SlideShare a Scribd company logo
1 of 28
Download to read offline
1
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2017
v © TRUSTe Inc., 2017
GDPR: DPIAs & Risk
May 23, 2017
2
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2017
v © TRUSTe Inc., 2017
• We will be starting a couple minutes after the hour
• This webinar will be recorded and the recording and slides sent out
later today
• Please use the GotoWebinar control panel on the right hand side to
submit any questions for the speakers
Thank you for joining the webinar
“GDPR: DPIAs & Risk”
3
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2017
Today’s Speakers
Marty Abrams
Executive Director & Chief Strategist
Information Accountability Foundation (IAF)
Hilary Wandall (Moderator)
General Counsel & Chief Data Governance Officer
TRUSTe
4
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2017
• Welcome & Introductions
• The role of DPIAs
• Development of privacy assessment methodology
• GDPR and DPIAs
• Risky processing under GDPR
• IAF-TRUSTe DPIA approach
• Privacy risk and enterprise risk management
• Q&A
Today’s Agenda
5
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2017
Do you have an internal PIA or DPIA process?
• yes
• no
Webinar Poll
6
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2017
v © TRUSTe Inc., 2017
The Role of DPIAs
7
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2017
Build Your Program – 6 Essential Elements
Build
Establish, maintain
and evolve an
integrated privacy
and data governance
program aligned with
other data
management and
information risk
functions such as
security, IP, trade
secret protection and
e-discovery
Integrated
Governance
Identify stakeholders. Establish
program leadership and governance.
Define program mission, vision and
goals.
Risk
Assessment
Identify, assess and classify data-
related strategic, operational, legal
compliance and financial risks.
Resource
Allocation
Establish budgets. Define roles and
responsibilities. Assign competent
personnel.
Policies &
Standards
Develop policies, procedures and
guidelines to define and deploy
effective and sustainable governance
and controls for managing data-
related risks.
Processes Establish, manage, measure and
continually improve processes for
PIAs, vendor assessments, incident
management and breach notification,
complaint handling and individual
rights management.
Awareness &
Training
Communicate expectations. Provide
general & contextual training.
Learn and Evolve Over Time
8
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2017
v © TRUSTe Inc., 2017
Development of Privacy Assessment
Methodology
9
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2017
How has assessment methodology developed in
the privacy field?
10
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2017
How did comprehensive data impact assessments
originate?
11
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2017
Genesis of Ethical Assessments
2013 - Challenge by HP, Merck, Intuit and Acxiom to
develop a means to make big data processing defendable
2014 - Unified Ethical frame developed and presented at
the International Conference of Data Protection and Privacy
Commissioners
–Ethical assessments the key
–Embraced by numerous regulators
–The “golden rule” became the proxy for ethics
2015 – Oversight and framework for assessment
–Multi-stakeholder oversight
–Link to legitimate interests established
–Digital marketing assessment framework developed
2016 – Canadian project
12
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2017
Canadian Project
•Canadian law, in most cases requires consent
–Raised the question of how big data might be done in Canada as a
link to accountability
•IAF received a grant from Office of the Privacy
Commissioner to explore the concept of ethical
assessments
•Recruited 20 Canadian companies and a lead Canadian
lawyer/expert to work with us
•Took the Canadian framework to a multi-stakeholder group
that included regulators
•End products a framework that includes the legal and
ethical discussion and an assessment framework
–Participants pleased with the outcome
–OPC pleased with the work product
13
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2017
Key Findings
•A customized linkage to local law and culture is
necessary
•The assessment framework can be used globally
•Assessing stakeholder benefits and risks was break
through for companies
•This methodology is useful everywhere
•Legal, fair and just - which puts people first - is a great
proxy for ethics
•Automating the process would lead to scalability
14
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2017
How does the ethical assessment methodology
align with the GDPR expectations for DPIAs?
15
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2017
v © TRUSTe Inc., 2017
IAF-TRUSTe DPIA Strategy
16
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2017
GDPR Requirements for DPIAs (Articles 35 and 36)
Processing likely to
result in high risk
Article 35(1)
No
No DPIA Required
DPIA Required
• Systematic description of the processing
• Assessment of necessity and
proportionality
• Assessment of the risks to the rights and
freedoms of data subjects
• Measures to address the risks
Is residual risk high?
No
DPA Consult Required
No DPA Consult
Required
17
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2017
Based on Article 29 Working Party Guidelines WP 248 (4 Apr 2017)
• Evaluation or scoring
• Automated-decision making with legal or similar significant effect
• Systematic monitoring
• Sensitive data
• Data processed on a large scale
• Datasets that have been matched or combined
• Data concerning vulnerable subjects
• Innovative use or applying technological or organizational solutions
• Data transfer across borders outside of the EU
• Where the processing itself prevents individuals from exercising a right
or using a service or a contract
Processing Likely to Result in High Risk – Key Criteria
18
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2017
IAF-TRUSTe DPIA Construct
Part A – Governance
and Accountability
1. Organizational
Accountability
2. Purpose
3. Data
4. Data Sources, Origins
and Characteristics
5. Legal Basis of
Processing
Part C – Mitigations
and Safeguards
10. Data Necessity
(DPbDesign/Default,
Data Minimization)
11. Use, Retention and
Disposal
12. Disclosure to Third
Parties and Onward
Transfer
13. Choice and Consent
14. Access and Individual
Rights
15. Data Integrity and
Quality
16. Security
17. Transparency
Part D – Risk Outcomes
(Report)
18. Mitigations and
Safeguard
Effectiveness
Evaluation (Scale)
19. Calculation of
Residual Risk
Severity and
Likelihood
20. Legitimate Interests
Balancing Test
Outcomes
21. Where residual risks
are high, consultation
of DPA and data
subjects
Part B – Risk, Impacts
and Benefits
6. High Risk Processing
7. Value and Benefits of
the Processing
8. Inherent Risk
Assessment
9. Weighted Inherent
Risk-Benefits
19
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2017
Do you have an automated PIA or DPIA process?
• yes
• no
Webinar Poll
20
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2017
Automating the IAF-TRUSTe DPIA
21
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2017
Automating the IAF-TRUSTe DPIA
22
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2017
Automating the IAF-TRUSTe DPIA
23
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2017
Automating the IAF-TRUSTe DPIA
24
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2017
Do you have an enterprise risk management (ERM)
process?
• yes
• no
Webinar Poll
25
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2017
Integrating Privacy into Enterprise Risk Management
26
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2017
v © TRUSTe Inc., 2017
Questions?
27
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2017
v © TRUSTe Inc., 2017
Marty Abrams mabrams@informationaccountability.org
Hilary Wandall hilary@truste.com
Contacts
28
vPrivacy Insight Series - truste.com/insightseries
© TRUSTe Inc., 2017
v © TRUSTe Inc., 2017
Details and registration for our 2017 Summer/Fall Webinar Series will be
published shortly.
Register for our next live event – the Privacy Risk Summit on June 6th 2017
at https://www.truste.com/events/privacy-risk/
See http://www.truste.com/insightseries for the 2017 Privacy Insight Series
and past webinar recordings.
Thank You!

More Related Content

More from TrustArc

Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...TrustArc
 
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...TrustArc
 
Nymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesTrustArc
 
CBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceCBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceTrustArc
 
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfEverything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfTrustArc
 
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...TrustArc
 
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsPrivacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsTrustArc
 
Building Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsBuilding Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsTrustArc
 
The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...TrustArc
 
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdfTrustArc
 
Artificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceArtificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceTrustArc
 
How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023TrustArc
 
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act:  Using Consumer Data and Maintaining TrustThe Ultimate Balancing Act:  Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act: Using Consumer Data and Maintaining TrustTrustArc
 
The Cost of Privacy Teams: What Your Business Needs To Know
The Cost of Privacy Teams: What Your Business Needs To KnowThe Cost of Privacy Teams: What Your Business Needs To Know
The Cost of Privacy Teams: What Your Business Needs To KnowTrustArc
 
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdf
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdfTrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdf
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdfTrustArc
 
TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?
TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?
TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?TrustArc
 
Why Your Company Needs A Privacy Culture & Where To Start
Why Your Company Needs A Privacy Culture & Where To StartWhy Your Company Needs A Privacy Culture & Where To Start
Why Your Company Needs A Privacy Culture & Where To StartTrustArc
 
Data Privacy Perspectives: Get Answers to Your Privacy Questions
Data Privacy Perspectives: Get Answers to Your Privacy QuestionsData Privacy Perspectives: Get Answers to Your Privacy Questions
Data Privacy Perspectives: Get Answers to Your Privacy QuestionsTrustArc
 
TrustArc Webinar: DPIA Compliance
TrustArc Webinar: DPIA ComplianceTrustArc Webinar: DPIA Compliance
TrustArc Webinar: DPIA ComplianceTrustArc
 
TrustArc Webinar: 2023 Privacy Roadmap
TrustArc Webinar: 2023 Privacy RoadmapTrustArc Webinar: 2023 Privacy Roadmap
TrustArc Webinar: 2023 Privacy RoadmapTrustArc
 

More from TrustArc (20)

Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
 
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
 
Nymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 States
 
CBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceCBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy Compliance
 
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfEverything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
 
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
 
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsPrivacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
 
Building Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsBuilding Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy Certifications
 
The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...
 
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
 
Artificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceArtificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI Governance
 
How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023
 
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act:  Using Consumer Data and Maintaining TrustThe Ultimate Balancing Act:  Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust
 
The Cost of Privacy Teams: What Your Business Needs To Know
The Cost of Privacy Teams: What Your Business Needs To KnowThe Cost of Privacy Teams: What Your Business Needs To Know
The Cost of Privacy Teams: What Your Business Needs To Know
 
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdf
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdfTrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdf
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdf
 
TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?
TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?
TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?
 
Why Your Company Needs A Privacy Culture & Where To Start
Why Your Company Needs A Privacy Culture & Where To StartWhy Your Company Needs A Privacy Culture & Where To Start
Why Your Company Needs A Privacy Culture & Where To Start
 
Data Privacy Perspectives: Get Answers to Your Privacy Questions
Data Privacy Perspectives: Get Answers to Your Privacy QuestionsData Privacy Perspectives: Get Answers to Your Privacy Questions
Data Privacy Perspectives: Get Answers to Your Privacy Questions
 
TrustArc Webinar: DPIA Compliance
TrustArc Webinar: DPIA ComplianceTrustArc Webinar: DPIA Compliance
TrustArc Webinar: DPIA Compliance
 
TrustArc Webinar: 2023 Privacy Roadmap
TrustArc Webinar: 2023 Privacy RoadmapTrustArc Webinar: 2023 Privacy Roadmap
TrustArc Webinar: 2023 Privacy Roadmap
 

Recently uploaded

Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionAnuragMishra811030
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdflaysamaeguardiano
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书Fs Las
 
Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Oishi8
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书Fs Las
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书E LSS
 
如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书Fir L
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxRRR Chambers
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labourBhavikaGholap1
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书Fir L
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx2020000445musaib
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书SS A
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueSkyLaw Professional Corporation
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxRRR Chambers
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书Sir Lt
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书E LSS
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
 

Recently uploaded (20)

Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusion
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
 
Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
 
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书
 
如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书
 
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptx
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labour
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书
 
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
 

GDPR: DPIAs & Risk [Webinar Slides]

  • 1. 1 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2017 v © TRUSTe Inc., 2017 GDPR: DPIAs & Risk May 23, 2017
  • 2. 2 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2017 v © TRUSTe Inc., 2017 • We will be starting a couple minutes after the hour • This webinar will be recorded and the recording and slides sent out later today • Please use the GotoWebinar control panel on the right hand side to submit any questions for the speakers Thank you for joining the webinar “GDPR: DPIAs & Risk”
  • 3. 3 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2017 Today’s Speakers Marty Abrams Executive Director & Chief Strategist Information Accountability Foundation (IAF) Hilary Wandall (Moderator) General Counsel & Chief Data Governance Officer TRUSTe
  • 4. 4 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2017 • Welcome & Introductions • The role of DPIAs • Development of privacy assessment methodology • GDPR and DPIAs • Risky processing under GDPR • IAF-TRUSTe DPIA approach • Privacy risk and enterprise risk management • Q&A Today’s Agenda
  • 5. 5 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2017 Do you have an internal PIA or DPIA process? • yes • no Webinar Poll
  • 6. 6 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2017 v © TRUSTe Inc., 2017 The Role of DPIAs
  • 7. 7 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2017 Build Your Program – 6 Essential Elements Build Establish, maintain and evolve an integrated privacy and data governance program aligned with other data management and information risk functions such as security, IP, trade secret protection and e-discovery Integrated Governance Identify stakeholders. Establish program leadership and governance. Define program mission, vision and goals. Risk Assessment Identify, assess and classify data- related strategic, operational, legal compliance and financial risks. Resource Allocation Establish budgets. Define roles and responsibilities. Assign competent personnel. Policies & Standards Develop policies, procedures and guidelines to define and deploy effective and sustainable governance and controls for managing data- related risks. Processes Establish, manage, measure and continually improve processes for PIAs, vendor assessments, incident management and breach notification, complaint handling and individual rights management. Awareness & Training Communicate expectations. Provide general & contextual training. Learn and Evolve Over Time
  • 8. 8 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2017 v © TRUSTe Inc., 2017 Development of Privacy Assessment Methodology
  • 9. 9 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2017 How has assessment methodology developed in the privacy field?
  • 10. 10 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2017 How did comprehensive data impact assessments originate?
  • 11. 11 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2017 Genesis of Ethical Assessments 2013 - Challenge by HP, Merck, Intuit and Acxiom to develop a means to make big data processing defendable 2014 - Unified Ethical frame developed and presented at the International Conference of Data Protection and Privacy Commissioners –Ethical assessments the key –Embraced by numerous regulators –The “golden rule” became the proxy for ethics 2015 – Oversight and framework for assessment –Multi-stakeholder oversight –Link to legitimate interests established –Digital marketing assessment framework developed 2016 – Canadian project
  • 12. 12 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2017 Canadian Project •Canadian law, in most cases requires consent –Raised the question of how big data might be done in Canada as a link to accountability •IAF received a grant from Office of the Privacy Commissioner to explore the concept of ethical assessments •Recruited 20 Canadian companies and a lead Canadian lawyer/expert to work with us •Took the Canadian framework to a multi-stakeholder group that included regulators •End products a framework that includes the legal and ethical discussion and an assessment framework –Participants pleased with the outcome –OPC pleased with the work product
  • 13. 13 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2017 Key Findings •A customized linkage to local law and culture is necessary •The assessment framework can be used globally •Assessing stakeholder benefits and risks was break through for companies •This methodology is useful everywhere •Legal, fair and just - which puts people first - is a great proxy for ethics •Automating the process would lead to scalability
  • 14. 14 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2017 How does the ethical assessment methodology align with the GDPR expectations for DPIAs?
  • 15. 15 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2017 v © TRUSTe Inc., 2017 IAF-TRUSTe DPIA Strategy
  • 16. 16 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2017 GDPR Requirements for DPIAs (Articles 35 and 36) Processing likely to result in high risk Article 35(1) No No DPIA Required DPIA Required • Systematic description of the processing • Assessment of necessity and proportionality • Assessment of the risks to the rights and freedoms of data subjects • Measures to address the risks Is residual risk high? No DPA Consult Required No DPA Consult Required
  • 17. 17 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2017 Based on Article 29 Working Party Guidelines WP 248 (4 Apr 2017) • Evaluation or scoring • Automated-decision making with legal or similar significant effect • Systematic monitoring • Sensitive data • Data processed on a large scale • Datasets that have been matched or combined • Data concerning vulnerable subjects • Innovative use or applying technological or organizational solutions • Data transfer across borders outside of the EU • Where the processing itself prevents individuals from exercising a right or using a service or a contract Processing Likely to Result in High Risk – Key Criteria
  • 18. 18 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2017 IAF-TRUSTe DPIA Construct Part A – Governance and Accountability 1. Organizational Accountability 2. Purpose 3. Data 4. Data Sources, Origins and Characteristics 5. Legal Basis of Processing Part C – Mitigations and Safeguards 10. Data Necessity (DPbDesign/Default, Data Minimization) 11. Use, Retention and Disposal 12. Disclosure to Third Parties and Onward Transfer 13. Choice and Consent 14. Access and Individual Rights 15. Data Integrity and Quality 16. Security 17. Transparency Part D – Risk Outcomes (Report) 18. Mitigations and Safeguard Effectiveness Evaluation (Scale) 19. Calculation of Residual Risk Severity and Likelihood 20. Legitimate Interests Balancing Test Outcomes 21. Where residual risks are high, consultation of DPA and data subjects Part B – Risk, Impacts and Benefits 6. High Risk Processing 7. Value and Benefits of the Processing 8. Inherent Risk Assessment 9. Weighted Inherent Risk-Benefits
  • 19. 19 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2017 Do you have an automated PIA or DPIA process? • yes • no Webinar Poll
  • 20. 20 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2017 Automating the IAF-TRUSTe DPIA
  • 21. 21 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2017 Automating the IAF-TRUSTe DPIA
  • 22. 22 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2017 Automating the IAF-TRUSTe DPIA
  • 23. 23 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2017 Automating the IAF-TRUSTe DPIA
  • 24. 24 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2017 Do you have an enterprise risk management (ERM) process? • yes • no Webinar Poll
  • 25. 25 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2017 Integrating Privacy into Enterprise Risk Management
  • 26. 26 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2017 v © TRUSTe Inc., 2017 Questions?
  • 27. 27 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2017 v © TRUSTe Inc., 2017 Marty Abrams mabrams@informationaccountability.org Hilary Wandall hilary@truste.com Contacts
  • 28. 28 vPrivacy Insight Series - truste.com/insightseries © TRUSTe Inc., 2017 v © TRUSTe Inc., 2017 Details and registration for our 2017 Summer/Fall Webinar Series will be published shortly. Register for our next live event – the Privacy Risk Summit on June 6th 2017 at https://www.truste.com/events/privacy-risk/ See http://www.truste.com/insightseries for the 2017 Privacy Insight Series and past webinar recordings. Thank You!