SlideShare a Scribd company logo
1 of 18
5 things you should know about Data Protection
2
David Foster
Head of Data Privacy Protection
January 2018
Opening Sing-along
My personal data are mine
To abuse them is a crime
You cannot share
You must take care
Or risk a hefty fine
3
David Foster 2018
1. My Personal data are mine
• Personal data belong to the individual
• They are not yours to use as you see fit, not even if they
are public!
• Fair processing
• Legitimate Basis (hint: consent is a problem)
• Specific Purpose
• Privacy notices should declare what, how and why data are
processed
• One is unlikely to be enough!
• One notice for each independent service.
• Data Protection Impact Assessments (DPIA) may be needed.
4
2. To abuse them is a crime
• The scope of personal data is wide
• Attributes, Photos, Electronic Identifiers ….
• The scope of processing is broad
• Analysing, Copying, Viewing ….
• This is complex to communicate inside an organisation
• Internal training
• Internal policies
• Accountability
• It may help to consolidate processes and infrastructure
• Approved storage systems
• Managed internal transfers
• Be wary of automated decision making and profiling
5
3. You cannot share
• Without safeguards because privacy travels with
the data
• Responsibility rests with the controller
• Contracts, codes of conduct, binding corporate
rules
• Records of transfers
• Extra-territorial reach
• This may be a difficult culture change within
organisations used to freely sharing personal data
• Complexity may increase with ePrivacy
6
4. You must take care
• You need to look after other peoples data
• Appropriate organisational and technical measures
• Risks with unnecessary data retention
• ISO27001 for data security and handling is a good
starting point
• Individuals have rights to their data you are
processing (even if not absolute rights)
• Must be clear mechanisms to exercise the 8 basic
rights, which should be in the privacy notice
• Privacy by default and by design
• Anonymise or pseudonymise
7
5. Or risk a hefty fine
• Its all about managing risk
• “Compliance”, per-se, does not exist
• Fines can be large depending on the infraction
• Violation of principles carry the larger fine
• Mitigation of risk of large fines
• A demonstrable attempt at implementing the
legislative requirements
• Internal Training, Policies, Accountability,
Management Commitment
• Having a DPO and accepting their advice
8
Finally …
9
Key Obligations of an Organization
• A29 Advice
• “employers should always bear in mind the fundamental data
protection principles, irrespective of the technology used;
• consent is highly unlikely to be a legal basis for data
processing at work, unless employees can refuse without
adverse consequence;
• the contents of electronic communications made from
business premises enjoy the same fundamental rights
protections as analogue communications;
• employees should receive effective information about the
monitoring that takes place; and
• any international transfer of employee data should take place
only where an adequate level of protection is ensured.”
10
Employers Must:
• A29 Advice
• “ensure that data is processed for specified and legitimate purposes that are
proportionate and necessary;
• take into account the principle of purpose limitation, while making sure that the data
are adequate, relevant and not excessive for the legitimate purpose;
• apply the principles of proportionality and subsidiarity regardless of the applicable
legal ground;
• be transparent with employees about the use and purposes of monitoring
technologies;
• enable the exercise of data subject rights, including the rights of access and, as
appropriate, the rectification, erasure or blocking of personal data;
• keep the data accurate, and not retain them any longer than necessary; and
• take all necessary measures to protect the data against unauthorised access and
• ensure that staff are sufficiently aware of data protection obligations.”
11
Typical Reactions
• Fiction: “This is just administration so doesn’t
concern me”
• Fact: This is part of the professional
responsibilities
• Fiction: “OK, I will do it and then I can forget about it”
• Fact: This is an ongoing and continual process
• Fiction: “Just tell me what to do so I don’t have to
think about it”
• Fact: Privacy considerations have to become part
of the culture as simple prescriptions for all
possible situations are not possible.
12
Monitoring
• Principles
• Employees must be informed of the existence of any monitoring, the purposes for which
personal data are to be processed and any other information necessary to guarantee fair
processing. (Necessary but not in itself sufficient)
• Data collected that includes personal data should be for a specific legitimate purpose.
• Monitoring data should be anonymised by default.
• A29 Advice on limitations to monitoring
• “geographical (e.g. monitoring only in specific places; monitoring sensitive areas such as
religious places and for example sanitary zones and break rooms should be prohibited),
• data-oriented (e.g. personal electronic files and communication should not be monitored),
and
• time-related (e.g. sampling instead of continuous monitoring).”
• Blocking is better than monitoring
• Questions
• Are you handling this appropriately?
• Are you “over-collecting” data with the risk of “further processing”?
• How will you separate personal and work-related data?
• Do you have a clear IT monitoring policy with appropriate safeguards?
13
Storage
• Principles
• Ensure that data are not accidentally processed.
• Ensure that deleted data stays deleted
• A29
• “It should be ensured that employees can designate certain
private spaces to which the employer may not gain access
unless under exceptional circumstances.”
• Some Questions
• Are all services where personal data are stored “fit for purpose”?
• Can you demonstrate adequate technical measures? (ISO27001)
• What are you policies for different classes of data on automatic
deletion?
14
End-user devices
• Principles
• Do not process non-work related personal data on devices
allowed for private use, or in a private context (home).
• A29
• “Select the most privacy protecting defaults”
• Provide (acceptable use) policies. “This allows employees
to adapt their behaviour to prevent being monitored when
they legitimately use IT work facilities for private use”
• Some Questions
• Do you have sufficient measures to allow for truly private
use of facilities? (Laptops, Network, Storage etc)
• Are you offering enough advice on the use of IT facilities?
15
Typical and generic problems
• Collecting too much data - violates data minimisation
• Because you have a single “Web form”
• Using unsecured transfer mechanisms - violates appropriate technical
measures
• Email
• Processing data without controls - violates appropriate organisational
measures
• Excel spreadsheets, Laptops etc.
• Personal Data kept because it “might be useful” - violates retention
periods.
• Archives
• Data stored on other services (internal and external) without privacy
protecting agreements - violates appropriate safeguards.
• Almost every storage system or platform
16
Finally, 5 things to do
1. Know where you are processing
• Data mapping
2. Know what you are doing
• Privacy notices
3. Know why you are doing it
• Internal review of processing operations
4. Know how you are doing is correct
• Technical measures and controls
5. Know when you should stop doing it
• Retention periods
17
Good Luck!
18
Facebooks has put together: “the largest cross functional team”
comprising “senior executives from all product teams, designers
and user experience/testing executives, policy executives, legal
executives and executives from each of the Facebook family of
companies”.
“Dozens of people at Facebook Ireland are working full time on this
effort,” it said, noting too that the data protection team at its
European HQ (in Dublin, Ireland) would be growing by 250% in
2017.
Source: https://techcrunch.com/2018/01/20/wtf-is-gdpr/

More Related Content

What's hot

2. Asset Security
2. Asset Security2. Asset Security
2. Asset SecuritySam Bowne
 
3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security EngineeringSam Bowne
 
Privacy, Security & Access to Data
Privacy, Security & Access to DataPrivacy, Security & Access to Data
Privacy, Security & Access to DataCybera Inc.
 
Umphrey hutcherson-ecu-cause2010-rev5
Umphrey hutcherson-ecu-cause2010-rev5Umphrey hutcherson-ecu-cause2010-rev5
Umphrey hutcherson-ecu-cause2010-rev5umphreym
 
Privacy by Design: White Papaer
Privacy by Design: White PapaerPrivacy by Design: White Papaer
Privacy by Design: White PapaerKristyn Greenwood
 
Employee monitoring updated
Employee monitoring updatedEmployee monitoring updated
Employee monitoring updatedAdvent IM Ltd
 
CISSP - Chapter 2 - Asset Security
CISSP - Chapter 2 -  Asset SecurityCISSP - Chapter 2 -  Asset Security
CISSP - Chapter 2 - Asset SecurityKarthikeyan Dhayalan
 
Introduction to Health Informatics Ch11 power point
Introduction to Health Informatics Ch11 power pointIntroduction to Health Informatics Ch11 power point
Introduction to Health Informatics Ch11 power pointbradleyl2
 
Privacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the artPrivacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the artJames Mulhern
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk ManagementSam Bowne
 
Data Privacy Compliance Awareness Planning Strategy Assessment Methodology Fr...
Data Privacy Compliance Awareness Planning Strategy Assessment Methodology Fr...Data Privacy Compliance Awareness Planning Strategy Assessment Methodology Fr...
Data Privacy Compliance Awareness Planning Strategy Assessment Methodology Fr...SlideTeam
 
GDPR and ISO27001 mapping EL
GDPR and ISO27001 mapping ELGDPR and ISO27001 mapping EL
GDPR and ISO27001 mapping ELEugene Lee
 
Digital Preservation Discussion Group
Digital Preservation Discussion GroupDigital Preservation Discussion Group
Digital Preservation Discussion GroupAxiell ALM
 
Advantage ppt data breaches km approved - final (djm notes)
Advantage ppt  data breaches   km approved - final (djm notes)Advantage ppt  data breaches   km approved - final (djm notes)
Advantage ppt data breaches km approved - final (djm notes)Dan Michaluk
 
GDPR for Non-European Region - Financial Services EL
GDPR for Non-European Region - Financial Services ELGDPR for Non-European Region - Financial Services EL
GDPR for Non-European Region - Financial Services ELEugene Lee
 

What's hot (20)

3 02
3 023 02
3 02
 
2. Asset Security
2. Asset Security2. Asset Security
2. Asset Security
 
3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security Engineering
 
Privacy, Security & Access to Data
Privacy, Security & Access to DataPrivacy, Security & Access to Data
Privacy, Security & Access to Data
 
Umphrey hutcherson-ecu-cause2010-rev5
Umphrey hutcherson-ecu-cause2010-rev5Umphrey hutcherson-ecu-cause2010-rev5
Umphrey hutcherson-ecu-cause2010-rev5
 
Privacy by Design: White Papaer
Privacy by Design: White PapaerPrivacy by Design: White Papaer
Privacy by Design: White Papaer
 
GDPR for your Payroll Bureau
GDPR for your Payroll BureauGDPR for your Payroll Bureau
GDPR for your Payroll Bureau
 
Employee monitoring updated
Employee monitoring updatedEmployee monitoring updated
Employee monitoring updated
 
CISSP - Chapter 2 - Asset Security
CISSP - Chapter 2 -  Asset SecurityCISSP - Chapter 2 -  Asset Security
CISSP - Chapter 2 - Asset Security
 
Introduction to Health Informatics Ch11 power point
Introduction to Health Informatics Ch11 power pointIntroduction to Health Informatics Ch11 power point
Introduction to Health Informatics Ch11 power point
 
Privacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the artPrivacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the art
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
 
CISSP-WEB
CISSP-WEBCISSP-WEB
CISSP-WEB
 
Data Privacy Compliance Awareness Planning Strategy Assessment Methodology Fr...
Data Privacy Compliance Awareness Planning Strategy Assessment Methodology Fr...Data Privacy Compliance Awareness Planning Strategy Assessment Methodology Fr...
Data Privacy Compliance Awareness Planning Strategy Assessment Methodology Fr...
 
Steal This Data - Email Security and DLP
Steal This Data - Email Security and DLPSteal This Data - Email Security and DLP
Steal This Data - Email Security and DLP
 
3GRC approach to GDPR V 0.1 www.3grc.co.uk
3GRC  approach to GDPR V 0.1 www.3grc.co.uk3GRC  approach to GDPR V 0.1 www.3grc.co.uk
3GRC approach to GDPR V 0.1 www.3grc.co.uk
 
GDPR and ISO27001 mapping EL
GDPR and ISO27001 mapping ELGDPR and ISO27001 mapping EL
GDPR and ISO27001 mapping EL
 
Digital Preservation Discussion Group
Digital Preservation Discussion GroupDigital Preservation Discussion Group
Digital Preservation Discussion Group
 
Advantage ppt data breaches km approved - final (djm notes)
Advantage ppt  data breaches   km approved - final (djm notes)Advantage ppt  data breaches   km approved - final (djm notes)
Advantage ppt data breaches km approved - final (djm notes)
 
GDPR for Non-European Region - Financial Services EL
GDPR for Non-European Region - Financial Services ELGDPR for Non-European Region - Financial Services EL
GDPR for Non-European Region - Financial Services EL
 

Similar to CERN 5 Things you should know about Data Protection

Cybertopicsecurity_3
Cybertopicsecurity_3Cybertopicsecurity_3
Cybertopicsecurity_3Anne Starr
 
gkknwqeq3232,sqSecurity essentials domain 3
gkknwqeq3232,sqSecurity essentials   domain 3gkknwqeq3232,sqSecurity essentials   domain 3
gkknwqeq3232,sqSecurity essentials domain 3Anne Starr
 
GDPR Privacy Introduction
GDPR Privacy IntroductionGDPR Privacy Introduction
GDPR Privacy IntroductionNiclasGranqvist
 
Media_644046_smxx (1).pptx
Media_644046_smxx (1).pptxMedia_644046_smxx (1).pptx
Media_644046_smxx (1).pptxMichelleSaver
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptxRavindra Babu
 
Global Data Privacy Regulation
Global Data Privacy RegulationGlobal Data Privacy Regulation
Global Data Privacy RegulationJatin Kochhar
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk ManagementSam Bowne
 
Cor concepts information governance-protection-of-personal-information-act-popi
Cor concepts information governance-protection-of-personal-information-act-popiCor concepts information governance-protection-of-personal-information-act-popi
Cor concepts information governance-protection-of-personal-information-act-popiRobust Marketing & Consulting (Pty) Ltd
 
Introduction to data protection
Introduction to data protectionIntroduction to data protection
Introduction to data protectionRachel Aldighieri
 
Handling and Processing Big Data
Handling and Processing Big DataHandling and Processing Big Data
Handling and Processing Big DataUmair Shafique
 
An introduction to data protection - Edinburgh
An introduction to data protection - EdinburghAn introduction to data protection - Edinburgh
An introduction to data protection - EdinburghRachel Aldighieri
 
10 commandments in rdm funder compliancy
10 commandments in rdm funder compliancy10 commandments in rdm funder compliancy
10 commandments in rdm funder compliancyHannelore Vanhaverbeke
 
CNIT 125: Ch 2. Security and Risk Management (Part 1)
CNIT 125: Ch 2. Security and Risk Management (Part 1)CNIT 125: Ch 2. Security and Risk Management (Part 1)
CNIT 125: Ch 2. Security and Risk Management (Part 1)Sam Bowne
 
ch1.pptx Chapter 1 of CISSP ch1.pptx Chapter 1 of CISSPch1.pptx Chapter 1 of ...
ch1.pptx Chapter 1 of CISSP ch1.pptx Chapter 1 of CISSPch1.pptx Chapter 1 of ...ch1.pptx Chapter 1 of CISSP ch1.pptx Chapter 1 of CISSPch1.pptx Chapter 1 of ...
ch1.pptx Chapter 1 of CISSP ch1.pptx Chapter 1 of CISSPch1.pptx Chapter 1 of ...drsajjad13
 
Group 2 Handling and Processing of big data.pptx
Group 2 Handling and Processing of big data.pptxGroup 2 Handling and Processing of big data.pptx
Group 2 Handling and Processing of big data.pptxsalutiontechnology
 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingSecurity Innovation
 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingRebecca Leitch
 
501 ch 11 operational security
501 ch 11 operational security501 ch 11 operational security
501 ch 11 operational securitygocybersec
 

Similar to CERN 5 Things you should know about Data Protection (20)

Cybertopicsecurity_3
Cybertopicsecurity_3Cybertopicsecurity_3
Cybertopicsecurity_3
 
gkknwqeq3232,sqSecurity essentials domain 3
gkknwqeq3232,sqSecurity essentials   domain 3gkknwqeq3232,sqSecurity essentials   domain 3
gkknwqeq3232,sqSecurity essentials domain 3
 
Secuntialesse
SecuntialesseSecuntialesse
Secuntialesse
 
GDPR Privacy Introduction
GDPR Privacy IntroductionGDPR Privacy Introduction
GDPR Privacy Introduction
 
Media_644046_smxx (1).pptx
Media_644046_smxx (1).pptxMedia_644046_smxx (1).pptx
Media_644046_smxx (1).pptx
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptx
 
Global Data Privacy Regulation
Global Data Privacy RegulationGlobal Data Privacy Regulation
Global Data Privacy Regulation
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
 
What IT Needs to Consider for Legal Hold
What IT Needs to Consider for Legal HoldWhat IT Needs to Consider for Legal Hold
What IT Needs to Consider for Legal Hold
 
Cor concepts information governance-protection-of-personal-information-act-popi
Cor concepts information governance-protection-of-personal-information-act-popiCor concepts information governance-protection-of-personal-information-act-popi
Cor concepts information governance-protection-of-personal-information-act-popi
 
Introduction to data protection
Introduction to data protectionIntroduction to data protection
Introduction to data protection
 
Handling and Processing Big Data
Handling and Processing Big DataHandling and Processing Big Data
Handling and Processing Big Data
 
An introduction to data protection - Edinburgh
An introduction to data protection - EdinburghAn introduction to data protection - Edinburgh
An introduction to data protection - Edinburgh
 
10 commandments in rdm funder compliancy
10 commandments in rdm funder compliancy10 commandments in rdm funder compliancy
10 commandments in rdm funder compliancy
 
CNIT 125: Ch 2. Security and Risk Management (Part 1)
CNIT 125: Ch 2. Security and Risk Management (Part 1)CNIT 125: Ch 2. Security and Risk Management (Part 1)
CNIT 125: Ch 2. Security and Risk Management (Part 1)
 
ch1.pptx Chapter 1 of CISSP ch1.pptx Chapter 1 of CISSPch1.pptx Chapter 1 of ...
ch1.pptx Chapter 1 of CISSP ch1.pptx Chapter 1 of CISSPch1.pptx Chapter 1 of ...ch1.pptx Chapter 1 of CISSP ch1.pptx Chapter 1 of CISSPch1.pptx Chapter 1 of ...
ch1.pptx Chapter 1 of CISSP ch1.pptx Chapter 1 of CISSPch1.pptx Chapter 1 of ...
 
Group 2 Handling and Processing of big data.pptx
Group 2 Handling and Processing of big data.pptxGroup 2 Handling and Processing of big data.pptx
Group 2 Handling and Processing of big data.pptx
 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be Telling
 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be Telling
 
501 ch 11 operational security
501 ch 11 operational security501 ch 11 operational security
501 ch 11 operational security
 

More from EUDAT

EUDAT_Brochure_Generica_Jan_UPDATED(5).pdf
EUDAT_Brochure_Generica_Jan_UPDATED(5).pdfEUDAT_Brochure_Generica_Jan_UPDATED(5).pdf
EUDAT_Brochure_Generica_Jan_UPDATED(5).pdfEUDAT
 
EUDAT Booklet Mar22 (2).pdf
EUDAT Booklet Mar22 (2).pdfEUDAT Booklet Mar22 (2).pdf
EUDAT Booklet Mar22 (2).pdfEUDAT
 
EUDAT_Brochure_Generica_Jan_UPDATED (1).pdf
EUDAT_Brochure_Generica_Jan_UPDATED (1).pdfEUDAT_Brochure_Generica_Jan_UPDATED (1).pdf
EUDAT_Brochure_Generica_Jan_UPDATED (1).pdfEUDAT
 
EUDAT Brochure - B2HANDLE.pdf
EUDAT Brochure - B2HANDLE.pdfEUDAT Brochure - B2HANDLE.pdf
EUDAT Brochure - B2HANDLE.pdfEUDAT
 
EUDAT Brochure - B2DROP.pdf
EUDAT Brochure - B2DROP.pdfEUDAT Brochure - B2DROP.pdf
EUDAT Brochure - B2DROP.pdfEUDAT
 
EUDAT Brochure - B2SHARE.pdf
EUDAT Brochure - B2SHARE.pdfEUDAT Brochure - B2SHARE.pdf
EUDAT Brochure - B2SHARE.pdfEUDAT
 
EUDAT Brochure - B2SAFE.pdf
EUDAT Brochure - B2SAFE.pdfEUDAT Brochure - B2SAFE.pdf
EUDAT Brochure - B2SAFE.pdfEUDAT
 
EUDAT Brochure - B2FIND(1).pdf
EUDAT Brochure - B2FIND(1).pdfEUDAT Brochure - B2FIND(1).pdf
EUDAT Brochure - B2FIND(1).pdfEUDAT
 
EUDAT Brochure - B2ACCESS.pdf
EUDAT Brochure - B2ACCESS.pdfEUDAT Brochure - B2ACCESS.pdf
EUDAT Brochure - B2ACCESS.pdfEUDAT
 
Rob Carrillo - Writing effective service documentation for EUDAT services
Rob Carrillo - Writing effective service documentation for EUDAT servicesRob Carrillo - Writing effective service documentation for EUDAT services
Rob Carrillo - Writing effective service documentation for EUDAT servicesEUDAT
 
Ariyo - EUDAT CDI B2 services documentation
Ariyo - EUDAT CDI B2 services documentationAriyo - EUDAT CDI B2 services documentation
Ariyo - EUDAT CDI B2 services documentationEUDAT
 
Introduction to eudat and its services
Introduction to eudat and its servicesIntroduction to eudat and its services
Introduction to eudat and its servicesEUDAT
 
Using B2NOTE: The U.Porto Pilot
Using B2NOTE: The U.Porto PilotUsing B2NOTE: The U.Porto Pilot
Using B2NOTE: The U.Porto PilotEUDAT
 
OpenAIRE Advance - Kick off last week
OpenAIRE Advance - Kick off last weekOpenAIRE Advance - Kick off last week
OpenAIRE Advance - Kick off last weekEUDAT
 
European Open Science Cloud - Skills workshop
European Open Science Cloud - Skills workshopEuropean Open Science Cloud - Skills workshop
European Open Science Cloud - Skills workshopEUDAT
 
Linking service capabilities to data stweardship competences for professional...
Linking service capabilities to data stweardship competences for professional...Linking service capabilities to data stweardship competences for professional...
Linking service capabilities to data stweardship competences for professional...EUDAT
 
FAIRness of training materials
FAIRness of training materialsFAIRness of training materials
FAIRness of training materialsEUDAT
 
Training by EOSC-hub - Integrating and Managing services for the European Ope...
Training by EOSC-hub - Integrating and Managing services for the European Ope...Training by EOSC-hub - Integrating and Managing services for the European Ope...
Training by EOSC-hub - Integrating and Managing services for the European Ope...EUDAT
 
Draft Governance Framework for the EOSC
Draft Governance Framework for the EOSCDraft Governance Framework for the EOSC
Draft Governance Framework for the EOSCEUDAT
 
Building Interoperable AAI for Researchers
Building Interoperable AAI for ResearchersBuilding Interoperable AAI for Researchers
Building Interoperable AAI for ResearchersEUDAT
 

More from EUDAT (20)

EUDAT_Brochure_Generica_Jan_UPDATED(5).pdf
EUDAT_Brochure_Generica_Jan_UPDATED(5).pdfEUDAT_Brochure_Generica_Jan_UPDATED(5).pdf
EUDAT_Brochure_Generica_Jan_UPDATED(5).pdf
 
EUDAT Booklet Mar22 (2).pdf
EUDAT Booklet Mar22 (2).pdfEUDAT Booklet Mar22 (2).pdf
EUDAT Booklet Mar22 (2).pdf
 
EUDAT_Brochure_Generica_Jan_UPDATED (1).pdf
EUDAT_Brochure_Generica_Jan_UPDATED (1).pdfEUDAT_Brochure_Generica_Jan_UPDATED (1).pdf
EUDAT_Brochure_Generica_Jan_UPDATED (1).pdf
 
EUDAT Brochure - B2HANDLE.pdf
EUDAT Brochure - B2HANDLE.pdfEUDAT Brochure - B2HANDLE.pdf
EUDAT Brochure - B2HANDLE.pdf
 
EUDAT Brochure - B2DROP.pdf
EUDAT Brochure - B2DROP.pdfEUDAT Brochure - B2DROP.pdf
EUDAT Brochure - B2DROP.pdf
 
EUDAT Brochure - B2SHARE.pdf
EUDAT Brochure - B2SHARE.pdfEUDAT Brochure - B2SHARE.pdf
EUDAT Brochure - B2SHARE.pdf
 
EUDAT Brochure - B2SAFE.pdf
EUDAT Brochure - B2SAFE.pdfEUDAT Brochure - B2SAFE.pdf
EUDAT Brochure - B2SAFE.pdf
 
EUDAT Brochure - B2FIND(1).pdf
EUDAT Brochure - B2FIND(1).pdfEUDAT Brochure - B2FIND(1).pdf
EUDAT Brochure - B2FIND(1).pdf
 
EUDAT Brochure - B2ACCESS.pdf
EUDAT Brochure - B2ACCESS.pdfEUDAT Brochure - B2ACCESS.pdf
EUDAT Brochure - B2ACCESS.pdf
 
Rob Carrillo - Writing effective service documentation for EUDAT services
Rob Carrillo - Writing effective service documentation for EUDAT servicesRob Carrillo - Writing effective service documentation for EUDAT services
Rob Carrillo - Writing effective service documentation for EUDAT services
 
Ariyo - EUDAT CDI B2 services documentation
Ariyo - EUDAT CDI B2 services documentationAriyo - EUDAT CDI B2 services documentation
Ariyo - EUDAT CDI B2 services documentation
 
Introduction to eudat and its services
Introduction to eudat and its servicesIntroduction to eudat and its services
Introduction to eudat and its services
 
Using B2NOTE: The U.Porto Pilot
Using B2NOTE: The U.Porto PilotUsing B2NOTE: The U.Porto Pilot
Using B2NOTE: The U.Porto Pilot
 
OpenAIRE Advance - Kick off last week
OpenAIRE Advance - Kick off last weekOpenAIRE Advance - Kick off last week
OpenAIRE Advance - Kick off last week
 
European Open Science Cloud - Skills workshop
European Open Science Cloud - Skills workshopEuropean Open Science Cloud - Skills workshop
European Open Science Cloud - Skills workshop
 
Linking service capabilities to data stweardship competences for professional...
Linking service capabilities to data stweardship competences for professional...Linking service capabilities to data stweardship competences for professional...
Linking service capabilities to data stweardship competences for professional...
 
FAIRness of training materials
FAIRness of training materialsFAIRness of training materials
FAIRness of training materials
 
Training by EOSC-hub - Integrating and Managing services for the European Ope...
Training by EOSC-hub - Integrating and Managing services for the European Ope...Training by EOSC-hub - Integrating and Managing services for the European Ope...
Training by EOSC-hub - Integrating and Managing services for the European Ope...
 
Draft Governance Framework for the EOSC
Draft Governance Framework for the EOSCDraft Governance Framework for the EOSC
Draft Governance Framework for the EOSC
 
Building Interoperable AAI for Researchers
Building Interoperable AAI for ResearchersBuilding Interoperable AAI for Researchers
Building Interoperable AAI for Researchers
 

Recently uploaded

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Recently uploaded (20)

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

CERN 5 Things you should know about Data Protection

  • 1.
  • 2. 5 things you should know about Data Protection 2 David Foster Head of Data Privacy Protection January 2018
  • 3. Opening Sing-along My personal data are mine To abuse them is a crime You cannot share You must take care Or risk a hefty fine 3 David Foster 2018
  • 4. 1. My Personal data are mine • Personal data belong to the individual • They are not yours to use as you see fit, not even if they are public! • Fair processing • Legitimate Basis (hint: consent is a problem) • Specific Purpose • Privacy notices should declare what, how and why data are processed • One is unlikely to be enough! • One notice for each independent service. • Data Protection Impact Assessments (DPIA) may be needed. 4
  • 5. 2. To abuse them is a crime • The scope of personal data is wide • Attributes, Photos, Electronic Identifiers …. • The scope of processing is broad • Analysing, Copying, Viewing …. • This is complex to communicate inside an organisation • Internal training • Internal policies • Accountability • It may help to consolidate processes and infrastructure • Approved storage systems • Managed internal transfers • Be wary of automated decision making and profiling 5
  • 6. 3. You cannot share • Without safeguards because privacy travels with the data • Responsibility rests with the controller • Contracts, codes of conduct, binding corporate rules • Records of transfers • Extra-territorial reach • This may be a difficult culture change within organisations used to freely sharing personal data • Complexity may increase with ePrivacy 6
  • 7. 4. You must take care • You need to look after other peoples data • Appropriate organisational and technical measures • Risks with unnecessary data retention • ISO27001 for data security and handling is a good starting point • Individuals have rights to their data you are processing (even if not absolute rights) • Must be clear mechanisms to exercise the 8 basic rights, which should be in the privacy notice • Privacy by default and by design • Anonymise or pseudonymise 7
  • 8. 5. Or risk a hefty fine • Its all about managing risk • “Compliance”, per-se, does not exist • Fines can be large depending on the infraction • Violation of principles carry the larger fine • Mitigation of risk of large fines • A demonstrable attempt at implementing the legislative requirements • Internal Training, Policies, Accountability, Management Commitment • Having a DPO and accepting their advice 8
  • 10. Key Obligations of an Organization • A29 Advice • “employers should always bear in mind the fundamental data protection principles, irrespective of the technology used; • consent is highly unlikely to be a legal basis for data processing at work, unless employees can refuse without adverse consequence; • the contents of electronic communications made from business premises enjoy the same fundamental rights protections as analogue communications; • employees should receive effective information about the monitoring that takes place; and • any international transfer of employee data should take place only where an adequate level of protection is ensured.” 10
  • 11. Employers Must: • A29 Advice • “ensure that data is processed for specified and legitimate purposes that are proportionate and necessary; • take into account the principle of purpose limitation, while making sure that the data are adequate, relevant and not excessive for the legitimate purpose; • apply the principles of proportionality and subsidiarity regardless of the applicable legal ground; • be transparent with employees about the use and purposes of monitoring technologies; • enable the exercise of data subject rights, including the rights of access and, as appropriate, the rectification, erasure or blocking of personal data; • keep the data accurate, and not retain them any longer than necessary; and • take all necessary measures to protect the data against unauthorised access and • ensure that staff are sufficiently aware of data protection obligations.” 11
  • 12. Typical Reactions • Fiction: “This is just administration so doesn’t concern me” • Fact: This is part of the professional responsibilities • Fiction: “OK, I will do it and then I can forget about it” • Fact: This is an ongoing and continual process • Fiction: “Just tell me what to do so I don’t have to think about it” • Fact: Privacy considerations have to become part of the culture as simple prescriptions for all possible situations are not possible. 12
  • 13. Monitoring • Principles • Employees must be informed of the existence of any monitoring, the purposes for which personal data are to be processed and any other information necessary to guarantee fair processing. (Necessary but not in itself sufficient) • Data collected that includes personal data should be for a specific legitimate purpose. • Monitoring data should be anonymised by default. • A29 Advice on limitations to monitoring • “geographical (e.g. monitoring only in specific places; monitoring sensitive areas such as religious places and for example sanitary zones and break rooms should be prohibited), • data-oriented (e.g. personal electronic files and communication should not be monitored), and • time-related (e.g. sampling instead of continuous monitoring).” • Blocking is better than monitoring • Questions • Are you handling this appropriately? • Are you “over-collecting” data with the risk of “further processing”? • How will you separate personal and work-related data? • Do you have a clear IT monitoring policy with appropriate safeguards? 13
  • 14. Storage • Principles • Ensure that data are not accidentally processed. • Ensure that deleted data stays deleted • A29 • “It should be ensured that employees can designate certain private spaces to which the employer may not gain access unless under exceptional circumstances.” • Some Questions • Are all services where personal data are stored “fit for purpose”? • Can you demonstrate adequate technical measures? (ISO27001) • What are you policies for different classes of data on automatic deletion? 14
  • 15. End-user devices • Principles • Do not process non-work related personal data on devices allowed for private use, or in a private context (home). • A29 • “Select the most privacy protecting defaults” • Provide (acceptable use) policies. “This allows employees to adapt their behaviour to prevent being monitored when they legitimately use IT work facilities for private use” • Some Questions • Do you have sufficient measures to allow for truly private use of facilities? (Laptops, Network, Storage etc) • Are you offering enough advice on the use of IT facilities? 15
  • 16. Typical and generic problems • Collecting too much data - violates data minimisation • Because you have a single “Web form” • Using unsecured transfer mechanisms - violates appropriate technical measures • Email • Processing data without controls - violates appropriate organisational measures • Excel spreadsheets, Laptops etc. • Personal Data kept because it “might be useful” - violates retention periods. • Archives • Data stored on other services (internal and external) without privacy protecting agreements - violates appropriate safeguards. • Almost every storage system or platform 16
  • 17. Finally, 5 things to do 1. Know where you are processing • Data mapping 2. Know what you are doing • Privacy notices 3. Know why you are doing it • Internal review of processing operations 4. Know how you are doing is correct • Technical measures and controls 5. Know when you should stop doing it • Retention periods 17
  • 18. Good Luck! 18 Facebooks has put together: “the largest cross functional team” comprising “senior executives from all product teams, designers and user experience/testing executives, policy executives, legal executives and executives from each of the Facebook family of companies”. “Dozens of people at Facebook Ireland are working full time on this effort,” it said, noting too that the data protection team at its European HQ (in Dublin, Ireland) would be growing by 250% in 2017. Source: https://techcrunch.com/2018/01/20/wtf-is-gdpr/