GDPR The New Data Protection Law coming into effect May 2018. What does it mean for hospitals?
21 de Sep de 2017•0 recomendaciones
4 recomendaciones
Sé el primero en que te guste
ver más
•1,070 vistas
vistas
Total de vistas
0
En Slideshare
0
De embebidos
0
Número de embebidos
0
Descargar para leer sin conexión
Denunciar
Salud y medicina
GDPR The New Data Protection Law coming into effect May 2018. What does it mean for hospitals?
Anthe Papageorgiou, Compliance Officer & Data Protection Officer at Henry Dunant Hospital Center
GDPR The New Data Protection Law coming into effect May 2018. What does it mean for hospitals?
GENERAL DATA PROTECTION REGULATION
(GDPR)
A guide to security and data protection in life sciences
Preparing for 2018
To create a UNIFIED DATA PROTECTION LAW for all 28 European Countries.
To ENHANCE THE LEVEL OF DATA PROTECTION for EU data subjects
To MODERNIZE THE LAW in line with existing and emerging technologies
GDPR will fundamentally change the way
companies must manage their data
PRIMARY OBJECTIVES OF THE GDPR
GDPR came into force in May 2016 and will be applicable as of
25 May 2018
• It also has international reach – applying to any organization
that processes data of EU data subjects.
• Fines for non-compliance will increase substantially up to a
maximum fine of € 20 million or 4% of global annual turnover
per incident, whichever is higher
KEY ASPECTS OF THE REGULATION
MEDICAL DEPARTMENT
Nursing department
Medical laboratories
Biomedical technology
Pharmacy
ADMINISTRATIVE SERVICES
The board
Human Recourses,
Legal , Compliance
Procurement
Medical record maintenance department
IT, marketing and planning ,
education and Training ,
Billing and Collection ,
material management,
Hospital security
HEALTH CARE PROVIDER’ S ORGANIZATIONAL STRUCTURE
Lawfulness, fairness and transparency
Personal data must be processed lawfully, fairly, and in a transparent manner
Personal data must be collected for specified, explicit and legitimate purposes
and not further processed in a way incompatible with those purposes.
Data minimization Personal data must be adequate, relevant and limited to
those which are necessary
Accuracy Personal data must be accurate and, where necessary, kept up to
date;
Storage limitation they should be kept for no longer than is necessary
Integrity and confidentiality appropriate security of the personal data,
including protection against unauthorised or unlawful processing and against
accidental loss, destruction or damage.
KEY PRINCIPLES
•Erasure
•Rectification
•Data Portability and data sharing
stating that the data subject has the right to receive their data in an appropriate
format without hindrance and for data to be transferred between data controllers
where technically feasible
•Restricted Automated decisions and profiling
• Objection to direct marketing
• Claim of compensation from the data controller or processor for damage suffered
■ member states should enact local laws providing criminal sanctions for a
breach of the GDPR.
■ Claims or complaints may be made by not-for-profit bodies, organisations or
associations.
■ on behalf of a group of data subjects.
NEW RIGHTS FOR THE INDIVIDUAL
The appointment of a data protection officer (DPO)
The obligation to carry out privacy risk impact assessments (DPIA)
New data breach notification requirements
Requirement to apply Privacy by design and by Default,
Appropriate Documentation
Monitoring and verifying compliance regular audit
Consent necessary to process children’s data
Changes to the rules for obtaining valid consent
Heavy Fines for controller and PROCESSOR
ENHANCED OBLIGATIONS
Data protection: hidden risks, clear opportunities
Or the opposite :
Data protection: clear risks, hidden opportunities
INVOLVE THE BOARD
4
create DATA FLOW MAPPING
conduct RISK ANALYSIS and DPIA
Run a GDPR compliance GAP ANALYSIS
Implement SECURITY MEASURES
PROJECT GDPR COMPLIANCE 1/4
DISASTER RECOVERY PLAN
PRIVACY AND DATA PROTECTION POLICIES
DATA SUBJECT ACCESS REQUEST (DSAR) PROTOCOLS
DATA BREACH PROTOCOLS
SECURITY POLICIES
DATA RETENTION POLICIES
DATA SUBJECT NOTIFICATIONS
INCIDENT RESPONSE PLANS
DATA TRANSFER AND DATA SHARING AGREEMENTS
DATA PROCESSING AGREEMENTS
DRAFT POLICIES, PLANS AND PROCEDURES
PROJECT GDPR COMPLIANCE 2/4
TRAINING PROCESS AND AWARENESS PROGRAMS
KEY VENDOR CONTRACTS / THIRD-PARTY RISK
CONSENT OF DATA SUBJECTS
NOTIFICATIONS TO DATA SUBJECTS &
DATA SUBJECT’S RIGHT TO ACCESS, MODIFY, TRANSFER
DATA
PROJECT GDPR COMPLIANCE 3/4
10
DATA BREACH NOTIFICATION
■ describe the nature of the breach;
■ state the number of the data subjects affected by the breach;
■ describe the likely consequences of the breach;
■ describe the measures taken or proposed to be taken by the controller to remedy
the breach.
■ There is a tight deadline of 72 hours
INTERNAL BREACH NOTIFICATION PROCEDURES
identification systems and incident response plans
Internal breach register:
Insurance policies
PROJECT GDPR COMPLIANCE 4/4
MONITORING & AUDITING- IMPROVEMENTS
GDPR IS NOT A DEADLINE OR A
DESTINATION,
IT IS A JOURNEY
PRIVACY PRINCIPLES FOR THE HEALTHCARE PROVIDER
The changes to data protection rules are not revolutionary – the key principles, remain in place but with many new requirements Some Remain Consistent with the Directive 95/46/CE
Lawfulness, fairness and transparency
Personal data must be processed lawfully, fairly, and in a transparent manner
Personal data must be collected for specified, explicit and legitimate purposes and not further processed in a way incompatible with those purposes.
Data minimization Personal data must be adequate, relevant and limited to those which are necessary
Accuracy Personal data must be accurate and, where necessary, kept up to date;
Storage limitation they should be kept for no longer than is necessary
Integrity and confidentiality appropriate security of the personal data, including protection against unauthorised or unlawful processing and against accidental loss, destruction or damage.
new rights for the individual
Erasure
•Rectification
•Data Portability and data sharing/
stating that the data subject has the right to receive their data in an appropriate format without hindrance and for data to be transferred between data controllers where technically feasible
•Restricted Automated decisions and profiling
• Objection to direct marketing
• Claim of compensation from the data controller or processor for damage suffered
■ member states should enact local laws providing criminal sanctions for a breach of the GDPR.
■ Claims or complaints may be made by not-for-profit bodies, organisations or associations.
■ on behalf of a group of data subjects
The obligation to keep an internal register ,a record of all data processing activities.
available for inspection to the supervisory authority upon request.
The appointment of a data protection officer (DPO)
The obligation to carry out privacy risk impact assessments DPIA
New data breach notification requirements
Requirement to apply Privacy by design and by Default,
Appropriate Documentation maintaining a clear written record of all data operations
Monitoring and verifying compliance regular audit
Consent necessary to process children’s data
Changes to the rules for obtaining valid consent
Heavy Fines for controller and PROCESSOR
Under the GDPR, the maximum amount of financial sanctions is harmonized and increased up to 4% of the total worldwide annual turnover or 20 million euros, whichever is the greater
AS A FIRST STEP΄¨ ADVISE MEMBERS OF THE BOARD TO ASSIGN RESPONSIBILITY AND BUDGET FOR DATA PROTECTION COMPLIANCE WITHIN YOUR HOSPITAL
You should ask them
Are YOU investing appropriately in protecting our network, computing devices, Internet-connected devices and data relevant to their value and criticality to the operation of our hospital?
Do YOU consider cyber security a part of our overall strategic and operational business decisions?
The five principles of the Boards responsibility by The National Association of Corporate Directors concerning cyber security :
PRINCIPLE 1: Directors need to understand and approach cyber security as an enterprisewide risk-management issue, not just an IT issue.
PRINCIPLE 2: Directors should understand the legal implications of cyber risks as they relate to their company’s specific circumstances.
PRINCIPLE 3: Boards should have adequate access to cyber security expertise, and discussions about cyber-risk management should be given regular and adequate time on the board meeting agenda.
PRINCIPLE 4: Directors should set the expectation that management will establish an enterprise-wide, cyber-risk management framework with adequate staffing and budget.
PRINCIPLE 5: Board discussion of cyber risk management should include identification of which risks to avoid, accept, mitigate, or transfer through insurance, as well as specific plans associated with each approach.
The board should Develop an implement governance framework,
The Dpo should proposE, design and implement solutions that protect access and align to business growth Objectives
Then you should help them build a culture of privacy through awareness programs
As you can see there s a direct line of communication with the board, subjects and authorities.
The DPO should involve key persons and make a supporting Team . Those usually are
ΙΤ-cio ATTENDS processes pertaining
to data security, availability and confidentiality and ensure that they are well documented,
DR systems.
a breach of data security,
-CROs- The head of risk perhaps the most important person within an organisation in ensuring that GDPR compliance is maintained. s will be responsible for setting compliance frameworks and audits, interpreting the GDPR and assessing risk,
HR . Because as a DPO you have to protect the staff as well, and treat employees as personal data subjects
What kind of personal data and sensitive p data do u keep?
Do you obtain consent and is it valid under GDPR?
how long do you keep them?
Legal AND COMPLIANCE . How they should deal with a request, or multiple concurrent requests for provision of p.d ?
Is your answer within GDPR deadline?
Is there a documented process?
Review of all contracts
Procurement Are there sub-contractors processing pd on your behalf?
Do they take all safety measures to protect pd?
Do they meet the GDPR requirements?
CREATE DATA MAPPING you need to discover and classify P.D
What & where is it? Understand and document where Personal Data is stored and processed, including with/by 3rd parties
Why it matters:
• Hospitals like any other organization need to understand what data they hold and process to assess risk and design adequate controls
• are necessary to support Data Portability,Right of Access,
CONDUCT RISK ANALYSIS AND DATA PROTECTION IMPACT ASSESSMENTS Identify significant risks and areas which require immediate action to help you better manage risk The Data Protection Impact Assessments include assessing risks, ‘including safeguards, security measures and mechanisms to ensure the protection of personal data and demonstrate compliance with this regulation
RUN A GDPR COMPLIANCE GAP ANALYSIS - ACCESS YOURSELF
to identify areas of most material noncompliance and to priorities mitigating steps, especially in relation to high risk processing activities
Assess yourself in the areas of consent and marketing.
Assess your compliance with data protection in the specific areas of information security policy and risk, mobile working, removable media, access controls and malware protection.
include physical security processes
assess the compliance of your CCTV including the installation, management, operation, and public awareness and signage.
Implement technical and organizational security measures appropriate to the risks presented The only technical controls mentioned in GDPR are encryption and pseudonymisation (de-identifying datawith a mechanism to re-identify if necessary)
Clients may not need to notify data subjects about a breach if the
personal data has been rendered “unintelligible to any person who is not
authorised to access it, such as encryption”.
Records management
Develop records management policy and procedures
When storing physical records, make sure they're secure in rest and in motion
Outsourcing
Records inventories
Tracking and off-site storage
Security and disposal of data
Business continuity
Record creation, storage and disposal, access, tracking and off-site storage.
training process and awareness programs
staff handbooks
training material
key vendor contracts Third-party risk
there are also significant risks which can and should be minimized through appropriate contractual clauses, as well as
by conducting due diligence on third party vendors, to ensure that those operating on behalf of your organization ( partners and service providers) are capable of operating in compliance with the GDPR.
Audit existing supplier arrangements and update template RFP and procurement contracts
8. Consent of data subjects -
• should be explicit It has to be opt in , not opt out and no response means no consent.
Consent must also now be separable from other written agreements, is given before data is processed and should be as easily revoked as given.
data subjects are informed that they have the right to withdraw consent at any time but that this will not affect the lawfulness of processing based on consent before its withdrawal;
Consent is not the only legal basis for processing personal data though. When there is a legitimate interest involved, consent is given after the processing and even if the subject objects, the processing doesn’t stop.
9. Notifications to data subjects & data subject’s right to access, modify, delete, transfer data
The controller is obliged to respond to requests from the data subject without undue delay and at the latest within one month and to give reasons where the controller does not intend to comply with any such requests.
Determine if you work in a sector where exemptions are ………. By a EU member’s National legislation
Focus on Preparedness for the inevitable
YOUR INCIDENT RESPONSE PLAN to a malware attack:
at first you should access the extention of the damage, in order to see if you can contain the attack and stop the spreading of the malware .
Then triage question should be answered, like
Whats affected,
who did it,
how did it happen,
is it ongoing or an isolated incident
.how critical is it, etc.
There was a huge dbate about wether a ransomeware attack qualifies as a reportable breach incident. The conclusion was that YES A RANSOMEWARE ATTACK is a Reportable breach, but because every situation is fact based , there are few limited exceptions.
Like Australian authorities already did, they will be guiding lines or mandatory provisions about when a data breach is always reportable.
After a Data breach report, the regulators will examine