SlideShare una empresa de Scribd logo
1 de 32
1
Introductions
Agenda
3 www.bigid.com
BigID
4
BigID
GDPR in the eyes of the legislator
5 www.bigid.com
BigID
6
BigID
Agenda
Enforcement
Databreach notification
Privacy Impact Assessment & Privacy by design
7Gaston Gautreneau – IT Expert Department23/06/2017
Enforcement
Each supervisory authority shall ensure that the imposition of administrative fines pursuant …/… shall in each
individual case be effective, proportionate and dissuasive.
Administrative fines up to 20,000,000 EUR, or in the case of an undertaking, up to 4% of the total worldwide
annual turnover of the preceding financial year, whichever is higher
Taken into account, especially
Nature, gravity and duration of the infringement
Number of data subjects affected
Level of damage suffered by them
The intentional or negligent character of the infringement
…
any other aggravating or mitigating factor applicable to the circumstances of the case, such as financial
benefits gained, or losses avoided, directly or indirectly, from the infringement
8Gaston Gautreneau – IT Expert Department23/06/2017
Data breach notification
A personal data breach means a breach of security leading to the destruction, loss, alteration,
unauthorized disclosure of, or access to, personal data.
This means that a breach is more than just losing personal data.
The controller shall document any personal data breaches, comprising the facts relating to the
personal data breach, its effects and the remedial action taken
Administrative fines up to €10,000,000 or 2% of global turnover, whichever is the greater
Notify DPA if there is risks on rights and freedom of natural persons
When the personal data breach is likely to result in a high risk to the rights and freedoms of
natural persons, the controller shall communicate the personal data breach to the data subject
without undue delay.
Shall not be required if the controller has implemented appropriate technical and organisational
protection measures
9Gaston Gautreneau – IT Expert Department23/06/2017
The PIA stands on two pillars
What does it mean to comply with the regulation ?
The fundamental
principles and rights
(purpose, information,
etc.) are “non
negotiable”, fixed by the
law, and have to be fully
respected
Risk management allows
to identify the technical
and organizational
measures to protect the
personal data from data
breaches
1. Respect
the
fundamenta
l principles
2. Manage
the risks
related to
data
security
PIA
(Privacy
Impact
Assessmen
t)
The Privacy Impact
Assessment (PIA) is a
means to comply with the
regulation and prove it
(accountability)
10Gaston Gautreneau – IT Expert Department23/06/2017
11
Likely to result in
high risks?
[art. 35(1), (3) & (4)]
Yes
Prior
consultation
Yes
No prior
consultation
No
No DPIA needed
No
No DPIA
[art. 35(7)]
High residual risks?
[art. 36(1)]
Code(s) of conduct
[art. 35(8)]
Advice of the DPO
[art. 35(2)]
Monitor performance
[art. 39(1) (c)]
Seek the views of
the data subjects
[art. 35(9)]
Yes Exception ?
[art. 35(5) et (10)]
Processing
reviewed by the
controller
[art. 35(11)]
Process overview
Gaston Gautreneau – IT Expert Department23/06/2017
www.dlapiper.com 12
Speaker
Prof. dr. Patrick Van Eecke is partner in DLA Piper’s Brussels
office and global co-chair of DLA Piper's Data Protection,
Privacy and Security practice.
He has over 20 years of international legal experience in
privacy and data protection issues advising on the legal
impact of big data, cloud computing and Internet of Things.
Patrick advises multinational organisations on data protection
and privacy issues and has in-depth knowledge of regulatory
developments both in Belgium, EU Member States, and on a
pan-European level.
Patrick teaches European Cyberlaw at the University of
Antwerp and King's College London.
www.dlapiper.com 13
New principles introduced by GPDR
www.dlapiper.com 14
New principles introduced by GPDR
www.dlapiper.com 15
"Been there, done
that. It is similar to
our anti-bribery
and anti-trust
exercise"
"We are ISO 72K
compliant, so we
are GDPR
compliant"
"It's just a
European issue,
why should we
bother"
"PII = personal
data: let's keep our
US approach"
"We still have time,
25 May 2018 is the
date we need to
start our
implementation"
Some myths unveiled
www.dlapiper.com 16
"Let's decrease our
liability exposure, by
spinning off data
activities to a shared
service center"
"Data Protection =
Consumer
Protection, we only
process employee
and B2B data"
"Let's change our
website privacy
policy, then we're
fine"
"It has never been
enforced, it will
never be enforced"
"End users will never
sue us"
"We need a DPO,
let's ask our CISO to
take up this role"
Some myths unveiled
17
BigID
General Data Protection Regulation (GDPR):
Tools to Accelerate the Journey
Cindy E. Compert CIPT/M, CTO Data Security & Privacy, IBM Security
JUNE 22, 2017
19 IBM Security
“A ship in port is safe; but that is not what ships are built for.
Sail out to sea and do new things” – Grace Hopper
20 IBM Security
IBM’s Overall GDPR Framework: 5 phases to Readiness
IBM PROPRIETARY
Identify GDPR
impact and plan
Technical and
Organisational
Measures (TOM)
Includes Data
Protection controls,
processes and
solutions to be
implemented.
TOMs in place:
Personal Data
discovery,
classification and
governance in place
Begin the new
GDPR compliant
way of working
Monitor TOMs
execution; deliver
compliance evidence
to internal and
external
stakeholders
• Conduct GDPR
assessments
across privacy,
governance,
people, processes,
data, security
• Develop GDPR
Readiness
Roadmap
• Identify personal
data
• Design
governance,
training,
communication,
and processes
standards
• Design privacy,
data management
and security
management
standards
• Develop and
embed procedures,
processes, and
tools
• Deliver GDPR
training
• Develop/embed
standards using
Privacy by Design,
Security by Design,
data management
policies
• Execute all
relevant business
processes
• Monitor security
and privacy using
TOMs
• Manage data
subject access and
consent rights
• Monitor, assess,
audit, report and
evaluate adherence
to GDPR standards
Assess Design Transform Operate Conform
ActivityOutcomePhase
Assessments
and roadmap
Defined
implementation
plan
Process
enhancements
completed
Operational
framework in
place
Ongoing
monitoring and
reporting
©2017 IBM Corporation
21 IBM Security
IBM Security Framework: Key Activities to address GDPR
IBM PROPRIETARY
Privacy Requirements Security Requirements
ASSESS
PREPARE:
• Conduct GDPR Assessments, assess and document
GDPR related policies
• Assess data subject rights to consent, access,
correct, delete, and transfer personal data
DISCOVER:
• Discover and classify personal data assets and
affected systems
• Identify access risks, supporting Privacy by Design
PREPARE:
• Assess security current state, identify gaps, benchmark
maturity, establish conformance roadmaps
• Identify vulnerabilities, supporting Security by Design
DISCOVER:
• Discover and classify personal data assets and affected
systems to design Security controls
DESIGN
ROADMAP:
• Create GDPR remediation/implementation plan
PRIVACY BY DESIGN:
• Design policies, business processes and supporting
technologies
• Create GDPR Reference Architecture
• Evaluate Controller/Processor Governance
ROADMAP:
• Create Security remediation/implementation plan
SECURITY BY DESIGN:
• Create Security Reference Architecture
• Design Technical and Organizational Measures (TOMs)
appropriate to risk (encryption, pseudonimization, access
control, monitoring, etc.)
TRANSFORM
TRANSFORM PROCESSES:
• Implement and execute policies, processes and
technologies
• Automate data subject access requests
PROTECT:
• Implement privacy enhancing controls (e.g. encryption,
tokenization, dynamic masking)
• Implement security controls; mitigate access risks and security
vulnerabilities
©2017 IBM Corporation
Legend:
Red=Tools available
22 IBM Security
IBM Security Framework: Key Activities to address GDPR
IBM PROPRIETARY
Privacy Requirements Security Requirements
OPERATE MANAGE GDPR PROGRAM:
• Manage GDPR Data Governance Practices such as
Information Lifecycle Governance
• Manage GDPR Enterprise Conformance Programs such as
data use, consent activities, data subject requests
RUN SERVICES:
• Monitor personal data access
• Govern roles and identities
MANAGE SECURITY PROGRAM:
Manage and implement Security Program Practices such as
risk assessment, roles and responsibilities, program
effectiveness
RUN SERVICES:
• Monitor security operations and intelligence: monitor,
detect, respond to and mitigate threats
• Govern data incident response and forensics practices
CONFORM
DEMONSTRATE:
• Record personal data access audit trail including data
subject rights to access, modify, delete, transfer data
• Run Data Processor/Controller Governance including
providing processor guidance, track data processing
activities, provide audit trail, preparing for data subject
access requests
• Document and manage compliance program - Ongoing
monitoring, assessment, evaluation and reporting of GDPR
activities
RESPOND:
o Respond to and manage breaches
DEMONSTRATE:
• Demonstrate technical and organizational measures to
ensure security appropriate to processing risk
• Document Security program - Ongoing monitoring,
assessment, evaluation and reporting of security controls
and activities
RESPOND:
o Respond to and manage breaches
©2017 IBM Corporation
Legend:
Red=Tools available
23 IBM Security
Other activities with tools that can help address GDPR
IBM PROPRIETARY
PRIVACY REQUIREMENTS
GOVERN
Develop data lifecycle
management processes
Maintain enterprise vocabulary
Manage Data Subject Quality
Govern Risk and Compliance
Vendor Management
©2017 IBM Corporation
Legend:
Red=Tools available
24
BigID
GDPR brings new requirements
25 www.bigid.com
BigID
Addressing Subject Access Requests
NEED TO KNOW WHO’S DATA IS IT!
26
Don’t know Who’s data is it
Cannot detect Contextual PII
Many False Positives
!
Need to know Where is the data going
www.bigid.com
BigID
Need to search Big Data
Need an Inventory by Data Subject
JUST KNOWING WHAT CLASS OF DATA IS FOUND WHERE IS NOT ENOUGH
27
Learning Based Discovery
No Duplication of data
Correlate to the identity
Map identity Data Graph
www.bigid.com
BigID
Data Subject Request Automation
IDENTITY DATA INDEX PROVIDES ALL DATA SUBJECT INFORMATION AT YOUR FINGERTIPS
28
Quickly Find Personal Data
Date
Location
Properties
Export Personal Data
Correlate Consent Approvals
Trigger Data Deletion
Provide as Self Service
www.bigid.com
BigID
Responsible Breach Response
IDENTITY INDEX HELPS YOU MINIMIZE YOUR EXPOSURE
29
Pinpoint
Breach Time
Scan Dark Web
Breach Files
Quickly Find Who
was Impacted
Pinpoint Breach
Source
Notify Only
Who was Impacted
www.bigid.com
BigID
Data Mapping True Automation
ONCE YOU KNOW WHERE THE DATA IS, UNDERSTAND WHO IS ACCESSING IT
www.bigid.com30
Top Down And Bottom Up
Continuous Compliance
Data Discovery, Not questionnaires
Enrich with Business Information
BigID
QUESTIONS TIME!
Have a question? Ask NOW!
Disclaimer
• Notice: Clients are responsible for ensuring their own compliance with various laws and regulations, including the European Union General Data
Protection Regulation. Clients are solely responsibility for obtaining advice of competent legal counsel as to the identification and interpretation
of any relevant laws and regulations that may affect the clients’ business and any actions the clients may need to take to comply with such laws
and regulations. The products, services, and other capabilities described herein are not suitable for all client situations and may have restricted
availability. IBM does not provide legal, accounting or auditing advice or represent or warrant that its services or products will ensure that
clients are in compliance with any law or regulation.
• IBM’s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM’s sole discretion.
• Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a purchasing
decision.
• The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code or functionality.
Information about potential future products may not be incorporated into any contract.
• The development, release, and timing of any future features or functionality described for our products remains at our sole discretion.
Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance
that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user’s job
stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will
achieve results similar to those stated here.
2
None of the statements contained herein constitutes legal advice– it is process
advice only.

Más contenido relacionado

La actualidad más candente

Common Practice in Data Privacy Program Management
Common Practice in Data Privacy Program ManagementCommon Practice in Data Privacy Program Management
Common Practice in Data Privacy Program ManagementEryk Budi Pratama
 
General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001Owako Rodah
 
LGPD Privacy by Design 30nov2022.pdf
LGPD Privacy by Design 30nov2022.pdfLGPD Privacy by Design 30nov2022.pdf
LGPD Privacy by Design 30nov2022.pdfFernando Nery
 
Privacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationPrivacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationEryk Budi Pratama
 
General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...Cvent
 
LGPD | FASE-2: ORGANIZAÇÃO | JORNADA DE ADEQUAÇÃO | SGPD - SISTEMA DE GESTÃO ...
LGPD | FASE-2: ORGANIZAÇÃO | JORNADA DE ADEQUAÇÃO | SGPD - SISTEMA DE GESTÃO ...LGPD | FASE-2: ORGANIZAÇÃO | JORNADA DE ADEQUAÇÃO | SGPD - SISTEMA DE GESTÃO ...
LGPD | FASE-2: ORGANIZAÇÃO | JORNADA DE ADEQUAÇÃO | SGPD - SISTEMA DE GESTÃO ...Wellington Monaco
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...IT Governance Ltd
 
LGPD | FASE-2: ORGANIZAÇÃO | JORNADA DE ADEQUAÇÃO | SGPD - SISTEMA DE GESTÃO...
LGPD | FASE-2: ORGANIZAÇÃO | JORNADA DE ADEQUAÇÃO |  SGPD - SISTEMA DE GESTÃO...LGPD | FASE-2: ORGANIZAÇÃO | JORNADA DE ADEQUAÇÃO |  SGPD - SISTEMA DE GESTÃO...
LGPD | FASE-2: ORGANIZAÇÃO | JORNADA DE ADEQUAÇÃO | SGPD - SISTEMA DE GESTÃO...Wellington Monaco
 
Data Ownership and Privacy
Data Ownership and PrivacyData Ownership and Privacy
Data Ownership and PrivacyGerard Sylvester
 
Gdpr overview ciso platform presentation
Gdpr overview ciso platform presentationGdpr overview ciso platform presentation
Gdpr overview ciso platform presentationPriyanka Aash
 
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...PECB
 
PDPA Compliance Preparation
PDPA Compliance PreparationPDPA Compliance Preparation
PDPA Compliance PreparationLawPlus Ltd.
 
O que e mapeamento de dados (data mapping) e como elaborar um para sua empresa
O que e mapeamento de dados (data mapping) e como elaborar um para sua empresaO que e mapeamento de dados (data mapping) e como elaborar um para sua empresa
O que e mapeamento de dados (data mapping) e como elaborar um para sua empresaGraziela Brandão
 
LGPD | VISÃO GERAL DE ADEQUAÇÃO CORPORATIVA A LEGISLAÇÃO DE PROTEÇÃO DE DADOS...
LGPD | VISÃO GERAL DE ADEQUAÇÃO CORPORATIVA A LEGISLAÇÃO DE PROTEÇÃO DE DADOS...LGPD | VISÃO GERAL DE ADEQUAÇÃO CORPORATIVA A LEGISLAÇÃO DE PROTEÇÃO DE DADOS...
LGPD | VISÃO GERAL DE ADEQUAÇÃO CORPORATIVA A LEGISLAÇÃO DE PROTEÇÃO DE DADOS...Wellington Monaco
 
GDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection RegulationGDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection RegulationVicky Dallas
 
ISO/IEC 27701 vs GDPR: What you need to know
ISO/IEC 27701 vs GDPR: What you need to knowISO/IEC 27701 vs GDPR: What you need to know
ISO/IEC 27701 vs GDPR: What you need to knowPECB
 

La actualidad más candente (20)

Common Practice in Data Privacy Program Management
Common Practice in Data Privacy Program ManagementCommon Practice in Data Privacy Program Management
Common Practice in Data Privacy Program Management
 
General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001
 
LGPD Privacy by Design 30nov2022.pdf
LGPD Privacy by Design 30nov2022.pdfLGPD Privacy by Design 30nov2022.pdf
LGPD Privacy by Design 30nov2022.pdf
 
Privacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationPrivacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program Implementation
 
GDPR and Security.pdf
GDPR and Security.pdfGDPR and Security.pdf
GDPR and Security.pdf
 
General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...
 
Privacidade By Design
Privacidade By DesignPrivacidade By Design
Privacidade By Design
 
LGPD | FASE-2: ORGANIZAÇÃO | JORNADA DE ADEQUAÇÃO | SGPD - SISTEMA DE GESTÃO ...
LGPD | FASE-2: ORGANIZAÇÃO | JORNADA DE ADEQUAÇÃO | SGPD - SISTEMA DE GESTÃO ...LGPD | FASE-2: ORGANIZAÇÃO | JORNADA DE ADEQUAÇÃO | SGPD - SISTEMA DE GESTÃO ...
LGPD | FASE-2: ORGANIZAÇÃO | JORNADA DE ADEQUAÇÃO | SGPD - SISTEMA DE GESTÃO ...
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...
 
LGPD | FASE-2: ORGANIZAÇÃO | JORNADA DE ADEQUAÇÃO | SGPD - SISTEMA DE GESTÃO...
LGPD | FASE-2: ORGANIZAÇÃO | JORNADA DE ADEQUAÇÃO |  SGPD - SISTEMA DE GESTÃO...LGPD | FASE-2: ORGANIZAÇÃO | JORNADA DE ADEQUAÇÃO |  SGPD - SISTEMA DE GESTÃO...
LGPD | FASE-2: ORGANIZAÇÃO | JORNADA DE ADEQUAÇÃO | SGPD - SISTEMA DE GESTÃO...
 
Data Ownership and Privacy
Data Ownership and PrivacyData Ownership and Privacy
Data Ownership and Privacy
 
GDPR
GDPRGDPR
GDPR
 
Gdpr overview ciso platform presentation
Gdpr overview ciso platform presentationGdpr overview ciso platform presentation
Gdpr overview ciso platform presentation
 
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
 
PDPA Compliance Preparation
PDPA Compliance PreparationPDPA Compliance Preparation
PDPA Compliance Preparation
 
GDPR Demystified
GDPR DemystifiedGDPR Demystified
GDPR Demystified
 
O que e mapeamento de dados (data mapping) e como elaborar um para sua empresa
O que e mapeamento de dados (data mapping) e como elaborar um para sua empresaO que e mapeamento de dados (data mapping) e como elaborar um para sua empresa
O que e mapeamento de dados (data mapping) e como elaborar um para sua empresa
 
LGPD | VISÃO GERAL DE ADEQUAÇÃO CORPORATIVA A LEGISLAÇÃO DE PROTEÇÃO DE DADOS...
LGPD | VISÃO GERAL DE ADEQUAÇÃO CORPORATIVA A LEGISLAÇÃO DE PROTEÇÃO DE DADOS...LGPD | VISÃO GERAL DE ADEQUAÇÃO CORPORATIVA A LEGISLAÇÃO DE PROTEÇÃO DE DADOS...
LGPD | VISÃO GERAL DE ADEQUAÇÃO CORPORATIVA A LEGISLAÇÃO DE PROTEÇÃO DE DADOS...
 
GDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection RegulationGDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection Regulation
 
ISO/IEC 27701 vs GDPR: What you need to know
ISO/IEC 27701 vs GDPR: What you need to knowISO/IEC 27701 vs GDPR: What you need to know
ISO/IEC 27701 vs GDPR: What you need to know
 

Similar a BigID GDPR Compliance Automation Webinar Slides

GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers Gary Dodson
 
GDPR what you should know and how to minimize impact on your business
GDPR what you should know and how to minimize impact on your businessGDPR what you should know and how to minimize impact on your business
GDPR what you should know and how to minimize impact on your businessOlivier BARROT
 
The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...IT Governance Ltd
 
1 -2-6 kista watson summit-gdpr ibm pov hogg-sm
1 -2-6 kista watson summit-gdpr ibm pov hogg-sm1 -2-6 kista watson summit-gdpr ibm pov hogg-sm
1 -2-6 kista watson summit-gdpr ibm pov hogg-smIBM Sverige
 
Why GDPR Must Be an Integral Part of Your GRC Framework
Why GDPR Must Be an Integral Part of Your GRC FrameworkWhy GDPR Must Be an Integral Part of Your GRC Framework
Why GDPR Must Be an Integral Part of Your GRC FrameworkPECB
 
eu-market-access-gdpr-fundamentals-by-risk-associates
eu-market-access-gdpr-fundamentals-by-risk-associateseu-market-access-gdpr-fundamentals-by-risk-associates
eu-market-access-gdpr-fundamentals-by-risk-associatesMohsin Termezy
 
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...
Symantec Webinar Part 4 of 6  GDPR Compliance, What NAM Organizations Need to...Symantec Webinar Part 4 of 6  GDPR Compliance, What NAM Organizations Need to...
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...Symantec
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRMatt Stubbs
 
Impact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A SecurityImpact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A SecurityEQS Group
 
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...ARMA International
 
What is a data protection impact assessment?
What is a data protection impact assessment?What is a data protection impact assessment?
What is a data protection impact assessment?Infinity Legal Solutions
 
What is a data protection impact assessment? what are the essential stages to...
What is a data protection impact assessment? what are the essential stages to...What is a data protection impact assessment? what are the essential stages to...
What is a data protection impact assessment? what are the essential stages to...Infinity Legal Solutions
 
Toreon adding privacy by design in secure application development oss18 v20...
Toreon adding privacy by design in secure application development   oss18 v20...Toreon adding privacy by design in secure application development   oss18 v20...
Toreon adding privacy by design in secure application development oss18 v20...Sebastien Deleersnyder
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerCapgemini
 
Whos role is it anyway
Whos role is it anywayWhos role is it anyway
Whos role is it anywayIRIS
 
MRS Operations Network: GDPR - Organisational Measures
MRS Operations Network: GDPR - Organisational MeasuresMRS Operations Network: GDPR - Organisational Measures
MRS Operations Network: GDPR - Organisational MeasuresMRS
 
3 minute reading time on how you can comply with GDPR.
3 minute reading time on how you can comply with GDPR.3 minute reading time on how you can comply with GDPR.
3 minute reading time on how you can comply with GDPR.Richard Kranendonk
 

Similar a BigID GDPR Compliance Automation Webinar Slides (20)

GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
 
GDPR what you should know and how to minimize impact on your business
GDPR what you should know and how to minimize impact on your businessGDPR what you should know and how to minimize impact on your business
GDPR what you should know and how to minimize impact on your business
 
The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...
 
2016 11-17-gdpr-integro-webinar
2016 11-17-gdpr-integro-webinar2016 11-17-gdpr-integro-webinar
2016 11-17-gdpr-integro-webinar
 
1 -2-6 kista watson summit-gdpr ibm pov hogg-sm
1 -2-6 kista watson summit-gdpr ibm pov hogg-sm1 -2-6 kista watson summit-gdpr ibm pov hogg-sm
1 -2-6 kista watson summit-gdpr ibm pov hogg-sm
 
Why GDPR Must Be an Integral Part of Your GRC Framework
Why GDPR Must Be an Integral Part of Your GRC FrameworkWhy GDPR Must Be an Integral Part of Your GRC Framework
Why GDPR Must Be an Integral Part of Your GRC Framework
 
20170323 are you ready the new gdpr is here
20170323 are you ready the new gdpr is here20170323 are you ready the new gdpr is here
20170323 are you ready the new gdpr is here
 
eu-market-access-gdpr-fundamentals-by-risk-associates
eu-market-access-gdpr-fundamentals-by-risk-associateseu-market-access-gdpr-fundamentals-by-risk-associates
eu-market-access-gdpr-fundamentals-by-risk-associates
 
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...
Symantec Webinar Part 4 of 6  GDPR Compliance, What NAM Organizations Need to...Symantec Webinar Part 4 of 6  GDPR Compliance, What NAM Organizations Need to...
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
 
Impact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A SecurityImpact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A Security
 
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
 
What is a data protection impact assessment?
What is a data protection impact assessment?What is a data protection impact assessment?
What is a data protection impact assessment?
 
What is a data protection impact assessment? what are the essential stages to...
What is a data protection impact assessment? what are the essential stages to...What is a data protection impact assessment? what are the essential stages to...
What is a data protection impact assessment? what are the essential stages to...
 
Toreon adding privacy by design in secure application development oss18 v20...
Toreon adding privacy by design in secure application development   oss18 v20...Toreon adding privacy by design in secure application development   oss18 v20...
Toreon adding privacy by design in secure application development oss18 v20...
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offer
 
Whos role is it anyway
Whos role is it anywayWhos role is it anyway
Whos role is it anyway
 
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
 
MRS Operations Network: GDPR - Organisational Measures
MRS Operations Network: GDPR - Organisational MeasuresMRS Operations Network: GDPR - Organisational Measures
MRS Operations Network: GDPR - Organisational Measures
 
3 minute reading time on how you can comply with GDPR.
3 minute reading time on how you can comply with GDPR.3 minute reading time on how you can comply with GDPR.
3 minute reading time on how you can comply with GDPR.
 

Más de Dimitri Sirota

BigID GDPR RoPA / Article 30 Automation Data Sheet
BigID GDPR RoPA / Article 30 Automation Data SheetBigID GDPR RoPA / Article 30 Automation Data Sheet
BigID GDPR RoPA / Article 30 Automation Data SheetDimitri Sirota
 
BigID Enterprise Privacy Management Data Sheet
BigID Enterprise Privacy Management Data SheetBigID Enterprise Privacy Management Data Sheet
BigID Enterprise Privacy Management Data SheetDimitri Sirota
 
BigID's Smart Data Labeling and Tagging
BigID's Smart Data Labeling and TaggingBigID's Smart Data Labeling and Tagging
BigID's Smart Data Labeling and TaggingDimitri Sirota
 
BigID Virtual MDM Data Sheet
BigID Virtual MDM Data SheetBigID Virtual MDM Data Sheet
BigID Virtual MDM Data SheetDimitri Sirota
 
BigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
BigID Data Subject Rights Automation for GDPR & Privacy Data SheetBigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
BigID Data Subject Rights Automation for GDPR & Privacy Data SheetDimitri Sirota
 
BigID GDPR Privacy Automation Data Sheet
BigID GDPR Privacy Automation Data SheetBigID GDPR Privacy Automation Data Sheet
BigID GDPR Privacy Automation Data SheetDimitri Sirota
 
BigID PII & PI Discovery for GDPR Data Sheet
BigID PII & PI Discovery for GDPR Data SheetBigID PII & PI Discovery for GDPR Data Sheet
BigID PII & PI Discovery for GDPR Data SheetDimitri Sirota
 
BigID Data Inventory & Data Mapping Data Sheet
BigID Data Inventory & Data Mapping Data SheetBigID Data Inventory & Data Mapping Data Sheet
BigID Data Inventory & Data Mapping Data SheetDimitri Sirota
 

Más de Dimitri Sirota (8)

BigID GDPR RoPA / Article 30 Automation Data Sheet
BigID GDPR RoPA / Article 30 Automation Data SheetBigID GDPR RoPA / Article 30 Automation Data Sheet
BigID GDPR RoPA / Article 30 Automation Data Sheet
 
BigID Enterprise Privacy Management Data Sheet
BigID Enterprise Privacy Management Data SheetBigID Enterprise Privacy Management Data Sheet
BigID Enterprise Privacy Management Data Sheet
 
BigID's Smart Data Labeling and Tagging
BigID's Smart Data Labeling and TaggingBigID's Smart Data Labeling and Tagging
BigID's Smart Data Labeling and Tagging
 
BigID Virtual MDM Data Sheet
BigID Virtual MDM Data SheetBigID Virtual MDM Data Sheet
BigID Virtual MDM Data Sheet
 
BigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
BigID Data Subject Rights Automation for GDPR & Privacy Data SheetBigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
BigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
 
BigID GDPR Privacy Automation Data Sheet
BigID GDPR Privacy Automation Data SheetBigID GDPR Privacy Automation Data Sheet
BigID GDPR Privacy Automation Data Sheet
 
BigID PII & PI Discovery for GDPR Data Sheet
BigID PII & PI Discovery for GDPR Data SheetBigID PII & PI Discovery for GDPR Data Sheet
BigID PII & PI Discovery for GDPR Data Sheet
 
BigID Data Inventory & Data Mapping Data Sheet
BigID Data Inventory & Data Mapping Data SheetBigID Data Inventory & Data Mapping Data Sheet
BigID Data Inventory & Data Mapping Data Sheet
 

Último

(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Intelisync
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 

Último (20)

(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 

BigID GDPR Compliance Automation Webinar Slides

  • 1. 1
  • 5. GDPR in the eyes of the legislator 5 www.bigid.com BigID
  • 7. Agenda Enforcement Databreach notification Privacy Impact Assessment & Privacy by design 7Gaston Gautreneau – IT Expert Department23/06/2017
  • 8. Enforcement Each supervisory authority shall ensure that the imposition of administrative fines pursuant …/… shall in each individual case be effective, proportionate and dissuasive. Administrative fines up to 20,000,000 EUR, or in the case of an undertaking, up to 4% of the total worldwide annual turnover of the preceding financial year, whichever is higher Taken into account, especially Nature, gravity and duration of the infringement Number of data subjects affected Level of damage suffered by them The intentional or negligent character of the infringement … any other aggravating or mitigating factor applicable to the circumstances of the case, such as financial benefits gained, or losses avoided, directly or indirectly, from the infringement 8Gaston Gautreneau – IT Expert Department23/06/2017
  • 9. Data breach notification A personal data breach means a breach of security leading to the destruction, loss, alteration, unauthorized disclosure of, or access to, personal data. This means that a breach is more than just losing personal data. The controller shall document any personal data breaches, comprising the facts relating to the personal data breach, its effects and the remedial action taken Administrative fines up to €10,000,000 or 2% of global turnover, whichever is the greater Notify DPA if there is risks on rights and freedom of natural persons When the personal data breach is likely to result in a high risk to the rights and freedoms of natural persons, the controller shall communicate the personal data breach to the data subject without undue delay. Shall not be required if the controller has implemented appropriate technical and organisational protection measures 9Gaston Gautreneau – IT Expert Department23/06/2017
  • 10. The PIA stands on two pillars What does it mean to comply with the regulation ? The fundamental principles and rights (purpose, information, etc.) are “non negotiable”, fixed by the law, and have to be fully respected Risk management allows to identify the technical and organizational measures to protect the personal data from data breaches 1. Respect the fundamenta l principles 2. Manage the risks related to data security PIA (Privacy Impact Assessmen t) The Privacy Impact Assessment (PIA) is a means to comply with the regulation and prove it (accountability) 10Gaston Gautreneau – IT Expert Department23/06/2017
  • 11. 11 Likely to result in high risks? [art. 35(1), (3) & (4)] Yes Prior consultation Yes No prior consultation No No DPIA needed No No DPIA [art. 35(7)] High residual risks? [art. 36(1)] Code(s) of conduct [art. 35(8)] Advice of the DPO [art. 35(2)] Monitor performance [art. 39(1) (c)] Seek the views of the data subjects [art. 35(9)] Yes Exception ? [art. 35(5) et (10)] Processing reviewed by the controller [art. 35(11)] Process overview Gaston Gautreneau – IT Expert Department23/06/2017
  • 12. www.dlapiper.com 12 Speaker Prof. dr. Patrick Van Eecke is partner in DLA Piper’s Brussels office and global co-chair of DLA Piper's Data Protection, Privacy and Security practice. He has over 20 years of international legal experience in privacy and data protection issues advising on the legal impact of big data, cloud computing and Internet of Things. Patrick advises multinational organisations on data protection and privacy issues and has in-depth knowledge of regulatory developments both in Belgium, EU Member States, and on a pan-European level. Patrick teaches European Cyberlaw at the University of Antwerp and King's College London.
  • 15. www.dlapiper.com 15 "Been there, done that. It is similar to our anti-bribery and anti-trust exercise" "We are ISO 72K compliant, so we are GDPR compliant" "It's just a European issue, why should we bother" "PII = personal data: let's keep our US approach" "We still have time, 25 May 2018 is the date we need to start our implementation" Some myths unveiled
  • 16. www.dlapiper.com 16 "Let's decrease our liability exposure, by spinning off data activities to a shared service center" "Data Protection = Consumer Protection, we only process employee and B2B data" "Let's change our website privacy policy, then we're fine" "It has never been enforced, it will never be enforced" "End users will never sue us" "We need a DPO, let's ask our CISO to take up this role" Some myths unveiled
  • 18. General Data Protection Regulation (GDPR): Tools to Accelerate the Journey Cindy E. Compert CIPT/M, CTO Data Security & Privacy, IBM Security JUNE 22, 2017
  • 19. 19 IBM Security “A ship in port is safe; but that is not what ships are built for. Sail out to sea and do new things” – Grace Hopper
  • 20. 20 IBM Security IBM’s Overall GDPR Framework: 5 phases to Readiness IBM PROPRIETARY Identify GDPR impact and plan Technical and Organisational Measures (TOM) Includes Data Protection controls, processes and solutions to be implemented. TOMs in place: Personal Data discovery, classification and governance in place Begin the new GDPR compliant way of working Monitor TOMs execution; deliver compliance evidence to internal and external stakeholders • Conduct GDPR assessments across privacy, governance, people, processes, data, security • Develop GDPR Readiness Roadmap • Identify personal data • Design governance, training, communication, and processes standards • Design privacy, data management and security management standards • Develop and embed procedures, processes, and tools • Deliver GDPR training • Develop/embed standards using Privacy by Design, Security by Design, data management policies • Execute all relevant business processes • Monitor security and privacy using TOMs • Manage data subject access and consent rights • Monitor, assess, audit, report and evaluate adherence to GDPR standards Assess Design Transform Operate Conform ActivityOutcomePhase Assessments and roadmap Defined implementation plan Process enhancements completed Operational framework in place Ongoing monitoring and reporting ©2017 IBM Corporation
  • 21. 21 IBM Security IBM Security Framework: Key Activities to address GDPR IBM PROPRIETARY Privacy Requirements Security Requirements ASSESS PREPARE: • Conduct GDPR Assessments, assess and document GDPR related policies • Assess data subject rights to consent, access, correct, delete, and transfer personal data DISCOVER: • Discover and classify personal data assets and affected systems • Identify access risks, supporting Privacy by Design PREPARE: • Assess security current state, identify gaps, benchmark maturity, establish conformance roadmaps • Identify vulnerabilities, supporting Security by Design DISCOVER: • Discover and classify personal data assets and affected systems to design Security controls DESIGN ROADMAP: • Create GDPR remediation/implementation plan PRIVACY BY DESIGN: • Design policies, business processes and supporting technologies • Create GDPR Reference Architecture • Evaluate Controller/Processor Governance ROADMAP: • Create Security remediation/implementation plan SECURITY BY DESIGN: • Create Security Reference Architecture • Design Technical and Organizational Measures (TOMs) appropriate to risk (encryption, pseudonimization, access control, monitoring, etc.) TRANSFORM TRANSFORM PROCESSES: • Implement and execute policies, processes and technologies • Automate data subject access requests PROTECT: • Implement privacy enhancing controls (e.g. encryption, tokenization, dynamic masking) • Implement security controls; mitigate access risks and security vulnerabilities ©2017 IBM Corporation Legend: Red=Tools available
  • 22. 22 IBM Security IBM Security Framework: Key Activities to address GDPR IBM PROPRIETARY Privacy Requirements Security Requirements OPERATE MANAGE GDPR PROGRAM: • Manage GDPR Data Governance Practices such as Information Lifecycle Governance • Manage GDPR Enterprise Conformance Programs such as data use, consent activities, data subject requests RUN SERVICES: • Monitor personal data access • Govern roles and identities MANAGE SECURITY PROGRAM: Manage and implement Security Program Practices such as risk assessment, roles and responsibilities, program effectiveness RUN SERVICES: • Monitor security operations and intelligence: monitor, detect, respond to and mitigate threats • Govern data incident response and forensics practices CONFORM DEMONSTRATE: • Record personal data access audit trail including data subject rights to access, modify, delete, transfer data • Run Data Processor/Controller Governance including providing processor guidance, track data processing activities, provide audit trail, preparing for data subject access requests • Document and manage compliance program - Ongoing monitoring, assessment, evaluation and reporting of GDPR activities RESPOND: o Respond to and manage breaches DEMONSTRATE: • Demonstrate technical and organizational measures to ensure security appropriate to processing risk • Document Security program - Ongoing monitoring, assessment, evaluation and reporting of security controls and activities RESPOND: o Respond to and manage breaches ©2017 IBM Corporation Legend: Red=Tools available
  • 23. 23 IBM Security Other activities with tools that can help address GDPR IBM PROPRIETARY PRIVACY REQUIREMENTS GOVERN Develop data lifecycle management processes Maintain enterprise vocabulary Manage Data Subject Quality Govern Risk and Compliance Vendor Management ©2017 IBM Corporation Legend: Red=Tools available
  • 25. GDPR brings new requirements 25 www.bigid.com BigID
  • 26. Addressing Subject Access Requests NEED TO KNOW WHO’S DATA IS IT! 26 Don’t know Who’s data is it Cannot detect Contextual PII Many False Positives ! Need to know Where is the data going www.bigid.com BigID Need to search Big Data
  • 27. Need an Inventory by Data Subject JUST KNOWING WHAT CLASS OF DATA IS FOUND WHERE IS NOT ENOUGH 27 Learning Based Discovery No Duplication of data Correlate to the identity Map identity Data Graph www.bigid.com BigID
  • 28. Data Subject Request Automation IDENTITY DATA INDEX PROVIDES ALL DATA SUBJECT INFORMATION AT YOUR FINGERTIPS 28 Quickly Find Personal Data Date Location Properties Export Personal Data Correlate Consent Approvals Trigger Data Deletion Provide as Self Service www.bigid.com BigID
  • 29. Responsible Breach Response IDENTITY INDEX HELPS YOU MINIMIZE YOUR EXPOSURE 29 Pinpoint Breach Time Scan Dark Web Breach Files Quickly Find Who was Impacted Pinpoint Breach Source Notify Only Who was Impacted www.bigid.com BigID
  • 30. Data Mapping True Automation ONCE YOU KNOW WHERE THE DATA IS, UNDERSTAND WHO IS ACCESSING IT www.bigid.com30 Top Down And Bottom Up Continuous Compliance Data Discovery, Not questionnaires Enrich with Business Information BigID
  • 31. QUESTIONS TIME! Have a question? Ask NOW!
  • 32. Disclaimer • Notice: Clients are responsible for ensuring their own compliance with various laws and regulations, including the European Union General Data Protection Regulation. Clients are solely responsibility for obtaining advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulations that may affect the clients’ business and any actions the clients may need to take to comply with such laws and regulations. The products, services, and other capabilities described herein are not suitable for all client situations and may have restricted availability. IBM does not provide legal, accounting or auditing advice or represent or warrant that its services or products will ensure that clients are in compliance with any law or regulation. • IBM’s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM’s sole discretion. • Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a purchasing decision. • The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code or functionality. Information about potential future products may not be incorporated into any contract. • The development, release, and timing of any future features or functionality described for our products remains at our sole discretion. Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user’s job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here. 2 None of the statements contained herein constitutes legal advice– it is process advice only.