SlideShare a Scribd company logo
1 of 26
Download to read offline
EU GDPR
Are you prepared?
Addressing 5 Critical GDPR
Data Protection Requirements
1
Agenda
GDPR Explained
Key GDPR Requirements
Addressing 5 Critical GDPR Requirements
 Data Protection Impact Assessment
 Purpose Limitation
 Data Protection
 Incident Response
 Breach Notification
2
GDPR Explained
Expands and standardizes data protection rules across
entire European Union
Gives EU citizens “ownership” of their personal data
Broadly defines personally identifiable information (PII)
“any data that can be used to identify a person”
Organizations must seek permission from citizens to use
their personal data
“GDPR is a complex set of regulations
specifying how organizations must protect
EU citizens’ personal data. Here are six
fundamental principles of the GDPR.”
3
GDPR Explained
EU citizens can withdraw right of an organization to use
their personal data
EU citizens can monitor the use of their data, decide who
can use it, and can demand its return to them
In summary: they have the right to be “forgotten”
4
Key GDPR Mandates
1. Big Fines
GDPR compliance violations can be huge: 4% of global
revenue or €20 million whichever is greater
2. Data Protection Officer Required
Organizations >250 employees must have Data
Protection Officer who will be personally liable for
data breaches
3. Strict Breach Notification
Organizations must notify authorities
within 72 hours of a data breach
“GDPR is complex but the key mandates can
be broken down to eight major points.”
5
Key GDPR Mandates
4. Global Reach
Any organization anywhere in the world collecting EU
citizen personal data must comply
5. Comprehensive Monitoring and Security Controls
Organizations must establish strict PII access
monitoring, documentation, and security controls
6. On-Demand Demonstration of Data Security
Organizations must be able to demonstrate their data
protection process at any time
6
Key GDPR Mandates
7. Data Protection Impact Assessment
Organizations must assess the scope, purpose, and
sensitivity of data processed
8. Applies to Organization Affiliates
GDPR rules apply to a company’s partners, vendors,
subcontractors, and cloud providers who store or
access PII
7
Are You Prepared?
There is no time to waste because…
 GDPR compliance violations can be big
4% of revenue or €20 million whichever is greater
 GDPR requirements are new and complex
 Data environments are large, complex, and distributed
 PII is often stored in many applications and
databases across the enterprise
GDPR Deadline
May 25th, 2018
8
Report/Analyze - Out-of-the-box GDPR compliance reports
and alerts. Analysis of users, organizational context,
applications, PII access for audit and breach forensics
Monitor - Detailed audit/alerting of PII usage – “Who, What,
Where, When and How”
Protect - 70 granular access policies automatically prevent
inappropriate access to PII
GDPR Data Protection
and Compliance Solution
7
9
 Unobtrusive
 Comprehensive
 Quick to Install
 Low Admin Effort
Monitoring and
Query Control Agent
Compliance
Repository
Compliance Reporting
and Analytics
Databases
Apps
GDPR Data Protection
and Compliance Solution
10
Who ?
What Data ?
Where ?
User ? App ?
Establishes “business context” for comprehensive,
accurate compliance and effective protection
SCaputo
Sept. Budget Report
Finance Department
Milano Office
Business
Objects
GDPR Data Protection
and Compliance Solution
11
Addresses Five Critical GDPR Requirements
GDPR Data Protection
and Compliance Solution
Purpose
Limitation
(Article 5-1b)
Data
Protection
(Article 5-1f)
Incident
Response
(Article 5-2)
Breach
Notification
(Articles 33/34)
Impact
Assessment
(Article 35)
12
GDPR Impact Assessment – organizations need to conduct
audit of what is PII, how it is used, and by whom to confirm
and attest they are GDPR-compliant
Teleran addresses by:
• Enabling a “GDPR Readiness Assessment” by
discovering sensitive PII and auditing/documenting
who is accessing PII, with which application, and
for what purpose
• Applying appropriate data access control policies
to protect PII and ensure GDPR compliance
GDPR Data Protection
and Compliance Solution
13
GDPR Data Protection Impact Assessment
GDPR Data Protection
and Compliance Solution
14
Purpose Limitation - personal data use must be limited to
stated purpose and no other
Teleran addresses by:
• Auditing PII access to ensure it is limited to
stated use and no non-compliant access is occurring
• PII protection policies enforce purpose limitation
by allowing only authorized users to access PII
• All other attempted access is prevented
GDPR Data Protection
and Compliance Solution
15
GDPR Purpose Limitation Monitoring
Report showing sensitive column data access
GDPR Data Protection
and Compliance Solution
16
Purpose Limitation PII Access Controls
Column Access
Restriction
Prevents queries on <TABLE> if query
contains <COLUMN> by <USER> and
<DATASOURCE>.
Use this policy to prevent
access to sensitive columns.
GDPR Data Protection
and Compliance Solution
17
Purpose Limitation PII Access Control
User Message
Insurance Customer Analysis
Segmentation Report
Customer Table
Geography
Address
Product
Payment
Premium
GDPR Compliance Message
Your query violates GDPR Compliance Policies
because it attempts to access sensitive customer
information. Contact the BI Helpdesk or Compliance
Office for more information. AIW+10901
Compliance
Message to
Business Objects
user attempting
to access
sensitive data
GDPR Data Protection
and Compliance Solution
18
Data Protection – personal data must be secure and remain
unchanged. Security audits must be documented
Teleran addresses by:
• Monitoring access to ensure personal data is
unchanged or destroyed
• Audit reporting documents data security and
integrity measures are in place
• Data protection policies prevent data manipulation
or destruction of personal data
GDPR Data Protection
and Compliance Solution
19
Data Integrity Reporting and Controls
DELETE
Restriction
Prevents queries containing DELETE
on <TABLE> or <COLUMN>.
Use this access policy to
prevent deleting sensitive data.
Report showing sensitive data access/changes
GDPR Data Protection
and Compliance Solution
20
Breach Identification / Notification – organizations need to
put in place process to be aware of and notify authorities
and citizens if and when a breach occurs
Teleran addresses by:
• Identifying and alerting staff to suspected or
actual data breaches
• Documenting breach for purposes of notification and
preventing further breach activity
• Applying additional access control policies to
prevent future breaches of this nature
GDPR Data Protection
and Compliance Solution
21
Suspicious Activity Alerting
---Security Alert---
From: Teleran [mailto:501458408@chicisapp429v.corporate.gr.com
Sent: Saturday, July 23, 2016 3:22PM
To: rsimone@gr.com
Subject: GDPR Compliance Event Alert
Exception Activity: INSERT sensitive data to TEMP TABLE queries run 7/23/16 3:20 PM by User ID: DB
Administrator.
Download event report pdf.
GDPR Data Protection
and Compliance Solution
22
Data Breach Identification
Suspicious Activity Dashboard identifying the possible
GDPR violation of accessing and moving sensitive data
GDPR Data Protection
and Compliance Solution
23
Data Breach Forensic Audit Documentation
Documentation of compliance violation. Inappropriate
access and movement of PII to temporary database table
GDPR Data Protection
and Compliance Solution
24
Impact
Assessment
(Article 35)
Purpose
Limitation
(Article 5-1 b)
Data Security
& Integrity
(Article 5-1 f)
Accountability &
Documentation
(Article 5-2)
Breach
Notification
(Articles 33/34)
Audit where PII
exists, how used,
by whom.
Identify /
remediate gaps
Confirm PII
use limited to
stated purpose
and no other
Protect PII
from unlawful
use,
manipulation,
destruction or
loss
Demonstrate and
document
compliance
processes
Establish process
to: Identify data
breaches. Notify
authorities /
citizens of
breach
Teleran Solution
Discovers and
classifies PII.
Audits who
accessing PII to
identify /
remediate
compliance gaps
Monitoring
documents
adherence to
purpose limits
Monitoring /
controlling PII
access and use
to ensure
protection
Audit reports
demonstrate,
document
compliant PII
access /
control
Identifies and
alerts to
suspected or
actual PII
breaches
Applies access
control policies
to protect PII
and ensure GDPR
compliance
Access
controls
enforce
purpose
limits,
prevent
inappropriate
use/users/apps
Delivers access
policies to
prevent:
illegal data
use, data
manipulation,
destruction
PII access
control and
testing
processes prove
protection
measures and
GDPR-compliancy
Documents breach
activity for
notification.
Applies new
control policies
to prevent future
like breaches
Summary: Teleran Addresses 5 Critical GDPR Mandates
Supports Oracle, DB2 (LUW/z), Teradata, SQL Server, Hadoop
25
 What is your GDPR compliance strategy?
 Schedule a Teleran GDPR Data Protection Readiness
Assessment now to establish your GDPR roadmap
www.teleran.com
GDPR Data Protection
and Compliance Solution
The Teleran logo, iSight and iGuard are trademarks or registered trademarks of Teleran Technologies, Inc. Other brand and
product names are the marks of their respective owners. SO05.10.7

More Related Content

What's hot

Building a register of data processing
Building a register of data processingBuilding a register of data processing
Building a register of data processingTim Gough
 
GDPR Data Subject Rights - What You Need to Know
GDPR Data Subject Rights - What You Need to KnowGDPR Data Subject Rights - What You Need to Know
GDPR Data Subject Rights - What You Need to KnowPiwik PRO
 
Beginning your General Data Protection Regulation (GDPR) Journey
Beginning your General Data Protection Regulation (GDPR) JourneyBeginning your General Data Protection Regulation (GDPR) Journey
Beginning your General Data Protection Regulation (GDPR) JourneyMicrosoft Österreich
 
Developer view on new EU privacy legislation (GDPR)
Developer view on new EU privacy legislation (GDPR)Developer view on new EU privacy legislation (GDPR)
Developer view on new EU privacy legislation (GDPR)Exove
 
GDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection RegulationGDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection RegulationVicky Dallas
 
Teradata's approach to addressing GDPR
Teradata's approach to addressing GDPRTeradata's approach to addressing GDPR
Teradata's approach to addressing GDPRPaul O'Carroll
 
GDPR - Fail to Prepare, Prepare to Fail!
GDPR - Fail to Prepare, Prepare to Fail!GDPR - Fail to Prepare, Prepare to Fail!
GDPR - Fail to Prepare, Prepare to Fail!Fintan Swanton
 
EU GDPR(general data protection regulation)
EU GDPR(general data protection regulation)EU GDPR(general data protection regulation)
EU GDPR(general data protection regulation)RAKESH S
 
What is GDPR?
What is GDPR?What is GDPR?
What is GDPR?Faidepro
 
GDPR most actionable cheatsheet and checklist by cyberstratg
GDPR most actionable cheatsheet and checklist by cyberstratgGDPR most actionable cheatsheet and checklist by cyberstratg
GDPR most actionable cheatsheet and checklist by cyberstratgCyber StratG
 
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127Frank Dawson
 
Getting Ready for GDPR
Getting Ready for GDPRGetting Ready for GDPR
Getting Ready for GDPRJessvin Thomas
 
An Overview of GDPR by Pathway Group
An Overview of GDPR by Pathway GroupAn Overview of GDPR by Pathway Group
An Overview of GDPR by Pathway GroupThe Pathway Group
 
GDPR - a view for the non experts
GDPR - a view for the non expertsGDPR - a view for the non experts
GDPR - a view for the non expertsClaudio Bolla, CISM
 
DAMA Ireland - GDPR
DAMA Ireland - GDPRDAMA Ireland - GDPR
DAMA Ireland - GDPRDAMA Ireland
 

What's hot (20)

GDPR
GDPRGDPR
GDPR
 
GDPR infographic
GDPR infographicGDPR infographic
GDPR infographic
 
Building a register of data processing
Building a register of data processingBuilding a register of data processing
Building a register of data processing
 
GDPR Data Subject Rights - What You Need to Know
GDPR Data Subject Rights - What You Need to KnowGDPR Data Subject Rights - What You Need to Know
GDPR Data Subject Rights - What You Need to Know
 
Beginning your General Data Protection Regulation (GDPR) Journey
Beginning your General Data Protection Regulation (GDPR) JourneyBeginning your General Data Protection Regulation (GDPR) Journey
Beginning your General Data Protection Regulation (GDPR) Journey
 
Developer view on new EU privacy legislation (GDPR)
Developer view on new EU privacy legislation (GDPR)Developer view on new EU privacy legislation (GDPR)
Developer view on new EU privacy legislation (GDPR)
 
GDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection RegulationGDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection Regulation
 
Teradata's approach to addressing GDPR
Teradata's approach to addressing GDPRTeradata's approach to addressing GDPR
Teradata's approach to addressing GDPR
 
GDPR - Fail to Prepare, Prepare to Fail!
GDPR - Fail to Prepare, Prepare to Fail!GDPR - Fail to Prepare, Prepare to Fail!
GDPR - Fail to Prepare, Prepare to Fail!
 
EU GDPR(general data protection regulation)
EU GDPR(general data protection regulation)EU GDPR(general data protection regulation)
EU GDPR(general data protection regulation)
 
What is GDPR?
What is GDPR?What is GDPR?
What is GDPR?
 
GDPR
GDPRGDPR
GDPR
 
GDPR most actionable cheatsheet and checklist by cyberstratg
GDPR most actionable cheatsheet and checklist by cyberstratgGDPR most actionable cheatsheet and checklist by cyberstratg
GDPR most actionable cheatsheet and checklist by cyberstratg
 
Data protection
Data protectionData protection
Data protection
 
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
 
Gdpr presentation
Gdpr presentationGdpr presentation
Gdpr presentation
 
Getting Ready for GDPR
Getting Ready for GDPRGetting Ready for GDPR
Getting Ready for GDPR
 
An Overview of GDPR by Pathway Group
An Overview of GDPR by Pathway GroupAn Overview of GDPR by Pathway Group
An Overview of GDPR by Pathway Group
 
GDPR - a view for the non experts
GDPR - a view for the non expertsGDPR - a view for the non experts
GDPR - a view for the non experts
 
DAMA Ireland - GDPR
DAMA Ireland - GDPRDAMA Ireland - GDPR
DAMA Ireland - GDPR
 

Similar to Teleran Data Protection - Addressing 5 Critical GDPR Requirements

The Definitive GDPR Guide for Event Professionals
The Definitive GDPR Guide for Event ProfessionalsThe Definitive GDPR Guide for Event Professionals
The Definitive GDPR Guide for Event ProfessionalsHubilo
 
All you need to know about GDPR
All you need to know about GDPRAll you need to know about GDPR
All you need to know about GDPRHubilo
 
Why GDPR Must Be an Integral Part of Your GRC Framework
Why GDPR Must Be an Integral Part of Your GRC FrameworkWhy GDPR Must Be an Integral Part of Your GRC Framework
Why GDPR Must Be an Integral Part of Your GRC FrameworkPECB
 
Operational impact of gdpr finance industries in the caribbean
Operational impact of gdpr finance industries in the caribbeanOperational impact of gdpr finance industries in the caribbean
Operational impact of gdpr finance industries in the caribbeanEquiGov Institute
 
GDPR and API Security
GDPR and API SecurityGDPR and API Security
GDPR and API SecurityWSO2
 
CyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRCyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRShadi A. Razak
 
A Brief Overview on GDPR
A Brief Overview on GDPRA Brief Overview on GDPR
A Brief Overview on GDPRNeha Patel
 
GDPRIBMWhitePaper
GDPRIBMWhitePaperGDPRIBMWhitePaper
GDPRIBMWhitePaperJim Wilson
 
CyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPRCyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPRIryna Chekanava
 
Satori GDPR Overview 2018
Satori GDPR Overview 2018Satori GDPR Overview 2018
Satori GDPR Overview 2018Dean Evans
 
GDPR: Data Privacy in the New
GDPR: Data Privacy in the NewGDPR: Data Privacy in the New
GDPR: Data Privacy in the Newaccenture
 
GDPR A Practical Guide with Varonis
GDPR A Practical Guide with VaronisGDPR A Practical Guide with Varonis
GDPR A Practical Guide with VaronisAngad Dayal
 
Impact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A SecurityImpact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A SecurityEQS Group
 
What's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesWhat's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesOgilvy Consulting
 
GDPR in the Digital World
GDPR in the Digital WorldGDPR in the Digital World
GDPR in the Digital WorldeZ Systems
 
GDPR & Data Privacy Guide - Free Download
GDPR & Data Privacy Guide - Free DownloadGDPR & Data Privacy Guide - Free Download
GDPR & Data Privacy Guide - Free DownloadVisitor Analytics
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) Kimberly Simon MBA
 

Similar to Teleran Data Protection - Addressing 5 Critical GDPR Requirements (20)

The Definitive GDPR Guide for Event Professionals
The Definitive GDPR Guide for Event ProfessionalsThe Definitive GDPR Guide for Event Professionals
The Definitive GDPR Guide for Event Professionals
 
All you need to know about GDPR
All you need to know about GDPRAll you need to know about GDPR
All you need to know about GDPR
 
Why GDPR Must Be an Integral Part of Your GRC Framework
Why GDPR Must Be an Integral Part of Your GRC FrameworkWhy GDPR Must Be an Integral Part of Your GRC Framework
Why GDPR Must Be an Integral Part of Your GRC Framework
 
Operational impact of gdpr finance industries in the caribbean
Operational impact of gdpr finance industries in the caribbeanOperational impact of gdpr finance industries in the caribbean
Operational impact of gdpr finance industries in the caribbean
 
GDPR and API Security
GDPR and API SecurityGDPR and API Security
GDPR and API Security
 
CyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRCyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPR
 
A Brief Overview on GDPR
A Brief Overview on GDPRA Brief Overview on GDPR
A Brief Overview on GDPR
 
GDPR How to get started?
GDPR  How to get started?GDPR  How to get started?
GDPR How to get started?
 
GDPRIBMWhitePaper
GDPRIBMWhitePaperGDPRIBMWhitePaper
GDPRIBMWhitePaper
 
CyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPRCyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPR
 
Are You Prepared for the GDPR?
Are You Prepared for the GDPR?Are You Prepared for the GDPR?
Are You Prepared for the GDPR?
 
GDPR SECURITY ISSUES
GDPR SECURITY ISSUESGDPR SECURITY ISSUES
GDPR SECURITY ISSUES
 
Satori GDPR Overview 2018
Satori GDPR Overview 2018Satori GDPR Overview 2018
Satori GDPR Overview 2018
 
GDPR: Data Privacy in the New
GDPR: Data Privacy in the NewGDPR: Data Privacy in the New
GDPR: Data Privacy in the New
 
GDPR A Practical Guide with Varonis
GDPR A Practical Guide with VaronisGDPR A Practical Guide with Varonis
GDPR A Practical Guide with Varonis
 
Impact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A SecurityImpact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A Security
 
What's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesWhat's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) Changes
 
GDPR in the Digital World
GDPR in the Digital WorldGDPR in the Digital World
GDPR in the Digital World
 
GDPR & Data Privacy Guide - Free Download
GDPR & Data Privacy Guide - Free DownloadGDPR & Data Privacy Guide - Free Download
GDPR & Data Privacy Guide - Free Download
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 

Recently uploaded

Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 

Recently uploaded (20)

Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 

Teleran Data Protection - Addressing 5 Critical GDPR Requirements

  • 1. EU GDPR Are you prepared? Addressing 5 Critical GDPR Data Protection Requirements
  • 2. 1 Agenda GDPR Explained Key GDPR Requirements Addressing 5 Critical GDPR Requirements  Data Protection Impact Assessment  Purpose Limitation  Data Protection  Incident Response  Breach Notification
  • 3. 2 GDPR Explained Expands and standardizes data protection rules across entire European Union Gives EU citizens “ownership” of their personal data Broadly defines personally identifiable information (PII) “any data that can be used to identify a person” Organizations must seek permission from citizens to use their personal data “GDPR is a complex set of regulations specifying how organizations must protect EU citizens’ personal data. Here are six fundamental principles of the GDPR.”
  • 4. 3 GDPR Explained EU citizens can withdraw right of an organization to use their personal data EU citizens can monitor the use of their data, decide who can use it, and can demand its return to them In summary: they have the right to be “forgotten”
  • 5. 4 Key GDPR Mandates 1. Big Fines GDPR compliance violations can be huge: 4% of global revenue or €20 million whichever is greater 2. Data Protection Officer Required Organizations >250 employees must have Data Protection Officer who will be personally liable for data breaches 3. Strict Breach Notification Organizations must notify authorities within 72 hours of a data breach “GDPR is complex but the key mandates can be broken down to eight major points.”
  • 6. 5 Key GDPR Mandates 4. Global Reach Any organization anywhere in the world collecting EU citizen personal data must comply 5. Comprehensive Monitoring and Security Controls Organizations must establish strict PII access monitoring, documentation, and security controls 6. On-Demand Demonstration of Data Security Organizations must be able to demonstrate their data protection process at any time
  • 7. 6 Key GDPR Mandates 7. Data Protection Impact Assessment Organizations must assess the scope, purpose, and sensitivity of data processed 8. Applies to Organization Affiliates GDPR rules apply to a company’s partners, vendors, subcontractors, and cloud providers who store or access PII
  • 8. 7 Are You Prepared? There is no time to waste because…  GDPR compliance violations can be big 4% of revenue or €20 million whichever is greater  GDPR requirements are new and complex  Data environments are large, complex, and distributed  PII is often stored in many applications and databases across the enterprise GDPR Deadline May 25th, 2018
  • 9. 8 Report/Analyze - Out-of-the-box GDPR compliance reports and alerts. Analysis of users, organizational context, applications, PII access for audit and breach forensics Monitor - Detailed audit/alerting of PII usage – “Who, What, Where, When and How” Protect - 70 granular access policies automatically prevent inappropriate access to PII GDPR Data Protection and Compliance Solution 7
  • 10. 9  Unobtrusive  Comprehensive  Quick to Install  Low Admin Effort Monitoring and Query Control Agent Compliance Repository Compliance Reporting and Analytics Databases Apps GDPR Data Protection and Compliance Solution
  • 11. 10 Who ? What Data ? Where ? User ? App ? Establishes “business context” for comprehensive, accurate compliance and effective protection SCaputo Sept. Budget Report Finance Department Milano Office Business Objects GDPR Data Protection and Compliance Solution
  • 12. 11 Addresses Five Critical GDPR Requirements GDPR Data Protection and Compliance Solution Purpose Limitation (Article 5-1b) Data Protection (Article 5-1f) Incident Response (Article 5-2) Breach Notification (Articles 33/34) Impact Assessment (Article 35)
  • 13. 12 GDPR Impact Assessment – organizations need to conduct audit of what is PII, how it is used, and by whom to confirm and attest they are GDPR-compliant Teleran addresses by: • Enabling a “GDPR Readiness Assessment” by discovering sensitive PII and auditing/documenting who is accessing PII, with which application, and for what purpose • Applying appropriate data access control policies to protect PII and ensure GDPR compliance GDPR Data Protection and Compliance Solution
  • 14. 13 GDPR Data Protection Impact Assessment GDPR Data Protection and Compliance Solution
  • 15. 14 Purpose Limitation - personal data use must be limited to stated purpose and no other Teleran addresses by: • Auditing PII access to ensure it is limited to stated use and no non-compliant access is occurring • PII protection policies enforce purpose limitation by allowing only authorized users to access PII • All other attempted access is prevented GDPR Data Protection and Compliance Solution
  • 16. 15 GDPR Purpose Limitation Monitoring Report showing sensitive column data access GDPR Data Protection and Compliance Solution
  • 17. 16 Purpose Limitation PII Access Controls Column Access Restriction Prevents queries on <TABLE> if query contains <COLUMN> by <USER> and <DATASOURCE>. Use this policy to prevent access to sensitive columns. GDPR Data Protection and Compliance Solution
  • 18. 17 Purpose Limitation PII Access Control User Message Insurance Customer Analysis Segmentation Report Customer Table Geography Address Product Payment Premium GDPR Compliance Message Your query violates GDPR Compliance Policies because it attempts to access sensitive customer information. Contact the BI Helpdesk or Compliance Office for more information. AIW+10901 Compliance Message to Business Objects user attempting to access sensitive data GDPR Data Protection and Compliance Solution
  • 19. 18 Data Protection – personal data must be secure and remain unchanged. Security audits must be documented Teleran addresses by: • Monitoring access to ensure personal data is unchanged or destroyed • Audit reporting documents data security and integrity measures are in place • Data protection policies prevent data manipulation or destruction of personal data GDPR Data Protection and Compliance Solution
  • 20. 19 Data Integrity Reporting and Controls DELETE Restriction Prevents queries containing DELETE on <TABLE> or <COLUMN>. Use this access policy to prevent deleting sensitive data. Report showing sensitive data access/changes GDPR Data Protection and Compliance Solution
  • 21. 20 Breach Identification / Notification – organizations need to put in place process to be aware of and notify authorities and citizens if and when a breach occurs Teleran addresses by: • Identifying and alerting staff to suspected or actual data breaches • Documenting breach for purposes of notification and preventing further breach activity • Applying additional access control policies to prevent future breaches of this nature GDPR Data Protection and Compliance Solution
  • 22. 21 Suspicious Activity Alerting ---Security Alert--- From: Teleran [mailto:501458408@chicisapp429v.corporate.gr.com Sent: Saturday, July 23, 2016 3:22PM To: rsimone@gr.com Subject: GDPR Compliance Event Alert Exception Activity: INSERT sensitive data to TEMP TABLE queries run 7/23/16 3:20 PM by User ID: DB Administrator. Download event report pdf. GDPR Data Protection and Compliance Solution
  • 23. 22 Data Breach Identification Suspicious Activity Dashboard identifying the possible GDPR violation of accessing and moving sensitive data GDPR Data Protection and Compliance Solution
  • 24. 23 Data Breach Forensic Audit Documentation Documentation of compliance violation. Inappropriate access and movement of PII to temporary database table GDPR Data Protection and Compliance Solution
  • 25. 24 Impact Assessment (Article 35) Purpose Limitation (Article 5-1 b) Data Security & Integrity (Article 5-1 f) Accountability & Documentation (Article 5-2) Breach Notification (Articles 33/34) Audit where PII exists, how used, by whom. Identify / remediate gaps Confirm PII use limited to stated purpose and no other Protect PII from unlawful use, manipulation, destruction or loss Demonstrate and document compliance processes Establish process to: Identify data breaches. Notify authorities / citizens of breach Teleran Solution Discovers and classifies PII. Audits who accessing PII to identify / remediate compliance gaps Monitoring documents adherence to purpose limits Monitoring / controlling PII access and use to ensure protection Audit reports demonstrate, document compliant PII access / control Identifies and alerts to suspected or actual PII breaches Applies access control policies to protect PII and ensure GDPR compliance Access controls enforce purpose limits, prevent inappropriate use/users/apps Delivers access policies to prevent: illegal data use, data manipulation, destruction PII access control and testing processes prove protection measures and GDPR-compliancy Documents breach activity for notification. Applies new control policies to prevent future like breaches Summary: Teleran Addresses 5 Critical GDPR Mandates Supports Oracle, DB2 (LUW/z), Teradata, SQL Server, Hadoop
  • 26. 25  What is your GDPR compliance strategy?  Schedule a Teleran GDPR Data Protection Readiness Assessment now to establish your GDPR roadmap www.teleran.com GDPR Data Protection and Compliance Solution The Teleran logo, iSight and iGuard are trademarks or registered trademarks of Teleran Technologies, Inc. Other brand and product names are the marks of their respective owners. SO05.10.7