SlideShare a Scribd company logo
1 of 22
Take the necessary steps to
comply with GDPR
Page 2 – © Keley - Confidentiel –
GDPR
(RGPD - French)
officially starting May 25, 2018
Page 3 – © Keley - Confidentiel –
Page 4 – © Keley - Confidentiel –
Page 5 – © Keley - Confidentiel –
M. C
Page 6 – © Keley - Confidentiel –
Communication
/ Promotion
@
SMS
Courier
Call
Data treatment Data usage
Quality
Enrichment
Predictive
Targeting
Structure
Tools and
applications
Data
Collection
Personalized
actions
Optimization
CRM
CDP
DMP
ERP
Advertising
/ Content
Web
Display
SEM
Page 7 – © Keley - Confidentiel –
« A fantastic opportunity to finally devote
resources to organize and structure our data »
« This will also impact economic
models and marketing strategies »
« Long-term project, to deploy
and maintain over time »
« A lack of awareness in terms
of operational management. »
« New measures and
actions to undertake »
« Many difficulties
ahead »
« Needs a dedicated project team
and availability of partners »
Page 8 – © Keley - Confidentiel –
...and now?
Pragmatic and efficient action:
> 360∞ data vision:
> Mapping of personal data
> Resumption of expected benefits
> Breakdown in contexts of Privacy Impact Analysis ( PIA )
> Evaluating risks and measures by context:
> Definition of Defendable Minimum
> Evaluation of Stakes and Accessibility
=> Prioritization of actions
> Setting up tools to accelerate and sustain the plan
… with a goal of constant improvement
Page 9 – © Keley - Confidentiel –
Page 10 – © Keley - Confidentiel –
10
Job
Vision
Usage
Vision
SI
Vision
Quality
Vision
Different focus for a 360∞ vision
Definition of existing data for each job:
what does a client mean for
marketing, for purchase
Gathering usages of data,
frequency and respective
contributions?
Description of data trajectories in
various SI environments
Listing established rules
impacting data and its
respect
360 °
Page 11 – © Keley - Confidentiel –
...while focusing on expected benefits
> GDPR compliance creates a fantastic opportunity for companies in terms of:
Image
Install or restore third party confidence in the company when
dealing with personal data
Law Prepare the "digital responsibility" of the company
IT Secure and enhance treatment and storage of data
Job Increase valorization and monitoring of data
HR
Give responsibility to actors in the company in terms of
personal data
Page 12 – © Keley - Confidentiel –
Page 13 – © Keley - Confidentiel –
Context qualification
> A study context comprises one or several treatments on a data source with a
determined purpose
Description générale d'un Contexte
Informations générales
Etude d'impact
Date de l'analyse ex: 01/10/2017 Analyste Prénom Nom Fonctiondel'analyste ex : Data manager
Informations générales sur le contexte
Typede projet ex : Nettoyage des adresses postales Finalité/ Objectif ex: communication parcourrier Typede traitement ex : Normalisationpostale
Personnes concernées ex : clients Nombred'individu(estimation) ex : 2 000 000 Nombred'informationpar individu ex: 10
Base / Application concernée ex: Base de porteurde carte de fidélitéResponsabledetraitement ex : Prestataire externe Responsableopérationnel ex : Responsable interne
Contributeurs projet
Chef de projet ex: directeur des opérations Expert données personnelles ex : directeur juridique Expert sécurité ex : RSSI, directeur technique
Expert technique/ étude ex : data manager Responsableexploitation ex : data manager Autres à renseigner
Description des données traitées (cf procédure de gestion de la traçabilité)
Liste des données Source des données Base concernée Destination des données
Type de données
(cf onglet 05)
Périmètre géographique du
traitement (Pays)
ex : nom ex : Saisie Magasin ex : Magasin ex : CRM ex : données d'identification ex : France
Collecte des données et transparence de l'information (cf procédure de gestion de la traçabilité)
Liste des données Type de collecte Méthode de collecte
Méthode d'information des
personnes
Responsable de la gestion des
droits d'accès/rectification
Autre
Civilité ex : directe, indirecte ex : liste déroulante, champs libre ex : Conditionsgénérales de la carte ex : Fonction +Nom
Règles de conservation & purge des données
Liste des données Durée de conservation Règles de purge Règles d'archivage
Règles de sécurisation de la
destruction
Resonsable du processus de
purge
Adresse postale ex : 3 ans
ex : mensuellement en semi-
automatique
ex : 5 ans sur serveur chiffré ex : broyage sécurisé ex : Fonction +Nom
Sécurité (cf procédure traçabilité, procédure habilitations, plan de contrôle)
Liste des applicatifs / systèmes /
bases
Politique de mots de passe Gestion des logs
Chiffrement des données /
transferts
Profils d'habilitations Responsable des habilitations
Dépôt du fichier ex : oui ex : trace des interventions ex : oui, type de chiffrement ex : Data Manager ex : Fonction +Nom
Test de l'application
Remarques et informations additionnelles
• Which treatment for which purpose?
What?
• Who plays a part, who is
responsible?
Who?
• Which source and which collection
mode?
Wich Data?
• … of conservation and purge?
Which Rules?
• … tracking and accreditation?
Which Security?
• … tests and verifications?
Which Controls?
Page 14 – © Keley - Confidentiel –
Pre-Diagnosis or Self Assessment
> A first analysis should reveal the main contexts with high risk while
relying on simplified criteria
1 . Personal Information Sensitivity
• Common
• Perceived as sensitive
• Sensitive in terms of law
2 . Purpose / Minimization
• Conservation time
• Archiving time
• Anonymization mode
• Encryption choice
3 . Organization / Process
• Managing accreditations
• Managing risks
• Managing incidents
• Managing projets
4 . Consent / Portability
• Information on the
concerned party
• Access to its data
• Possibility to oppose, rectify
and restore
5 . Quality / Sécurity
• Preserve data cohérence • Logical security
• Physical security
Sensibilité
Finalité
Organisation
/ Process
Consenteme
nt /
Portabilité
Sécurité
Minimum Défendable
Evaluation on each axis
from 1 (perfect) to 4 (bad)
Page 15 – © Keley - Confidentiel –
> Identified risks should be placed on a grid according to:
> their gravity
> their likelihood
> This should evaluate the stakes of the measure associated with risk reduction
maximum
important
limited
marginal
marginal limited important maximum
Mapping the risks
Likelihood
Gravity
Stakes - -
Stakes -
Stakes +
M1
M2
M3
Stakes + +
R
3
R
2
R
1
Page 16 – © Keley - Confidentiel –
Association of measures with identified risks
Evaluation of these measures is done
on 3 axis:
> on each axis, a grade from 1 to 5
Accessibility is defined by using
these 3 grades
Difficulty Cost Time
M1 3 2 3 -
M2 2 1 2 +
M3 2 2 4 -
R1 : Malevolent injection of false data via
a web form
M1 : Install a site for managing consent and
portability of data
R2 : Inadvertent deletion of data M2 : Applying rules for conservation,
archiving and purge
R3 : Theft of personal information for
redistribution or exploiting by a third
party
M3 : Revision of contracts with one or
several providers
Page 17 – © Keley - Confidentiel –
Prioritization of measures
Accessibility
Stakes
++
- -
- - ++
Very high priority
High priority
Moderate
priority
Low priority
M1
M2
M3
> Measures to take are prioritized depending on:
> Their stakes
> Their Accessibility
Page 18 – © Keley - Confidentiel –
Watch out for All Excel!
Page 19 – © Keley - Confidentiel –
Choosing a tool: main functionalities
> Tools do not share all the functionalities that can be grouped in 4 families:
Functions connected
to GDPR
• Data treatment
register
• PIA plan
• Managing contracts
• Managing rights and
accreditations
• Tracking security
issues
• Integration in internal
systems
Project tracking
functions
• Task tracking
• Reporting and
control panel
• Employee
education
• Sharing user
experience
• Comparison inside
a company or
between
companies
Functions dedicated
to individuals
• Managing legal
notices
• Managing individual
demands
• Monitoring sites and
applications
• Managing portability
• Dedicated web site
for visitors
relationship
management
Technical / data
functions
• Anonymization of
data
• Secured data
analysis
• Monitoring data
misusage
Page 20 – © Keley - Confidentiel –
APM
ActeCil
DPMS-
PrivaCil
TrustArc OneTrust Ensighten Privitar
GDPR 4 4 4 4 1 3
Project tracking 4 3 3 3 0 0
Dedicated to individuals 0 3 3 3 4 0
Technical / data 0 0 0 0 0 4
Ease of use 3 3 4 4 3 1
References 4 4 3 3 1 1
FR FR US US US UK
from free to several thousand euros per month
Choosing a tool: selected tools
There are more specialized tools like TrackUp...or Didomi
Page 21 – © Keley - Confidentiel –
Taking action with Keley - Data
Unlaunched project Ongoing project
 Quick evaluation of the task size
based on:
• Number of entities/services concerned
• Number of systems and databases
• Number of context (data/treatment)
• Number of measures to uphold and track
=> Commando style launch of the
project for strong mobilisation and
maximum efficiency
 Flash diagnosis of your GDPR
approach
=> Faster implementation at
different levels:
• 360∞ Data Vision
• Minimum Defendable
• Prioritization of actions
• Choice of tool
They trust us: Orange, Renault, La Poste, Reed Expo...and you?
Contact
information
5 rue Sixtus, 75015 Paris
Métro : Dupleix ou Bir Hakeim
Phone : + 33 1 80 48 26 20
Adress : 28 rue du Docteur Finlay,
75015 Paris
Métro: Dupleix or Bir Hakeim
Phone: +33 1 80 48 26 25
haraki@keley-data.com

More Related Content

What's hot

Opteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix LLC
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarEryk Budi Pratama
 
GDPR Scotland 2017
GDPR Scotland 2017GDPR Scotland 2017
GDPR Scotland 2017Ray Bugg
 
The 4 Challenges of Managing Privacy Incident Response
The 4 Challenges of Managing Privacy Incident ResponseThe 4 Challenges of Managing Privacy Incident Response
The 4 Challenges of Managing Privacy Incident ResponseElizabeth Dimit
 
The Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDThe Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDEryk Budi Pratama
 
Common Practice in Data Privacy Program Management
Common Practice in Data Privacy Program ManagementCommon Practice in Data Privacy Program Management
Common Practice in Data Privacy Program ManagementEryk Budi Pratama
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving servicesCloudMask inc.
 
10 Practical Tips to Prepare for the New Privacy Shield Era
10 Practical Tips to Prepare for the New Privacy Shield Era10 Practical Tips to Prepare for the New Privacy Shield Era
10 Practical Tips to Prepare for the New Privacy Shield EraPaul Hastings
 
BigID IAPP webinar on data-driven enterprise privacy management
BigID IAPP webinar on data-driven enterprise privacy managementBigID IAPP webinar on data-driven enterprise privacy management
BigID IAPP webinar on data-driven enterprise privacy managementBigID Inc
 
Cyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - ErykCyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - ErykEryk Budi Pratama
 
When does a company need to be PCI compliant
When does a company need to be PCI compliantWhen does a company need to be PCI compliant
When does a company need to be PCI compliantDivya Kothari
 
GDPR ASAP: A Seven-Step Guide to Prepare for the General Data Protection Regu...
GDPR ASAP: A Seven-Step Guide to Prepare for the General Data Protection Regu...GDPR ASAP: A Seven-Step Guide to Prepare for the General Data Protection Regu...
GDPR ASAP: A Seven-Step Guide to Prepare for the General Data Protection Regu...ObservePoint
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Erik Ginalick
 
Best Practices for Managing Individual Rights under the GDPR [Webinar Slides]
Best Practices for Managing Individual Rights under the GDPR [Webinar Slides]Best Practices for Managing Individual Rights under the GDPR [Webinar Slides]
Best Practices for Managing Individual Rights under the GDPR [Webinar Slides]TrustArc
 
Guardians of Trust: Building Trust in Data & Analytics
Guardians of Trust: Building Trust in Data & AnalyticsGuardians of Trust: Building Trust in Data & Analytics
Guardians of Trust: Building Trust in Data & AnalyticsEryk Budi Pratama
 
Cashing in on the public cloud with total confidence
Cashing in on the public cloud with total confidenceCashing in on the public cloud with total confidence
Cashing in on the public cloud with total confidenceCloudMask inc.
 
The Data Value Map for GDPR - May 2018 - GDPR summit Dublin
The Data Value Map for GDPR - May 2018 - GDPR summit DublinThe Data Value Map for GDPR - May 2018 - GDPR summit Dublin
The Data Value Map for GDPR - May 2018 - GDPR summit DublinKen O'Connor
 

What's hot (20)

Materializing dataprivacy in sap .. how?
Materializing dataprivacy in sap .. how?Materializing dataprivacy in sap .. how?
Materializing dataprivacy in sap .. how?
 
Opteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdf
 
GDPR: Time to Act
GDPR: Time to ActGDPR: Time to Act
GDPR: Time to Act
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI Webinar
 
GDPR Scotland 2017
GDPR Scotland 2017GDPR Scotland 2017
GDPR Scotland 2017
 
The 4 Challenges of Managing Privacy Incident Response
The 4 Challenges of Managing Privacy Incident ResponseThe 4 Challenges of Managing Privacy Incident Response
The 4 Challenges of Managing Privacy Incident Response
 
The Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDThe Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA ID
 
GDPR for Marketers - teaser
GDPR for Marketers - teaserGDPR for Marketers - teaser
GDPR for Marketers - teaser
 
Common Practice in Data Privacy Program Management
Common Practice in Data Privacy Program ManagementCommon Practice in Data Privacy Program Management
Common Practice in Data Privacy Program Management
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving services
 
10 Practical Tips to Prepare for the New Privacy Shield Era
10 Practical Tips to Prepare for the New Privacy Shield Era10 Practical Tips to Prepare for the New Privacy Shield Era
10 Practical Tips to Prepare for the New Privacy Shield Era
 
BigID IAPP webinar on data-driven enterprise privacy management
BigID IAPP webinar on data-driven enterprise privacy managementBigID IAPP webinar on data-driven enterprise privacy management
BigID IAPP webinar on data-driven enterprise privacy management
 
Cyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - ErykCyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - Eryk
 
When does a company need to be PCI compliant
When does a company need to be PCI compliantWhen does a company need to be PCI compliant
When does a company need to be PCI compliant
 
GDPR ASAP: A Seven-Step Guide to Prepare for the General Data Protection Regu...
GDPR ASAP: A Seven-Step Guide to Prepare for the General Data Protection Regu...GDPR ASAP: A Seven-Step Guide to Prepare for the General Data Protection Regu...
GDPR ASAP: A Seven-Step Guide to Prepare for the General Data Protection Regu...
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991
 
Best Practices for Managing Individual Rights under the GDPR [Webinar Slides]
Best Practices for Managing Individual Rights under the GDPR [Webinar Slides]Best Practices for Managing Individual Rights under the GDPR [Webinar Slides]
Best Practices for Managing Individual Rights under the GDPR [Webinar Slides]
 
Guardians of Trust: Building Trust in Data & Analytics
Guardians of Trust: Building Trust in Data & AnalyticsGuardians of Trust: Building Trust in Data & Analytics
Guardians of Trust: Building Trust in Data & Analytics
 
Cashing in on the public cloud with total confidence
Cashing in on the public cloud with total confidenceCashing in on the public cloud with total confidence
Cashing in on the public cloud with total confidence
 
The Data Value Map for GDPR - May 2018 - GDPR summit Dublin
The Data Value Map for GDPR - May 2018 - GDPR summit DublinThe Data Value Map for GDPR - May 2018 - GDPR summit Dublin
The Data Value Map for GDPR - May 2018 - GDPR summit Dublin
 

Similar to GDPR offer by Keley-Data

5 Signs Your Privacy Management Program is Not Working for You
5 Signs Your Privacy Management Program is Not Working for You5 Signs Your Privacy Management Program is Not Working for You
5 Signs Your Privacy Management Program is Not Working for YouTrustArc
 
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...David Kearney
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerCapgemini
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Qualsys Ltd
 
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for complianceGDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for complianceCloudera, Inc.
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?IBM Security
 
Optimizing Regulatory Compliance with Big Data
Optimizing Regulatory Compliance with Big DataOptimizing Regulatory Compliance with Big Data
Optimizing Regulatory Compliance with Big DataCloudera, Inc.
 
Customer Insights Prozess
Customer Insights ProzessCustomer Insights Prozess
Customer Insights ProzessCapgemini
 
ISMS End-User Training Presentation.pptx
ISMS End-User Training Presentation.pptxISMS End-User Training Presentation.pptx
ISMS End-User Training Presentation.pptxcomstarndt
 
Analytics in Action - Data Protection
Analytics in Action - Data ProtectionAnalytics in Action - Data Protection
Analytics in Action - Data ProtectionLee Schlenker
 
2015-0318 GAC Presentation - BCR - 05052015
2015-0318 GAC Presentation - BCR - 050520152015-0318 GAC Presentation - BCR - 05052015
2015-0318 GAC Presentation - BCR - 05052015Jan Dhont
 
Information Governance: Reducing Costs and Increasing Customer Satisfaction
Information Governance: Reducing Costs and Increasing Customer SatisfactionInformation Governance: Reducing Costs and Increasing Customer Satisfaction
Information Governance: Reducing Costs and Increasing Customer SatisfactionCapgemini
 
Continous Audit and Controls with Brainwave GRC
Continous Audit and Controls with Brainwave GRCContinous Audit and Controls with Brainwave GRC
Continous Audit and Controls with Brainwave GRCGraeme Hein
 
Maclear’s IT GRC Tools – Key Issues and Trends
Maclear’s  IT GRC Tools – Key Issues and TrendsMaclear’s  IT GRC Tools – Key Issues and Trends
Maclear’s IT GRC Tools – Key Issues and TrendsMaclear LLC
 
Information Risk Management Overview
Information Risk Management OverviewInformation Risk Management Overview
Information Risk Management Overviewelvinchan
 

Similar to GDPR offer by Keley-Data (20)

5 Signs Your Privacy Management Program is Not Working for You
5 Signs Your Privacy Management Program is Not Working for You5 Signs Your Privacy Management Program is Not Working for You
5 Signs Your Privacy Management Program is Not Working for You
 
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offer
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
 
Internal Audit
Internal AuditInternal Audit
Internal Audit
 
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for complianceGDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
 
Data Governance
Data GovernanceData Governance
Data Governance
 
Asset Management: Climbing the Asset Maturity Curve
Asset Management: Climbing the Asset Maturity CurveAsset Management: Climbing the Asset Maturity Curve
Asset Management: Climbing the Asset Maturity Curve
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?
 
Optimizing Regulatory Compliance with Big Data
Optimizing Regulatory Compliance with Big DataOptimizing Regulatory Compliance with Big Data
Optimizing Regulatory Compliance with Big Data
 
Customer Insights Prozess
Customer Insights ProzessCustomer Insights Prozess
Customer Insights Prozess
 
ISMS End-User Training Presentation.pptx
ISMS End-User Training Presentation.pptxISMS End-User Training Presentation.pptx
ISMS End-User Training Presentation.pptx
 
Analytics in Action - Data Protection
Analytics in Action - Data ProtectionAnalytics in Action - Data Protection
Analytics in Action - Data Protection
 
2015-0318 GAC Presentation - BCR - 05052015
2015-0318 GAC Presentation - BCR - 050520152015-0318 GAC Presentation - BCR - 05052015
2015-0318 GAC Presentation - BCR - 05052015
 
Information Governance: Reducing Costs and Increasing Customer Satisfaction
Information Governance: Reducing Costs and Increasing Customer SatisfactionInformation Governance: Reducing Costs and Increasing Customer Satisfaction
Information Governance: Reducing Costs and Increasing Customer Satisfaction
 
EDI 2009 Controlling E-Discovery Costs through Records Management
EDI 2009 Controlling E-Discovery Costs through Records ManagementEDI 2009 Controlling E-Discovery Costs through Records Management
EDI 2009 Controlling E-Discovery Costs through Records Management
 
California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)
 
Continous Audit and Controls with Brainwave GRC
Continous Audit and Controls with Brainwave GRCContinous Audit and Controls with Brainwave GRC
Continous Audit and Controls with Brainwave GRC
 
Maclear’s IT GRC Tools – Key Issues and Trends
Maclear’s  IT GRC Tools – Key Issues and TrendsMaclear’s  IT GRC Tools – Key Issues and Trends
Maclear’s IT GRC Tools – Key Issues and Trends
 
Information Risk Management Overview
Information Risk Management OverviewInformation Risk Management Overview
Information Risk Management Overview
 

Recently uploaded

Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 

Recently uploaded (20)

Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 

GDPR offer by Keley-Data

  • 1. Take the necessary steps to comply with GDPR
  • 2. Page 2 – © Keley - Confidentiel – GDPR (RGPD - French) officially starting May 25, 2018
  • 3. Page 3 – © Keley - Confidentiel –
  • 4. Page 4 – © Keley - Confidentiel –
  • 5. Page 5 – © Keley - Confidentiel – M. C
  • 6. Page 6 – © Keley - Confidentiel – Communication / Promotion @ SMS Courier Call Data treatment Data usage Quality Enrichment Predictive Targeting Structure Tools and applications Data Collection Personalized actions Optimization CRM CDP DMP ERP Advertising / Content Web Display SEM
  • 7. Page 7 – © Keley - Confidentiel – « A fantastic opportunity to finally devote resources to organize and structure our data » « This will also impact economic models and marketing strategies » « Long-term project, to deploy and maintain over time » « A lack of awareness in terms of operational management. » « New measures and actions to undertake » « Many difficulties ahead » « Needs a dedicated project team and availability of partners »
  • 8. Page 8 – © Keley - Confidentiel – ...and now? Pragmatic and efficient action: > 360∞ data vision: > Mapping of personal data > Resumption of expected benefits > Breakdown in contexts of Privacy Impact Analysis ( PIA ) > Evaluating risks and measures by context: > Definition of Defendable Minimum > Evaluation of Stakes and Accessibility => Prioritization of actions > Setting up tools to accelerate and sustain the plan … with a goal of constant improvement
  • 9. Page 9 – © Keley - Confidentiel –
  • 10. Page 10 – © Keley - Confidentiel – 10 Job Vision Usage Vision SI Vision Quality Vision Different focus for a 360∞ vision Definition of existing data for each job: what does a client mean for marketing, for purchase Gathering usages of data, frequency and respective contributions? Description of data trajectories in various SI environments Listing established rules impacting data and its respect 360 °
  • 11. Page 11 – © Keley - Confidentiel – ...while focusing on expected benefits > GDPR compliance creates a fantastic opportunity for companies in terms of: Image Install or restore third party confidence in the company when dealing with personal data Law Prepare the "digital responsibility" of the company IT Secure and enhance treatment and storage of data Job Increase valorization and monitoring of data HR Give responsibility to actors in the company in terms of personal data
  • 12. Page 12 – © Keley - Confidentiel –
  • 13. Page 13 – © Keley - Confidentiel – Context qualification > A study context comprises one or several treatments on a data source with a determined purpose Description générale d'un Contexte Informations générales Etude d'impact Date de l'analyse ex: 01/10/2017 Analyste Prénom Nom Fonctiondel'analyste ex : Data manager Informations générales sur le contexte Typede projet ex : Nettoyage des adresses postales Finalité/ Objectif ex: communication parcourrier Typede traitement ex : Normalisationpostale Personnes concernées ex : clients Nombred'individu(estimation) ex : 2 000 000 Nombred'informationpar individu ex: 10 Base / Application concernée ex: Base de porteurde carte de fidélitéResponsabledetraitement ex : Prestataire externe Responsableopérationnel ex : Responsable interne Contributeurs projet Chef de projet ex: directeur des opérations Expert données personnelles ex : directeur juridique Expert sécurité ex : RSSI, directeur technique Expert technique/ étude ex : data manager Responsableexploitation ex : data manager Autres à renseigner Description des données traitées (cf procédure de gestion de la traçabilité) Liste des données Source des données Base concernée Destination des données Type de données (cf onglet 05) Périmètre géographique du traitement (Pays) ex : nom ex : Saisie Magasin ex : Magasin ex : CRM ex : données d'identification ex : France Collecte des données et transparence de l'information (cf procédure de gestion de la traçabilité) Liste des données Type de collecte Méthode de collecte Méthode d'information des personnes Responsable de la gestion des droits d'accès/rectification Autre Civilité ex : directe, indirecte ex : liste déroulante, champs libre ex : Conditionsgénérales de la carte ex : Fonction +Nom Règles de conservation & purge des données Liste des données Durée de conservation Règles de purge Règles d'archivage Règles de sécurisation de la destruction Resonsable du processus de purge Adresse postale ex : 3 ans ex : mensuellement en semi- automatique ex : 5 ans sur serveur chiffré ex : broyage sécurisé ex : Fonction +Nom Sécurité (cf procédure traçabilité, procédure habilitations, plan de contrôle) Liste des applicatifs / systèmes / bases Politique de mots de passe Gestion des logs Chiffrement des données / transferts Profils d'habilitations Responsable des habilitations Dépôt du fichier ex : oui ex : trace des interventions ex : oui, type de chiffrement ex : Data Manager ex : Fonction +Nom Test de l'application Remarques et informations additionnelles • Which treatment for which purpose? What? • Who plays a part, who is responsible? Who? • Which source and which collection mode? Wich Data? • … of conservation and purge? Which Rules? • … tracking and accreditation? Which Security? • … tests and verifications? Which Controls?
  • 14. Page 14 – © Keley - Confidentiel – Pre-Diagnosis or Self Assessment > A first analysis should reveal the main contexts with high risk while relying on simplified criteria 1 . Personal Information Sensitivity • Common • Perceived as sensitive • Sensitive in terms of law 2 . Purpose / Minimization • Conservation time • Archiving time • Anonymization mode • Encryption choice 3 . Organization / Process • Managing accreditations • Managing risks • Managing incidents • Managing projets 4 . Consent / Portability • Information on the concerned party • Access to its data • Possibility to oppose, rectify and restore 5 . Quality / Sécurity • Preserve data cohérence • Logical security • Physical security Sensibilité Finalité Organisation / Process Consenteme nt / Portabilité Sécurité Minimum Défendable Evaluation on each axis from 1 (perfect) to 4 (bad)
  • 15. Page 15 – © Keley - Confidentiel – > Identified risks should be placed on a grid according to: > their gravity > their likelihood > This should evaluate the stakes of the measure associated with risk reduction maximum important limited marginal marginal limited important maximum Mapping the risks Likelihood Gravity Stakes - - Stakes - Stakes + M1 M2 M3 Stakes + + R 3 R 2 R 1
  • 16. Page 16 – © Keley - Confidentiel – Association of measures with identified risks Evaluation of these measures is done on 3 axis: > on each axis, a grade from 1 to 5 Accessibility is defined by using these 3 grades Difficulty Cost Time M1 3 2 3 - M2 2 1 2 + M3 2 2 4 - R1 : Malevolent injection of false data via a web form M1 : Install a site for managing consent and portability of data R2 : Inadvertent deletion of data M2 : Applying rules for conservation, archiving and purge R3 : Theft of personal information for redistribution or exploiting by a third party M3 : Revision of contracts with one or several providers
  • 17. Page 17 – © Keley - Confidentiel – Prioritization of measures Accessibility Stakes ++ - - - - ++ Very high priority High priority Moderate priority Low priority M1 M2 M3 > Measures to take are prioritized depending on: > Their stakes > Their Accessibility
  • 18. Page 18 – © Keley - Confidentiel – Watch out for All Excel!
  • 19. Page 19 – © Keley - Confidentiel – Choosing a tool: main functionalities > Tools do not share all the functionalities that can be grouped in 4 families: Functions connected to GDPR • Data treatment register • PIA plan • Managing contracts • Managing rights and accreditations • Tracking security issues • Integration in internal systems Project tracking functions • Task tracking • Reporting and control panel • Employee education • Sharing user experience • Comparison inside a company or between companies Functions dedicated to individuals • Managing legal notices • Managing individual demands • Monitoring sites and applications • Managing portability • Dedicated web site for visitors relationship management Technical / data functions • Anonymization of data • Secured data analysis • Monitoring data misusage
  • 20. Page 20 – © Keley - Confidentiel – APM ActeCil DPMS- PrivaCil TrustArc OneTrust Ensighten Privitar GDPR 4 4 4 4 1 3 Project tracking 4 3 3 3 0 0 Dedicated to individuals 0 3 3 3 4 0 Technical / data 0 0 0 0 0 4 Ease of use 3 3 4 4 3 1 References 4 4 3 3 1 1 FR FR US US US UK from free to several thousand euros per month Choosing a tool: selected tools There are more specialized tools like TrackUp...or Didomi
  • 21. Page 21 – © Keley - Confidentiel – Taking action with Keley - Data Unlaunched project Ongoing project  Quick evaluation of the task size based on: • Number of entities/services concerned • Number of systems and databases • Number of context (data/treatment) • Number of measures to uphold and track => Commando style launch of the project for strong mobilisation and maximum efficiency  Flash diagnosis of your GDPR approach => Faster implementation at different levels: • 360∞ Data Vision • Minimum Defendable • Prioritization of actions • Choice of tool They trust us: Orange, Renault, La Poste, Reed Expo...and you?
  • 22. Contact information 5 rue Sixtus, 75015 Paris Métro : Dupleix ou Bir Hakeim Phone : + 33 1 80 48 26 20 Adress : 28 rue du Docteur Finlay, 75015 Paris Métro: Dupleix or Bir Hakeim Phone: +33 1 80 48 26 25 haraki@keley-data.com