SlideShare una empresa de Scribd logo
1 de 47
Descargar para leer sin conexión
DESIGNING PRODUCTS
AND SERVICES WITH
GDPR
#DigitalPond @danny_bluestone
Introducing GDPR
What is GDPR?

1. Transparency
2. Privacy

3. Control
Conclusion
TODAY
#DigitalPond @danny_bluestone
HELLO. I AM DANNY.
#DigitalPond @danny_bluestone
21%
- are a -
Data
Liberator
They think data will make
us healthier, safe and more
efficient. They’re up for
the big data revolution.
40%
- are a -
Savvy
Sharer
They’re optimists. Data
should be used freely in
most situations, but not all.
29%
- are a -
Data
Regulator
They think that big data can
be useful. But we need to
consider decisions carefully.
10%
- are a -
Privacy
Protector
They don’t believe the big
data hype. They want to
regain privacy, no matter
what the cost.
#DigitalPond @danny_bluestone
INTRODUCING GDPR
The rise of digital and data is unparalleled
#DigitalPond @danny_bluestone
The issue is that brands know more about us
than we know about ourselves
#DigitalPond @danny_bluestone
Tinder has 800 pages of information on one
of its users, including age-rank of matches
and how many facebook friends she had
#DigitalPond @danny_bluestone
#DigitalPond @danny_bluestone
There are moral arguments about all of this
The Ponemon Institute Research report May 2017
49%
HAD A DOCUMENT BREACH
IN THE PAST 2 YEARS
73%
EMPLOYEES ARE
ACCIDENTALLY
EXPOSING INFORMATION
63%
OF STAFF UNABLE TO
LOCATE SENSITIVE DATA
#DigitalPond @danny_bluestone
Do businesses know what they are doing?
11
WHO IS BEHIND GDPR?
12
Official EU website, no information about GDPR
European Data Protection Board, no link to GDPR
guidelines some internal facing articles
The EUR-LUX website (searchable database) contains
EU law, the journal of the Union and international
agreements. It is also home to the GDPR articles. The
articles are not prominent on the homepage.
There ls a link to the GDPR PDF or web page with 54K
words over 102 word pages
Giovanni Buttarelli is the
European Data Protection
Supervisor.
Wojciech Wiewiórowski is the
Assistant Supervisor at the
EDPS.
The GDPR includes new regulations to prior directives.
Accountability
Risk-based approach
Privacy by design
(PbD)
Rights of erasure
Data portability
Transparency/
Consent
#DigitalPond @danny_bluestone
14
The Processor is an entity that processes
data on behalf of the controller. They need
to conform to the processes, audits,
breach and Disaster Recovery policies.
The Controller determines the purposes and
means of the processing of personal data.
They have a legal responsibility to appoint
‘qualified’ Processors.
#DigitalPond @danny_bluestone
#DigitalPond @danny_bluestone
Only collect the data you
need and ensure that it is
accessible by users so they
can update it. Maintain
retention policies.
Transparency
The service must be clear
and collected for specified
purposes through explicit
consent.
ControlsPrivacy
Implement PbD, backup
and DR methods to ensure
data security and resilience.
Don't compromise users’
identities.
Cyber-Duck Ltd
TRANSPARENCY
Prepare for Subject Access Requests (SARS)
#DigitalPond @danny_bluestone
How to handle SARs
Requirement
Legal
response time
Facebook Majestic Wine
View data held
following SAR
1 month
No response (have export button to view
likes, timeline posts, friends made etc’)
Responded in time
Follow-up to the SAR Immediate
Did not respond to original SAR by email
as explained there is a download function
N/A
With GDPR users will be entitled to know how long their data is stored, enjoy data
portability (e.g. porting data from one bank to another) and have their data erased
without a court request.
#DigitalPond @danny_bluestone
The importance of consent
It is important that consent is ‘Unbundled’ and as ‘Granular’ as possible. There should
be no ‘Opt-out’. Only provide ‘Opt-in’. Ensure that consent is ‘Easy to withdraw’.
Note: You will also need to name any parties that will rely on consent. Using words
like third parties or categories will not be acceptable.
#DigitalPond @danny_bluestone
Unbundled consent
#DigitalPond @danny_bluestone
Poor consent
#DigitalPond @danny_bluestone
Audited consent
#DigitalPond @danny_bluestone
PRIVACY
Not doing enough to protect identities
#DigitalPond @danny_bluestone
How to deal with messaging and live-chat
#DigitalPond @danny_bluestone
Design ‘retrospective privacy’ functions
#DigitalPond @danny_bluestone
The difference between anonymisation and
pseudonymisation
Anonymisation means erasing any personal data with permanent fictitious values.

Pseudonymisation replaces identifiable data with a persistent and reversible token.
Name Pseudonym (token) Anonymised
Jonny aERT xyz
Veronica Oqwti xyz
Sylvain SqaL xyz
Jonny aERT xyz
#DigitalPond @danny_bluestone
The difference between anonymisation and
pseudonymisation
Anonymisation
#DigitalPond @danny_bluestone
Pseudonymisation
Useful for when granularity of data
is not important and reverting
back is not required
Useful is you want to masquerade
data, protect privacy but need to
revert back to original
Dynamic IP addresses
A dynamic IP address will be personal data in the hands of a website operator if there
is another party (i.e. ISP) that can link the dynamic IP address to the identity of an
individual and the website operator has a "legal means" of obtaining access to the
information held by the ISP in order to identify the individual.
19 October 2016, the Court of Justice of the European Union (the "CJEU")
Note: Don’t store server logs if you do not have to. Encrypt logs in storage and limit access to decryption credentials.
#DigitalPond @danny_bluestone
Implied consent is not sufficient - “By using this site, you
accept cookies” message is not going to cut it.
Users can reject cookies - Easily let users withdraw consent
and opt-out so they are able to adjust their preferences.
The Cookie madness, an ongoing saga!
#DigitalPond @danny_bluestone
Deleting data
Data Subjects have the right to obtain erasure from
the data controller, without undue delay. This means
backups too. Make sure you can quickly pinpoint a
backup and delete a particular record or file.
#DigitalPond @danny_bluestone
1. Privacy must be proactive, not reactive.
2. Privacy must be the default setting.
3. Privacy must be embedded into design.
4. Privacy must contain a balance between privacy and security.
5. Privacy offers end-to-end lifecycle protection of user data.
6. Privacy standards must be visible, transparent.
7. Privacy must be user-centric.
Privacy by design (PbD)
#DigitalPond @danny_bluestone
“…With the implementation of the GDPR and
the principle of ‘privacy by default’,
organizations can no longer hide behind the
argument that they are technologically unable to
act in line with the regulations”
Vita Zwaan, lawyer & lead Privacy Team Bureau Brandeis
#DigitalPond @danny_bluestone
CONTROL
Limit the amount of data you capture
#DigitalPond @danny_bluestone
Allow users to maintain accurate information
#DigitalPond @danny_bluestone
Set and maintain data policies
#DigitalPond @danny_bluestone
Why give users ‘data portability’ capabilities?
Data portability is a concept to protect users from having their data stored in "silos"
or "walled gardens" that are incompatible with one another, i.e. closed platforms, thus
subjecting them to vendor lock-in (Wikipedia).
TRANSPARENCY
& ANALYSIS
HELP USERS
SWITCH
#DigitalPond @danny_bluestone
Be ready for breaches
#DigitalPond @danny_bluestone
Educate your staff
http://cybrd.uk/dp-quiz
#DigitalPond @danny_bluestone
PROCESS 

WHERE TO START
Apply a process to your GDPR initiative1
Data audit1 Gap analysis2 Make a plan3 Execute4 Train everyone5
#DigitalPond @danny_bluestone
Register for an ICO certificate2
#DigitalPond @danny_bluestone
Embed GDPR in your CX and marketing3
Lloyds concluded that if it was going to avoid losing customers, it needed
to overhaul the CRM programme to reflect what people actually want.
#DigitalPond @danny_bluestone
CONCLUSION
1. Saving less data is taking less risk - Store only what you need.
2. Use PbD - Consider systems, messaging and encryption to determine who sees
what and why.
3. Be aware - Besides GDPR look out for other laws like e-privacy and PSD2.
4. Consent - Obtain explicit consent for everything and ensure you have audit trails.
5. Policies and process - Be ready for SARs and ensure you have retention policies.
Conclusions from the Cyber-Duck talk
#DigitalPond @danny_bluestone
@DANNY_BLUESTONE
@CYBERDUCK_UK
THANKS FOR LISTENING
All images in this presentation are copyright of their respective owners

Más contenido relacionado

La actualidad más candente

Putting Buyers and Sellers in the Best Light, How Etsy Leverages Big Data for...
Putting Buyers and Sellers in the Best Light, How Etsy Leverages Big Data for...Putting Buyers and Sellers in the Best Light, How Etsy Leverages Big Data for...
Putting Buyers and Sellers in the Best Light, How Etsy Leverages Big Data for...Dana Gardner
 
How a Hackathon Approach Juices Innovation on Big Data Applications for Thoms...
How a Hackathon Approach Juices Innovation on Big Data Applications for Thoms...How a Hackathon Approach Juices Innovation on Big Data Applications for Thoms...
How a Hackathon Approach Juices Innovation on Big Data Applications for Thoms...Dana Gardner
 
IT Support Gains Automation and Intelligence to Bring Self-Service to Both Le...
IT Support Gains Automation and Intelligence to Bring Self-Service to Both Le...IT Support Gains Automation and Intelligence to Bring Self-Service to Both Le...
IT Support Gains Automation and Intelligence to Bring Self-Service to Both Le...Dana Gardner
 
Is big data handicapped by "design"? Seven design principles for communicatin...
Is big data handicapped by "design"? Seven design principles for communicatin...Is big data handicapped by "design"? Seven design principles for communicatin...
Is big data handicapped by "design"? Seven design principles for communicatin...Zach Gemignani
 
Thoughts on Data & Design
Thoughts on Data & DesignThoughts on Data & Design
Thoughts on Data & DesignHollie Lubbock
 
How Modern Operational Services Leads to More Self-Managing, Self-Healing, an...
How Modern Operational Services Leads to More Self-Managing, Self-Healing, an...How Modern Operational Services Leads to More Self-Managing, Self-Healing, an...
How Modern Operational Services Leads to More Self-Managing, Self-Healing, an...Dana Gardner
 
Rolta AdvizeX Experts on Hastening Time to Value for Big Data Analytics in He...
Rolta AdvizeX Experts on Hastening Time to Value for Big Data Analytics in He...Rolta AdvizeX Experts on Hastening Time to Value for Big Data Analytics in He...
Rolta AdvizeX Experts on Hastening Time to Value for Big Data Analytics in He...Dana Gardner
 
Turning Data into Dollars
Turning Data into DollarsTurning Data into Dollars
Turning Data into DollarsZach Gemignani
 
3 razones para contar historias...
3 razones para contar historias...3 razones para contar historias...
3 razones para contar historias...Data IQ Argentina
 
Beyond Data Visualization: What's next in communicating with data?
Beyond Data Visualization: What's next in communicating with data?Beyond Data Visualization: What's next in communicating with data?
Beyond Data Visualization: What's next in communicating with data?Zach Gemignani
 
Redcentric Uses Advanced Configuration Database to Bring into Focus Massive M...
Redcentric Uses Advanced Configuration Database to Bring into Focus Massive M...Redcentric Uses Advanced Configuration Database to Bring into Focus Massive M...
Redcentric Uses Advanced Configuration Database to Bring into Focus Massive M...Dana Gardner
 
How New Technology Trends Will Disrupt the Very Nature of Business
How New Technology Trends Will Disrupt the Very Nature of Business How New Technology Trends Will Disrupt the Very Nature of Business
How New Technology Trends Will Disrupt the Very Nature of Business Dana Gardner
 
ITIL-ITSM Tagteam Boosts Mexican ISP INFOTEC's Service Desk and Monitoring Op...
ITIL-ITSM Tagteam Boosts Mexican ISP INFOTEC's Service Desk and Monitoring Op...ITIL-ITSM Tagteam Boosts Mexican ISP INFOTEC's Service Desk and Monitoring Op...
ITIL-ITSM Tagteam Boosts Mexican ISP INFOTEC's Service Desk and Monitoring Op...Dana Gardner
 
Game-Changing Demands on Network Management Require a Secure, Integrated, and...
Game-Changing Demands on Network Management Require a Secure, Integrated, and...Game-Changing Demands on Network Management Require a Secure, Integrated, and...
Game-Changing Demands on Network Management Require a Secure, Integrated, and...Dana Gardner
 
How Analytics as a Service Changes the Game and Expands the Market for Big Da...
How Analytics as a Service Changes the Game and Expands the Market for Big Da...How Analytics as a Service Changes the Game and Expands the Market for Big Da...
How Analytics as a Service Changes the Game and Expands the Market for Big Da...Dana Gardner
 
Improved IT Asset and Configuration Management Allow Health Shared Services B...
Improved IT Asset and Configuration Management Allow Health Shared Services B...Improved IT Asset and Configuration Management Allow Health Shared Services B...
Improved IT Asset and Configuration Management Allow Health Shared Services B...Dana Gardner
 
The Digital Workplace - Redefining Productivity in the Information Age
The Digital Workplace - Redefining Productivity in the Information AgeThe Digital Workplace - Redefining Productivity in the Information Age
The Digital Workplace - Redefining Productivity in the Information AgeElizabeth Lupfer
 
How Unisys and Microsoft Team Up To Ease Complex Cloud Adoption For Governmen...
How Unisys and Microsoft Team Up To Ease Complex Cloud Adoption For Governmen...How Unisys and Microsoft Team Up To Ease Complex Cloud Adoption For Governmen...
How Unisys and Microsoft Team Up To Ease Complex Cloud Adoption For Governmen...Dana Gardner
 

La actualidad más candente (20)

Putting Buyers and Sellers in the Best Light, How Etsy Leverages Big Data for...
Putting Buyers and Sellers in the Best Light, How Etsy Leverages Big Data for...Putting Buyers and Sellers in the Best Light, How Etsy Leverages Big Data for...
Putting Buyers and Sellers in the Best Light, How Etsy Leverages Big Data for...
 
How a Hackathon Approach Juices Innovation on Big Data Applications for Thoms...
How a Hackathon Approach Juices Innovation on Big Data Applications for Thoms...How a Hackathon Approach Juices Innovation on Big Data Applications for Thoms...
How a Hackathon Approach Juices Innovation on Big Data Applications for Thoms...
 
IT Support Gains Automation and Intelligence to Bring Self-Service to Both Le...
IT Support Gains Automation and Intelligence to Bring Self-Service to Both Le...IT Support Gains Automation and Intelligence to Bring Self-Service to Both Le...
IT Support Gains Automation and Intelligence to Bring Self-Service to Both Le...
 
Is big data handicapped by "design"? Seven design principles for communicatin...
Is big data handicapped by "design"? Seven design principles for communicatin...Is big data handicapped by "design"? Seven design principles for communicatin...
Is big data handicapped by "design"? Seven design principles for communicatin...
 
Thoughts on Data & Design
Thoughts on Data & DesignThoughts on Data & Design
Thoughts on Data & Design
 
How Modern Operational Services Leads to More Self-Managing, Self-Healing, an...
How Modern Operational Services Leads to More Self-Managing, Self-Healing, an...How Modern Operational Services Leads to More Self-Managing, Self-Healing, an...
How Modern Operational Services Leads to More Self-Managing, Self-Healing, an...
 
Rolta AdvizeX Experts on Hastening Time to Value for Big Data Analytics in He...
Rolta AdvizeX Experts on Hastening Time to Value for Big Data Analytics in He...Rolta AdvizeX Experts on Hastening Time to Value for Big Data Analytics in He...
Rolta AdvizeX Experts on Hastening Time to Value for Big Data Analytics in He...
 
Turning Data into Dollars
Turning Data into DollarsTurning Data into Dollars
Turning Data into Dollars
 
3 razones para contar historias...
3 razones para contar historias...3 razones para contar historias...
3 razones para contar historias...
 
Beyond Data Visualization: What's next in communicating with data?
Beyond Data Visualization: What's next in communicating with data?Beyond Data Visualization: What's next in communicating with data?
Beyond Data Visualization: What's next in communicating with data?
 
Redcentric Uses Advanced Configuration Database to Bring into Focus Massive M...
Redcentric Uses Advanced Configuration Database to Bring into Focus Massive M...Redcentric Uses Advanced Configuration Database to Bring into Focus Massive M...
Redcentric Uses Advanced Configuration Database to Bring into Focus Massive M...
 
Digital Workplace Framework
Digital Workplace FrameworkDigital Workplace Framework
Digital Workplace Framework
 
How New Technology Trends Will Disrupt the Very Nature of Business
How New Technology Trends Will Disrupt the Very Nature of Business How New Technology Trends Will Disrupt the Very Nature of Business
How New Technology Trends Will Disrupt the Very Nature of Business
 
ITIL-ITSM Tagteam Boosts Mexican ISP INFOTEC's Service Desk and Monitoring Op...
ITIL-ITSM Tagteam Boosts Mexican ISP INFOTEC's Service Desk and Monitoring Op...ITIL-ITSM Tagteam Boosts Mexican ISP INFOTEC's Service Desk and Monitoring Op...
ITIL-ITSM Tagteam Boosts Mexican ISP INFOTEC's Service Desk and Monitoring Op...
 
Game-Changing Demands on Network Management Require a Secure, Integrated, and...
Game-Changing Demands on Network Management Require a Secure, Integrated, and...Game-Changing Demands on Network Management Require a Secure, Integrated, and...
Game-Changing Demands on Network Management Require a Secure, Integrated, and...
 
How Analytics as a Service Changes the Game and Expands the Market for Big Da...
How Analytics as a Service Changes the Game and Expands the Market for Big Da...How Analytics as a Service Changes the Game and Expands the Market for Big Da...
How Analytics as a Service Changes the Game and Expands the Market for Big Da...
 
Improved IT Asset and Configuration Management Allow Health Shared Services B...
Improved IT Asset and Configuration Management Allow Health Shared Services B...Improved IT Asset and Configuration Management Allow Health Shared Services B...
Improved IT Asset and Configuration Management Allow Health Shared Services B...
 
The Digital Workplace - Redefining Productivity in the Information Age
The Digital Workplace - Redefining Productivity in the Information AgeThe Digital Workplace - Redefining Productivity in the Information Age
The Digital Workplace - Redefining Productivity in the Information Age
 
G suite sales presentation
G suite sales presentationG suite sales presentation
G suite sales presentation
 
How Unisys and Microsoft Team Up To Ease Complex Cloud Adoption For Governmen...
How Unisys and Microsoft Team Up To Ease Complex Cloud Adoption For Governmen...How Unisys and Microsoft Team Up To Ease Complex Cloud Adoption For Governmen...
How Unisys and Microsoft Team Up To Ease Complex Cloud Adoption For Governmen...
 

Similar a Designing products and services with GDPR

The Meaning and Impact of the General Data Protection Regulation
The Meaning and Impact of the General Data Protection RegulationThe Meaning and Impact of the General Data Protection Regulation
The Meaning and Impact of the General Data Protection RegulationJake DiMare
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsAT Internet
 
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Design
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by DesignSay Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Design
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Designbradley_g
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationcaniceconsulting
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in MindGosia Fraser
 
Spotlight on Technology 2017
Spotlight on Technology 2017Spotlight on Technology 2017
Spotlight on Technology 2017Craig Devlin
 
The General data protection regulation : Salient clauses
The General data protection regulation : Salient clausesThe General data protection regulation : Salient clauses
The General data protection regulation : Salient clausesSyed Nazir Razik ACP, CSM, PMP
 
Interview With Eric Vanderburg, Cyber Security & Privacy Expert
Interview With Eric Vanderburg, Cyber Security & Privacy ExpertInterview With Eric Vanderburg, Cyber Security & Privacy Expert
Interview With Eric Vanderburg, Cyber Security & Privacy ExpertMuhammad Khan
 
Tech For Good Meetup 10.11.14 The Good Data
Tech For Good Meetup 10.11.14 The Good DataTech For Good Meetup 10.11.14 The Good Data
Tech For Good Meetup 10.11.14 The Good DataTech For Good
 
Module 5 - Legislation - Online
Module 5 - Legislation - OnlineModule 5 - Legislation - Online
Module 5 - Legislation - Onlinecaniceconsulting
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...IBM Security
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.jayceewong1
 
How Data Loss Prevention End-Point Agents Use HPE IDOL’s Comprehensive Data C...
How Data Loss Prevention End-Point Agents Use HPE IDOL’s Comprehensive Data C...How Data Loss Prevention End-Point Agents Use HPE IDOL’s Comprehensive Data C...
How Data Loss Prevention End-Point Agents Use HPE IDOL’s Comprehensive Data C...Dana Gardner
 
NetSquared London - GDPR for charities
NetSquared London - GDPR for charitiesNetSquared London - GDPR for charities
NetSquared London - GDPR for charitiesTech Trust
 
Future of privacy - Insights from Discussions Building on an Initial Perspect...
Future of privacy - Insights from Discussions Building on an Initial Perspect...Future of privacy - Insights from Discussions Building on an Initial Perspect...
Future of privacy - Insights from Discussions Building on an Initial Perspect...Future Agenda
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...Symantec
 
Privacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital AgePrivacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital AgeAgile Financial Technologies
 
Designing for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public WorldDesigning for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public WorldRobert Stribley
 
Potential Advantages Of An Insider Attack
Potential Advantages Of An Insider AttackPotential Advantages Of An Insider Attack
Potential Advantages Of An Insider AttackSusan Kennedy
 

Similar a Designing products and services with GDPR (20)

The Meaning and Impact of the General Data Protection Regulation
The Meaning and Impact of the General Data Protection RegulationThe Meaning and Impact of the General Data Protection Regulation
The Meaning and Impact of the General Data Protection Regulation
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
 
GDPRforum London
GDPRforum LondonGDPRforum London
GDPRforum London
 
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Design
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by DesignSay Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Design
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Design
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislation
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in Mind
 
Spotlight on Technology 2017
Spotlight on Technology 2017Spotlight on Technology 2017
Spotlight on Technology 2017
 
The General data protection regulation : Salient clauses
The General data protection regulation : Salient clausesThe General data protection regulation : Salient clauses
The General data protection regulation : Salient clauses
 
Interview With Eric Vanderburg, Cyber Security & Privacy Expert
Interview With Eric Vanderburg, Cyber Security & Privacy ExpertInterview With Eric Vanderburg, Cyber Security & Privacy Expert
Interview With Eric Vanderburg, Cyber Security & Privacy Expert
 
Tech For Good Meetup 10.11.14 The Good Data
Tech For Good Meetup 10.11.14 The Good DataTech For Good Meetup 10.11.14 The Good Data
Tech For Good Meetup 10.11.14 The Good Data
 
Module 5 - Legislation - Online
Module 5 - Legislation - OnlineModule 5 - Legislation - Online
Module 5 - Legislation - Online
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
 
How Data Loss Prevention End-Point Agents Use HPE IDOL’s Comprehensive Data C...
How Data Loss Prevention End-Point Agents Use HPE IDOL’s Comprehensive Data C...How Data Loss Prevention End-Point Agents Use HPE IDOL’s Comprehensive Data C...
How Data Loss Prevention End-Point Agents Use HPE IDOL’s Comprehensive Data C...
 
NetSquared London - GDPR for charities
NetSquared London - GDPR for charitiesNetSquared London - GDPR for charities
NetSquared London - GDPR for charities
 
Future of privacy - Insights from Discussions Building on an Initial Perspect...
Future of privacy - Insights from Discussions Building on an Initial Perspect...Future of privacy - Insights from Discussions Building on an Initial Perspect...
Future of privacy - Insights from Discussions Building on an Initial Perspect...
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
 
Privacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital AgePrivacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital Age
 
Designing for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public WorldDesigning for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public World
 
Potential Advantages Of An Insider Attack
Potential Advantages Of An Insider AttackPotential Advantages Of An Insider Attack
Potential Advantages Of An Insider Attack
 

Más de Cyber-Duck

Business X Design - People, Planet & Product
Business X Design - People, Planet & ProductBusiness X Design - People, Planet & Product
Business X Design - People, Planet & ProductCyber-Duck
 
Scaling our digital agency during the 2020 pandemic - Imperial College lecture
Scaling our digital agency during the 2020 pandemic - Imperial College lectureScaling our digital agency during the 2020 pandemic - Imperial College lecture
Scaling our digital agency during the 2020 pandemic - Imperial College lectureCyber-Duck
 
Fixing user experience (UX) through trust - SXSW keynote
Fixing user experience (UX) through trust - SXSW keynoteFixing user experience (UX) through trust - SXSW keynote
Fixing user experience (UX) through trust - SXSW keynoteCyber-Duck
 
How to use ux thinking to generate meaningful marketing insights v0101d
How to use ux thinking to generate meaningful marketing insights v0101dHow to use ux thinking to generate meaningful marketing insights v0101d
How to use ux thinking to generate meaningful marketing insights v0101dCyber-Duck
 
Empowering brands through better UX
Empowering brands through better UXEmpowering brands through better UX
Empowering brands through better UXCyber-Duck
 
Hackers guide to UX - 2017
Hackers guide to UX - 2017Hackers guide to UX - 2017
Hackers guide to UX - 2017Cyber-Duck
 
Demystifying Digital transformation
Demystifying Digital transformation Demystifying Digital transformation
Demystifying Digital transformation Cyber-Duck
 
Digital marketing trends (workshop)
Digital marketing trends (workshop)Digital marketing trends (workshop)
Digital marketing trends (workshop)Cyber-Duck
 
StartupBus UK presentation
StartupBus UK presentationStartupBus UK presentation
StartupBus UK presentationCyber-Duck
 
Building a compelling Brand System
Building a compelling Brand System Building a compelling Brand System
Building a compelling Brand System Cyber-Duck
 
Five Digital Marketing ingredients for 2016
Five Digital Marketing ingredients for 2016Five Digital Marketing ingredients for 2016
Five Digital Marketing ingredients for 2016Cyber-Duck
 
Hackers guide to UX
Hackers guide to UXHackers guide to UX
Hackers guide to UXCyber-Duck
 
User centred design (UCD) and the connected home
User centred design (UCD) and the connected homeUser centred design (UCD) and the connected home
User centred design (UCD) and the connected homeCyber-Duck
 
How Lean, UCD and Agile can propel designers into the future
How Lean, UCD and Agile can propel designers into the futureHow Lean, UCD and Agile can propel designers into the future
How Lean, UCD and Agile can propel designers into the futureCyber-Duck
 
What it means to be a lean agency
What it means to be a lean agency What it means to be a lean agency
What it means to be a lean agency Cyber-Duck
 
The essentials of a digital project
The essentials of a digital projectThe essentials of a digital project
The essentials of a digital projectCyber-Duck
 
Danny finder - internal hackathon
Danny finder - internal hackathon Danny finder - internal hackathon
Danny finder - internal hackathon Cyber-Duck
 
UX principles at Marketing Week Live London 2014
UX principles at Marketing Week Live London 2014UX principles at Marketing Week Live London 2014
UX principles at Marketing Week Live London 2014Cyber-Duck
 
UX principles for co-founders
UX principles for co-foundersUX principles for co-founders
UX principles for co-foundersCyber-Duck
 
Digital agency founders talk
Digital agency founders talkDigital agency founders talk
Digital agency founders talkCyber-Duck
 

Más de Cyber-Duck (20)

Business X Design - People, Planet & Product
Business X Design - People, Planet & ProductBusiness X Design - People, Planet & Product
Business X Design - People, Planet & Product
 
Scaling our digital agency during the 2020 pandemic - Imperial College lecture
Scaling our digital agency during the 2020 pandemic - Imperial College lectureScaling our digital agency during the 2020 pandemic - Imperial College lecture
Scaling our digital agency during the 2020 pandemic - Imperial College lecture
 
Fixing user experience (UX) through trust - SXSW keynote
Fixing user experience (UX) through trust - SXSW keynoteFixing user experience (UX) through trust - SXSW keynote
Fixing user experience (UX) through trust - SXSW keynote
 
How to use ux thinking to generate meaningful marketing insights v0101d
How to use ux thinking to generate meaningful marketing insights v0101dHow to use ux thinking to generate meaningful marketing insights v0101d
How to use ux thinking to generate meaningful marketing insights v0101d
 
Empowering brands through better UX
Empowering brands through better UXEmpowering brands through better UX
Empowering brands through better UX
 
Hackers guide to UX - 2017
Hackers guide to UX - 2017Hackers guide to UX - 2017
Hackers guide to UX - 2017
 
Demystifying Digital transformation
Demystifying Digital transformation Demystifying Digital transformation
Demystifying Digital transformation
 
Digital marketing trends (workshop)
Digital marketing trends (workshop)Digital marketing trends (workshop)
Digital marketing trends (workshop)
 
StartupBus UK presentation
StartupBus UK presentationStartupBus UK presentation
StartupBus UK presentation
 
Building a compelling Brand System
Building a compelling Brand System Building a compelling Brand System
Building a compelling Brand System
 
Five Digital Marketing ingredients for 2016
Five Digital Marketing ingredients for 2016Five Digital Marketing ingredients for 2016
Five Digital Marketing ingredients for 2016
 
Hackers guide to UX
Hackers guide to UXHackers guide to UX
Hackers guide to UX
 
User centred design (UCD) and the connected home
User centred design (UCD) and the connected homeUser centred design (UCD) and the connected home
User centred design (UCD) and the connected home
 
How Lean, UCD and Agile can propel designers into the future
How Lean, UCD and Agile can propel designers into the futureHow Lean, UCD and Agile can propel designers into the future
How Lean, UCD and Agile can propel designers into the future
 
What it means to be a lean agency
What it means to be a lean agency What it means to be a lean agency
What it means to be a lean agency
 
The essentials of a digital project
The essentials of a digital projectThe essentials of a digital project
The essentials of a digital project
 
Danny finder - internal hackathon
Danny finder - internal hackathon Danny finder - internal hackathon
Danny finder - internal hackathon
 
UX principles at Marketing Week Live London 2014
UX principles at Marketing Week Live London 2014UX principles at Marketing Week Live London 2014
UX principles at Marketing Week Live London 2014
 
UX principles for co-founders
UX principles for co-foundersUX principles for co-founders
UX principles for co-founders
 
Digital agency founders talk
Digital agency founders talkDigital agency founders talk
Digital agency founders talk
 

Último

Top 10 Modern Web Design Trends for 2025
Top 10 Modern Web Design Trends for 2025Top 10 Modern Web Design Trends for 2025
Top 10 Modern Web Design Trends for 2025Rndexperts
 
DAKSHIN BIHAR GRAMIN BANK: REDEFINING THE DIGITAL BANKING EXPERIENCE WITH A U...
DAKSHIN BIHAR GRAMIN BANK: REDEFINING THE DIGITAL BANKING EXPERIENCE WITH A U...DAKSHIN BIHAR GRAMIN BANK: REDEFINING THE DIGITAL BANKING EXPERIENCE WITH A U...
DAKSHIN BIHAR GRAMIN BANK: REDEFINING THE DIGITAL BANKING EXPERIENCE WITH A U...Rishabh Aryan
 
Interior Design for Office a cura di RMG Project Studio
Interior Design for Office a cura di RMG Project StudioInterior Design for Office a cura di RMG Project Studio
Interior Design for Office a cura di RMG Project StudioRMG Project Studio
 
guest bathroom white and blue ssssssssss
guest bathroom white and blue ssssssssssguest bathroom white and blue ssssssssss
guest bathroom white and blue ssssssssssNadaMohammed714321
 
Giulio Michelon, Founder di @Belka – “Oltre le Stime: Sviluppare una Mentalit...
Giulio Michelon, Founder di @Belka – “Oltre le Stime: Sviluppare una Mentalit...Giulio Michelon, Founder di @Belka – “Oltre le Stime: Sviluppare una Mentalit...
Giulio Michelon, Founder di @Belka – “Oltre le Stime: Sviluppare una Mentalit...Associazione Digital Days
 
Sharif's 9-BOX Monitoring Model for Adaptive Programme Management
Sharif's 9-BOX Monitoring Model for Adaptive Programme ManagementSharif's 9-BOX Monitoring Model for Adaptive Programme Management
Sharif's 9-BOX Monitoring Model for Adaptive Programme ManagementMd. Shariful Hoque
 
Making and Unmaking of Chandigarh - A City of Two Plans2-4-24.ppt
Making and Unmaking of Chandigarh - A City of Two Plans2-4-24.pptMaking and Unmaking of Chandigarh - A City of Two Plans2-4-24.ppt
Making and Unmaking of Chandigarh - A City of Two Plans2-4-24.pptJIT KUMAR GUPTA
 
The spirit of digital place - game worlds and architectural phenomenology
The spirit of digital place - game worlds and architectural phenomenologyThe spirit of digital place - game worlds and architectural phenomenology
The spirit of digital place - game worlds and architectural phenomenologyChristopher Totten
 
CAPITAL GATE CASE STUDY -regional case study.pdf
CAPITAL GATE CASE STUDY -regional case study.pdfCAPITAL GATE CASE STUDY -regional case study.pdf
CAPITAL GATE CASE STUDY -regional case study.pdfAlasAlthaher
 
world health day 2024.pptxgbbvggvbhjjjbbbb
world health day 2024.pptxgbbvggvbhjjjbbbbworld health day 2024.pptxgbbvggvbhjjjbbbb
world health day 2024.pptxgbbvggvbhjjjbbbbpreetirao780
 
AI and Design Vol. 2: Navigating the New Frontier - Morgenbooster
AI and Design Vol. 2: Navigating the New Frontier - MorgenboosterAI and Design Vol. 2: Navigating the New Frontier - Morgenbooster
AI and Design Vol. 2: Navigating the New Frontier - Morgenbooster1508 A/S
 
10 Best WordPress Plugins to make the website effective in 2024
10 Best WordPress Plugins to make the website effective in 202410 Best WordPress Plugins to make the website effective in 2024
10 Best WordPress Plugins to make the website effective in 2024digital learning point
 
FW25-26 Knit Cut & Sew Trend Book Peclers Paris
FW25-26 Knit Cut & Sew Trend Book Peclers ParisFW25-26 Knit Cut & Sew Trend Book Peclers Paris
FW25-26 Knit Cut & Sew Trend Book Peclers ParisPeclers Paris
 
10 must-have Chrome extensions for designers
10 must-have Chrome extensions for designers10 must-have Chrome extensions for designers
10 must-have Chrome extensions for designersPixeldarts
 
Karim apartment ideas 01 ppppppppppppppp
Karim apartment ideas 01 pppppppppppppppKarim apartment ideas 01 ppppppppppppppp
Karim apartment ideas 01 pppppppppppppppNadaMohammed714321
 
Niintendo Wii Presentation Template.pptx
Niintendo Wii Presentation Template.pptxNiintendo Wii Presentation Template.pptx
Niintendo Wii Presentation Template.pptxKevinYaelJimnezSanti
 
Map of St. Louis Parks
Map of St. Louis Parks                              Map of St. Louis Parks
Map of St. Louis Parks CharlottePulte
 
NBA power point presentation final copy y
NBA power point presentation final copy yNBA power point presentation final copy y
NBA power point presentation final copy ysrajece
 
Piece by Piece Magazine
Piece by Piece Magazine                      Piece by Piece Magazine
Piece by Piece Magazine CharlottePulte
 
Unit1_Syllbwbnwnwneneneneneneentation_Sem2.pptx
Unit1_Syllbwbnwnwneneneneneneentation_Sem2.pptxUnit1_Syllbwbnwnwneneneneneneentation_Sem2.pptx
Unit1_Syllbwbnwnwneneneneneneentation_Sem2.pptxNitish292041
 

Último (20)

Top 10 Modern Web Design Trends for 2025
Top 10 Modern Web Design Trends for 2025Top 10 Modern Web Design Trends for 2025
Top 10 Modern Web Design Trends for 2025
 
DAKSHIN BIHAR GRAMIN BANK: REDEFINING THE DIGITAL BANKING EXPERIENCE WITH A U...
DAKSHIN BIHAR GRAMIN BANK: REDEFINING THE DIGITAL BANKING EXPERIENCE WITH A U...DAKSHIN BIHAR GRAMIN BANK: REDEFINING THE DIGITAL BANKING EXPERIENCE WITH A U...
DAKSHIN BIHAR GRAMIN BANK: REDEFINING THE DIGITAL BANKING EXPERIENCE WITH A U...
 
Interior Design for Office a cura di RMG Project Studio
Interior Design for Office a cura di RMG Project StudioInterior Design for Office a cura di RMG Project Studio
Interior Design for Office a cura di RMG Project Studio
 
guest bathroom white and blue ssssssssss
guest bathroom white and blue ssssssssssguest bathroom white and blue ssssssssss
guest bathroom white and blue ssssssssss
 
Giulio Michelon, Founder di @Belka – “Oltre le Stime: Sviluppare una Mentalit...
Giulio Michelon, Founder di @Belka – “Oltre le Stime: Sviluppare una Mentalit...Giulio Michelon, Founder di @Belka – “Oltre le Stime: Sviluppare una Mentalit...
Giulio Michelon, Founder di @Belka – “Oltre le Stime: Sviluppare una Mentalit...
 
Sharif's 9-BOX Monitoring Model for Adaptive Programme Management
Sharif's 9-BOX Monitoring Model for Adaptive Programme ManagementSharif's 9-BOX Monitoring Model for Adaptive Programme Management
Sharif's 9-BOX Monitoring Model for Adaptive Programme Management
 
Making and Unmaking of Chandigarh - A City of Two Plans2-4-24.ppt
Making and Unmaking of Chandigarh - A City of Two Plans2-4-24.pptMaking and Unmaking of Chandigarh - A City of Two Plans2-4-24.ppt
Making and Unmaking of Chandigarh - A City of Two Plans2-4-24.ppt
 
The spirit of digital place - game worlds and architectural phenomenology
The spirit of digital place - game worlds and architectural phenomenologyThe spirit of digital place - game worlds and architectural phenomenology
The spirit of digital place - game worlds and architectural phenomenology
 
CAPITAL GATE CASE STUDY -regional case study.pdf
CAPITAL GATE CASE STUDY -regional case study.pdfCAPITAL GATE CASE STUDY -regional case study.pdf
CAPITAL GATE CASE STUDY -regional case study.pdf
 
world health day 2024.pptxgbbvggvbhjjjbbbb
world health day 2024.pptxgbbvggvbhjjjbbbbworld health day 2024.pptxgbbvggvbhjjjbbbb
world health day 2024.pptxgbbvggvbhjjjbbbb
 
AI and Design Vol. 2: Navigating the New Frontier - Morgenbooster
AI and Design Vol. 2: Navigating the New Frontier - MorgenboosterAI and Design Vol. 2: Navigating the New Frontier - Morgenbooster
AI and Design Vol. 2: Navigating the New Frontier - Morgenbooster
 
10 Best WordPress Plugins to make the website effective in 2024
10 Best WordPress Plugins to make the website effective in 202410 Best WordPress Plugins to make the website effective in 2024
10 Best WordPress Plugins to make the website effective in 2024
 
FW25-26 Knit Cut & Sew Trend Book Peclers Paris
FW25-26 Knit Cut & Sew Trend Book Peclers ParisFW25-26 Knit Cut & Sew Trend Book Peclers Paris
FW25-26 Knit Cut & Sew Trend Book Peclers Paris
 
10 must-have Chrome extensions for designers
10 must-have Chrome extensions for designers10 must-have Chrome extensions for designers
10 must-have Chrome extensions for designers
 
Karim apartment ideas 01 ppppppppppppppp
Karim apartment ideas 01 pppppppppppppppKarim apartment ideas 01 ppppppppppppppp
Karim apartment ideas 01 ppppppppppppppp
 
Niintendo Wii Presentation Template.pptx
Niintendo Wii Presentation Template.pptxNiintendo Wii Presentation Template.pptx
Niintendo Wii Presentation Template.pptx
 
Map of St. Louis Parks
Map of St. Louis Parks                              Map of St. Louis Parks
Map of St. Louis Parks
 
NBA power point presentation final copy y
NBA power point presentation final copy yNBA power point presentation final copy y
NBA power point presentation final copy y
 
Piece by Piece Magazine
Piece by Piece Magazine                      Piece by Piece Magazine
Piece by Piece Magazine
 
Unit1_Syllbwbnwnwneneneneneneentation_Sem2.pptx
Unit1_Syllbwbnwnwneneneneneneentation_Sem2.pptxUnit1_Syllbwbnwnwneneneneneneentation_Sem2.pptx
Unit1_Syllbwbnwnwneneneneneneentation_Sem2.pptx
 

Designing products and services with GDPR

  • 1. DESIGNING PRODUCTS AND SERVICES WITH GDPR #DigitalPond @danny_bluestone
  • 2. Introducing GDPR What is GDPR?
 1. Transparency 2. Privacy
 3. Control Conclusion TODAY #DigitalPond @danny_bluestone
  • 3. HELLO. I AM DANNY. #DigitalPond @danny_bluestone
  • 4. 21% - are a - Data Liberator They think data will make us healthier, safe and more efficient. They’re up for the big data revolution. 40% - are a - Savvy Sharer They’re optimists. Data should be used freely in most situations, but not all. 29% - are a - Data Regulator They think that big data can be useful. But we need to consider decisions carefully. 10% - are a - Privacy Protector They don’t believe the big data hype. They want to regain privacy, no matter what the cost. #DigitalPond @danny_bluestone
  • 6. The rise of digital and data is unparalleled #DigitalPond @danny_bluestone
  • 7. The issue is that brands know more about us than we know about ourselves #DigitalPond @danny_bluestone
  • 8. Tinder has 800 pages of information on one of its users, including age-rank of matches and how many facebook friends she had #DigitalPond @danny_bluestone
  • 9. #DigitalPond @danny_bluestone There are moral arguments about all of this
  • 10. The Ponemon Institute Research report May 2017 49% HAD A DOCUMENT BREACH IN THE PAST 2 YEARS 73% EMPLOYEES ARE ACCIDENTALLY EXPOSING INFORMATION 63% OF STAFF UNABLE TO LOCATE SENSITIVE DATA #DigitalPond @danny_bluestone Do businesses know what they are doing?
  • 11. 11
  • 12. WHO IS BEHIND GDPR? 12 Official EU website, no information about GDPR European Data Protection Board, no link to GDPR guidelines some internal facing articles The EUR-LUX website (searchable database) contains EU law, the journal of the Union and international agreements. It is also home to the GDPR articles. The articles are not prominent on the homepage. There ls a link to the GDPR PDF or web page with 54K words over 102 word pages Giovanni Buttarelli is the European Data Protection Supervisor. Wojciech Wiewiórowski is the Assistant Supervisor at the EDPS.
  • 13. The GDPR includes new regulations to prior directives. Accountability Risk-based approach Privacy by design (PbD) Rights of erasure Data portability Transparency/ Consent #DigitalPond @danny_bluestone
  • 14. 14 The Processor is an entity that processes data on behalf of the controller. They need to conform to the processes, audits, breach and Disaster Recovery policies. The Controller determines the purposes and means of the processing of personal data. They have a legal responsibility to appoint ‘qualified’ Processors. #DigitalPond @danny_bluestone
  • 15. #DigitalPond @danny_bluestone Only collect the data you need and ensure that it is accessible by users so they can update it. Maintain retention policies. Transparency The service must be clear and collected for specified purposes through explicit consent. ControlsPrivacy Implement PbD, backup and DR methods to ensure data security and resilience. Don't compromise users’ identities. Cyber-Duck Ltd
  • 17. Prepare for Subject Access Requests (SARS) #DigitalPond @danny_bluestone
  • 18. How to handle SARs Requirement Legal response time Facebook Majestic Wine View data held following SAR 1 month No response (have export button to view likes, timeline posts, friends made etc’) Responded in time Follow-up to the SAR Immediate Did not respond to original SAR by email as explained there is a download function N/A With GDPR users will be entitled to know how long their data is stored, enjoy data portability (e.g. porting data from one bank to another) and have their data erased without a court request. #DigitalPond @danny_bluestone
  • 19. The importance of consent It is important that consent is ‘Unbundled’ and as ‘Granular’ as possible. There should be no ‘Opt-out’. Only provide ‘Opt-in’. Ensure that consent is ‘Easy to withdraw’. Note: You will also need to name any parties that will rely on consent. Using words like third parties or categories will not be acceptable. #DigitalPond @danny_bluestone
  • 24. Not doing enough to protect identities #DigitalPond @danny_bluestone
  • 25. How to deal with messaging and live-chat #DigitalPond @danny_bluestone
  • 26. Design ‘retrospective privacy’ functions #DigitalPond @danny_bluestone
  • 27. The difference between anonymisation and pseudonymisation Anonymisation means erasing any personal data with permanent fictitious values.
 Pseudonymisation replaces identifiable data with a persistent and reversible token. Name Pseudonym (token) Anonymised Jonny aERT xyz Veronica Oqwti xyz Sylvain SqaL xyz Jonny aERT xyz #DigitalPond @danny_bluestone
  • 28. The difference between anonymisation and pseudonymisation Anonymisation #DigitalPond @danny_bluestone Pseudonymisation Useful for when granularity of data is not important and reverting back is not required Useful is you want to masquerade data, protect privacy but need to revert back to original
  • 29. Dynamic IP addresses A dynamic IP address will be personal data in the hands of a website operator if there is another party (i.e. ISP) that can link the dynamic IP address to the identity of an individual and the website operator has a "legal means" of obtaining access to the information held by the ISP in order to identify the individual. 19 October 2016, the Court of Justice of the European Union (the "CJEU") Note: Don’t store server logs if you do not have to. Encrypt logs in storage and limit access to decryption credentials. #DigitalPond @danny_bluestone
  • 30. Implied consent is not sufficient - “By using this site, you accept cookies” message is not going to cut it. Users can reject cookies - Easily let users withdraw consent and opt-out so they are able to adjust their preferences. The Cookie madness, an ongoing saga! #DigitalPond @danny_bluestone
  • 31. Deleting data Data Subjects have the right to obtain erasure from the data controller, without undue delay. This means backups too. Make sure you can quickly pinpoint a backup and delete a particular record or file. #DigitalPond @danny_bluestone
  • 32. 1. Privacy must be proactive, not reactive. 2. Privacy must be the default setting. 3. Privacy must be embedded into design. 4. Privacy must contain a balance between privacy and security. 5. Privacy offers end-to-end lifecycle protection of user data. 6. Privacy standards must be visible, transparent. 7. Privacy must be user-centric. Privacy by design (PbD) #DigitalPond @danny_bluestone
  • 33. “…With the implementation of the GDPR and the principle of ‘privacy by default’, organizations can no longer hide behind the argument that they are technologically unable to act in line with the regulations” Vita Zwaan, lawyer & lead Privacy Team Bureau Brandeis #DigitalPond @danny_bluestone
  • 35. Limit the amount of data you capture #DigitalPond @danny_bluestone
  • 36. Allow users to maintain accurate information #DigitalPond @danny_bluestone
  • 37. Set and maintain data policies #DigitalPond @danny_bluestone
  • 38. Why give users ‘data portability’ capabilities? Data portability is a concept to protect users from having their data stored in "silos" or "walled gardens" that are incompatible with one another, i.e. closed platforms, thus subjecting them to vendor lock-in (Wikipedia). TRANSPARENCY & ANALYSIS HELP USERS SWITCH #DigitalPond @danny_bluestone
  • 39. Be ready for breaches #DigitalPond @danny_bluestone
  • 42. Apply a process to your GDPR initiative1 Data audit1 Gap analysis2 Make a plan3 Execute4 Train everyone5 #DigitalPond @danny_bluestone
  • 43. Register for an ICO certificate2 #DigitalPond @danny_bluestone
  • 44. Embed GDPR in your CX and marketing3 Lloyds concluded that if it was going to avoid losing customers, it needed to overhaul the CRM programme to reflect what people actually want. #DigitalPond @danny_bluestone
  • 46. 1. Saving less data is taking less risk - Store only what you need. 2. Use PbD - Consider systems, messaging and encryption to determine who sees what and why. 3. Be aware - Besides GDPR look out for other laws like e-privacy and PSD2. 4. Consent - Obtain explicit consent for everything and ensure you have audit trails. 5. Policies and process - Be ready for SARs and ensure you have retention policies. Conclusions from the Cyber-Duck talk #DigitalPond @danny_bluestone
  • 47. @DANNY_BLUESTONE @CYBERDUCK_UK THANKS FOR LISTENING All images in this presentation are copyright of their respective owners