SlideShare a Scribd company logo
1 of 35
Download to read offline
Data Flow Mapping and the
EU GDPR
Adrian Ross LLB (Hons), MBA
GRC Consultant
IT Governance Ltd
29 September 2016
www.itgovernance.co.uk
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Introduction
• Adrian Ross
• GRC Consultant
– Infrastructure services
– Business process re-engineering
– Business intelligence
– Business architecture
– Intellectual property
– Legal compliance
– Data protection and information security
– Enterprise risk management
2
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
IT Governance Ltd: GRC one-stop shop
All verticals, all sectors, all organisational sizes
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Agenda
• An overview of the regulatory landscape
• Territorial scope
• Remedies, liabilities and penalties
• Risk management and the GDPR
• Legal requirements for a DPIA
• Why and how to conduct a data flow mapping exercise
• What are the challenges?
• What is an information flow?
• The questions to ask
• Data flow mapping techniques
4
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
The nature of European law
• Two main types of legislation:
– Directives
º Require individual implementation in each member state
º Implemented by the creation of national laws approved by the parliaments of
each member state
º European Directive 95/46/EC is a directive
º UK Data Protection Act 1998
– Regulations
º Immediately applicable in each member state
º Require no local implementing legislation
º The EU GDPR is a regulation
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Article 99: Entry into force and
application
This Regulation shall be binding in its entirety and directly
applicable in all member states.
KEY DATES
• On 8 April 2016 the Regulation was adopted by the European Council.
• On 14 April 2016 the Regulation was adopted by the European Parliament.
• On 4 May 2016 the official text of the Regulation was published in the EU Official
Journal in all the official languages.
• The Regulation entered into force on 24 May 2016 and will apply from 25 May
2018.
• http://ec.europa.eu/justice/data-protection/reform/index_en.htm
Final text of the Regulation: http://data.consilium.europa.eu/doc/document/ST-
5419-2016-REV-1/en/pdf
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
GDPR
The GDPR has eleven chapters:
1
• Chapter I – General Provisions: Articles 1 - 4
2
• Chapter II – Principles: Articles 5 - 11
3
• Chapter III – Rights of the Data Subject: Articles 12 - 23
4
• Chapter IV – Controller and Processor: Articles 24 - 43
5
• Chapter V – Transfer of Personal Data to Third Countries: Articles 44 - 50
6
• Chapter VI – Independent Supervisory Authorities: Articles 51 - 59
7
• Chapter VII – Cooperation and Consistency: Articles 60 - 76
8
• Chapter VIII – Remedies, Liabilities and Penalties: Articles 77 - 84
9
• Chapter IX – Provisions Relating to Specific Processing Situations: Articles 85 - 91
Data protection model
under the GDPR
Information Commissioner’s Office (ICO)
(supervising authority)
Data controller
(organisations)
Data subject
(individuals)
Data
processor
Third
countries
Third
parties
Duties
Rights
Disclosure?
Inform?
Security?
Guarantees?
Assessment
Enforcement
European Data Protection Board
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Articles 1 – 3: Who and where?
• Natural person = a living individual
• Natural persons have rights associated with:
– The protection of personal data.
– The protection of the processing personal data.
– The unrestricted movement of personal data within the EU.
• In material scope:
– Personal data that is processed wholly or partly by automated means.
– Personal data that is part of a filing system, or intended to be.
• The Regulation applies to controllers and processors in the EU
irrespective of where processing takes place.
• The Regulation also applies to controllers not in the EU.
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Remedies, liabilities and penalties
• Article 79: Right to an effective judicial remedy against a
controller or processor
– Judicial remedy where their rights have been infringed as a result of the
processing of personal data.
º In the courts of the member state where the controller or processor has an establishment.
º In the courts of the member state where the data subject habitually resides.
• Article 82: Right to compensation and liability
– Any person who has suffered material or non-material damage shall have the
right to receive compensation from the controller or processor.
– A controller involved in processing shall be liable for damage caused by
processing.
• Article 83: General conditions for imposing administrative fines
– Imposition of administrative fines will in each case be effective, proportionate
and dissuasive.
º Fines shall take into account technical and organisational measures implemented.
– €20,000,000 or, in the case of an undertaking, 4% of total worldwide
annual turnover in the preceding financial year (whichever is higher).
Module I
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Remedies, liability and penalties (cont.)
Article 83: General conditions for imposing administrative fines
• €10,000,000 or, in the case of an undertaking, 2% of total worldwide annual
turnover in the preceding financial year (whichever is greater).
• Articles:
– 8: Child’s consent
– 11: Processing not requiring identification
– 25: Data protection by design and by default
– 26: Joint controllers
– 27: Representatives of controllers not established in EU
– 26 - 29 & 30: Processing
– 31: Cooperation with the supervisory authority
– 32: Data security
– 33: Notification of breaches to supervisory authority
– 34: Communication of breaches to data subjects
– 35: Data protection impact assessment
– 36: Prior consultation
– 37 - 39: DPOs
– 41(4): Monitoring approved codes of conduct
– 42: Certification
– 43: Certification bodies
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Remedies, liability and penalties (cont.)
Article 83: General conditions for imposing administrative fines
• €20,000,000 or, in the case of an undertaking, 4% total worldwide
annual turnover in the preceding financial year (whichever is higher).
• Articles
– 5: Principles relating to the processing of personal data
– 6: Lawfulness of processing
– 7: Conditions for consent
– 9: Processing special categories of personal data (i.e. sensitive personal data)
– 12 - 22: Data subject rights to information, access, rectification, erasure,
restriction of processing, data portability, object, profiling
– 44 - 49: Transfers to third countries
– 58(1): Requirement to provide access to supervisory authority
– 58(2): Orders/limitations on processing or the suspension of data flows
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Riskmanagement and the GDPR
RISK is mentioned over
60
times in the Regulation.
It is important to understand privacy risk and integrate it into your risk framework.
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
What is risk?
• The effect of uncertainty on objectives (ISO 31000 etc.)
• The combination of the probability of an event and its consequences
(IRM)
• A situation involving exposure to danger (OED)
• Uncertainty of outcome, within a range of exposure, arising from a
combination of the impact and the probability of events (Orange
Book HM Treasury)
• The uncertainty of an event occurring that could have an impact on
the achievement of objectives (Institute of Internal Auditors)
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Standards and codes
• ISO 31000 – Risk management – Principles and guidelines
– AS/NZS 4360:2004 now replaced by ISO 31000
• ISO 31010 – Risk management – Risk assessment techniques
• IRM/ALARM/AIRMIC – A risk management standard
• UK Combined Code on UK Corporate Governance
• OECD Principles of Corporate Governance
• COSO Enterprise Risk Management – Integrated Framework
• Sector specific, e.g. clinical, food
• Discipline specific, e.g. ISO 27005
• ISO 22301 – Business continuity management
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
ISO 31000: Risk management
• Management framework approach
• PDCA model modified in ISO 27005
• Generic (all risks)
• Very similar to a management system
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Risk assessment
Risk management process
Establishing the context
Risk identification
Risk analysis
Risk evaluation
Risk treatment
Communication
and
consultation
Monitoring
and
review
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Enterprise risk management
• Capabilities:
– Aligning risk appetite and strategy
– Enhancing risk response decisions
– Reducing operational surprises and losses
– Identifying and managing multiple and cross-enterprise risks
– Seizing opportunities
– Improving deployment of capital
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Risk management
• Organisational risk ‘landscape’
• Strategic
– Business performance
– Financial performance
– Reputation
• Operational
– Output capacity
– Demand response
– Interruption and disruption
• Statutory
– Employment law
– Health & safety
– Company law
• Regulatory
– Industry/sector-specific
compliance requirements
– Licence to operate
• Contractual
– SLA targets/levels
– Product/service availability
– Quality/warranty
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Information security
• Preservation of confidentiality, integrity and availability of information
and the assets and processes that support and enable its
acquisition, storage, use, protection and disposal.
• Wide variety of assets:
– information
– ICT
– infrastructure
• Prevent compromise (loss, disclosure, corruption, etc.).
• Includes IT security and other forms of security:
– physical
– HR
– supply
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Legal requirements for a DPIA
Article 35: Data protection impact assessment
• Controller must seek the advice of the data protection officer.
• This is particularly required in situations that involve:
– Automated processing
– Profiling
– Creation of legal effects
– Significantly affecting the natural person
– Processing of large-scale categories of sensitive data
– Data that relates to criminal offences or convictions
– Monitoring on a large scale
• Conduct a post-implementation review when risk profile changes.
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Legal requirements for a DPIA
Article 35: Data protection impact assessment
• DPIA must be performed where:
– New technologies are deployed
– Nature, scope and context of the project demand it
– Processes are likely to result in a high risk to the rights and freedom
– It can be used to address sets of processing and risks
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Legal requirements for a DPIA
• The DPIA will set out as a minimum:
– A description of the processing and purposes
– Legitimate interests pursued by the controller
– An assessment of the necessity and proportionality of the processing
– An assessment of the risks to the rights and freedoms of data subjects
– The measures envisaged to address the risks
– All safeguards & security measures to demonstrate compliance
– Indications of timeframes if processing relates to erasure
– An indication of any data protection by design and default measures
– List of recipients of personal data
– Compliance with approved codes of conduct
– Whether data subjects have been consulted.
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Linking the DPIA to the privacy principles
1
• Processed lawfully, fairly and in a transparent manner
2
• Collected for specified, explicit and legitimate purposes
3
• Adequate, relevant and limited to what is necessary
4
• Accurate and, where necessary, kept up to date
5
• Retained only for as long as necessary
6
• Processed in an appropriate manner to maintain security
Accountability
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
How to conduct a data mapping exercise
• The ICO staged approach to an effective DPIA:
1. Required when there is a change in processing of personally identifiable
information (PII).
2. Determine the information flows throughout the organisation in order to
make a proper assessment of the privacy risks.
3. Identify the risks related to privacy and processing, including the necessity and
proportionality of the change in processing.
4. Identify possible privacy solutions to address the risks that have been identified.
5. Assess how the data protection principles have been applied throughout the
organisation.
6. Sign-off and record the DPIA, including details of which privacy solutions are too
be implemented.
7. Integrate the result of the DPIA back into the project plan.
8. Conduct a post-implementation review where risk profile of PII data has
changed.
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Why and how to conduct a data
mapping exercise
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Data mapping – what are the
challenges?
Identify
personal
data
Identify
appropriate
technical and
organisational
safeguards
Understand
legal &
regulatory
obligations
Trust and
confidence
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
What is an information flow?
A transfer of information from one location to another. For example:
– Inside and outside the European Union.
– From suppliers and sub-suppliers through to customers.
When mapping information flow, you should identify the interaction
points between the parties involved.
NB: Cloud providers present their own challenges.
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Describing information flows
Consider the potential future uses
of the information collected, even if it is not
immediately necessary.
Ensure the people who will be using
the information are consulted on the
practical implications.
Walk through the information
lifecycle to
identify unforeseen or unintended
uses of the data.
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Information flow – identify the key
elements
Data items
Name, email, address Health data, criminal
records
Biometrics, location data
Formats
Hardcopy (paper records) Digital (USB) Database
Transfer methods
Post, telephone, social
media
Internal (within group) External (data sharing)
Locations
Offices Cloud Third parties
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Data flow mapping – questions to ask
• Workflow inputs and outputs:
– How is personal data collected (e.g. form, online, call centre, other)?
– Who is accountable for personal data?
– What is the location of the systems/filing systems containing the data?
– Who has access to the information?
– Is the information disclosed/shared with anyone (e.g suppliers, third parties)?
– Does the system interface with, or transfer information to, other systems?
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Data flow mapping – techniques
• Inspect existing documents
• Facilitation workshops
• Questionnaires
• Observation
• Whiteboard – freeform diagrams
• Template drawings (Visio, mind map tools)
• Post-it notes
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Example information flow
HR users
HR
system
Finance
system
Workforce
metrics
EmailRecruitment
system
Third-party users
CV
database
Outplacement
data
Candidate
information
Agency
employment
screening
Recruitment services
Outsourced management
Outplacement services
Candidates
HR
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
IT Governance: GDPR one-stop shop
• Accredited training, one-day foundation course:
– London OR Cambridge: http://www.itgovernance.co.uk/shop/p-1795-certified-eu-
general-data-protection-regulation-foundation-gdpr-training-course.aspx
– ONLINE: http://www.itgovernance.co.uk/shop/p-1834-certified-eu-general-data-
protection-regulation-foundation-gdpr-online-training-course.aspx
• Practitioner course, classroom or online:
– http://www.itgovernance.co.uk/shop/p-1824-certified-eu-general-data-protection-
regulation-practitioner-gdpr-training-course.aspx
• Pocket guide: http://www.itgovernance.co.uk/shop/p-1830-eu-gdpr-a-pocket-
guide.aspx
• Documentation toolkit: http://www.itgovernance.co.uk/shop/p-1796-eu-general-
data-protection-regulation-gdpr-documentation-toolkit.aspx
• Consultancy support :
– Data audit
– Transition/implementation consultancy
– http://www.itgovernance.co.uk/dpa-compliance-consultancy.aspx
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Questions?
aross@itgovernance.co.uk
0845 070 1750
www.itgovernance.co.uk

More Related Content

What's hot

ISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptxISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptxDr Madhu Aman Sharma
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber SecurityFireEye, Inc.
 
EU's General Data Protection Regulation (GDPR)
EU's General Data Protection Regulation (GDPR)EU's General Data Protection Regulation (GDPR)
EU's General Data Protection Regulation (GDPR)Kimberly Simon MBA
 
PDPA Compliance Preparation
PDPA Compliance PreparationPDPA Compliance Preparation
PDPA Compliance PreparationLawPlus Ltd.
 
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...Resolver Inc.
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) Kimberly Simon MBA
 
GDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection RegulationGDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection RegulationVicky Dallas
 
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information Standard
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information StandardQuick Guide to ISO/IEC 27701 - The Newest Privacy Information Standard
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information StandardPECB
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber SecurityLeon Fouche
 
Planning for security and security audit process
Planning for security and security audit processPlanning for security and security audit process
Planning for security and security audit processDivya Tiwari
 
GRC Governance, Risk mgmt. & Compliance Executive
GRC Governance, Risk mgmt. & Compliance ExecutiveGRC Governance, Risk mgmt. & Compliance Executive
GRC Governance, Risk mgmt. & Compliance ExecutiveMax Neira Schliemann
 
GDPR Introduction and overview
GDPR Introduction and overviewGDPR Introduction and overview
GDPR Introduction and overviewJane Lambert
 
GDPR and ISO 27001 - how to be compliant
GDPR and ISO 27001 - how to be compliantGDPR and ISO 27001 - how to be compliant
GDPR and ISO 27001 - how to be compliantIlesh Dattani
 
Iso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromIso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromMart Rovers
 

What's hot (20)

ISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptxISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptx
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber Security
 
Seg dutieschecklist
Seg dutieschecklistSeg dutieschecklist
Seg dutieschecklist
 
NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101  NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101
 
EU's General Data Protection Regulation (GDPR)
EU's General Data Protection Regulation (GDPR)EU's General Data Protection Regulation (GDPR)
EU's General Data Protection Regulation (GDPR)
 
PDPA Compliance Preparation
PDPA Compliance PreparationPDPA Compliance Preparation
PDPA Compliance Preparation
 
ISO 27001
ISO 27001ISO 27001
ISO 27001
 
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
 
An Overview of GDPR
An Overview of GDPR An Overview of GDPR
An Overview of GDPR
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
GDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection RegulationGDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection Regulation
 
GDPR RACI.pdf
GDPR RACI.pdfGDPR RACI.pdf
GDPR RACI.pdf
 
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information Standard
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information StandardQuick Guide to ISO/IEC 27701 - The Newest Privacy Information Standard
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information Standard
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber Security
 
Planning for security and security audit process
Planning for security and security audit processPlanning for security and security audit process
Planning for security and security audit process
 
GRC Governance, Risk mgmt. & Compliance Executive
GRC Governance, Risk mgmt. & Compliance ExecutiveGRC Governance, Risk mgmt. & Compliance Executive
GRC Governance, Risk mgmt. & Compliance Executive
 
27001 awareness Training
27001 awareness Training27001 awareness Training
27001 awareness Training
 
GDPR Introduction and overview
GDPR Introduction and overviewGDPR Introduction and overview
GDPR Introduction and overview
 
GDPR and ISO 27001 - how to be compliant
GDPR and ISO 27001 - how to be compliantGDPR and ISO 27001 - how to be compliant
GDPR and ISO 27001 - how to be compliant
 
Iso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromIso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interprom
 

Viewers also liked

GDPR: Requirements for Cloud Providers
GDPR: Requirements for Cloud ProvidersGDPR: Requirements for Cloud Providers
GDPR: Requirements for Cloud ProvidersIT Governance Ltd
 
Privacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failingPrivacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failingIT Governance Ltd
 
Revising policies and procedures under the new EU GDPR
Revising policies and procedures under the new EU GDPRRevising policies and procedures under the new EU GDPR
Revising policies and procedures under the new EU GDPRIT Governance Ltd
 
Appointing a Data Protection Officer under the GDPR
Appointing a Data Protection Officer under the GDPRAppointing a Data Protection Officer under the GDPR
Appointing a Data Protection Officer under the GDPRIT Governance Ltd
 
EU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingEU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingIT Governance Ltd
 
GDPR in practice
GDPR in practiceGDPR in practice
GDPR in practiceZoneFox
 
GDPR in a nutshell
GDPR in a nutshellGDPR in a nutshell
GDPR in a nutshellInitio
 
An Essential Guide to EU GDPR
An Essential Guide to EU GDPRAn Essential Guide to EU GDPR
An Essential Guide to EU GDPRTripwire
 
EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer IT Governance Ltd
 
GDPR and technology - details matter
GDPR and technology - details matterGDPR and technology - details matter
GDPR and technology - details matterExove
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerCapgemini
 
The Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection RegulationThe Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection RegulationGhostery, Inc.
 
The top 5 factors impacting third party risk management
The top 5 factors impacting third party risk managementThe top 5 factors impacting third party risk management
The top 5 factors impacting third party risk managementMarkit
 
MindMap AVG Louwers Advocaten V 4.0 (EN)
MindMap AVG Louwers Advocaten V 4.0 (EN)MindMap AVG Louwers Advocaten V 4.0 (EN)
MindMap AVG Louwers Advocaten V 4.0 (EN)Huub de Jong
 
Privacy of patient data versus patient safety. HIMSS Europe, Nov 6, 2014
Privacy of patient data versus patient safety. HIMSS Europe, Nov 6, 2014Privacy of patient data versus patient safety. HIMSS Europe, Nov 6, 2014
Privacy of patient data versus patient safety. HIMSS Europe, Nov 6, 2014Arjen Noordzij
 
Gender pay gap in the EU
Gender pay gap in the EUGender pay gap in the EU
Gender pay gap in the EUChristineKrumm
 
ERP System Process and Data Flow in Gane & Sarson Notation
ERP System Process and Data Flow in Gane & Sarson NotationERP System Process and Data Flow in Gane & Sarson Notation
ERP System Process and Data Flow in Gane & Sarson NotationGlen Alleman
 
GDPR From Implementation to Opportunity
GDPR From Implementation to OpportunityGDPR From Implementation to Opportunity
GDPR From Implementation to OpportunityDean Sappey
 

Viewers also liked (20)

GDPR: Requirements for Cloud Providers
GDPR: Requirements for Cloud ProvidersGDPR: Requirements for Cloud Providers
GDPR: Requirements for Cloud Providers
 
Privacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failingPrivacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failing
 
Revising policies and procedures under the new EU GDPR
Revising policies and procedures under the new EU GDPRRevising policies and procedures under the new EU GDPR
Revising policies and procedures under the new EU GDPR
 
Preparing for EU GDPR
Preparing for EU GDPRPreparing for EU GDPR
Preparing for EU GDPR
 
Appointing a Data Protection Officer under the GDPR
Appointing a Data Protection Officer under the GDPRAppointing a Data Protection Officer under the GDPR
Appointing a Data Protection Officer under the GDPR
 
EU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingEU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketing
 
GDPR in practice
GDPR in practiceGDPR in practice
GDPR in practice
 
GDPR in a nutshell
GDPR in a nutshellGDPR in a nutshell
GDPR in a nutshell
 
An Essential Guide to EU GDPR
An Essential Guide to EU GDPRAn Essential Guide to EU GDPR
An Essential Guide to EU GDPR
 
EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer
 
GDPR and technology - details matter
GDPR and technology - details matterGDPR and technology - details matter
GDPR and technology - details matter
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offer
 
The Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection RegulationThe Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection Regulation
 
The top 5 factors impacting third party risk management
The top 5 factors impacting third party risk managementThe top 5 factors impacting third party risk management
The top 5 factors impacting third party risk management
 
MindMap AVG Louwers Advocaten V 4.0 (EN)
MindMap AVG Louwers Advocaten V 4.0 (EN)MindMap AVG Louwers Advocaten V 4.0 (EN)
MindMap AVG Louwers Advocaten V 4.0 (EN)
 
Privacy of patient data versus patient safety. HIMSS Europe, Nov 6, 2014
Privacy of patient data versus patient safety. HIMSS Europe, Nov 6, 2014Privacy of patient data versus patient safety. HIMSS Europe, Nov 6, 2014
Privacy of patient data versus patient safety. HIMSS Europe, Nov 6, 2014
 
Gender pay gap in the EU
Gender pay gap in the EUGender pay gap in the EU
Gender pay gap in the EU
 
ERP System Process and Data Flow in Gane & Sarson Notation
ERP System Process and Data Flow in Gane & Sarson NotationERP System Process and Data Flow in Gane & Sarson Notation
ERP System Process and Data Flow in Gane & Sarson Notation
 
GDPR From Implementation to Opportunity
GDPR From Implementation to OpportunityGDPR From Implementation to Opportunity
GDPR From Implementation to Opportunity
 
Data privacy and digital strategy
Data privacy and digital strategyData privacy and digital strategy
Data privacy and digital strategy
 

Similar to Data Flow Mapping and the EU GDPR

Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRIT Governance Ltd
 
Data Breaches and the EU GDPR
Data Breaches and the EU GDPRData Breaches and the EU GDPR
Data Breaches and the EU GDPRIT Governance Ltd
 
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...IT Governance Ltd
 
The first steps towards GDPR compliance 
The first steps towards GDPR compliance The first steps towards GDPR compliance 
The first steps towards GDPR compliance IT Governance Ltd
 
The GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for complianceThe GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for complianceIT Governance Ltd
 
CyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPRCyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPRIryna Chekanava
 
Risk assessments and applying organisational controls for GDPR compliance
Risk assessments and applying organisational controls for GDPR complianceRisk assessments and applying organisational controls for GDPR compliance
Risk assessments and applying organisational controls for GDPR complianceIT Governance Ltd
 
CyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRCyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRShadi A. Razak
 
Data Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your businessData Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your businessEversheds Sutherland
 
Data transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPRData transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPRIT Governance Ltd
 
Ipswitch and cordery on the road " All you need to know about GDPR but are t...
Ipswitch and cordery on the road  " All you need to know about GDPR but are t...Ipswitch and cordery on the road  " All you need to know about GDPR but are t...
Ipswitch and cordery on the road " All you need to know about GDPR but are t...Sébastien Roques
 
eu-market-access-gdpr-fundamentals-by-risk-associates
eu-market-access-gdpr-fundamentals-by-risk-associateseu-market-access-gdpr-fundamentals-by-risk-associates
eu-market-access-gdpr-fundamentals-by-risk-associatesMohsin Termezy
 
Fintech and Data Protection by Balint Halasz and Zoltan Tarjan 25 10 2016
Fintech and Data Protection by Balint Halasz and Zoltan Tarjan 25 10 2016Fintech and Data Protection by Balint Halasz and Zoltan Tarjan 25 10 2016
Fintech and Data Protection by Balint Halasz and Zoltan Tarjan 25 10 2016bhalasz
 
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...ARMA International
 
GDPR: The Catalyst for Customer 360
GDPR: The Catalyst for Customer 360GDPR: The Catalyst for Customer 360
GDPR: The Catalyst for Customer 360DataStax
 
EU GDPR(general data protection regulation)
EU GDPR(general data protection regulation)EU GDPR(general data protection regulation)
EU GDPR(general data protection regulation)RAKESH S
 
EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?VYTIS MALECKAS
 
EU Data Protection Legislation, Peter Ridley (HPE)
EU Data Protection Legislation, Peter Ridley (HPE)EU Data Protection Legislation, Peter Ridley (HPE)
EU Data Protection Legislation, Peter Ridley (HPE)Napier University
 
05 standards and general purpose regulations - impact on finance
05 standards and general purpose regulations - impact on finance05 standards and general purpose regulations - impact on finance
05 standards and general purpose regulations - impact on financeinnov-acts-ltd
 
GDPR - Context, Principles, Implementation, Operation, Impact on Outsourcing,...
GDPR - Context, Principles, Implementation, Operation, Impact on Outsourcing,...GDPR - Context, Principles, Implementation, Operation, Impact on Outsourcing,...
GDPR - Context, Principles, Implementation, Operation, Impact on Outsourcing,...Alan McSweeney
 

Similar to Data Flow Mapping and the EU GDPR (20)

Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPR
 
Data Breaches and the EU GDPR
Data Breaches and the EU GDPRData Breaches and the EU GDPR
Data Breaches and the EU GDPR
 
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
 
The first steps towards GDPR compliance 
The first steps towards GDPR compliance The first steps towards GDPR compliance 
The first steps towards GDPR compliance 
 
The GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for complianceThe GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for compliance
 
CyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPRCyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPR
 
Risk assessments and applying organisational controls for GDPR compliance
Risk assessments and applying organisational controls for GDPR complianceRisk assessments and applying organisational controls for GDPR compliance
Risk assessments and applying organisational controls for GDPR compliance
 
CyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRCyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPR
 
Data Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your businessData Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your business
 
Data transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPRData transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPR
 
Ipswitch and cordery on the road " All you need to know about GDPR but are t...
Ipswitch and cordery on the road  " All you need to know about GDPR but are t...Ipswitch and cordery on the road  " All you need to know about GDPR but are t...
Ipswitch and cordery on the road " All you need to know about GDPR but are t...
 
eu-market-access-gdpr-fundamentals-by-risk-associates
eu-market-access-gdpr-fundamentals-by-risk-associateseu-market-access-gdpr-fundamentals-by-risk-associates
eu-market-access-gdpr-fundamentals-by-risk-associates
 
Fintech and Data Protection by Balint Halasz and Zoltan Tarjan 25 10 2016
Fintech and Data Protection by Balint Halasz and Zoltan Tarjan 25 10 2016Fintech and Data Protection by Balint Halasz and Zoltan Tarjan 25 10 2016
Fintech and Data Protection by Balint Halasz and Zoltan Tarjan 25 10 2016
 
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
 
GDPR: The Catalyst for Customer 360
GDPR: The Catalyst for Customer 360GDPR: The Catalyst for Customer 360
GDPR: The Catalyst for Customer 360
 
EU GDPR(general data protection regulation)
EU GDPR(general data protection regulation)EU GDPR(general data protection regulation)
EU GDPR(general data protection regulation)
 
EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?
 
EU Data Protection Legislation, Peter Ridley (HPE)
EU Data Protection Legislation, Peter Ridley (HPE)EU Data Protection Legislation, Peter Ridley (HPE)
EU Data Protection Legislation, Peter Ridley (HPE)
 
05 standards and general purpose regulations - impact on finance
05 standards and general purpose regulations - impact on finance05 standards and general purpose regulations - impact on finance
05 standards and general purpose regulations - impact on finance
 
GDPR - Context, Principles, Implementation, Operation, Impact on Outsourcing,...
GDPR - Context, Principles, Implementation, Operation, Impact on Outsourcing,...GDPR - Context, Principles, Implementation, Operation, Impact on Outsourcing,...
GDPR - Context, Principles, Implementation, Operation, Impact on Outsourcing,...
 

More from IT Governance Ltd

GDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risksGDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risksIT Governance Ltd
 
Business Continuity Management: How to get started
Business Continuity Management: How to get startedBusiness Continuity Management: How to get started
Business Continuity Management: How to get startedIT Governance Ltd
 
Staff awareness: developing a security culture
Staff awareness: developing a security cultureStaff awareness: developing a security culture
Staff awareness: developing a security cultureIT Governance Ltd
 
GDPR compliance: getting everyone in the organisation on board
GDPR compliance: getting everyone in the organisation on boardGDPR compliance: getting everyone in the organisation on board
GDPR compliance: getting everyone in the organisation on boardIT Governance Ltd
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceIT Governance Ltd
 
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...IT Governance Ltd
 
Creating an effective cyber security awareness programme
Creating an effective cyber security awareness programmeCreating an effective cyber security awareness programme
Creating an effective cyber security awareness programmeIT Governance Ltd
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...IT Governance Ltd
 
Addressing penetration testing and vulnerabilities, and adding verification m...
Addressing penetration testing and vulnerabilities, and adding verification m...Addressing penetration testing and vulnerabilities, and adding verification m...
Addressing penetration testing and vulnerabilities, and adding verification m...IT Governance Ltd
 
NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...IT Governance Ltd
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurityIT Governance Ltd
 
Using international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityUsing international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityIT Governance Ltd
 
Using international standards to improve EU cyber security
Using international standards to improve EU cyber securityUsing international standards to improve EU cyber security
Using international standards to improve EU cyber securityIT Governance Ltd
 
Implementing PCI DSS v 2.0 and v 3.0
Implementing PCI DSS v 2.0 and v 3.0Implementing PCI DSS v 2.0 and v 3.0
Implementing PCI DSS v 2.0 and v 3.0IT Governance Ltd
 

More from IT Governance Ltd (14)

GDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risksGDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risks
 
Business Continuity Management: How to get started
Business Continuity Management: How to get startedBusiness Continuity Management: How to get started
Business Continuity Management: How to get started
 
Staff awareness: developing a security culture
Staff awareness: developing a security cultureStaff awareness: developing a security culture
Staff awareness: developing a security culture
 
GDPR compliance: getting everyone in the organisation on board
GDPR compliance: getting everyone in the organisation on boardGDPR compliance: getting everyone in the organisation on board
GDPR compliance: getting everyone in the organisation on board
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to compliance
 
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
 
Creating an effective cyber security awareness programme
Creating an effective cyber security awareness programmeCreating an effective cyber security awareness programme
Creating an effective cyber security awareness programme
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...
 
Addressing penetration testing and vulnerabilities, and adding verification m...
Addressing penetration testing and vulnerabilities, and adding verification m...Addressing penetration testing and vulnerabilities, and adding verification m...
Addressing penetration testing and vulnerabilities, and adding verification m...
 
NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurity
 
Using international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityUsing international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber security
 
Using international standards to improve EU cyber security
Using international standards to improve EU cyber securityUsing international standards to improve EU cyber security
Using international standards to improve EU cyber security
 
Implementing PCI DSS v 2.0 and v 3.0
Implementing PCI DSS v 2.0 and v 3.0Implementing PCI DSS v 2.0 and v 3.0
Implementing PCI DSS v 2.0 and v 3.0
 

Recently uploaded

Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture conceptP&CO
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfAmzadHosen3
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noidadlhescort
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
Phases of negotiation .pptx
 Phases of negotiation .pptx Phases of negotiation .pptx
Phases of negotiation .pptxnandhinijagan9867
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...lizamodels9
 

Recently uploaded (20)

Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Phases of negotiation .pptx
 Phases of negotiation .pptx Phases of negotiation .pptx
Phases of negotiation .pptx
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 

Data Flow Mapping and the EU GDPR

  • 1. Data Flow Mapping and the EU GDPR Adrian Ross LLB (Hons), MBA GRC Consultant IT Governance Ltd 29 September 2016 www.itgovernance.co.uk
  • 2. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Introduction • Adrian Ross • GRC Consultant – Infrastructure services – Business process re-engineering – Business intelligence – Business architecture – Intellectual property – Legal compliance – Data protection and information security – Enterprise risk management 2
  • 3. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 IT Governance Ltd: GRC one-stop shop All verticals, all sectors, all organisational sizes
  • 4. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Agenda • An overview of the regulatory landscape • Territorial scope • Remedies, liabilities and penalties • Risk management and the GDPR • Legal requirements for a DPIA • Why and how to conduct a data flow mapping exercise • What are the challenges? • What is an information flow? • The questions to ask • Data flow mapping techniques 4
  • 5. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 The nature of European law • Two main types of legislation: – Directives º Require individual implementation in each member state º Implemented by the creation of national laws approved by the parliaments of each member state º European Directive 95/46/EC is a directive º UK Data Protection Act 1998 – Regulations º Immediately applicable in each member state º Require no local implementing legislation º The EU GDPR is a regulation
  • 6. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Article 99: Entry into force and application This Regulation shall be binding in its entirety and directly applicable in all member states. KEY DATES • On 8 April 2016 the Regulation was adopted by the European Council. • On 14 April 2016 the Regulation was adopted by the European Parliament. • On 4 May 2016 the official text of the Regulation was published in the EU Official Journal in all the official languages. • The Regulation entered into force on 24 May 2016 and will apply from 25 May 2018. • http://ec.europa.eu/justice/data-protection/reform/index_en.htm Final text of the Regulation: http://data.consilium.europa.eu/doc/document/ST- 5419-2016-REV-1/en/pdf
  • 7. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 GDPR The GDPR has eleven chapters: 1 • Chapter I – General Provisions: Articles 1 - 4 2 • Chapter II – Principles: Articles 5 - 11 3 • Chapter III – Rights of the Data Subject: Articles 12 - 23 4 • Chapter IV – Controller and Processor: Articles 24 - 43 5 • Chapter V – Transfer of Personal Data to Third Countries: Articles 44 - 50 6 • Chapter VI – Independent Supervisory Authorities: Articles 51 - 59 7 • Chapter VII – Cooperation and Consistency: Articles 60 - 76 8 • Chapter VIII – Remedies, Liabilities and Penalties: Articles 77 - 84 9 • Chapter IX – Provisions Relating to Specific Processing Situations: Articles 85 - 91
  • 8. Data protection model under the GDPR Information Commissioner’s Office (ICO) (supervising authority) Data controller (organisations) Data subject (individuals) Data processor Third countries Third parties Duties Rights Disclosure? Inform? Security? Guarantees? Assessment Enforcement European Data Protection Board
  • 9. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Articles 1 – 3: Who and where? • Natural person = a living individual • Natural persons have rights associated with: – The protection of personal data. – The protection of the processing personal data. – The unrestricted movement of personal data within the EU. • In material scope: – Personal data that is processed wholly or partly by automated means. – Personal data that is part of a filing system, or intended to be. • The Regulation applies to controllers and processors in the EU irrespective of where processing takes place. • The Regulation also applies to controllers not in the EU.
  • 10. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Remedies, liabilities and penalties • Article 79: Right to an effective judicial remedy against a controller or processor – Judicial remedy where their rights have been infringed as a result of the processing of personal data. º In the courts of the member state where the controller or processor has an establishment. º In the courts of the member state where the data subject habitually resides. • Article 82: Right to compensation and liability – Any person who has suffered material or non-material damage shall have the right to receive compensation from the controller or processor. – A controller involved in processing shall be liable for damage caused by processing. • Article 83: General conditions for imposing administrative fines – Imposition of administrative fines will in each case be effective, proportionate and dissuasive. º Fines shall take into account technical and organisational measures implemented. – €20,000,000 or, in the case of an undertaking, 4% of total worldwide annual turnover in the preceding financial year (whichever is higher). Module I
  • 11. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Remedies, liability and penalties (cont.) Article 83: General conditions for imposing administrative fines • €10,000,000 or, in the case of an undertaking, 2% of total worldwide annual turnover in the preceding financial year (whichever is greater). • Articles: – 8: Child’s consent – 11: Processing not requiring identification – 25: Data protection by design and by default – 26: Joint controllers – 27: Representatives of controllers not established in EU – 26 - 29 & 30: Processing – 31: Cooperation with the supervisory authority – 32: Data security – 33: Notification of breaches to supervisory authority – 34: Communication of breaches to data subjects – 35: Data protection impact assessment – 36: Prior consultation – 37 - 39: DPOs – 41(4): Monitoring approved codes of conduct – 42: Certification – 43: Certification bodies
  • 12. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Remedies, liability and penalties (cont.) Article 83: General conditions for imposing administrative fines • €20,000,000 or, in the case of an undertaking, 4% total worldwide annual turnover in the preceding financial year (whichever is higher). • Articles – 5: Principles relating to the processing of personal data – 6: Lawfulness of processing – 7: Conditions for consent – 9: Processing special categories of personal data (i.e. sensitive personal data) – 12 - 22: Data subject rights to information, access, rectification, erasure, restriction of processing, data portability, object, profiling – 44 - 49: Transfers to third countries – 58(1): Requirement to provide access to supervisory authority – 58(2): Orders/limitations on processing or the suspension of data flows
  • 13. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Riskmanagement and the GDPR RISK is mentioned over 60 times in the Regulation. It is important to understand privacy risk and integrate it into your risk framework.
  • 14. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 What is risk? • The effect of uncertainty on objectives (ISO 31000 etc.) • The combination of the probability of an event and its consequences (IRM) • A situation involving exposure to danger (OED) • Uncertainty of outcome, within a range of exposure, arising from a combination of the impact and the probability of events (Orange Book HM Treasury) • The uncertainty of an event occurring that could have an impact on the achievement of objectives (Institute of Internal Auditors)
  • 15. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Standards and codes • ISO 31000 – Risk management – Principles and guidelines – AS/NZS 4360:2004 now replaced by ISO 31000 • ISO 31010 – Risk management – Risk assessment techniques • IRM/ALARM/AIRMIC – A risk management standard • UK Combined Code on UK Corporate Governance • OECD Principles of Corporate Governance • COSO Enterprise Risk Management – Integrated Framework • Sector specific, e.g. clinical, food • Discipline specific, e.g. ISO 27005 • ISO 22301 – Business continuity management
  • 16. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 ISO 31000: Risk management • Management framework approach • PDCA model modified in ISO 27005 • Generic (all risks) • Very similar to a management system
  • 17. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Risk assessment Risk management process Establishing the context Risk identification Risk analysis Risk evaluation Risk treatment Communication and consultation Monitoring and review
  • 18. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Enterprise risk management • Capabilities: – Aligning risk appetite and strategy – Enhancing risk response decisions – Reducing operational surprises and losses – Identifying and managing multiple and cross-enterprise risks – Seizing opportunities – Improving deployment of capital
  • 19. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Risk management • Organisational risk ‘landscape’ • Strategic – Business performance – Financial performance – Reputation • Operational – Output capacity – Demand response – Interruption and disruption • Statutory – Employment law – Health & safety – Company law • Regulatory – Industry/sector-specific compliance requirements – Licence to operate • Contractual – SLA targets/levels – Product/service availability – Quality/warranty
  • 20. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Information security • Preservation of confidentiality, integrity and availability of information and the assets and processes that support and enable its acquisition, storage, use, protection and disposal. • Wide variety of assets: – information – ICT – infrastructure • Prevent compromise (loss, disclosure, corruption, etc.). • Includes IT security and other forms of security: – physical – HR – supply
  • 21. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Legal requirements for a DPIA Article 35: Data protection impact assessment • Controller must seek the advice of the data protection officer. • This is particularly required in situations that involve: – Automated processing – Profiling – Creation of legal effects – Significantly affecting the natural person – Processing of large-scale categories of sensitive data – Data that relates to criminal offences or convictions – Monitoring on a large scale • Conduct a post-implementation review when risk profile changes.
  • 22. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Legal requirements for a DPIA Article 35: Data protection impact assessment • DPIA must be performed where: – New technologies are deployed – Nature, scope and context of the project demand it – Processes are likely to result in a high risk to the rights and freedom – It can be used to address sets of processing and risks
  • 23. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Legal requirements for a DPIA • The DPIA will set out as a minimum: – A description of the processing and purposes – Legitimate interests pursued by the controller – An assessment of the necessity and proportionality of the processing – An assessment of the risks to the rights and freedoms of data subjects – The measures envisaged to address the risks – All safeguards & security measures to demonstrate compliance – Indications of timeframes if processing relates to erasure – An indication of any data protection by design and default measures – List of recipients of personal data – Compliance with approved codes of conduct – Whether data subjects have been consulted.
  • 24. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Linking the DPIA to the privacy principles 1 • Processed lawfully, fairly and in a transparent manner 2 • Collected for specified, explicit and legitimate purposes 3 • Adequate, relevant and limited to what is necessary 4 • Accurate and, where necessary, kept up to date 5 • Retained only for as long as necessary 6 • Processed in an appropriate manner to maintain security Accountability
  • 25. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 How to conduct a data mapping exercise • The ICO staged approach to an effective DPIA: 1. Required when there is a change in processing of personally identifiable information (PII). 2. Determine the information flows throughout the organisation in order to make a proper assessment of the privacy risks. 3. Identify the risks related to privacy and processing, including the necessity and proportionality of the change in processing. 4. Identify possible privacy solutions to address the risks that have been identified. 5. Assess how the data protection principles have been applied throughout the organisation. 6. Sign-off and record the DPIA, including details of which privacy solutions are too be implemented. 7. Integrate the result of the DPIA back into the project plan. 8. Conduct a post-implementation review where risk profile of PII data has changed.
  • 26. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Why and how to conduct a data mapping exercise
  • 27. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Data mapping – what are the challenges? Identify personal data Identify appropriate technical and organisational safeguards Understand legal & regulatory obligations Trust and confidence
  • 28. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 What is an information flow? A transfer of information from one location to another. For example: – Inside and outside the European Union. – From suppliers and sub-suppliers through to customers. When mapping information flow, you should identify the interaction points between the parties involved. NB: Cloud providers present their own challenges.
  • 29. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Describing information flows Consider the potential future uses of the information collected, even if it is not immediately necessary. Ensure the people who will be using the information are consulted on the practical implications. Walk through the information lifecycle to identify unforeseen or unintended uses of the data.
  • 30. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Information flow – identify the key elements Data items Name, email, address Health data, criminal records Biometrics, location data Formats Hardcopy (paper records) Digital (USB) Database Transfer methods Post, telephone, social media Internal (within group) External (data sharing) Locations Offices Cloud Third parties
  • 31. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Data flow mapping – questions to ask • Workflow inputs and outputs: – How is personal data collected (e.g. form, online, call centre, other)? – Who is accountable for personal data? – What is the location of the systems/filing systems containing the data? – Who has access to the information? – Is the information disclosed/shared with anyone (e.g suppliers, third parties)? – Does the system interface with, or transfer information to, other systems?
  • 32. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Data flow mapping – techniques • Inspect existing documents • Facilitation workshops • Questionnaires • Observation • Whiteboard – freeform diagrams • Template drawings (Visio, mind map tools) • Post-it notes
  • 33. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Example information flow HR users HR system Finance system Workforce metrics EmailRecruitment system Third-party users CV database Outplacement data Candidate information Agency employment screening Recruitment services Outsourced management Outplacement services Candidates HR
  • 34. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 IT Governance: GDPR one-stop shop • Accredited training, one-day foundation course: – London OR Cambridge: http://www.itgovernance.co.uk/shop/p-1795-certified-eu- general-data-protection-regulation-foundation-gdpr-training-course.aspx – ONLINE: http://www.itgovernance.co.uk/shop/p-1834-certified-eu-general-data- protection-regulation-foundation-gdpr-online-training-course.aspx • Practitioner course, classroom or online: – http://www.itgovernance.co.uk/shop/p-1824-certified-eu-general-data-protection- regulation-practitioner-gdpr-training-course.aspx • Pocket guide: http://www.itgovernance.co.uk/shop/p-1830-eu-gdpr-a-pocket- guide.aspx • Documentation toolkit: http://www.itgovernance.co.uk/shop/p-1796-eu-general- data-protection-regulation-gdpr-documentation-toolkit.aspx • Consultancy support : – Data audit – Transition/implementation consultancy – http://www.itgovernance.co.uk/dpa-compliance-consultancy.aspx
  • 35. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Questions? aross@itgovernance.co.uk 0845 070 1750 www.itgovernance.co.uk