SlideShare a Scribd company logo
1 of 37
Download to read offline
Prep Your App
For
GDPR Compliance
Asanka Nissanka
VP Technology at ShoutOUT Labs
AWS Certified Solutions Architect
Disclaimer
● The suggestions/approaches/implementations in this presentation are
subject to change as the court hearings on related cases continues.
● The information on this presentation is totally my interpretation of the
GDPR and contain no legal advices whatsoever
Agenda
1. Who is affected
2. Terminology
3. Key Principles
4. Natural Person
5. Organization
6. Case Study
Who is affected ?
Applies to people and organisations handling EU citizens personal data
Does not apply to certain activities including processing covered by the Law
Enforcement Directive, processing for national security purposes and processing
carried out by individuals purely for personal/household activities
Terminology
Supervisory Authority
An agency in each member state that could bring cases before the courts, or specify enforcement or remedial action in the
event an organisation acts outside of GDPR
Data Controller
The person who is responsible for how data is processed by an organisation
Data Processor
A natural or legal person, public authority, agency or any other body which processes personal data on behalf of the
controller
ICO
Information Commissioner’s Office
Key Principles
Should lie at the heart of your approach to processing personal data
IMPORTANT: Failure to comply with the principles may leave you open to a fine of up to €20 million, or 4% of your total
worldwide annual turnover, whichever is higher
1. Lawfulness, fairness and transparency
2. Purpose limitation
3. Data minimisation
4. Accuracy
5. Storage limitation
6. Integrity and confidentiality (security)
7. Accountability
Lawfulness, fairness and transparency
● Identify valid grounds for collecting and using personal data
● Ensure not to do anything with data in breach of any other laws
● Use personal data in a reasonable way
● Be clear, open and honest on how you will use the personal data
Purpose limitation
● Be clear about purposes for processing data
● Record the purposes of processing as a part of the documentation
● Can only use for a new purpose if that is compatible with your original purpose.
Data minimisation
● Adequate - sufficient to properly fulfill the stated purpose
○ Share pseudonymised data with third party where necessary
● Relevant - has a rational link to the purpose
● Limited to what is necessary - don’t hold on to more than you need
Accuracy
● Ensure personal data is correct
● If incorrect data is discovered either update or erase
Storage limitation
● Must not keep personal data for longer than you need it
● Justify how long you keep personal data
● State retention period on the policies
● Periodically review to erase or anonymise data no longer needed
Integrity and confidentiality
● Provide appropriate measures and records to demonstrate the compliance
● Take responsibility for what you do with personal data
Natural Person
Legal bases for processing data
● Performance of a contract
● Legal obligation
● Performance of a task in the public interest
● Consent
● Legitimate interest
● Protect the vital interests of an individual
Natural Person
Legal bases for processing data
● Performance of a contract
● Legal obligation
● Performance of a task in the public interest
● Consent
● Legitimate interest
● Protect the vital interests of an individual
Consent
Collection
“Consent should be given by a clear affirmative act establishing a freely given, specific, informed
and unambiguous indication of the data subject’s agreement to the processing of personal data
relating to him or her.”
Withdrawal
A data subject must be able to withdraw consent as easily as they gave it
Consent - Implementation
Implementation
1. Banner in the web site to collect cookie consent
2. Using checkboxes (unchecked) during signup
3. Attach as a requirement to the main action
4. Using checkboxes in the user account (profile) page to update the notification/news
preferences
5. Include a link to unsubscribe in the emails
6. Double opt-in using a confirmation link sent via email
Rights of Natural Person
1. The right of access
2. The right to rectification
3. The right to erasure
4. The right to restrict processing
5. Rights concerning automated processing and profiling
6. The right to data portability
7. The right to object
8. The right to be informed
Right to 1. Access, 2. Rectification, 3. Erasure and 6. Data portability
Making the request
● Sending an email to the DPO
● Application features to view,update and export user data
○ User profile with edit, export and account delete option
Processing the requests
● Update related records from the databases and/or storages
● Delete related records from the databases and all the storages (including backups)
● Export user privacy data to a readable format (Download as csv files)
● Anonymise related data (Pseudomise doesn’t count) (Ex:- Replace privacy data with random data)
● Manually by recording in a task management tool (Ex:- Trello, Asana, JIRA etc) and involve a human to perform the
action
Right to 4. Restrict processing 5. Consern automated profiling 7. Object
Making the request
● Sending an email to the DPO
● Application feature to update the user preferences for processing
○ Using checkboxes in a profile page to update the preferences
Processing the request
● Keep a record to skip/avoid processing of data (If the type of your processing permits)
● Involve human insteads of the automated processes to profile
8. Right to be informed
On a data breach
● Report a Supervisory Authority and the Data Subject
● Report within 72 hours after the discovery of the incident
Notification must include
● Description of the personal data breach (kind of data, number of data subjects and records affected)
● Name and contact details of the Data Protection Officer
● Potential and likely consequences of the breach
● Measures to address the breach and measures to mitigate future incidents
Implementation
● Using a CRM tool to send an announcement to the users via email (Ex:- ShoutOUT, Intercom, Hubspot)
● Using Pub/Sub service (Ex:- AWS SNS, PubNub, One Signal, Firebase Cloud Messaging)
Organization
● Should be responsible for upholding, and being able to demonstrate compliance with the
principles
● Make awareness within the organization
● Have a clear understanding on where the data is collected and where it flows (Data Lifecycle)
● GDPR does not make specific law around cyber security, but it does require that data be
handled securely and gives some broad requirements on what that means
Accountability and Governance
● Contracts with data processors
○ Inform controller when adding new sub processors
● Documentation about processing activities
○ Privacy policy, Terms of Use
○ Internal technical documentations - Provide when supervisory authorities request
■ Wiki pages
● Data protection by design and default
○ Store passwords with strong encryption
● Data protection impact assessments (DPIA)
○ Use risk assessment tools
● Data protection officers (DPO)
○ Should be easily reachable
● Codes of conduct and certification
Data Protection by Design and Default
● Legal requirement
● Apply appropriate technical and organisational measures to implement the data protection
principles and safeguard individual rights
How to Practice
● Isolate infrastructure (Virtual Private Cloud)
● Encrypt data at transit (Use SSL)
● Encrypt data at rest
○ AWS S3 server side encryption
○ MongoDB encrypted storage engine
Data Protection by Design and Default Ctd.
● Automatically delete temporary data on intermediate storages
○ Expiration rules (AWS S3 object lifecycle rules)
● Use firewalls
○ Web application firewall (AWS WAF)
○ DDoS attack protection (AWS Shield)
● Connect distant resources using secure connections
○ Private links (VPN, VPC peering connections)
○ IP based access control
● Keep secrets away from code
○ Use key management service (AWS KMS)
Data Protection by Design and Default Ctd.
● Use two factor authentication
○ Secure your application users
○ Secure cloud service provider accounts with 2FA)
● Monitoring and logging
○ Avoid logging privacy data (Use user reference ids instead)
○ Centralize and archive logs (AWS cloud watch)
○ Asset management and configuration (AWS config)
○ Track API activity (AWS CloudTrail)
Data Protection Impact Assessments (DPIAs)
● Mandated under GDPR
● Process to support with identifying and minimising data protection risks of a project
● Consult ICO if you find a high risk
● Integrate measures that are identified into the project plan
How to Practice
● Carry out in major projects that involve use of personal data
● Use dedicated risk assessment tools or even excel
Data Protection Officer
● Assist to monitor internal compliance
● Act as a contact point for data subjects and the supervisory authority
● Advice on DPIAs
● Can be an existing employee or externally appointed
● Must be independent, an expert in data protection, adequately resourced, and report to the
highest management level
Implementation
Publish contact details of the DPO in the website (publicly accessible)
Ex:- dpo@mycompany.com
Codes of Conduct & Certification
Codes of Conduct
● Focusing on the exercising of the data subjects’ rights
● Details of information provided to the public and the data subjects
● Compliance with security requirements
● Notification of breaches
Certifications
● ISO 27001 - for technical measures
● ISO 27017 - for cloud security
● ISO 27018 - for cloud privacy
● SOC1, SOC 2 and SOC 3
● EU-US Privacy Shield
● PCI DSS
International Data Transfers
● The third country has an adequate level of protection for EU Citizens’ data when it leaves the
EU or EEA
● There must also be an independent supervisory authority operating in the third country to
protect data
● A controller or processor can still transfer data to a third country or international organisation
when the commission has not determined adequacy. This would only be the case if recipient
the has provided appropriate safeguards.
● If you are using cloud best option is to use a cloud provider who is GDPR compliant
ShoutOUT
Case Study
Role of ShoutOUT
Data Controller
Collect personal data directly from the end users
who sign up with the application
Data Processor
Process personal data which are collected by the
organizations
Application User Lifecycle - Before
Web Site
Application
Analytics
CRM & Support
Backend
Application
Servers
Database
Servers
Application User Lifecycle - After
Privacy policy
Receive news,updates
Agree with terms
Web Site
Application
Analytics
CRM & Support
Backend
Application
Servers
Database
Servers
Firewall
DPA
Cookie
Consent
DPO
Risk Assessment
Tools
Documents
(Agreements,
Contracts)
Important
● Privacy and Data Protection should be on top in your list
● Design the systems from the beginning to support data protection
● Respect the data which matters to a living being
● Make it a collaborative effort of all within the organization
GDPR is an opportunity
Thank You
www.asankan.info
Resources
GDPR Checklist - https://gdprchecklist.io
CTO Security Checklist - https://cto-security-checklist.sqreen.io/
ICO Guide - https://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation-gdpr/
Course - https://www.futurelearn.com/courses/gdpr

More Related Content

What's hot

GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...Harrison Clark Rickerbys
 
Gdpr action plan - ISSA
Gdpr action plan - ISSAGdpr action plan - ISSA
Gdpr action plan - ISSAUlf Mattsson
 
Gdpr overview ciso platform presentation
Gdpr overview ciso platform presentationGdpr overview ciso platform presentation
Gdpr overview ciso platform presentationPriyanka Aash
 
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127Frank Dawson
 
Building a register of data processing
Building a register of data processingBuilding a register of data processing
Building a register of data processingTim Gough
 
How to implement gdpr in your document repository
How to implement gdpr in your document repository How to implement gdpr in your document repository
How to implement gdpr in your document repository XeniT Solutions nv
 
GDPR: Your Journey to Compliance
GDPR: Your Journey to ComplianceGDPR: Your Journey to Compliance
GDPR: Your Journey to ComplianceCobweb
 
Beginning your General Data Protection Regulation (GDPR) Journey
Beginning your General Data Protection Regulation (GDPR) JourneyBeginning your General Data Protection Regulation (GDPR) Journey
Beginning your General Data Protection Regulation (GDPR) JourneyMicrosoft Österreich
 
Gdpr powerpoint 15.01.18
Gdpr powerpoint 15.01.18Gdpr powerpoint 15.01.18
Gdpr powerpoint 15.01.18Jon Rathbone
 
GDPR and ISO27001 mapping EL
GDPR and ISO27001 mapping ELGDPR and ISO27001 mapping EL
GDPR and ISO27001 mapping ELEugene Lee
 
Everything you Need to Know about The Data Protection Officer Role
Everything you Need to Know about The Data Protection Officer Role Everything you Need to Know about The Data Protection Officer Role
Everything you Need to Know about The Data Protection Officer Role HackerOne
 
GDPR for Non-European Region - Financial Services EL
GDPR for Non-European Region - Financial Services ELGDPR for Non-European Region - Financial Services EL
GDPR for Non-European Region - Financial Services ELEugene Lee
 
ABM Display Advertising Success in the World of GDPR [PPT]
ABM Display Advertising Success in the World of GDPR [PPT]ABM Display Advertising Success in the World of GDPR [PPT]
ABM Display Advertising Success in the World of GDPR [PPT]Kwanzoo Inc
 
Ensuring GDPR Compliance - A Zymplify Guide
Ensuring GDPR Compliance - A Zymplify GuideEnsuring GDPR Compliance - A Zymplify Guide
Ensuring GDPR Compliance - A Zymplify GuideZymplify
 
Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...
Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...
Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...Synopsys Software Integrity Group
 
Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion
 
Key Steps to Building an Effective Patient-centric Healthcare System
Key Steps to Building an Effective Patient-centric Healthcare SystemKey Steps to Building an Effective Patient-centric Healthcare System
Key Steps to Building an Effective Patient-centric Healthcare SystemWSO2
 

What's hot (20)

GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
 
EU GDPR (training)
EU GDPR (training)  EU GDPR (training)
EU GDPR (training)
 
Gdpr action plan - ISSA
Gdpr action plan - ISSAGdpr action plan - ISSA
Gdpr action plan - ISSA
 
Gdpr overview ciso platform presentation
Gdpr overview ciso platform presentationGdpr overview ciso platform presentation
Gdpr overview ciso platform presentation
 
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
 
Building a register of data processing
Building a register of data processingBuilding a register of data processing
Building a register of data processing
 
How to implement gdpr in your document repository
How to implement gdpr in your document repository How to implement gdpr in your document repository
How to implement gdpr in your document repository
 
GDPR: Your Journey to Compliance
GDPR: Your Journey to ComplianceGDPR: Your Journey to Compliance
GDPR: Your Journey to Compliance
 
Privacy 101
Privacy 101Privacy 101
Privacy 101
 
GDPR for your Payroll Bureau
GDPR for your Payroll BureauGDPR for your Payroll Bureau
GDPR for your Payroll Bureau
 
Beginning your General Data Protection Regulation (GDPR) Journey
Beginning your General Data Protection Regulation (GDPR) JourneyBeginning your General Data Protection Regulation (GDPR) Journey
Beginning your General Data Protection Regulation (GDPR) Journey
 
Gdpr powerpoint 15.01.18
Gdpr powerpoint 15.01.18Gdpr powerpoint 15.01.18
Gdpr powerpoint 15.01.18
 
GDPR and ISO27001 mapping EL
GDPR and ISO27001 mapping ELGDPR and ISO27001 mapping EL
GDPR and ISO27001 mapping EL
 
Everything you Need to Know about The Data Protection Officer Role
Everything you Need to Know about The Data Protection Officer Role Everything you Need to Know about The Data Protection Officer Role
Everything you Need to Know about The Data Protection Officer Role
 
GDPR for Non-European Region - Financial Services EL
GDPR for Non-European Region - Financial Services ELGDPR for Non-European Region - Financial Services EL
GDPR for Non-European Region - Financial Services EL
 
ABM Display Advertising Success in the World of GDPR [PPT]
ABM Display Advertising Success in the World of GDPR [PPT]ABM Display Advertising Success in the World of GDPR [PPT]
ABM Display Advertising Success in the World of GDPR [PPT]
 
Ensuring GDPR Compliance - A Zymplify Guide
Ensuring GDPR Compliance - A Zymplify GuideEnsuring GDPR Compliance - A Zymplify Guide
Ensuring GDPR Compliance - A Zymplify Guide
 
Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...
Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...
Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...
 
Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event
 
Key Steps to Building an Effective Patient-centric Healthcare System
Key Steps to Building an Effective Patient-centric Healthcare SystemKey Steps to Building an Effective Patient-centric Healthcare System
Key Steps to Building an Effective Patient-centric Healthcare System
 

Similar to Prep your app for gdpr compliance

Privacy by design for peerlyst meetup
Privacy by design for peerlyst meetupPrivacy by design for peerlyst meetup
Privacy by design for peerlyst meetupIshay Tentser
 
Introduction to EU General Data Protection Regulation: Planning, Implementat...
 Introduction to EU General Data Protection Regulation: Planning, Implementat... Introduction to EU General Data Protection Regulation: Planning, Implementat...
Introduction to EU General Data Protection Regulation: Planning, Implementat...Financial Poise
 
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...Burton Lee
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection RegulationGrittyCC
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by QualsysQualsys Ltd
 
A Brief Overview on GDPR
A Brief Overview on GDPRA Brief Overview on GDPR
A Brief Overview on GDPRNeha Patel
 
Members evening - data protection
Members evening - data protectionMembers evening - data protection
Members evening - data protectionMRS
 
Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Financial Poise
 
Impact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A SecurityImpact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A SecurityEQS Group
 
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital MarketersOne North
 
Nymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesTrustArc
 
Creating a GDPR Action Plan; Not a Freakout Plan
Creating a GDPR Action Plan; Not a Freakout PlanCreating a GDPR Action Plan; Not a Freakout Plan
Creating a GDPR Action Plan; Not a Freakout PlanMediacurrent
 
GDPR Is Around the Corner - Don't Panic
GDPR Is Around the Corner - Don't PanicGDPR Is Around the Corner - Don't Panic
GDPR Is Around the Corner - Don't PaniceZ Systems
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers Gary Dodson
 

Similar to Prep your app for gdpr compliance (20)

What does GDPR mean for your business?
What does GDPR mean for your business?What does GDPR mean for your business?
What does GDPR mean for your business?
 
GDPR for your Payroll Bureau
GDPR for your Payroll BureauGDPR for your Payroll Bureau
GDPR for your Payroll Bureau
 
Living with gdpr
Living with gdprLiving with gdpr
Living with gdpr
 
Gdpr presentation
Gdpr presentationGdpr presentation
Gdpr presentation
 
Privacy by design for peerlyst meetup
Privacy by design for peerlyst meetupPrivacy by design for peerlyst meetup
Privacy by design for peerlyst meetup
 
Introduction to EU General Data Protection Regulation: Planning, Implementat...
 Introduction to EU General Data Protection Regulation: Planning, Implementat... Introduction to EU General Data Protection Regulation: Planning, Implementat...
Introduction to EU General Data Protection Regulation: Planning, Implementat...
 
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection Regulation
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by Qualsys
 
A Brief Overview on GDPR
A Brief Overview on GDPRA Brief Overview on GDPR
A Brief Overview on GDPR
 
Gdpr brief and controls ver2.0
Gdpr brief and controls ver2.0Gdpr brief and controls ver2.0
Gdpr brief and controls ver2.0
 
Members evening - data protection
Members evening - data protectionMembers evening - data protection
Members evening - data protection
 
Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...
 
Impact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A SecurityImpact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A Security
 
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
 
Nymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 States
 
Things to know about GDPR in 2018
Things to know about GDPR in 2018Things to know about GDPR in 2018
Things to know about GDPR in 2018
 
Creating a GDPR Action Plan; Not a Freakout Plan
Creating a GDPR Action Plan; Not a Freakout PlanCreating a GDPR Action Plan; Not a Freakout Plan
Creating a GDPR Action Plan; Not a Freakout Plan
 
GDPR Is Around the Corner - Don't Panic
GDPR Is Around the Corner - Don't PanicGDPR Is Around the Corner - Don't Panic
GDPR Is Around the Corner - Don't Panic
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
 

Recently uploaded

React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Matt Ray
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 

Recently uploaded (20)

React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 

Prep your app for gdpr compliance

  • 1. Prep Your App For GDPR Compliance Asanka Nissanka VP Technology at ShoutOUT Labs AWS Certified Solutions Architect
  • 2. Disclaimer ● The suggestions/approaches/implementations in this presentation are subject to change as the court hearings on related cases continues. ● The information on this presentation is totally my interpretation of the GDPR and contain no legal advices whatsoever
  • 3. Agenda 1. Who is affected 2. Terminology 3. Key Principles 4. Natural Person 5. Organization 6. Case Study
  • 4. Who is affected ? Applies to people and organisations handling EU citizens personal data Does not apply to certain activities including processing covered by the Law Enforcement Directive, processing for national security purposes and processing carried out by individuals purely for personal/household activities
  • 5. Terminology Supervisory Authority An agency in each member state that could bring cases before the courts, or specify enforcement or remedial action in the event an organisation acts outside of GDPR Data Controller The person who is responsible for how data is processed by an organisation Data Processor A natural or legal person, public authority, agency or any other body which processes personal data on behalf of the controller ICO Information Commissioner’s Office
  • 6. Key Principles Should lie at the heart of your approach to processing personal data IMPORTANT: Failure to comply with the principles may leave you open to a fine of up to €20 million, or 4% of your total worldwide annual turnover, whichever is higher 1. Lawfulness, fairness and transparency 2. Purpose limitation 3. Data minimisation 4. Accuracy 5. Storage limitation 6. Integrity and confidentiality (security) 7. Accountability
  • 7. Lawfulness, fairness and transparency ● Identify valid grounds for collecting and using personal data ● Ensure not to do anything with data in breach of any other laws ● Use personal data in a reasonable way ● Be clear, open and honest on how you will use the personal data
  • 8. Purpose limitation ● Be clear about purposes for processing data ● Record the purposes of processing as a part of the documentation ● Can only use for a new purpose if that is compatible with your original purpose.
  • 9. Data minimisation ● Adequate - sufficient to properly fulfill the stated purpose ○ Share pseudonymised data with third party where necessary ● Relevant - has a rational link to the purpose ● Limited to what is necessary - don’t hold on to more than you need
  • 10. Accuracy ● Ensure personal data is correct ● If incorrect data is discovered either update or erase
  • 11. Storage limitation ● Must not keep personal data for longer than you need it ● Justify how long you keep personal data ● State retention period on the policies ● Periodically review to erase or anonymise data no longer needed
  • 12. Integrity and confidentiality ● Provide appropriate measures and records to demonstrate the compliance ● Take responsibility for what you do with personal data
  • 13. Natural Person Legal bases for processing data ● Performance of a contract ● Legal obligation ● Performance of a task in the public interest ● Consent ● Legitimate interest ● Protect the vital interests of an individual
  • 14. Natural Person Legal bases for processing data ● Performance of a contract ● Legal obligation ● Performance of a task in the public interest ● Consent ● Legitimate interest ● Protect the vital interests of an individual
  • 15. Consent Collection “Consent should be given by a clear affirmative act establishing a freely given, specific, informed and unambiguous indication of the data subject’s agreement to the processing of personal data relating to him or her.” Withdrawal A data subject must be able to withdraw consent as easily as they gave it
  • 16. Consent - Implementation Implementation 1. Banner in the web site to collect cookie consent 2. Using checkboxes (unchecked) during signup 3. Attach as a requirement to the main action 4. Using checkboxes in the user account (profile) page to update the notification/news preferences 5. Include a link to unsubscribe in the emails 6. Double opt-in using a confirmation link sent via email
  • 17. Rights of Natural Person 1. The right of access 2. The right to rectification 3. The right to erasure 4. The right to restrict processing 5. Rights concerning automated processing and profiling 6. The right to data portability 7. The right to object 8. The right to be informed
  • 18. Right to 1. Access, 2. Rectification, 3. Erasure and 6. Data portability Making the request ● Sending an email to the DPO ● Application features to view,update and export user data ○ User profile with edit, export and account delete option Processing the requests ● Update related records from the databases and/or storages ● Delete related records from the databases and all the storages (including backups) ● Export user privacy data to a readable format (Download as csv files) ● Anonymise related data (Pseudomise doesn’t count) (Ex:- Replace privacy data with random data) ● Manually by recording in a task management tool (Ex:- Trello, Asana, JIRA etc) and involve a human to perform the action
  • 19. Right to 4. Restrict processing 5. Consern automated profiling 7. Object Making the request ● Sending an email to the DPO ● Application feature to update the user preferences for processing ○ Using checkboxes in a profile page to update the preferences Processing the request ● Keep a record to skip/avoid processing of data (If the type of your processing permits) ● Involve human insteads of the automated processes to profile
  • 20. 8. Right to be informed On a data breach ● Report a Supervisory Authority and the Data Subject ● Report within 72 hours after the discovery of the incident Notification must include ● Description of the personal data breach (kind of data, number of data subjects and records affected) ● Name and contact details of the Data Protection Officer ● Potential and likely consequences of the breach ● Measures to address the breach and measures to mitigate future incidents Implementation ● Using a CRM tool to send an announcement to the users via email (Ex:- ShoutOUT, Intercom, Hubspot) ● Using Pub/Sub service (Ex:- AWS SNS, PubNub, One Signal, Firebase Cloud Messaging)
  • 21. Organization ● Should be responsible for upholding, and being able to demonstrate compliance with the principles ● Make awareness within the organization ● Have a clear understanding on where the data is collected and where it flows (Data Lifecycle) ● GDPR does not make specific law around cyber security, but it does require that data be handled securely and gives some broad requirements on what that means
  • 22. Accountability and Governance ● Contracts with data processors ○ Inform controller when adding new sub processors ● Documentation about processing activities ○ Privacy policy, Terms of Use ○ Internal technical documentations - Provide when supervisory authorities request ■ Wiki pages ● Data protection by design and default ○ Store passwords with strong encryption ● Data protection impact assessments (DPIA) ○ Use risk assessment tools ● Data protection officers (DPO) ○ Should be easily reachable ● Codes of conduct and certification
  • 23. Data Protection by Design and Default ● Legal requirement ● Apply appropriate technical and organisational measures to implement the data protection principles and safeguard individual rights How to Practice ● Isolate infrastructure (Virtual Private Cloud) ● Encrypt data at transit (Use SSL) ● Encrypt data at rest ○ AWS S3 server side encryption ○ MongoDB encrypted storage engine
  • 24. Data Protection by Design and Default Ctd. ● Automatically delete temporary data on intermediate storages ○ Expiration rules (AWS S3 object lifecycle rules) ● Use firewalls ○ Web application firewall (AWS WAF) ○ DDoS attack protection (AWS Shield) ● Connect distant resources using secure connections ○ Private links (VPN, VPC peering connections) ○ IP based access control ● Keep secrets away from code ○ Use key management service (AWS KMS)
  • 25. Data Protection by Design and Default Ctd. ● Use two factor authentication ○ Secure your application users ○ Secure cloud service provider accounts with 2FA) ● Monitoring and logging ○ Avoid logging privacy data (Use user reference ids instead) ○ Centralize and archive logs (AWS cloud watch) ○ Asset management and configuration (AWS config) ○ Track API activity (AWS CloudTrail)
  • 26. Data Protection Impact Assessments (DPIAs) ● Mandated under GDPR ● Process to support with identifying and minimising data protection risks of a project ● Consult ICO if you find a high risk ● Integrate measures that are identified into the project plan How to Practice ● Carry out in major projects that involve use of personal data ● Use dedicated risk assessment tools or even excel
  • 27. Data Protection Officer ● Assist to monitor internal compliance ● Act as a contact point for data subjects and the supervisory authority ● Advice on DPIAs ● Can be an existing employee or externally appointed ● Must be independent, an expert in data protection, adequately resourced, and report to the highest management level Implementation Publish contact details of the DPO in the website (publicly accessible) Ex:- dpo@mycompany.com
  • 28. Codes of Conduct & Certification Codes of Conduct ● Focusing on the exercising of the data subjects’ rights ● Details of information provided to the public and the data subjects ● Compliance with security requirements ● Notification of breaches Certifications ● ISO 27001 - for technical measures ● ISO 27017 - for cloud security ● ISO 27018 - for cloud privacy ● SOC1, SOC 2 and SOC 3 ● EU-US Privacy Shield ● PCI DSS
  • 29. International Data Transfers ● The third country has an adequate level of protection for EU Citizens’ data when it leaves the EU or EEA ● There must also be an independent supervisory authority operating in the third country to protect data ● A controller or processor can still transfer data to a third country or international organisation when the commission has not determined adequacy. This would only be the case if recipient the has provided appropriate safeguards. ● If you are using cloud best option is to use a cloud provider who is GDPR compliant
  • 31. Role of ShoutOUT Data Controller Collect personal data directly from the end users who sign up with the application Data Processor Process personal data which are collected by the organizations
  • 32. Application User Lifecycle - Before Web Site Application Analytics CRM & Support Backend Application Servers Database Servers
  • 33. Application User Lifecycle - After Privacy policy Receive news,updates Agree with terms Web Site Application Analytics CRM & Support Backend Application Servers Database Servers Firewall DPA Cookie Consent DPO Risk Assessment Tools Documents (Agreements, Contracts)
  • 34. Important ● Privacy and Data Protection should be on top in your list ● Design the systems from the beginning to support data protection ● Respect the data which matters to a living being ● Make it a collaborative effort of all within the organization
  • 35. GDPR is an opportunity
  • 37. Resources GDPR Checklist - https://gdprchecklist.io CTO Security Checklist - https://cto-security-checklist.sqreen.io/ ICO Guide - https://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation-gdpr/ Course - https://www.futurelearn.com/courses/gdpr