SlideShare a Scribd company logo
1 of 26
GDPR Regulation
• Comes in to force - 25th May 2018
• Legislation is now European law
• Breech's can see fines of up to 4% gross
turnover or €20m
• There are 6 data processing principles which
should followed.
The GDPR Lingo!
− Personal Data - information relating to an identified or identifiable natural person (‘Data Subject’);
− Process, Processed, Processing - collection, recording, organisation, structuring, storage,
adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or
otherwise making available, alignment or combination, restriction, erasure or destruction;
− Data Processors - processes personal data on behalf of the controller;
− Controller - alone or jointly with others, determines the purposes and means of the processing of
personal data;
− Consent - signifies agreement to the processing of personal data relating to him or her;
− Third Party – Some body other than the data subject, controller, processor and persons who, under
the direct authority of the controller or processor, are authorised to process personal data.
− Special Categories or Sensitive Data
Personal Data – What is it?
Company details
Address without a name
A generic email address
such as info@company
Corporate accounts with
summary payroll data
Sensitive DataPersonal DataJust Data!
Name and address of a data
subject
Email address with
firstname.surname@company
Pay records with gender, age,
job title (even without a
name)
A web cookie
Racial or ethnic origin
Political Opinions
Religious beliefs
Sexual preferences
Biometric information
Objective, Subjective or Sensitive
Any information relating to an individual
can be classed as personal data when it
can identify the data subject!
Personal Data held by the company in
electronic format and manual records
which form part of a relevant filing system.
Examples of personal data?
− All employee/company data
−HR data
−Payroll
−IT data – IP, Cookie
−CCTV
−Mobile data
−Financial data
−Proof of Identification
−Pension
−Performance reviews
− Customer data
−Contact details
−Mobile data
−Pictures – (TT)
−Financial data (individual
contracts)
−Contracts (Consent)
−Call recordings
Business Business
You can rely on legitimate
interests if you can show the way
you use people’s data is
proportionate, has a minimal
privacy impact, and people would
not be surprised or likely to
object to what you are doing.
Note: You still need to be
compliant to Privacy and
Electronic Communications
Regulations (PECR).
Always include an Opt out – The
Right to object!
Who can/can't I contact - Marketing!
Be Mindful of B > C, Sole Traders and Partnerships
Existing Products
New Products
Events
Company Information
Business Consumer
• Consent must be freely given
• Consent should be obvious and
require a positive action to opt in.
Consent requests must be
prominent, unbundled from other
terms and conditions, concise and
easy to understand, and user-
friendly.
• Consent must specifically cover
the controller’s name, the
purposes of the processing and
the types of processing activity.
• You must make it easy for people
to withdraw consent at any time
they choose.
Who can/can't I contact - Marketing!
Can include Sole Traders and Partnerships
Consent
Consent doesn't always have to be written as long as it can be
evidenced
Who can/can’t I contact - Sales!
Business Business
Business Consumer
Who can/can’t I contact - Sales!
Business Business
Business Consumer
IMPORTANT!
If you asked to
stop then you
stop it!
What would
be a Data
Breach?
A Data Breach is a confirmed
incident in which sensitive,
confidential or otherwise
protected data has been
accessed and/or disclosed in
an unauthorized fashion.
All data breeches must be reported to
your companies DPO ASAP.
Prevention
Information Security
Everybody has a responsibility
towards protecting the
company's information.
It is essential for everyone to
follow Acceptable use
guidance's.
Hardware Software Paper Physical Security
Hardware &
Software
• Only hardware and software
authorised by your company
should be used in any
connection with the company
network.
• The business may be unable
to support any unauthorised
hardware or software.
• Use of unauthorised hardware
or software, which may expose
the business to the risk of
unauthorised access or virus
infection.
Company Owned Computers
• Use network/cloud
drives to create and
store documents.
• Passwords – Only
effective if kept secret !
• Think about what’s on
your screen and where
you are.
• Anti Virus is there for a
reason!
Mobile Phones
• Passwords
• Ability to wipe phones
• Data protection includes
mobiles! Think about what and
who you are messaging.
Email / Internet
• THINK - Who are you sending too? - What are you
sending ?
• Secure ISDX transfer
• Look at for attachments or requests from known &
unknown sources. – virus or malware
• Never use you personal email for work
• May monitor or block email traffic in certain
circumstances.
• Out of offices – Think before you type!
Paper
• Its not just our data
• Shred documents
• Clear desk policy
• Locked cabinets
• Templates have
disclaimers
Physical
security
• Secure buildings
• Report anomalies
• Don’t be afraid to
challenge
• Laptops should be
kept safe – travel,
person, home
Thank You for your time
For more information visit
www.intercity.technology/gpdr

More Related Content

What's hot

Intercity technology - GDPR your training toolkit
Intercity technology - GDPR your training toolkitIntercity technology - GDPR your training toolkit
Intercity technology - GDPR your training toolkit
joshquarrie
 
Merit Event - Understanding and Managing Data Protection
Merit Event - Understanding and Managing Data ProtectionMerit Event - Understanding and Managing Data Protection
Merit Event - Understanding and Managing Data Protection
meritnorthwest
 
Data Protection Act presentation
Data Protection Act presentationData Protection Act presentation
Data Protection Act presentation
Ian Clive Oultram
 

What's hot (20)

Intercity technology - GDPR your training toolkit
Intercity technology - GDPR your training toolkitIntercity technology - GDPR your training toolkit
Intercity technology - GDPR your training toolkit
 
Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)
 
The Data Protection Act What You Need To Know
The Data Protection Act   What You Need To KnowThe Data Protection Act   What You Need To Know
The Data Protection Act What You Need To Know
 
Data Protection (Download for slideshow)
Data Protection (Download for slideshow)Data Protection (Download for slideshow)
Data Protection (Download for slideshow)
 
Data Protection and IDEA
Data Protection and IDEAData Protection and IDEA
Data Protection and IDEA
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business Advisors
 
Protection of Personal Information Bill (POPI)
Protection of Personal Information Bill (POPI)Protection of Personal Information Bill (POPI)
Protection of Personal Information Bill (POPI)
 
ABM Display Advertising Success in the World of GDPR [PPT]
ABM Display Advertising Success in the World of GDPR [PPT]ABM Display Advertising Success in the World of GDPR [PPT]
ABM Display Advertising Success in the World of GDPR [PPT]
 
Merit Event - Understanding and Managing Data Protection
Merit Event - Understanding and Managing Data ProtectionMerit Event - Understanding and Managing Data Protection
Merit Event - Understanding and Managing Data Protection
 
POPI Seminar
POPI SeminarPOPI Seminar
POPI Seminar
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business Advisors
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
Interact 2018 - GDPR for digital publishers, digital agencies and advertisers
Interact 2018 -  GDPR for digital publishers, digital agencies and advertisersInteract 2018 -  GDPR for digital publishers, digital agencies and advertisers
Interact 2018 - GDPR for digital publishers, digital agencies and advertisers
 
Data Privacy in India and data theft
Data Privacy in India and data theftData Privacy in India and data theft
Data Privacy in India and data theft
 
POPI Seminar FINAL
POPI Seminar FINALPOPI Seminar FINAL
POPI Seminar FINAL
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information Security
 
Data Protection Act presentation
Data Protection Act presentationData Protection Act presentation
Data Protection Act presentation
 
Remember Data Protection Act (DPA)
Remember Data Protection Act (DPA)Remember Data Protection Act (DPA)
Remember Data Protection Act (DPA)
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
 
GDPR Demystified
GDPR DemystifiedGDPR Demystified
GDPR Demystified
 

Similar to Intercity Technology - GDPR your training toolkit

GDPR & the Travel Industry: Practical recommendations for holiday rental owners
GDPR & the Travel Industry: Practical recommendations for holiday rental ownersGDPR & the Travel Industry: Practical recommendations for holiday rental owners
GDPR & the Travel Industry: Practical recommendations for holiday rental owners
Spain-Holiday.com
 
LW GDPR and Cyber Security.pptx
LW GDPR and Cyber Security.pptxLW GDPR and Cyber Security.pptx
LW GDPR and Cyber Security.pptx
TimBee1
 

Similar to Intercity Technology - GDPR your training toolkit (20)

GDPR - Sink or Swim
GDPR - Sink or SwimGDPR - Sink or Swim
GDPR - Sink or Swim
 
Protection des données et de la vie privée : nouvelles obligations pour les e...
Protection des données et de la vie privée : nouvelles obligations pour les e...Protection des données et de la vie privée : nouvelles obligations pour les e...
Protection des données et de la vie privée : nouvelles obligations pour les e...
 
GDPR for your Payroll Bureau
GDPR for your Payroll BureauGDPR for your Payroll Bureau
GDPR for your Payroll Bureau
 
9 Practical Steps 2 GDPR Compliance
9 Practical Steps 2 GDPR Compliance9 Practical Steps 2 GDPR Compliance
9 Practical Steps 2 GDPR Compliance
 
GDPR webinar for business leaders
GDPR webinar for business leadersGDPR webinar for business leaders
GDPR webinar for business leaders
 
Associates quick guide to gdpr v 1.0
Associates quick guide to gdpr v 1.0Associates quick guide to gdpr v 1.0
Associates quick guide to gdpr v 1.0
 
CBC GDPR The Physics
CBC GDPR The PhysicsCBC GDPR The Physics
CBC GDPR The Physics
 
Information Privacy?! (GDPR)
Information Privacy?! (GDPR)Information Privacy?! (GDPR)
Information Privacy?! (GDPR)
 
Data protection act
Data protection actData protection act
Data protection act
 
Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)
 
GDPR & the Travel Industry: Practical recommendations for holiday rental owners
GDPR & the Travel Industry: Practical recommendations for holiday rental ownersGDPR & the Travel Industry: Practical recommendations for holiday rental owners
GDPR & the Travel Industry: Practical recommendations for holiday rental owners
 
GDPR: Your Journey to Compliance
GDPR: Your Journey to ComplianceGDPR: Your Journey to Compliance
GDPR: Your Journey to Compliance
 
Introduction to EU General Data Protection Regulation: Planning, Implementat...
 Introduction to EU General Data Protection Regulation: Planning, Implementat... Introduction to EU General Data Protection Regulation: Planning, Implementat...
Introduction to EU General Data Protection Regulation: Planning, Implementat...
 
Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...
 
LW GDPR and Cyber Security.pptx
LW GDPR and Cyber Security.pptxLW GDPR and Cyber Security.pptx
LW GDPR and Cyber Security.pptx
 
Gdpr for business full
Gdpr for business fullGdpr for business full
Gdpr for business full
 
Ready for the GDPR, Ready for the Digital Economy
Ready for the GDPR, Ready for the Digital EconomyReady for the GDPR, Ready for the Digital Economy
Ready for the GDPR, Ready for the Digital Economy
 
Living with gdpr
Living with gdprLiving with gdpr
Living with gdpr
 
What's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesWhat's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) Changes
 
Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...
Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...
Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...
 

Recently uploaded

Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
dlhescort
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
lizamodels9
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
lizamodels9
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
dollysharma2066
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
amitlee9823
 

Recently uploaded (20)

Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 

Intercity Technology - GDPR your training toolkit

  • 1.
  • 2. GDPR Regulation • Comes in to force - 25th May 2018 • Legislation is now European law • Breech's can see fines of up to 4% gross turnover or €20m • There are 6 data processing principles which should followed.
  • 3. The GDPR Lingo! − Personal Data - information relating to an identified or identifiable natural person (‘Data Subject’); − Process, Processed, Processing - collection, recording, organisation, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction, erasure or destruction; − Data Processors - processes personal data on behalf of the controller; − Controller - alone or jointly with others, determines the purposes and means of the processing of personal data; − Consent - signifies agreement to the processing of personal data relating to him or her; − Third Party – Some body other than the data subject, controller, processor and persons who, under the direct authority of the controller or processor, are authorised to process personal data. − Special Categories or Sensitive Data
  • 4. Personal Data – What is it?
  • 5. Company details Address without a name A generic email address such as info@company Corporate accounts with summary payroll data Sensitive DataPersonal DataJust Data! Name and address of a data subject Email address with firstname.surname@company Pay records with gender, age, job title (even without a name) A web cookie Racial or ethnic origin Political Opinions Religious beliefs Sexual preferences Biometric information
  • 6. Objective, Subjective or Sensitive Any information relating to an individual can be classed as personal data when it can identify the data subject!
  • 7. Personal Data held by the company in electronic format and manual records which form part of a relevant filing system.
  • 9. − All employee/company data −HR data −Payroll −IT data – IP, Cookie −CCTV −Mobile data −Financial data −Proof of Identification −Pension −Performance reviews − Customer data −Contact details −Mobile data −Pictures – (TT) −Financial data (individual contracts) −Contracts (Consent) −Call recordings
  • 10. Business Business You can rely on legitimate interests if you can show the way you use people’s data is proportionate, has a minimal privacy impact, and people would not be surprised or likely to object to what you are doing. Note: You still need to be compliant to Privacy and Electronic Communications Regulations (PECR). Always include an Opt out – The Right to object! Who can/can't I contact - Marketing! Be Mindful of B > C, Sole Traders and Partnerships Existing Products New Products Events Company Information
  • 11. Business Consumer • Consent must be freely given • Consent should be obvious and require a positive action to opt in. Consent requests must be prominent, unbundled from other terms and conditions, concise and easy to understand, and user- friendly. • Consent must specifically cover the controller’s name, the purposes of the processing and the types of processing activity. • You must make it easy for people to withdraw consent at any time they choose. Who can/can't I contact - Marketing! Can include Sole Traders and Partnerships Consent
  • 12. Consent doesn't always have to be written as long as it can be evidenced
  • 13. Who can/can’t I contact - Sales! Business Business Business Consumer
  • 14. Who can/can’t I contact - Sales! Business Business Business Consumer IMPORTANT! If you asked to stop then you stop it!
  • 15. What would be a Data Breach?
  • 16. A Data Breach is a confirmed incident in which sensitive, confidential or otherwise protected data has been accessed and/or disclosed in an unauthorized fashion.
  • 17. All data breeches must be reported to your companies DPO ASAP.
  • 19. Everybody has a responsibility towards protecting the company's information. It is essential for everyone to follow Acceptable use guidance's. Hardware Software Paper Physical Security
  • 20. Hardware & Software • Only hardware and software authorised by your company should be used in any connection with the company network. • The business may be unable to support any unauthorised hardware or software. • Use of unauthorised hardware or software, which may expose the business to the risk of unauthorised access or virus infection.
  • 21. Company Owned Computers • Use network/cloud drives to create and store documents. • Passwords – Only effective if kept secret ! • Think about what’s on your screen and where you are. • Anti Virus is there for a reason!
  • 22. Mobile Phones • Passwords • Ability to wipe phones • Data protection includes mobiles! Think about what and who you are messaging.
  • 23. Email / Internet • THINK - Who are you sending too? - What are you sending ? • Secure ISDX transfer • Look at for attachments or requests from known & unknown sources. – virus or malware • Never use you personal email for work • May monitor or block email traffic in certain circumstances. • Out of offices – Think before you type!
  • 24. Paper • Its not just our data • Shred documents • Clear desk policy • Locked cabinets • Templates have disclaimers
  • 25. Physical security • Secure buildings • Report anomalies • Don’t be afraid to challenge • Laptops should be kept safe – travel, person, home
  • 26. Thank You for your time For more information visit www.intercity.technology/gpdr

Editor's Notes

  1. To reiterate the 6 data processing principles . . . .
  2. Electronic filing system can be anything computerise. Including email Be prudent about making comments which may be later disclosed.
  3. Minutes of meetings And how they are recorded – Notebooks
  4. Document date, method, content of disclosure, validity
  5. If they ask you to stop it, then make sure we stop it.
  6. Social engineering – Be careful Simple mistakes – eg: sending To rather than BCC We have 72 hours to report a breech. Straight away if it is of high risk of breeching the rights of individuals.
  7. Electronic – Voice, Recordings, phones, PCs, Photographs Paper- Filing systems, diaries, indexes, photographs
  8. Must be returned what is issued Asset tags must not be removed No unauthorised equipment Policy of automatic lock – Turned on Software should be authorised Theft is to be reported
  9. Your desk top s not backed up – One drive. Watch what you are plugging into your PC Lock your work station Passwords Whats on your screens Make sure you connect to the network for updates Where do you leave your laptop?
  10. Think about what you are saying in public places. Toggle o get access but don’t by pass a network machine. Boxer – BYOD – Policy – Not provided with a company mobile.?
  11. Don’t look at stuff you shouldn’t ! - Offensive, pornographc, illegal etc. . Web pages may be blocked. They are blocked for a reason Secure sites have a padlock or HTTPS://