SlideShare a Scribd company logo
1 of 37
Download to read offline
Data Breaches and the
EU GDPR
Adrian Ross LLB (Hons), MBA
GRC Consultant
IT Governance Ltd
30 June 2016
www.itgovernance.co.uk
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Introduction
• Adrian Ross
• GRC Consultant
– Infrastructure Services
– Business Process Re-engineering
– Business Intelligence
– Business Architecture
– Intellectual Property
– Legal Compliance
– Data Protection & Information Security
– Enterprise Risk Management
2
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
IT Governance Ltd: GRC One-Stop-Shop
All verticals, all sectors, all organizational sizes
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Agenda
• An overview of the regulatory landscape
• Territorial scope
• Remedies, Liabilities and Penalties
• Principles of the EU GDPR
• Data Breaches
• Notification rules
• Supervisory Authorities
• EU Data Protection Board
4
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
The nature of European law
• Two main types of legislation:
– Directives
º Require individual implementation in each Member State
º Implemented by the creation of national laws approved by the parliaments of
each Member State
º European Directive 95/46/EC is a Directive
º UK Data Protection Act 1998
– Regulations
º Immediately applicable in each Member State
º Require no local implementing legislation
º EU GDPR is a Regulation
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Article 99: Entry into force and
application
This Regulation shall be binding in its entirety and directly
applicable in all Member States.
KEY DATES
• On 8 April 2016 the Council adopted the Regulation.
• On 14 April 2016 the Regulation was adopted by the European Parliament.
• On 4 May 2016, the official text of the Regulation was published in the EU Official
Journal in all the official languages.
• The Regulation entered into force on 24 May 2016, and applies from 25 May 2018.
• http://ec.europa.eu/justice/data-protection/reform/index_en.htm
Final Text of the Directive: http://data.consilium.europa.eu/doc/document/ST-
5419-2016-REV-1/en/pdf
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
GDPR
The GDPR has eleven chapters:
1
• Chapter I General Provisions: Articles 1 - 4
2
• Chapter II Principles: Articles 5 - 11
3
• Chapter III Rights of the Data Subject: Articles 12 - 23
4
• Chapter IV Controller and Processor: Articles 24 - 43
5
• Chapter V Transfer of Personal Data to Third Countries: Articles 44 - 50
6
• Chapter VI Independent Supervisory Authorities: Articles 51 - 59
7
• Chapter VII Cooperation and Consistency: Articles 60 - 76
8
• Chapter VIII Remedies Liabilities and Penalties: Articles 77 - 84
9
• Chapter IX Provisions Relating to Specific Processing Situations: Articles 85 - 91
Data protection model
under GDPR
Information Commissioner’s Office (ICO)
(supervising authority)
Data controller
(organisations)
Data subject
(individuals)
Data
processor
Third
countries
Third
parties
Duties
Rights
Disclosure?
Inform?
Security?
Guarantees?
Assessment
Enforcement
European Data Protection Board
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Articles 1 – 3: Who, and where?
• Natural person = a living individual
• Natural persons have rights associated with:
– The protection of personal data
– The protection of the processing personal data
– The unrestricted movement of personal data within the EU
• In material scope:
– Personal data that is processed wholly or partly by automated means;
– Personal data that is part of a filing system, or intended to be.
• The Regulation applies to controllers and processors in the EU
irrespective of where processing takes place.
• It applies to controllers not in the EU
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Remedies, liabilities and penalties
• Article 79: Right to an effective judicial remedy against a
controller or processor
– Judicial remedy where their rights have been infringed as a result of the
processing of personal data.
º In the courts of the Member State where the controller or processor has an establishment.
º In the courts of the Member State where the data subject habitually resides.
• Article 82: Right to compensation and liability
– Any person who has suffered material, or non-material, damage shall have the
right to receive compensation from the controller or processor.
– Controller involved in processing shall be liable for damage caused by
processing.
• Article 83: General conditions for imposing administrative fines
– Imposition of administrative fines will in each case be effective, proportionate,
and dissuasive
º taking into account technical and organisational measures implemented;
– € 20,000,000 or, in case of an undertaking, 4% total worldwide annual
turnover in the preceding financial year (whichever is higher)
Module I
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Article 5: Principles - Personal data shall be:
1 • Processed lawfully, fairly and in a transparent manner
2 • Collected for specified, explicit and legitimate purposes
3 • Adequate, relevant and limited to what is necessary
4 • Accurate and, where necessary kept up to date
5 • Retained only for as long as necessary
6 • Processed in an appropriate manner to maintain security
7.
• Accountability
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Article 5 & 6: Lawfulness
• Secure against accidental loss, destruction or damage
• Processing must be lawful – which means, inter alia:
– Data subject must give consent for specific purposes
– Other specific circumstances where consent is not required
º So that controller can comply with legal obligations etc
• One month to respond to Subject Access Requests – & no charges
• Controllers and processors clearly distinguished
– Clearly identified obligations
– Controllers responsible for ensuring processors comply with contractual terms for
processing information
– Processors must operate under a legally binding contract
º And note issues around extra-territoriality
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Article 32: Security of Personal Data
• A requirement for data controllers and data processors to
implement a level of security appropriate to the risk,
including:
– pseudonymisation and encryption of personal data;
– ensure the ongoing confidentiality, integrity and availability of
systems;
– a process for regularly testing, assessing and evaluating the
effectiveness of security measures;
– security measures taken need to comply with the concept of
privacy by design;
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Key facts about cyber breaches
Which organisations suffered data breaches in 2015?
• 69 % of large organisations
• 38 % of small organisation
What was the median number of breaches per company?
• Large organisations: 14
• Small organisations: 4
What was the average cost of the worst single breach?
• Large organisations: £1.46 - £3.14m
• Small organisations: £75k - £311k
What will happen next year?
• 59% of respondents expect more breaches this year than last
• PwC and BIS: 2015 ISBS Survey
14
60% of breached small
organisations close down
within 6 months – National
Cyber Security Alliance
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
What sorts of breaches?
Of Large Organisations:
• External attack – 69%
• Malware or viruses – 84%
• Denial of Service – 37%
• Network penetration (detected) – 37%
– (if you don’t think you’ve been breached, you’re not looking hard enough)
• Know they’ve suffered IP theft – 19%
• Staff-related security breaches – 75%
• Breaches caused by inadvertent human error – 50%
15
PwC and BIS: 2015 ISBS Survey
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Cyber crime: widespread
Source: BusinessWeek/Symantec
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Breach Landscape
• Not if, but when
• Being prepared is key
• Develop the resilience to respond
• Don’t wait until after the event
• 72 hour window to respond
• How and when you respond goes towards mitigation
• Incident response mandated in ISO27001, ISO 22301, PCI DSS
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
CREST - Three Phases of a Cyber Attack
• Stage 1
• Reconnaissance
– Identify target
– Look for vulnerabilities
• Countermeasures:
– Monitoring and logging
– Situational awareness
– Collaboration
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
CREST - Three Phases of Cyber Attack
• Stage 2
• Attack target
– Exploit vulnerabilities
– Defeat remaining controls
• Countermeasures:
– Architectural system design
– Standard controls (i.e. ISO 27001)
– Penetration testing
•
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
CREST - Three Phases of Cyber Attack
• Stage 3
• Achieve objectives
– Disruption of systems
– Extraction of data
– Manipulation of information
• Countermeasures:
– Cyber security incident response planning
– Business continuity and disaster recovery plans
– Cyber security insurance
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
The Top Ten Challenges Facing
Organisations
• Organisations can have significant difficulty in responding to cyber
security incidents, particularly sophisticated cyber security attacks.
• The top ten challenges organisations face in responding to a cyber
security incident in a fast, effective and consistent manner are:
– Identifying a suspected cyber security incident;
– Establishing the objectives of an investigation and a clean-up operation;
– Analysing all available information related to the potential cyber security incident;
– Determining what has actually happened;
– Identifying what systems, networks and information (assets) have been compromised;
– Determining what information has been disclosed to unauthorised parties, stolen,
deleted or corrupted;
– Finding out who did it and why;
– Working out how it happened;
– Determining the potential business impact of the cyber security incident;
– Conducting sufficient investigation using forensics to identify those responsible.
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
CREST Cyber Incident Response Approach
• Prepare:
– Conduct a criticality assessment;
– Carry out a cyber security threat analysis;
– Consider the implications of people, process, technology and information;
– Create an appropriate control framework;
– Review your state of readiness in cyber security incident response
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
CREST Cyber Incident Response Approach
• Respond:
– Identify cyber security incident/s;
– Define objectives and investigate the situation;
– Take appropriate action;
– Recover systems, data and connectivity.
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
CREST Cyber Incident Response Approach
• Follow up:
– Investigate incident more thoroughly;
– Report incident to relevant stakeholders;
– Carry out a post incident review;
– Communicate and build on lessons learned;
– Update key information, controls and processes;
– Perform trend analysis.
• Utilising the CREST Cyber Incident response approach and drawing
from ISO 27001 and ISO 27035 standards IT governance can assist
you in defining and implementing an effective prepare, respond,
and follow up incident response approach
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Article 33: Personal Data Breaches
• The definition of a Personal Data Breach in GDPR:
– A 'personal data breach' means a breach of security leading to the accidental or
unlawful destruction, loss, alteration, unauthorised disclosure of, or access to,
personal data transmitted, stored or otherwise processed.
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Article 33: Personal Data Breaches
• Obligation for data processor to notify data controller
– Notification without undue delay after becoming aware
– No exemptions
– All data breaches have to be reported
– EDPB to issue clarification with regard to ‘undue delay’
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Article 33: Personal Data Breaches
• Obligation for data controller to notify the supervisory authority
– Notification without undue delay and not later than 72 hours
– Unnecessary in certain circumstances
– Description of the nature of the breach
– Communicate details of the Data Protection Officer
– No requirement to notify if unlikely to result in a high risk to the rights and
freedoms of natural persons
– Failure to report within 72 hours must be explained
– EDPB to issue further clarification with regard to “undue delay”
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Article 34: Personal Data Breaches
• Obligation for data controller to communicate a personal data
breach to data subjects
– Communication to the data subject without undue delay if high risk
– Communication in clear plain language
– Supervisory authority may compel communication with data subject
– Exemptions if appropriate technical and organisational measures taken
– High risk to data subject will not materialise
– Communication with data subject would involve disproportionate effort
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Independent Supervisory Authorities
• Member states must create independent supervisory authorities and
resource them appropriately
– Tasks:
– Monitor and enforce
– Communicate
– Promote awareness
• Powers:
– To investigate, correct, advise, enforce
• Leading Supervisory Authority for multi-state controllers
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
European Data Protection Board (EDPB)
• Ensure cooperation, communication, consistency and mutual
assistance between national supervisory authorities
• Monitor and ensure correct application of the Regulation
• Examine any question dealing with its application
• Ie: Ensure a level playing field
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
GDPR - Summary
• Complete overhaul of data protection framework
– Covers all forms of PII, including biometric, genetic and location data
• Applies across all member states of the European Union
• Applies to all organizations processing the data of EU citizens –
wherever those organizations are geographically based
• Specific requirements around rights of data subjects, obligations on
controllers and processors, including privacy by design
• Administrative penalties for breach up to 4% revenue or €20 million
– Intended to be ‘dissuasive’
• Data subjects have a right to bring actions (in their home state) and to
receive damages if their human rights have been breached (‘Right to an
effective judicial remedy against a controller or processor’)
• Fines to take into account ‘the technical and organizational measures
implemented…’
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Data Breaches in the UK
• January to March 2016 - 448 new cases
• Data Breaches by Sector
– Health (184)
– Local Government (43)
– Education (36)
– General Business (36)
– Finance, Insurance & Credit (25)
– Legal (25)
– Charitable & Voluntary (23)
– Justice (18)
– Land or Property Services (17)
– Other (41)
Source: UK Information Commissioner’s Office
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Data Breaches in the UK
• January to March 2016
• Data Breaches by type
– Loss or theft of paperwork (74)
– Data posted of faxed to wrong recipient (74)
– Data sent by e-mail to wrong recipient (42)
– Webpage hacking (39)
– Failure to redact data (28)
– Insecure disposal of data (24)
– Loss or theft of unencrypted device (20)
– Information uploaded to web page (10)
– Verbal disclosure (7)
– Insecure disposal of hardware (2)
– Other principle 7 failure (128)
Source: UK Information Commissioner’s Office
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Information Security
Processes
People
Technology
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Cyber Security Assurance
• GDPR requirement - data controllers must implement:
– “appropriate technical and organizational measures to ensure and to be able to
demonstrate that the processing is performed in accordance with the regulation.”
– Must include appropriate data protection policies
– Organizations may use adherence to approved codes of conduct or management
system certifications “as an element by which to demonstrate compliance with
their obligations”
– ICO and BSI are both developing new GDPR-focused standards
• ISO 27001 already meets the “appropriate technical and
organizational measures” requirement
• It provides assurance to the board that data security is being
managed in accordance with the regulation
• It helps manage ALL information assets and all information security
within the organization – protecting against ALL threats
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
IT Governance: GDPR One-Stop-Shop
• Accredited Training – 1 Day Foundation Course
– London OR Cambridge: http://www.itgovernance.co.uk/shop/p-1795-certified-eu-
general-data-protection-regulation-foundation-gdpr-training-course.aspx
– ONLINE http://www.itgovernance.co.uk/shop/p-1834-certified-eu-general-data-
protection-regulation-foundation-gdpr-online-training-course.aspx
• Practitioner course, classroom or online
– www.itgovernance.co.uk/shop/p-1824-certified-eu-general-data-protection-
regulation-practitioner-gdpr-training-course.aspx
• Pocket Guide www.itgovernance.co.uk/shop/p-1830-eu-gdpr-a-pocket-guide.aspx
• Documentation Toolkit www.itgovernance.co.uk/shop/p-1796-eu-general-data-
protection-regulation-gdpr-documentation-toolkit.aspx
• Consultancy support
– Data audit
– Transition/implementation consultancy
– www.itgovernance.co.uk/dpa-compliance-consultancy.aspx
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Questions?
aross@itgovernance.co.uk
0845 070 1750
www.itgovernance.co.uk

More Related Content

What's hot

1211000-792-2-Promontory - Data Mapping Slides 06-06-16
1211000-792-2-Promontory - Data Mapping Slides 06-06-161211000-792-2-Promontory - Data Mapping Slides 06-06-16
1211000-792-2-Promontory - Data Mapping Slides 06-06-16
jbauerofprivacy
 
Datum DPO outsourced May 2016
Datum DPO outsourced May 2016Datum DPO outsourced May 2016
Datum DPO outsourced May 2016
Mark Honeyball
 
Preparing for general data protection regulations (gdpr) within the hous...
Preparing for general data protection regulations (gdpr) within the hous...Preparing for general data protection regulations (gdpr) within the hous...
Preparing for general data protection regulations (gdpr) within the hous...
Stephanie Vasey
 
EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?
VYTIS MALECKAS
 

What's hot (20)

Preparing for EU GDPR
Preparing for EU GDPRPreparing for EU GDPR
Preparing for EU GDPR
 
EU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingEU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketing
 
The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...
 
The first steps towards GDPR compliance 
The first steps towards GDPR compliance The first steps towards GDPR compliance 
The first steps towards GDPR compliance 
 
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
 
Addressing penetration testing and vulnerabilities, and adding verification m...
Addressing penetration testing and vulnerabilities, and adding verification m...Addressing penetration testing and vulnerabilities, and adding verification m...
Addressing penetration testing and vulnerabilities, and adding verification m...
 
The GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for complianceThe GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for compliance
 
Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPR
 
11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines 11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines
 
GDPR in a nutshell
GDPR in a nutshellGDPR in a nutshell
GDPR in a nutshell
 
Data transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPRData transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPR
 
1211000-792-2-Promontory - Data Mapping Slides 06-06-16
1211000-792-2-Promontory - Data Mapping Slides 06-06-161211000-792-2-Promontory - Data Mapping Slides 06-06-16
1211000-792-2-Promontory - Data Mapping Slides 06-06-16
 
Datum DPO outsourced May 2016
Datum DPO outsourced May 2016Datum DPO outsourced May 2016
Datum DPO outsourced May 2016
 
Risk assessments and applying organisational controls for GDPR compliance
Risk assessments and applying organisational controls for GDPR complianceRisk assessments and applying organisational controls for GDPR compliance
Risk assessments and applying organisational controls for GDPR compliance
 
20170323 are you ready the new gdpr is here
20170323 are you ready the new gdpr is here20170323 are you ready the new gdpr is here
20170323 are you ready the new gdpr is here
 
GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017
 
Sophie's Privacy - a story about GDPR
Sophie's Privacy - a story about GDPRSophie's Privacy - a story about GDPR
Sophie's Privacy - a story about GDPR
 
Preparing for general data protection regulations (gdpr) within the hous...
Preparing for general data protection regulations (gdpr) within the hous...Preparing for general data protection regulations (gdpr) within the hous...
Preparing for general data protection regulations (gdpr) within the hous...
 
EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?
 
GDPR: Key Article Overview
GDPR: Key Article OverviewGDPR: Key Article Overview
GDPR: Key Article Overview
 

Viewers also liked

The Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection RegulationThe Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection Regulation
Ghostery, Inc.
 

Viewers also liked (15)

The GDPR for Techies
The GDPR for TechiesThe GDPR for Techies
The GDPR for Techies
 
The Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection RegulationThe Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection Regulation
 
Gdpr - L'approccio aubay al mascheramento dei dati
Gdpr -  L'approccio aubay al mascheramento dei datiGdpr -  L'approccio aubay al mascheramento dei dati
Gdpr - L'approccio aubay al mascheramento dei dati
 
Data breaches, privacy programs and what will change for processors
Data breaches, privacy programs and what will change for processorsData breaches, privacy programs and what will change for processors
Data breaches, privacy programs and what will change for processors
 
AnaCredit
AnaCreditAnaCredit
AnaCredit
 
General Data Protection Regulations (GDPR) Summary
General Data Protection Regulations (GDPR) Summary General Data Protection Regulations (GDPR) Summary
General Data Protection Regulations (GDPR) Summary
 
GDPR-Overview
GDPR-OverviewGDPR-Overview
GDPR-Overview
 
Social crm
Social crm Social crm
Social crm
 
The Meaning and Impact of the General Data Protection Regulation
The Meaning and Impact of the General Data Protection RegulationThe Meaning and Impact of the General Data Protection Regulation
The Meaning and Impact of the General Data Protection Regulation
 
Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...
 
The Impact of the General Data Protection Regulation - 10th May 2016
The Impact of the General Data Protection Regulation - 10th May 2016The Impact of the General Data Protection Regulation - 10th May 2016
The Impact of the General Data Protection Regulation - 10th May 2016
 
EU General Data Protection Regulation & Transborder Information Flow
EU General Data Protection Regulation & Transborder Information FlowEU General Data Protection Regulation & Transborder Information Flow
EU General Data Protection Regulation & Transborder Information Flow
 
What does the Proposed EU General Data Protection Regulation (GDPR) mean for ...
What does the Proposed EU General Data Protection Regulation (GDPR) mean for ...What does the Proposed EU General Data Protection Regulation (GDPR) mean for ...
What does the Proposed EU General Data Protection Regulation (GDPR) mean for ...
 
Data Protection and Comnpliance with the GDPR Event 22 september 2016
Data Protection and Comnpliance with the GDPR Event 22 september 2016 Data Protection and Comnpliance with the GDPR Event 22 september 2016
Data Protection and Comnpliance with the GDPR Event 22 september 2016
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offer
 

Similar to Data Breaches and the EU GDPR

CyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRCyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPR
Shadi A. Razak
 

Similar to Data Breaches and the EU GDPR (20)

Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPR
 
Data Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your businessData Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your business
 
CyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPRCyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPR
 
Ipswitch and cordery on the road " All you need to know about GDPR but are t...
Ipswitch and cordery on the road  " All you need to know about GDPR but are t...Ipswitch and cordery on the road  " All you need to know about GDPR but are t...
Ipswitch and cordery on the road " All you need to know about GDPR but are t...
 
CyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRCyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPR
 
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
 
GDPR: The Catalyst for Customer 360
GDPR: The Catalyst for Customer 360GDPR: The Catalyst for Customer 360
GDPR: The Catalyst for Customer 360
 
eu-market-access-gdpr-fundamentals-by-risk-associates
eu-market-access-gdpr-fundamentals-by-risk-associateseu-market-access-gdpr-fundamentals-by-risk-associates
eu-market-access-gdpr-fundamentals-by-risk-associates
 
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
 
Introduction to GDPR
Introduction to GDPRIntroduction to GDPR
Introduction to GDPR
 
State regulation of information protection in the cloud - international and K...
State regulation of information protection in the cloud - international and K...State regulation of information protection in the cloud - international and K...
State regulation of information protection in the cloud - international and K...
 
GDPR Part 1: Quick Facts
GDPR Part 1: Quick FactsGDPR Part 1: Quick Facts
GDPR Part 1: Quick Facts
 
The general data protection act overview
The general data protection act overviewThe general data protection act overview
The general data protection act overview
 
Snow SAM presentation March 2018
Snow SAM presentation March 2018Snow SAM presentation March 2018
Snow SAM presentation March 2018
 
EU Data Protection Legislation, Peter Ridley (HPE)
EU Data Protection Legislation, Peter Ridley (HPE)EU Data Protection Legislation, Peter Ridley (HPE)
EU Data Protection Legislation, Peter Ridley (HPE)
 
Using Social Business Software and being compliant with EU data protection la...
Using Social Business Software and being compliant with EU data protection la...Using Social Business Software and being compliant with EU data protection la...
Using Social Business Software and being compliant with EU data protection la...
 
EU GDPR(general data protection regulation)
EU GDPR(general data protection regulation)EU GDPR(general data protection regulation)
EU GDPR(general data protection regulation)
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...
 
BigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesBigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar Slides
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
 

More from IT Governance Ltd

More from IT Governance Ltd (11)

GDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risksGDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risks
 
Business Continuity Management: How to get started
Business Continuity Management: How to get startedBusiness Continuity Management: How to get started
Business Continuity Management: How to get started
 
Staff awareness: developing a security culture
Staff awareness: developing a security cultureStaff awareness: developing a security culture
Staff awareness: developing a security culture
 
GDPR compliance: getting everyone in the organisation on board
GDPR compliance: getting everyone in the organisation on boardGDPR compliance: getting everyone in the organisation on board
GDPR compliance: getting everyone in the organisation on board
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to compliance
 
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
 
Creating an effective cyber security awareness programme
Creating an effective cyber security awareness programmeCreating an effective cyber security awareness programme
Creating an effective cyber security awareness programme
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurity
 
Using international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityUsing international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber security
 
Using international standards to improve EU cyber security
Using international standards to improve EU cyber securityUsing international standards to improve EU cyber security
Using international standards to improve EU cyber security
 
Implementing PCI DSS v 2.0 and v 3.0
Implementing PCI DSS v 2.0 and v 3.0Implementing PCI DSS v 2.0 and v 3.0
Implementing PCI DSS v 2.0 and v 3.0
 

Recently uploaded

FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
dollysharma2066
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
lizamodels9
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
amitlee9823
 
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
dlhescort
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Anamikakaur10
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
amitlee9823
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Abortion pills in Kuwait Cytotec pills in Kuwait
 

Recently uploaded (20)

JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLJAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 

Data Breaches and the EU GDPR

  • 1. Data Breaches and the EU GDPR Adrian Ross LLB (Hons), MBA GRC Consultant IT Governance Ltd 30 June 2016 www.itgovernance.co.uk
  • 2. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Introduction • Adrian Ross • GRC Consultant – Infrastructure Services – Business Process Re-engineering – Business Intelligence – Business Architecture – Intellectual Property – Legal Compliance – Data Protection & Information Security – Enterprise Risk Management 2
  • 3. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 IT Governance Ltd: GRC One-Stop-Shop All verticals, all sectors, all organizational sizes
  • 4. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Agenda • An overview of the regulatory landscape • Territorial scope • Remedies, Liabilities and Penalties • Principles of the EU GDPR • Data Breaches • Notification rules • Supervisory Authorities • EU Data Protection Board 4
  • 5. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 The nature of European law • Two main types of legislation: – Directives º Require individual implementation in each Member State º Implemented by the creation of national laws approved by the parliaments of each Member State º European Directive 95/46/EC is a Directive º UK Data Protection Act 1998 – Regulations º Immediately applicable in each Member State º Require no local implementing legislation º EU GDPR is a Regulation
  • 6. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Article 99: Entry into force and application This Regulation shall be binding in its entirety and directly applicable in all Member States. KEY DATES • On 8 April 2016 the Council adopted the Regulation. • On 14 April 2016 the Regulation was adopted by the European Parliament. • On 4 May 2016, the official text of the Regulation was published in the EU Official Journal in all the official languages. • The Regulation entered into force on 24 May 2016, and applies from 25 May 2018. • http://ec.europa.eu/justice/data-protection/reform/index_en.htm Final Text of the Directive: http://data.consilium.europa.eu/doc/document/ST- 5419-2016-REV-1/en/pdf
  • 7. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 GDPR The GDPR has eleven chapters: 1 • Chapter I General Provisions: Articles 1 - 4 2 • Chapter II Principles: Articles 5 - 11 3 • Chapter III Rights of the Data Subject: Articles 12 - 23 4 • Chapter IV Controller and Processor: Articles 24 - 43 5 • Chapter V Transfer of Personal Data to Third Countries: Articles 44 - 50 6 • Chapter VI Independent Supervisory Authorities: Articles 51 - 59 7 • Chapter VII Cooperation and Consistency: Articles 60 - 76 8 • Chapter VIII Remedies Liabilities and Penalties: Articles 77 - 84 9 • Chapter IX Provisions Relating to Specific Processing Situations: Articles 85 - 91
  • 8. Data protection model under GDPR Information Commissioner’s Office (ICO) (supervising authority) Data controller (organisations) Data subject (individuals) Data processor Third countries Third parties Duties Rights Disclosure? Inform? Security? Guarantees? Assessment Enforcement European Data Protection Board
  • 9. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Articles 1 – 3: Who, and where? • Natural person = a living individual • Natural persons have rights associated with: – The protection of personal data – The protection of the processing personal data – The unrestricted movement of personal data within the EU • In material scope: – Personal data that is processed wholly or partly by automated means; – Personal data that is part of a filing system, or intended to be. • The Regulation applies to controllers and processors in the EU irrespective of where processing takes place. • It applies to controllers not in the EU
  • 10. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Remedies, liabilities and penalties • Article 79: Right to an effective judicial remedy against a controller or processor – Judicial remedy where their rights have been infringed as a result of the processing of personal data. º In the courts of the Member State where the controller or processor has an establishment. º In the courts of the Member State where the data subject habitually resides. • Article 82: Right to compensation and liability – Any person who has suffered material, or non-material, damage shall have the right to receive compensation from the controller or processor. – Controller involved in processing shall be liable for damage caused by processing. • Article 83: General conditions for imposing administrative fines – Imposition of administrative fines will in each case be effective, proportionate, and dissuasive º taking into account technical and organisational measures implemented; – € 20,000,000 or, in case of an undertaking, 4% total worldwide annual turnover in the preceding financial year (whichever is higher) Module I
  • 11. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Article 5: Principles - Personal data shall be: 1 • Processed lawfully, fairly and in a transparent manner 2 • Collected for specified, explicit and legitimate purposes 3 • Adequate, relevant and limited to what is necessary 4 • Accurate and, where necessary kept up to date 5 • Retained only for as long as necessary 6 • Processed in an appropriate manner to maintain security 7. • Accountability
  • 12. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Article 5 & 6: Lawfulness • Secure against accidental loss, destruction or damage • Processing must be lawful – which means, inter alia: – Data subject must give consent for specific purposes – Other specific circumstances where consent is not required º So that controller can comply with legal obligations etc • One month to respond to Subject Access Requests – & no charges • Controllers and processors clearly distinguished – Clearly identified obligations – Controllers responsible for ensuring processors comply with contractual terms for processing information – Processors must operate under a legally binding contract º And note issues around extra-territoriality
  • 13. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Article 32: Security of Personal Data • A requirement for data controllers and data processors to implement a level of security appropriate to the risk, including: – pseudonymisation and encryption of personal data; – ensure the ongoing confidentiality, integrity and availability of systems; – a process for regularly testing, assessing and evaluating the effectiveness of security measures; – security measures taken need to comply with the concept of privacy by design;
  • 14. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Key facts about cyber breaches Which organisations suffered data breaches in 2015? • 69 % of large organisations • 38 % of small organisation What was the median number of breaches per company? • Large organisations: 14 • Small organisations: 4 What was the average cost of the worst single breach? • Large organisations: £1.46 - £3.14m • Small organisations: £75k - £311k What will happen next year? • 59% of respondents expect more breaches this year than last • PwC and BIS: 2015 ISBS Survey 14 60% of breached small organisations close down within 6 months – National Cyber Security Alliance
  • 15. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 What sorts of breaches? Of Large Organisations: • External attack – 69% • Malware or viruses – 84% • Denial of Service – 37% • Network penetration (detected) – 37% – (if you don’t think you’ve been breached, you’re not looking hard enough) • Know they’ve suffered IP theft – 19% • Staff-related security breaches – 75% • Breaches caused by inadvertent human error – 50% 15 PwC and BIS: 2015 ISBS Survey
  • 16. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Cyber crime: widespread Source: BusinessWeek/Symantec
  • 17. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Breach Landscape • Not if, but when • Being prepared is key • Develop the resilience to respond • Don’t wait until after the event • 72 hour window to respond • How and when you respond goes towards mitigation • Incident response mandated in ISO27001, ISO 22301, PCI DSS
  • 18. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 CREST - Three Phases of a Cyber Attack • Stage 1 • Reconnaissance – Identify target – Look for vulnerabilities • Countermeasures: – Monitoring and logging – Situational awareness – Collaboration
  • 19. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 CREST - Three Phases of Cyber Attack • Stage 2 • Attack target – Exploit vulnerabilities – Defeat remaining controls • Countermeasures: – Architectural system design – Standard controls (i.e. ISO 27001) – Penetration testing •
  • 20. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 CREST - Three Phases of Cyber Attack • Stage 3 • Achieve objectives – Disruption of systems – Extraction of data – Manipulation of information • Countermeasures: – Cyber security incident response planning – Business continuity and disaster recovery plans – Cyber security insurance
  • 21. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 The Top Ten Challenges Facing Organisations • Organisations can have significant difficulty in responding to cyber security incidents, particularly sophisticated cyber security attacks. • The top ten challenges organisations face in responding to a cyber security incident in a fast, effective and consistent manner are: – Identifying a suspected cyber security incident; – Establishing the objectives of an investigation and a clean-up operation; – Analysing all available information related to the potential cyber security incident; – Determining what has actually happened; – Identifying what systems, networks and information (assets) have been compromised; – Determining what information has been disclosed to unauthorised parties, stolen, deleted or corrupted; – Finding out who did it and why; – Working out how it happened; – Determining the potential business impact of the cyber security incident; – Conducting sufficient investigation using forensics to identify those responsible.
  • 22. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 CREST Cyber Incident Response Approach • Prepare: – Conduct a criticality assessment; – Carry out a cyber security threat analysis; – Consider the implications of people, process, technology and information; – Create an appropriate control framework; – Review your state of readiness in cyber security incident response
  • 23. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 CREST Cyber Incident Response Approach • Respond: – Identify cyber security incident/s; – Define objectives and investigate the situation; – Take appropriate action; – Recover systems, data and connectivity.
  • 24. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 CREST Cyber Incident Response Approach • Follow up: – Investigate incident more thoroughly; – Report incident to relevant stakeholders; – Carry out a post incident review; – Communicate and build on lessons learned; – Update key information, controls and processes; – Perform trend analysis. • Utilising the CREST Cyber Incident response approach and drawing from ISO 27001 and ISO 27035 standards IT governance can assist you in defining and implementing an effective prepare, respond, and follow up incident response approach
  • 25. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Article 33: Personal Data Breaches • The definition of a Personal Data Breach in GDPR: – A 'personal data breach' means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data transmitted, stored or otherwise processed.
  • 26. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Article 33: Personal Data Breaches • Obligation for data processor to notify data controller – Notification without undue delay after becoming aware – No exemptions – All data breaches have to be reported – EDPB to issue clarification with regard to ‘undue delay’
  • 27. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Article 33: Personal Data Breaches • Obligation for data controller to notify the supervisory authority – Notification without undue delay and not later than 72 hours – Unnecessary in certain circumstances – Description of the nature of the breach – Communicate details of the Data Protection Officer – No requirement to notify if unlikely to result in a high risk to the rights and freedoms of natural persons – Failure to report within 72 hours must be explained – EDPB to issue further clarification with regard to “undue delay”
  • 28. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Article 34: Personal Data Breaches • Obligation for data controller to communicate a personal data breach to data subjects – Communication to the data subject without undue delay if high risk – Communication in clear plain language – Supervisory authority may compel communication with data subject – Exemptions if appropriate technical and organisational measures taken – High risk to data subject will not materialise – Communication with data subject would involve disproportionate effort
  • 29. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Independent Supervisory Authorities • Member states must create independent supervisory authorities and resource them appropriately – Tasks: – Monitor and enforce – Communicate – Promote awareness • Powers: – To investigate, correct, advise, enforce • Leading Supervisory Authority for multi-state controllers
  • 30. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 European Data Protection Board (EDPB) • Ensure cooperation, communication, consistency and mutual assistance between national supervisory authorities • Monitor and ensure correct application of the Regulation • Examine any question dealing with its application • Ie: Ensure a level playing field
  • 31. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 GDPR - Summary • Complete overhaul of data protection framework – Covers all forms of PII, including biometric, genetic and location data • Applies across all member states of the European Union • Applies to all organizations processing the data of EU citizens – wherever those organizations are geographically based • Specific requirements around rights of data subjects, obligations on controllers and processors, including privacy by design • Administrative penalties for breach up to 4% revenue or €20 million – Intended to be ‘dissuasive’ • Data subjects have a right to bring actions (in their home state) and to receive damages if their human rights have been breached (‘Right to an effective judicial remedy against a controller or processor’) • Fines to take into account ‘the technical and organizational measures implemented…’
  • 32. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Data Breaches in the UK • January to March 2016 - 448 new cases • Data Breaches by Sector – Health (184) – Local Government (43) – Education (36) – General Business (36) – Finance, Insurance & Credit (25) – Legal (25) – Charitable & Voluntary (23) – Justice (18) – Land or Property Services (17) – Other (41) Source: UK Information Commissioner’s Office
  • 33. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Data Breaches in the UK • January to March 2016 • Data Breaches by type – Loss or theft of paperwork (74) – Data posted of faxed to wrong recipient (74) – Data sent by e-mail to wrong recipient (42) – Webpage hacking (39) – Failure to redact data (28) – Insecure disposal of data (24) – Loss or theft of unencrypted device (20) – Information uploaded to web page (10) – Verbal disclosure (7) – Insecure disposal of hardware (2) – Other principle 7 failure (128) Source: UK Information Commissioner’s Office
  • 34. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Information Security Processes People Technology
  • 35. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Cyber Security Assurance • GDPR requirement - data controllers must implement: – “appropriate technical and organizational measures to ensure and to be able to demonstrate that the processing is performed in accordance with the regulation.” – Must include appropriate data protection policies – Organizations may use adherence to approved codes of conduct or management system certifications “as an element by which to demonstrate compliance with their obligations” – ICO and BSI are both developing new GDPR-focused standards • ISO 27001 already meets the “appropriate technical and organizational measures” requirement • It provides assurance to the board that data security is being managed in accordance with the regulation • It helps manage ALL information assets and all information security within the organization – protecting against ALL threats
  • 36. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 IT Governance: GDPR One-Stop-Shop • Accredited Training – 1 Day Foundation Course – London OR Cambridge: http://www.itgovernance.co.uk/shop/p-1795-certified-eu- general-data-protection-regulation-foundation-gdpr-training-course.aspx – ONLINE http://www.itgovernance.co.uk/shop/p-1834-certified-eu-general-data- protection-regulation-foundation-gdpr-online-training-course.aspx • Practitioner course, classroom or online – www.itgovernance.co.uk/shop/p-1824-certified-eu-general-data-protection- regulation-practitioner-gdpr-training-course.aspx • Pocket Guide www.itgovernance.co.uk/shop/p-1830-eu-gdpr-a-pocket-guide.aspx • Documentation Toolkit www.itgovernance.co.uk/shop/p-1796-eu-general-data- protection-regulation-gdpr-documentation-toolkit.aspx • Consultancy support – Data audit – Transition/implementation consultancy – www.itgovernance.co.uk/dpa-compliance-consultancy.aspx
  • 37. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Questions? aross@itgovernance.co.uk 0845 070 1750 www.itgovernance.co.uk