SlideShare a Scribd company logo
1 of 4
Download to read offline
SOLUTION OVERVIEW
SAS Solution for Personal Data Protection
Enabling compliance with new regulation
Will you be ready to comply with new EU Data
Protection Regulation in time?
Soon you will have to find,evaluate and categorize your company’s stored Personal Data
(PD) in what may be thousands of databases,and create new processes in order to
comply with the new regulation.
Protecting personal information and consumer integrity has become a high priority for
the EU.Under the EU’s new General Data Protection Regulation (GDPR),every consumer
and citizen have the right to know how PD is being used – as well as the right to have his
or her data completely erased upon demand.Naturally,this means that organizations
that store and/or process EU consumer data must be vigilant and rigorous in protecting
such data,regardless of where they are located.The EU values consumer integrity to
such a degree that companies that do not comply with GDPR may be fined up to 20
million EUR or 4% of their annual global turnover.
The GDPR is a new regulation that will become effective
within the EU countries as of May 2018.Its ambition is to
secure privacy and integrity of the data that is collected
from EU consumers (Personal Data or PD) in various ways.
To comply with the GDPR,you must have people,
processes and tools in place that allow you to instantly
know which data you have about your customers,where
that data is stored (including the data in all your backup
systems),and that you are lawfully keeping and processing
the data.
The protection of personal data required by the GDPR is
far-reaching,including any information relating to “an iden-
tifiable natural person” such as name,identification number,
location data,economic,social or cultural identity.Individ-
uals also have the right to know how,where and for what
purpose their data is being processed.In addition,
consumers also have the right to restrict further processing
and to request the erasure of all their data.
Challenge – internally and
towards authorities
Responding to these demands can be complicated since
data may be stored in duplicate throughout various
systems,and erasing data in one system does not neces-
sarily mean that all data is erased in other systems or
databases.
Data may also be handled in different ways,depending on
how it is used and why it has been collected.There are
various de-identification techniques that enable compli-
ance with data protection requirements but at the same
time complicate the discovery of personal data within an
organization:
• Anonymization – removing PD
• Pseudonymization – replacing PD
• Encryption – encoding PD
With less than two years to implement,there are a number
of challenges on the way to full GDPR compliance.You
have to face both internal and external challenges.
How SAS can help
In view of the new requirements,each organization will
need to design or update its data protection compliance
practices.Several functions in the organization will need to
work together and,in some cases,entirely new functions
may need to be created.One such function is the Data
Protection Officer,who reports directly to the company’s
board,follows legislation and other news,and who inde-
pendently monitors the company’s GDPR compliance.
Other functions that will need to be involved in GDPR are IT,
ITSecurity,Legal,Compliance,CTOs,Marketing,Privacy
Compliance Officers and Information Security Officers.
SAS,with its industry-leading analytics including strong
solutions for data management and data quality,is well
placed to support data protection compliance and to help
your company meet evolving data protection compliance
demands,particularly in five areas:
1. Identification (classification, catalogue) – Identification
and extraction of PD from both structured and unstruc-
tured data sources, no matter where it resides
throughout the organization. Incorporate sophisticated
algorithms that go beyond traditional sampling
methods and manual processes to enable improved
Personal Data detection. Reduce false positives by
using automated data quality filters and techniques that
regularly search files for Personal Data content.
2. Data Flow Analysis – Monitoring and charting storage
and processing of PD in order to conduct and
document analyses and assessment of the risk involved
in all PD collection, use and processing activities, Data
Protection Impact Assessment (DPIA).This involves
monitoring large amounts of actions, processes and
plans, as well as documenting each such step. In
addition, companies must in certain cases of high-risk
processing for the individual conduct DPIAs and if
needed consult with supervisory authorities before
processing takes place.
3. Logging – Documenting how all systems are used, and
ensuring that no “rouge” users are accessing personal
data.
4. User Access Rights – Processes for ensuring exactly who
should be allowed to use systems/data, and ensuring
that access rights are enforced, even when an
employee is transferred to another department, quits a
job, etc.
5. Incident Management – Under GDPR, a company must
report to authorities within 72 hours if data is lost or a
breach in personal data is detected.The company must
also show which procedures have been initiated to fix
the problem.
To ensure compliance with the new GDPR,organizations
will need to review the collection and handling of personal
data,processes and routines.This includes,for instance:
• Data Protection Impact Assessments based on a
questionnaire
• Complete list of systems and related risk rating based
on ISO27001 risk rating (Confidentiality, Integrity and
Availability)
• Predefined list of controls and options to add addi-
tional controls
• Support for policy management and life cycle tracking
on all policies in order to ensure monitoring of policies
and communication across organizations
• Creation of a standard process for incident manage-
ment including related actions, responsibility/owner,
documentation and reporting
• Easily find Personal Data, even where data is mixed
and messy
• Get a clear overview of roles and responsibilities
• Link systems, processes and business owners in data
flows
New compliance requirements
For more information,please contact DanielAunvig: +45 513 87 509 or daniel.aunvig@sas.com
To contact your local SAS office,please visit: sas.com/dk,fi,no or se
SAS and all other SAS Institute Inc. product or service names are registered trademarks or trademarks of SAS Institute Inc. in the USA and other countries.
® indicates USA registration. Other brand and product names are trademarks of their respective companies. Copyright © 2016, SAS Institute Inc.
All rights reserved. 108104_S151339.0316
SAS solution: a unified view of how
your data is handled
For the functions within the organization that oversee how
data is handled,normally over a wide range of platforms
such as Mobile,Cloud,Social Media,proprietary databases
and systems as well as commercial systems,SAS Institute’s
capabilities enable you to you handle all your data through
a unified view.This means that you can seamlessly manage
logging,user access and encryption of data to ensure
Enterprise Governance and Data Compliance.It also
means that individuals can easily find the necessary data
– even if that data is “hidden” in “wrong” columns,text
strings,mislabeled or identified only by context.
Only SAS delivers proven data
management capabilities.
With SAS,you get superior detection capabilities that
enable you to search your entire network,regardless of
operating system,and locate personal data within varying
file formats and both traditional and emerging data sources
like Hadoop.

More Related Content

What's hot

GDPR and technology - details matter
GDPR and technology - details matterGDPR and technology - details matter
GDPR and technology - details matterExove
 
How to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected DataHow to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected DataNeo4j
 
Extending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsExtending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsLindaWatson19
 
Top gdpr assessment tools
Top  gdpr assessment toolsTop  gdpr assessment tools
Top gdpr assessment toolsRajivarnan R
 
Teleran Data Protection - Addressing 5 Critical GDPR Requirements
Teleran Data Protection - Addressing 5 Critical GDPR RequirementsTeleran Data Protection - Addressing 5 Critical GDPR Requirements
Teleran Data Protection - Addressing 5 Critical GDPR RequirementsChris Doolittle
 
Beginning your General Data Protection Regulation (GDPR) Journey
Beginning your General Data Protection Regulation (GDPR) JourneyBeginning your General Data Protection Regulation (GDPR) Journey
Beginning your General Data Protection Regulation (GDPR) JourneyMicrosoft Österreich
 
Supporting GDPR Compliance through Data Classification
Supporting GDPR Compliance through Data ClassificationSupporting GDPR Compliance through Data Classification
Supporting GDPR Compliance through Data ClassificationIndex Engines Inc.
 
12 steps to prepare for GDPR
12 steps to prepare for GDPR12 steps to prepare for GDPR
12 steps to prepare for GDPRGary Chambers
 
GDPR 12 Steps infographic
GDPR 12 Steps infographic GDPR 12 Steps infographic
GDPR 12 Steps infographic Ermine Amies
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) Kimberly Simon MBA
 
Data Classification Presentation
Data Classification PresentationData Classification Presentation
Data Classification PresentationDerroylo
 
GDPR & Your Cloud Provider - What You Need to Know
GDPR & Your Cloud Provider - What You Need to KnowGDPR & Your Cloud Provider - What You Need to Know
GDPR & Your Cloud Provider - What You Need to KnowRachel Roach
 
Building the Governance Ready Enterprise for GDPR Compliance
Building the Governance Ready Enterprise for GDPR ComplianceBuilding the Governance Ready Enterprise for GDPR Compliance
Building the Governance Ready Enterprise for GDPR ComplianceIndex Engines Inc.
 
Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)Acquia
 
Beyond GDPR Compliance - Role of Internal Audit
Beyond GDPR Compliance - Role of Internal AuditBeyond GDPR Compliance - Role of Internal Audit
Beyond GDPR Compliance - Role of Internal AuditOmo Osagiede
 
Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion
 
Complete Guide to General Data Protection Regulation (GDPR)
Complete Guide to General Data Protection Regulation (GDPR)Complete Guide to General Data Protection Regulation (GDPR)
Complete Guide to General Data Protection Regulation (GDPR)Happiest Minds Technologies
 

What's hot (20)

GDPR and technology - details matter
GDPR and technology - details matterGDPR and technology - details matter
GDPR and technology - details matter
 
How to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected DataHow to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected Data
 
Extending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsExtending Information Security to Non-Production Environments
Extending Information Security to Non-Production Environments
 
Top gdpr assessment tools
Top  gdpr assessment toolsTop  gdpr assessment tools
Top gdpr assessment tools
 
Teleran Data Protection - Addressing 5 Critical GDPR Requirements
Teleran Data Protection - Addressing 5 Critical GDPR RequirementsTeleran Data Protection - Addressing 5 Critical GDPR Requirements
Teleran Data Protection - Addressing 5 Critical GDPR Requirements
 
Beginning your General Data Protection Regulation (GDPR) Journey
Beginning your General Data Protection Regulation (GDPR) JourneyBeginning your General Data Protection Regulation (GDPR) Journey
Beginning your General Data Protection Regulation (GDPR) Journey
 
Supporting GDPR Compliance through Data Classification
Supporting GDPR Compliance through Data ClassificationSupporting GDPR Compliance through Data Classification
Supporting GDPR Compliance through Data Classification
 
12 steps to prepare for GDPR
12 steps to prepare for GDPR12 steps to prepare for GDPR
12 steps to prepare for GDPR
 
GDPR 12 Steps infographic
GDPR 12 Steps infographic GDPR 12 Steps infographic
GDPR 12 Steps infographic
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
Andrew Warland
Andrew WarlandAndrew Warland
Andrew Warland
 
Data Classification Presentation
Data Classification PresentationData Classification Presentation
Data Classification Presentation
 
GDPR & Your Cloud Provider - What You Need to Know
GDPR & Your Cloud Provider - What You Need to KnowGDPR & Your Cloud Provider - What You Need to Know
GDPR & Your Cloud Provider - What You Need to Know
 
Building the Governance Ready Enterprise for GDPR Compliance
Building the Governance Ready Enterprise for GDPR ComplianceBuilding the Governance Ready Enterprise for GDPR Compliance
Building the Governance Ready Enterprise for GDPR Compliance
 
Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)
 
Beyond GDPR Compliance - Role of Internal Audit
Beyond GDPR Compliance - Role of Internal AuditBeyond GDPR Compliance - Role of Internal Audit
Beyond GDPR Compliance - Role of Internal Audit
 
GDPR and Hadoop
GDPR and HadoopGDPR and Hadoop
GDPR and Hadoop
 
Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event
 
Complete Guide to General Data Protection Regulation (GDPR)
Complete Guide to General Data Protection Regulation (GDPR)Complete Guide to General Data Protection Regulation (GDPR)
Complete Guide to General Data Protection Regulation (GDPR)
 
GDPR Compliance
GDPR ComplianceGDPR Compliance
GDPR Compliance
 

Similar to Will you be ready to comply with new EU Data Protection Regulation in time?

Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessSirius
 
Eu data protection regulations (point-of-view)
Eu data protection regulations (point-of-view)Eu data protection regulations (point-of-view)
Eu data protection regulations (point-of-view)Gerson Trigueiros
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Qualsys Ltd
 
General Data Protection Regulation (GDPR) Implications for Canadian Firms
General Data Protection Regulation (GDPR) Implications for Canadian FirmsGeneral Data Protection Regulation (GDPR) Implications for Canadian Firms
General Data Protection Regulation (GDPR) Implications for Canadian Firmsaccenture
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessSirius
 
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdfData Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdfCIOWomenMagazine
 
Michael Josephs
Michael JosephsMichael Josephs
Michael JosephsdaveGBE
 
Setting the right GDPR priorities
Setting the right GDPR prioritiesSetting the right GDPR priorities
Setting the right GDPR prioritiesAlberto Canadè
 
Big data security
Big data securityBig data security
Big data securityAnne ndolo
 
Big data security
Big data securityBig data security
Big data securityAnne ndolo
 
LS_WhitePaper_NextGenAnalyticsMay2016
LS_WhitePaper_NextGenAnalyticsMay2016LS_WhitePaper_NextGenAnalyticsMay2016
LS_WhitePaper_NextGenAnalyticsMay2016Anjan Roy, PMP
 
Data privacy and security in uae
Data privacy and security in uaeData privacy and security in uae
Data privacy and security in uaeRishalHalid1
 
Practical Guide to Data Governance Success
Practical Guide to Data Governance SuccessPractical Guide to Data Governance Success
Practical Guide to Data Governance SuccessAmple Insight Inc
 
Data Privacy and Security in UAE.pptx
Data Privacy and Security in UAE.pptxData Privacy and Security in UAE.pptx
Data Privacy and Security in UAE.pptxAdarsh748147
 
SME- Developing an information governance strategy 2016
SME- Developing an information governance strategy 2016 SME- Developing an information governance strategy 2016
SME- Developing an information governance strategy 2016 Hybrid Cloud
 
Opteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix LLC
 
Enterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoftEnterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoftAppsian
 

Similar to Will you be ready to comply with new EU Data Protection Regulation in time? (20)

Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR Success
 
Eu data protection regulations (point-of-view)
Eu data protection regulations (point-of-view)Eu data protection regulations (point-of-view)
Eu data protection regulations (point-of-view)
 
3GRC approach to GDPR V 0.1 www.3grc.co.uk
3GRC  approach to GDPR V 0.1 www.3grc.co.uk3GRC  approach to GDPR V 0.1 www.3grc.co.uk
3GRC approach to GDPR V 0.1 www.3grc.co.uk
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
 
General Data Protection Regulation (GDPR) Implications for Canadian Firms
General Data Protection Regulation (GDPR) Implications for Canadian FirmsGeneral Data Protection Regulation (GDPR) Implications for Canadian Firms
General Data Protection Regulation (GDPR) Implications for Canadian Firms
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
 
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdfData Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
 
Michael Josephs
Michael JosephsMichael Josephs
Michael Josephs
 
Setting the right GDPR priorities
Setting the right GDPR prioritiesSetting the right GDPR priorities
Setting the right GDPR priorities
 
Big data security
Big data securityBig data security
Big data security
 
Big data security
Big data securityBig data security
Big data security
 
LS_WhitePaper_NextGenAnalyticsMay2016
LS_WhitePaper_NextGenAnalyticsMay2016LS_WhitePaper_NextGenAnalyticsMay2016
LS_WhitePaper_NextGenAnalyticsMay2016
 
Data privacy and security in uae
Data privacy and security in uaeData privacy and security in uae
Data privacy and security in uae
 
Practical Guide to Data Governance Success
Practical Guide to Data Governance SuccessPractical Guide to Data Governance Success
Practical Guide to Data Governance Success
 
Data Privacy and Security in UAE.pptx
Data Privacy and Security in UAE.pptxData Privacy and Security in UAE.pptx
Data Privacy and Security in UAE.pptx
 
SME- Developing an information governance strategy 2016
SME- Developing an information governance strategy 2016 SME- Developing an information governance strategy 2016
SME- Developing an information governance strategy 2016
 
Opteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdf
 
Unit 5 v2
Unit 5 v2Unit 5 v2
Unit 5 v2
 
Enterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoftEnterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoft
 
GDPR: Time to Act
GDPR: Time to ActGDPR: Time to Act
GDPR: Time to Act
 

Recently uploaded

如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书Fir L
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxsrikarna235
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaNafiaNazim
 
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书FS LS
 
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfWhy Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfMilind Agarwal
 
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书SD DS
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书SD DS
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...shubhuc963
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书SD DS
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书SD DS
 
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptxAn Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptxKUHANARASARATNAM1
 
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSVIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSDr. Oliver Massmann
 
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxsrikarna235
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书Fir L
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书Fs Las
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一st Las
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementShubhiSharma858417
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一jr6r07mb
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书Sir Lt
 

Recently uploaded (20)

如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptx
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in India
 
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
 
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfWhy Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
 
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...
 
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in  Pusa Road🔝 9953330565 🔝 escort Serviceyoung Call Girls in  Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
 
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptxAn Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
 
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSVIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
 
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreement
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 

Will you be ready to comply with new EU Data Protection Regulation in time?

  • 1. SOLUTION OVERVIEW SAS Solution for Personal Data Protection Enabling compliance with new regulation Will you be ready to comply with new EU Data Protection Regulation in time? Soon you will have to find,evaluate and categorize your company’s stored Personal Data (PD) in what may be thousands of databases,and create new processes in order to comply with the new regulation. Protecting personal information and consumer integrity has become a high priority for the EU.Under the EU’s new General Data Protection Regulation (GDPR),every consumer and citizen have the right to know how PD is being used – as well as the right to have his or her data completely erased upon demand.Naturally,this means that organizations that store and/or process EU consumer data must be vigilant and rigorous in protecting such data,regardless of where they are located.The EU values consumer integrity to such a degree that companies that do not comply with GDPR may be fined up to 20 million EUR or 4% of their annual global turnover.
  • 2. The GDPR is a new regulation that will become effective within the EU countries as of May 2018.Its ambition is to secure privacy and integrity of the data that is collected from EU consumers (Personal Data or PD) in various ways. To comply with the GDPR,you must have people, processes and tools in place that allow you to instantly know which data you have about your customers,where that data is stored (including the data in all your backup systems),and that you are lawfully keeping and processing the data. The protection of personal data required by the GDPR is far-reaching,including any information relating to “an iden- tifiable natural person” such as name,identification number, location data,economic,social or cultural identity.Individ- uals also have the right to know how,where and for what purpose their data is being processed.In addition, consumers also have the right to restrict further processing and to request the erasure of all their data. Challenge – internally and towards authorities Responding to these demands can be complicated since data may be stored in duplicate throughout various systems,and erasing data in one system does not neces- sarily mean that all data is erased in other systems or databases. Data may also be handled in different ways,depending on how it is used and why it has been collected.There are various de-identification techniques that enable compli- ance with data protection requirements but at the same time complicate the discovery of personal data within an organization: • Anonymization – removing PD • Pseudonymization – replacing PD • Encryption – encoding PD
  • 3. With less than two years to implement,there are a number of challenges on the way to full GDPR compliance.You have to face both internal and external challenges. How SAS can help In view of the new requirements,each organization will need to design or update its data protection compliance practices.Several functions in the organization will need to work together and,in some cases,entirely new functions may need to be created.One such function is the Data Protection Officer,who reports directly to the company’s board,follows legislation and other news,and who inde- pendently monitors the company’s GDPR compliance. Other functions that will need to be involved in GDPR are IT, ITSecurity,Legal,Compliance,CTOs,Marketing,Privacy Compliance Officers and Information Security Officers. SAS,with its industry-leading analytics including strong solutions for data management and data quality,is well placed to support data protection compliance and to help your company meet evolving data protection compliance demands,particularly in five areas: 1. Identification (classification, catalogue) – Identification and extraction of PD from both structured and unstruc- tured data sources, no matter where it resides throughout the organization. Incorporate sophisticated algorithms that go beyond traditional sampling methods and manual processes to enable improved Personal Data detection. Reduce false positives by using automated data quality filters and techniques that regularly search files for Personal Data content. 2. Data Flow Analysis – Monitoring and charting storage and processing of PD in order to conduct and document analyses and assessment of the risk involved in all PD collection, use and processing activities, Data Protection Impact Assessment (DPIA).This involves monitoring large amounts of actions, processes and plans, as well as documenting each such step. In addition, companies must in certain cases of high-risk processing for the individual conduct DPIAs and if needed consult with supervisory authorities before processing takes place. 3. Logging – Documenting how all systems are used, and ensuring that no “rouge” users are accessing personal data. 4. User Access Rights – Processes for ensuring exactly who should be allowed to use systems/data, and ensuring that access rights are enforced, even when an employee is transferred to another department, quits a job, etc. 5. Incident Management – Under GDPR, a company must report to authorities within 72 hours if data is lost or a breach in personal data is detected.The company must also show which procedures have been initiated to fix the problem. To ensure compliance with the new GDPR,organizations will need to review the collection and handling of personal data,processes and routines.This includes,for instance: • Data Protection Impact Assessments based on a questionnaire • Complete list of systems and related risk rating based on ISO27001 risk rating (Confidentiality, Integrity and Availability) • Predefined list of controls and options to add addi- tional controls • Support for policy management and life cycle tracking on all policies in order to ensure monitoring of policies and communication across organizations • Creation of a standard process for incident manage- ment including related actions, responsibility/owner, documentation and reporting • Easily find Personal Data, even where data is mixed and messy • Get a clear overview of roles and responsibilities • Link systems, processes and business owners in data flows New compliance requirements
  • 4. For more information,please contact DanielAunvig: +45 513 87 509 or daniel.aunvig@sas.com To contact your local SAS office,please visit: sas.com/dk,fi,no or se SAS and all other SAS Institute Inc. product or service names are registered trademarks or trademarks of SAS Institute Inc. in the USA and other countries. ® indicates USA registration. Other brand and product names are trademarks of their respective companies. Copyright © 2016, SAS Institute Inc. All rights reserved. 108104_S151339.0316 SAS solution: a unified view of how your data is handled For the functions within the organization that oversee how data is handled,normally over a wide range of platforms such as Mobile,Cloud,Social Media,proprietary databases and systems as well as commercial systems,SAS Institute’s capabilities enable you to you handle all your data through a unified view.This means that you can seamlessly manage logging,user access and encryption of data to ensure Enterprise Governance and Data Compliance.It also means that individuals can easily find the necessary data – even if that data is “hidden” in “wrong” columns,text strings,mislabeled or identified only by context. Only SAS delivers proven data management capabilities. With SAS,you get superior detection capabilities that enable you to search your entire network,regardless of operating system,and locate personal data within varying file formats and both traditional and emerging data sources like Hadoop.