SlideShare a Scribd company logo
1 of 2
Download to read offline
What does the new EU General Data Protection Regulation mean for you?
The decision on the EU General Data Protection Regulation (GDPR) has been finalised, with a raft of new
legislation to be implemented over the next two years. These changes will have significant implications
for organisations taking and storing data. Here’s a handy summary of what you need to know.
Fines of up to 4% of global turnover or €20m*.
In the event of a data breach, organisations may be hit
with significant fines. Figures currently quoted are €20m or
4% of global turnover (*whichever is greatest), but this is
dependent on the severity of the breach and the
organisation’s ability to prove it had measures in place (or
not) to protect customer data.
Potential pay-outs to customers.
On top of the official fines, organisations may also be
required to pay customers damages in the event of data
loss or theft.
Organisations may need to appoint a Data
Processing Officer.
Whoever holds this position will be responsible for
managing data security processes, and free to give
recommendations or feedback without fear of negative
consequences, similar to union representatives.
This only applies to organisations that handle ‘significant’
volumes of data, and not to small and medium-sized
enterprises.
A time limit to report breaches has been set.
Organisations must report all data breaches to the
regulatory body within 72 hours, but there is no time limit
in place for when customers have to be informed.
The laws reach beyond just the one organisation.
Any organisation or individual that processes data will be
held responsible for its protection. This means if an
organisation is providing information to third-parties, it will
also be subject to the EU General Data Protection
Regulation.
BT Cloud Contact PCI.
New EU Data Protection Regulation.
Offices worldwide
The services described in this publication are subject to availability and may be modified from time to time. Services and equipment are provided subject to British Telecommunications plc’s
respective standard conditions of contract. Nothing in this publication forms any part of any contract. © British Telecommunications plc 2015. Registered office: 81 Newgate Street, London
EC1A 7AJ. Registered in England No: 1800000
BT Cloud Contact PCI.
bt.com/globalservices
Find out more at:
The EU will form a unified governing body.
The new rules will see one regulatory body established to
govern all organisations based in the EU, rather than the
current 28 separate bodies.
However, regardless of whether an organisation is
established in the EU or not, it will still have to comply with
the data protection law if it plans to offer services within
the continent.
More generally, the new rules will mean tighter controls
on protection of data no matter where it is sent, processed
or stored.
So, what’s the big picture?
The European Commission claims the regulations will
reduce red tape, speed up procedures and streamline data
protection across the EU.
But while these requirements may seem heavy-handed to
some, the new laws have been a long time coming and are
finally catching up to the realities of operating in the
modern technical world.
Ultimately, bringing an organisation into line with the
regulations and being able to show that it is as secure as
possible will boost brand confidence and loyalty.
How can BT help?
BT Cloud Contact PCI enables contact centres to take
personal data securely over the telephone.
The patented data capture method collects sensitive
information such as payment card or bank details directly
from the customer’s telephone keypad for processing.
This prevents personal data from entering the contact
centre so if fraudsters do find a way to get in, there is
nothing to steal!
BT Cloud Contact PCI not only protects against the risk of
fraud and the associated reputational damage, but also
ensures compliance with industry regulations such as PCI
DSS.
Find out more.
Please contact your BT account manager for more detail
on BT Cloud Contact PCI.
They’ll be able to engage one of our specialists or a PCI
consultant from our partner Semafone to answer any
detailed questions you have.
Alternatively contact us through bt.com

More Related Content

More from Abhishek Sood

More from Abhishek Sood (20)

How to measure your cybersecurity performance
How to measure your cybersecurity performanceHow to measure your cybersecurity performance
How to measure your cybersecurity performance
 
Why adopt more than one cloud service?
 Why adopt more than one cloud service? Why adopt more than one cloud service?
Why adopt more than one cloud service?
 
Cloud Application Security --Symantec
 Cloud Application Security --Symantec Cloud Application Security --Symantec
Cloud Application Security --Symantec
 
How to integrate risk into your compliance-only approach
 How to integrate risk into your compliance-only approach How to integrate risk into your compliance-only approach
How to integrate risk into your compliance-only approach
 
DLP 101: Help identify and plug information leaks
 DLP 101: Help identify and plug information leaks DLP 101: Help identify and plug information leaks
DLP 101: Help identify and plug information leaks
 
IoT: 3 keys to handling the oncoming barrage of use cases
 IoT: 3 keys to handling the oncoming barrage of use cases IoT: 3 keys to handling the oncoming barrage of use cases
IoT: 3 keys to handling the oncoming barrage of use cases
 
How 3 trends are shaping analytics and data management
How 3 trends are shaping analytics and data management How 3 trends are shaping analytics and data management
How 3 trends are shaping analytics and data management
 
API-led connectivity: How to leverage reusable microservices
 API-led connectivity: How to leverage reusable microservices API-led connectivity: How to leverage reusable microservices
API-led connectivity: How to leverage reusable microservices
 
How to create a secure high performance storage and compute infrastructure
 How to create a secure high performance storage and compute infrastructure How to create a secure high performance storage and compute infrastructure
How to create a secure high performance storage and compute infrastructure
 
Enterprise software usability and digital transformation
Enterprise software usability and digital transformationEnterprise software usability and digital transformation
Enterprise software usability and digital transformation
 
Transforming for digital customers across 6 key industries
 Transforming for digital customers across 6 key industries Transforming for digital customers across 6 key industries
Transforming for digital customers across 6 key industries
 
Authentication best practices: Experts weigh in
Authentication best practices: Experts weigh inAuthentication best practices: Experts weigh in
Authentication best practices: Experts weigh in
 
Tips --Break Down the Barriers to Better Data Analytics
Tips --Break Down the Barriers to Better Data AnalyticsTips --Break Down the Barriers to Better Data Analytics
Tips --Break Down the Barriers to Better Data Analytics
 
Attivio discovery insight innovation --Whitepaper
Attivio discovery insight innovation --WhitepaperAttivio discovery insight innovation --Whitepaper
Attivio discovery insight innovation --Whitepaper
 
89% of consumers switch to a competitor after a poor CX
89% of consumers switch to a competitor after a poor CX 89% of consumers switch to a competitor after a poor CX
89% of consumers switch to a competitor after a poor CX
 
The state of incident response
The state of incident responseThe state of incident response
The state of incident response
 
IoT intelligence: Attitudes towards big data and advanced analytics
IoT intelligence: Attitudes towards big data and advanced analyticsIoT intelligence: Attitudes towards big data and advanced analytics
IoT intelligence: Attitudes towards big data and advanced analytics
 
Robert McFarlane deconstructs DCIM tools' role in the enterprise
Robert McFarlane deconstructs DCIM tools' role in the enterpriseRobert McFarlane deconstructs DCIM tools' role in the enterprise
Robert McFarlane deconstructs DCIM tools' role in the enterprise
 
6 best practices to get started on a digital HR strategy
6 best practices to get started on a digital HR strategy6 best practices to get started on a digital HR strategy
6 best practices to get started on a digital HR strategy
 
Build a high-speed network using your DSL broadband circuit
Build a high-speed network using your DSL broadband circuitBuild a high-speed network using your DSL broadband circuit
Build a high-speed network using your DSL broadband circuit
 

Recently uploaded

audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
lolsDocherty
 
Production 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxProduction 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptx
ChloeMeadows1
 

Recently uploaded (17)

GOOGLE Io 2024 At takes center stage.pdf
GOOGLE Io 2024 At takes center stage.pdfGOOGLE Io 2024 At takes center stage.pdf
GOOGLE Io 2024 At takes center stage.pdf
 
Free scottie t shirts Free scottie t shirts
Free scottie t shirts Free scottie t shirtsFree scottie t shirts Free scottie t shirts
Free scottie t shirts Free scottie t shirts
 
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
 
I’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 ShirtI’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 Shirt
 
Development Lifecycle.pptx for the secure development of apps
Development Lifecycle.pptx for the secure development of appsDevelopment Lifecycle.pptx for the secure development of apps
Development Lifecycle.pptx for the secure development of apps
 
Statistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdfStatistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdf
 
Premier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdfPremier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdf
 
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
 
Bug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideBug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's Guide
 
Production 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxProduction 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptx
 
AI Generated 3D Models | AI 3D Model Generator
AI Generated 3D Models | AI 3D Model GeneratorAI Generated 3D Models | AI 3D Model Generator
AI Generated 3D Models | AI 3D Model Generator
 
The Rise of Subscription-Based Digital Services.pdf
The Rise of Subscription-Based Digital Services.pdfThe Rise of Subscription-Based Digital Services.pdf
The Rise of Subscription-Based Digital Services.pdf
 
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital PresenceCyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
 
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWebiThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
 
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
 
Reggie miller choke t shirtsReggie miller choke t shirts
Reggie miller choke t shirtsReggie miller choke t shirtsReggie miller choke t shirtsReggie miller choke t shirts
Reggie miller choke t shirtsReggie miller choke t shirts
 
Thank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirtsThank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirts
 

How to prepare your call center for the EU GDPR

  • 1. What does the new EU General Data Protection Regulation mean for you? The decision on the EU General Data Protection Regulation (GDPR) has been finalised, with a raft of new legislation to be implemented over the next two years. These changes will have significant implications for organisations taking and storing data. Here’s a handy summary of what you need to know. Fines of up to 4% of global turnover or €20m*. In the event of a data breach, organisations may be hit with significant fines. Figures currently quoted are €20m or 4% of global turnover (*whichever is greatest), but this is dependent on the severity of the breach and the organisation’s ability to prove it had measures in place (or not) to protect customer data. Potential pay-outs to customers. On top of the official fines, organisations may also be required to pay customers damages in the event of data loss or theft. Organisations may need to appoint a Data Processing Officer. Whoever holds this position will be responsible for managing data security processes, and free to give recommendations or feedback without fear of negative consequences, similar to union representatives. This only applies to organisations that handle ‘significant’ volumes of data, and not to small and medium-sized enterprises. A time limit to report breaches has been set. Organisations must report all data breaches to the regulatory body within 72 hours, but there is no time limit in place for when customers have to be informed. The laws reach beyond just the one organisation. Any organisation or individual that processes data will be held responsible for its protection. This means if an organisation is providing information to third-parties, it will also be subject to the EU General Data Protection Regulation. BT Cloud Contact PCI. New EU Data Protection Regulation.
  • 2. Offices worldwide The services described in this publication are subject to availability and may be modified from time to time. Services and equipment are provided subject to British Telecommunications plc’s respective standard conditions of contract. Nothing in this publication forms any part of any contract. © British Telecommunications plc 2015. Registered office: 81 Newgate Street, London EC1A 7AJ. Registered in England No: 1800000 BT Cloud Contact PCI. bt.com/globalservices Find out more at: The EU will form a unified governing body. The new rules will see one regulatory body established to govern all organisations based in the EU, rather than the current 28 separate bodies. However, regardless of whether an organisation is established in the EU or not, it will still have to comply with the data protection law if it plans to offer services within the continent. More generally, the new rules will mean tighter controls on protection of data no matter where it is sent, processed or stored. So, what’s the big picture? The European Commission claims the regulations will reduce red tape, speed up procedures and streamline data protection across the EU. But while these requirements may seem heavy-handed to some, the new laws have been a long time coming and are finally catching up to the realities of operating in the modern technical world. Ultimately, bringing an organisation into line with the regulations and being able to show that it is as secure as possible will boost brand confidence and loyalty. How can BT help? BT Cloud Contact PCI enables contact centres to take personal data securely over the telephone. The patented data capture method collects sensitive information such as payment card or bank details directly from the customer’s telephone keypad for processing. This prevents personal data from entering the contact centre so if fraudsters do find a way to get in, there is nothing to steal! BT Cloud Contact PCI not only protects against the risk of fraud and the associated reputational damage, but also ensures compliance with industry regulations such as PCI DSS. Find out more. Please contact your BT account manager for more detail on BT Cloud Contact PCI. They’ll be able to engage one of our specialists or a PCI consultant from our partner Semafone to answer any detailed questions you have. Alternatively contact us through bt.com