?Do You Have a Roadmap for EU GDPR Compliance?
Do You Have a Roadmap for EU GDPR Compliance?
 
EU Update: Applying the new SCCs, or ‘just’ the complete GDPR?
EU Update: Applying the new SCCs, or ‘just’ the complete GDPR?EU Update: Applying the new SCCs, or ‘just’ the complete GDPR?
EU Update: Applying the new SCCs, or ‘just’ the complete GDPR?
 
2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management
 

Similar a How to Leverage Your GDPR Compliance for CCPA, Privacy Shield & More New Requirements

Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Dr. Donald Macfarlane
 

Similar a How to Leverage Your GDPR Compliance for CCPA, Privacy Shield & More New Requirements (20)

How the EU-GDPR May Affect Your Website
How the EU-GDPR May Affect Your WebsiteHow the EU-GDPR May Affect Your Website
How the EU-GDPR May Affect Your Website
 
TrustArc-Webinar-Slides-2022-09-20-Cross-Contextual-Advertising
TrustArc-Webinar-Slides-2022-09-20-Cross-Contextual-AdvertisingTrustArc-Webinar-Slides-2022-09-20-Cross-Contextual-Advertising
TrustArc-Webinar-Slides-2022-09-20-Cross-Contextual-Advertising
 
GDPR: how IT works
GDPR: how IT worksGDPR: how IT works
GDPR: how IT works
 
A Brief Overview on GDPR
A Brief Overview on GDPRA Brief Overview on GDPR
A Brief Overview on GDPR
 
General data protection regulation - European union
General data protection regulation  - European unionGeneral data protection regulation  - European union
General data protection regulation - European union
 
California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)
 
Top 10 Clauses for CCPA Compliance For Your Vendor Contracts
Top 10 Clauses for CCPA Compliance For Your Vendor ContractsTop 10 Clauses for CCPA Compliance For Your Vendor Contracts
Top 10 Clauses for CCPA Compliance For Your Vendor Contracts
 
California Consumer Privacy Act (CCPA) - Kloudlearn
California Consumer Privacy Act (CCPA) - KloudlearnCalifornia Consumer Privacy Act (CCPA) - Kloudlearn
California Consumer Privacy Act (CCPA) - Kloudlearn
 
GDPR for Dummies
GDPR for DummiesGDPR for Dummies
GDPR for Dummies
 
NetSquared London - GDPR for charities
NetSquared London - GDPR for charitiesNetSquared London - GDPR for charities
NetSquared London - GDPR for charities
 
Bridging the Gap Between Privacy and Retention
Bridging the Gap Between Privacy and RetentionBridging the Gap Between Privacy and Retention
Bridging the Gap Between Privacy and Retention
 
The GDPR - A data revolution
The GDPR - A data revolutionThe GDPR - A data revolution
The GDPR - A data revolution
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
 
Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)
 
The Essential Guide to GDPR
The Essential Guide to GDPRThe Essential Guide to GDPR
The Essential Guide to GDPR
 
The Essential Guide to GDPR
The Essential Guide to GDPRThe Essential Guide to GDPR
The Essential Guide to GDPR
 
An Overview of GDPR
An Overview of GDPR An Overview of GDPR
An Overview of GDPR
 
An Overview of GDPR by Pathway Group
An Overview of GDPR by Pathway GroupAn Overview of GDPR by Pathway Group
An Overview of GDPR by Pathway Group
 
Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...
 

Más de TrustArc

TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
TrustArc
 

Más de TrustArc (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
 
TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI Innovations
 
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
 
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
 
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
 
Nymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 States
 
CBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceCBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy Compliance
 
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfEverything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
 
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
 
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsPrivacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
 
Building Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsBuilding Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy Certifications
 
The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...
 
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
 
Artificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceArtificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI Governance
 
How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023
 
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act:  Using Consumer Data and Maintaining TrustThe Ultimate Balancing Act:  Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust
 

Último

Último (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 

How to Leverage Your GDPR Compliance for CCPA, Privacy Shield & More New Requirements

  • 1. © 2020 TrustArc Inc. Proprietary and Confidential Information. How to Leverage Your GDPR Compliance for CCPA, Privacy Shield & More New Requirements August 19, 2020 1
  • 2. How to Leverage Your GDPR Compliance for CCPA, Privacy Shield & More New Requirements 2 ● We will be starting a couple minutes after the hour ● This webinar will be recorded and the recording and slides sent out later today ● Please use the GoToWebinar control panel on the right hand side to submit any questions for the speakers
  • 3. Speakers 3 K Royal FIP, CIPP/US / E, CIPM, CDPSE Associate General Counsel, Privacy Intelligence TrustArc Joanne Furtsch CIPP/C, CIPP/US, CIPT, FIP Director, Privacy Intelligence Development TrustArc Meaghan McCluskey LL.B., CIPP/US/E, CIPM Director of Research TrustArc
  • 4. Agenda 4 ● Key similarities and differences between GDPR and CCPA ● The main compliance areas that can be leveraged for multiple requirements (including individual rights and consent) ● Recent legislative developments with similarities to GDPR and CCPA ● How a framework based approach helps achieve ongoing compliance for future legislation
  • 5. Polling Question 1 Where are you on GDPR to CCPA compliance? ● Both are fully operational ● Both are operational, but more so GDPR ● Both are operational, but more so CCPA ● Neither one are what I would call operational. 5
  • 6. Using a Framework is Critical 6 ● Consistency of approach ● Predictability ● Baseline documentation ● Reduce risk ● Prioritize actions and reactions
  • 7. © 2019 TrustArc Inc Proprietary and Confidential Information Key similarities and differences between GDPR and CCPA
  • 8. Summary of GDPR and CCPA Mapping 8 Compliance Area GDPR CCPA Differences Compliance Deadline May 25, 2018 (note: Schrems II) January 1, 2020 (note: Regs approved) Applicability In the EU and organizations offering goods and services to people in the EU California and organizations doing business there Who it Protects Data protection is seen as a fundamental human right, so no nationality requirement needed This legislation focuses on California residents Area of Focus Omnibus – it covers most aspects of data protection Focuses on data subject rights, transparency, third party management, and training, but compliance is dependent on privacy program accountability Similarities Individual Rights Having a mechanism for fielding a broad scope of requests, timely responding to requests, and keeping an audit trail should be part of an individual rights program. Consent Having mechanisms for ensuring that data processing is permitted and lawful, such as consent management, should be part of an overall data privacy management program. Notice Notice should be part of an overall data privacy management program. Data Inventory Having an up-to-date data inventory that shows what data is being collected, why it is being collected, and who is using it will help meet compliance requirements.
  • 9. Final CCPA Regulations Approved and Now Effective Immediately 9 ● August 14, 2020: Approved ● Mostly non-substantive, but some areas to note of withdrawn provisions ○ § 999.305(a)(5) - New uses, no consent ■ Not required to directly contact consumers and obtain explicit consent if using PI for purposes that are materially different than those disclosed in the privacy notice at the time of collection. ○ § 999.306(b)(2) - No offline opt-outs notices ■ Businesses that primarily interact with consumers offline will not be required to provide notice of their right to opt-out of the sale of their personal information using an offline method. ○ § 999.315(c) - Easy opt-out removed, but does not permit obstructions ■ The provision that was withdrawn (1) required that a business’s opt-out method be “easy for consumers to execute,” and “require minimal steps to allow the consumer to opt-out,” and (2) prohibited using a method that intended or had the substantial effect of “subverting or impairing” a consumer’s decision to opt-out.” ○ § 999.326(c) - Removed for redundancy ■ Businesses may deny requests from authorized agents who do not provide signed written permission from the consumer demonstrating they have been authorized to act on the consumer’s behalf. Denial still provided in § 999.315.
  • 10. © 2019 TrustArc Inc Proprietary and Confidential Information The main compliance areas that can be leveraged for multiple requirements (Individual rights, consent)
  • 11. Individual Rights / Data Subject Rights 11 Background ● Privacy laws require companies to respond to individual (data subject) requests for access to their data on specific timelines: GDPR, General Data Protection Regulation ● Articles 15-23 provide data subjects rights to their data (i.e., right of access; rectification or erasure; to restrict or object to processing; and to portability); ● Requests must be addressed within one month CCPA, California Consumer Privacy Act ● Sections 1798.100-120 provide individuals rights of access and data portability, erasure, information about collection and sales of data, to opt-out of sales. ● Requests must be addressed within 45 days.
  • 12. Operationalizing Individual Rights under CCPA 12 How you can leverage what you did under GDPR for CCPA Provide an accessible mechanism through which individuals can submit a request (e.g., on the website, through a toll-free phone number, designated email address, paper forms); Validate that the mechanism for receiving requests is working - requests are received, date of receipt is recorded, receipt of request is acknowledged, identity of the requestor is verified, requests are being actioned appropriately. Leverage communication templates and other mechanisms created for GDPR: ● Access requests under GDPR include most of what you need for CCPA (the biggest challenge will be providing an accounting of disclosures/sales) ● Erasure requests - validate the availability of exclusions; ● Opt-out and objection mechanisms for marketing and automated processing can be retooled for sales of data; ● Data portability treat the same way (CCPA only applies to electronic requests). Submit a Request Request Received
  • 13. Consent 13 Background ● Privacy laws may require companies to obtain the consent of individuals before processing the individual’s personal information for certain types of business purposes. The conditions for consent may depend on the type of individual or information or the processing purpose. GDPR, General Data Protection Regulation ● Articles 7 & 8 lay out the conditions for using consent as the basis for processing ● The consent mechanism needs to be clearly presented and easily identified and distinguished from other content or features CCPA, California Consumer Privacy Act ● 1798.120(a) gives consumers the right to opt-out of the sale of personal information to third parties ● § 999.315. Requests to Opt-Out. under the Final CCPA Regulation requires companies to provide two mechanisms for consumers to opt-out including an interactive form available on the company’s website or mobile app via a “Do Not Sell My Personal Information” link.
  • 14. Operationalizing Consent Requirements under CCPA 14 How you can leverage what you did under GDPR for CCPA Provide a clear, easily identifiable mechanism(s) to obtain consent and let individuals indicate a preference (e.g., opt-out) Track that the individual gave consent or opted-out - evidence of the individual’s preference Enable individuals to withdraw consent or change their preference (e.g., it’s okay to sell my information) CCPA’s requirements for providing the opt-out mechanism around the sale of personal information and for obtaining consent for financial incentives are outlined in the Final Text of the CCPA Regulation https://www.oag.ca.gov/sites/all/files/agweb/pdfs/privacy/oal-sub-final-text-of-regs.pdf? Opt-Out Opt-Out Confirmed
  • 15. Notice 15 Background ● Privacy laws require individuals to be informed of processing activities prior to collecting their personal information or before using information if received from third parties. GDPR, General Data Protection Regulation ● Article 12 - Concise, transparent, intelligible and easily accessible form; in writing, including electronically. ● Article 13 - 6 mandatory disclosures; 6 additional disclosures if necessary to ensure fair and lawful processing. CCPA, California Consumer Privacy Act ● Sec. 130/110 - 4 main disclosures to include in online privacy policies. ● Sec. 135 - disclose that information might be sold and provide an opt-out. CCPA Regulations adds requirements, including delivery, formatting, language, and content.
  • 16. Operationalizing Notices under CCPA 16 How you can leverage what you did under GDPR for CCPA Language is already in a concise, transparent, intelligible and easily accessible form, using clear and plain language (Art. 12). Notice is already in writing, likely electronically, and possibly scripts have been developed for providing the information orally (Art 12). Leverage mechanisms created for displaying and providing GDPR notice: ● In person - hard copy, posters; ● Online - links (Consider separate California Privacy Rights Notice if you already comply with Shine the Light) ● In apps.
  • 17. Data Inventory 17 Background ● A data inventory helps companies understand where data is stored and start to understand their data flows. Some privacy laws explicitly require companies to maintain records or an inventory of their processing activities. GDPR, General Data Protection Regulation ● Article 30 - Records of Processing Activities ● Art 30(1) - Data Controllers must maintain a record of data processing activities ● Art 30(2) - Data Processors are required to maintain a list of processing activities carried out on behalf of Data Controller CCPA, California Consumer Privacy Act ● 1798.130 - Inventory of Data Processing requires companies to maintain a data inventory covering at least the prior 12 month period
  • 18. Doing your inventory to comply with CCPA 18 Leverage your organization’s process for creating and maintaining Records of Processing Activities used to generate GDPR Article 30 Reports to create your Inventory of Data Processing. Identify processing activities that include processing data of California consumers and update your existing inventory. Indicate on the record whether the disclosure of personal information to a third party is a sale. How you can leverage what you did under GDPR for CCPA
  • 19. © 2019 TrustArc Inc Proprietary and Confidential Information Main GDPR compliance areas mapped to other regulations
  • 20. Main GDPR Compliance Areas Mapped to Other Regulations 20 GDPR CCPA NZ Privacy Act 2020 Japan LPPI China Civil Code Dubai DPL 2020 Egypt LPPD Privacy Shield Individual Rights X X X X X X X X Notice X X X X X X X Consent X X X X X X X X Data Inventory X X X X
  • 21. Individual Rights Mapped to Other Regulations 21 GDPR CCPA NZ Privacy Act 2020 Japan LPPI* China Civil Code Dubai DPL 2020 Egypt LPPD Privacy Shield Access X X X X X X X X Correction X X X X X X X Erasure X X X X X X Object, Opt-Out X X X X X X Portability X X X *Japan’s Law on the Protection of Personal Information was amended, effective June 12th, to bring in rights of access and cessation of processing.
  • 22. © 2019 TrustArc Inc Proprietary and Confidential Information How a framework based approach helps achieve ongoing compliance for future legislation
  • 23. Polling Question 2 What framework if any do you use in your privacy or security program? ● ISO/IEC ● NIST ● Another recognized framework ● Our own self-developed framework ● None 23
  • 24. Important Framework Elements 24 Build ● Establish, maintain and continually evolve and improve a privacy program aligned with other information governance, compliance and risk management functions such as security, IP and trade secret protection and e-discovery ● 6 “Build” standards aligned with key laws, regulations and effective ethics and compliance programs Implement ● 8 “Implement” standards for designing and/or engineering effective privacy and data governance controls into organizational processes products and technologies and maintain or enhance those controls throughout the lifecycle for the product, process or technology ● Conduct privacy impact assessments (D/PIAs) presents a high inherent risk of harm to individuals and remediate identified risks Demonstrate ● 2 “Demonstrate” standards for providing evidence of program and practices compliance, maturity, responsibility and value
  • 25. 25
  • 26. © 2019 TrustArc Inc Proprietary and Confidential Information Q&A
  • 27. Upcoming Webinars 27 Past Webinars 5 Signs Your Privacy Management Program is Not Working for You August 26, 2020 @ 9:00 PST CCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions Free Download The Court Speaks: Privacy Shield, Standard Contractual Clauses and Cookie Consent Free Download
  • 28. © 2019 TrustArc Inc Proprietary and Confidential Information Thank You! See http://www.trustarc.com/insightseries for the 2020 Privacy Insight Series and past webinar recordings. If you would like to learn more about how TrustArc can support you with compliance, please reach out to sales@trustarc.com for a free demo.