SlideShare a Scribd company logo
Is Your PeopleSoft Ready For the GDPR?
48 Hours to Go...
Oracle HCM Cloud & PeopleSoft Cedar Day 2018
Wednesday, 23rd May 2018
Sarah Hurley, Cedar Consulting
Introduction - GDPR
The GDPR on a Page
3
The GDPR on a Page
4
₋ Lawful, fair, and transparent
₋ Purpose limitation
₋ Data minimization
₋ Accurate and up-to-date
processing
₋ Limitation of storage
₋ Confidential and secure
₋ Accountability andliability
7 Principles:
Data Classification
PeopleSoft captures a plethora of personal
and sensitive data
Examples of this data can include the
following depending on context:
– Name
– Ethnic or racial origin
– Political opinions
– Memberships
– Physical or mental
health details
– Criminal orcivil
offenses
– IP Address
– Photo
– Meal Preferences
Personal and Sensitive Data
ORACLE©. (2018, May). Be in the Know for PeopleSoft HCM Data Privacy [Webinar].
Data Classification
 The Personally Identifiable and Sensitive data (doc ID 2313438.1) is
being updated (likely this month) with NA payroll and benefits
being added
 Future plans:
 An online (in app) version of the tool is being released which
will allow the addition of custom fields
 Additional spreadsheets being launched for FSCM, ELM and CRM
Data Classification
Oracle’s Mockup of the Online Identification and Usage solution
Data Masking
 Masking of production environments in the user interface (security
driven) – released in PI 26 – currently limited to:
 Date of Birth
 National ID
 Bank Account Number (all but last 4 digits)
 This document is really useful: Implementing Sensitive Data
Masking (Doc ID 2375376.1)
Data Masking
 Future plans:
 A more configurable approach to managing personal and
sensitive data is planned in the form of a Data Privacy
Framework
 Field level security as masked, hidden or display-only
 Full or partial masking
 Support custom masking formats
 Any personal or sensitive data field on any transaction
 Role security or additional controls (country or reg region)
Data Right to be Forgotten
 Person Delete – improved in Image 25 & 26
 Data deleted from all tables with Emplid field
 Configure records excluded from delete e.g. Audit tables
 Individuals ignored with payroll calcs (can be overridden)
 Applicant delete available since image 25
 Future plans
 Integration from HCM to notify ‘subscribers’ that emp info has
been deleted (FSCM, ELM, CRM and third party systems
integrated with IB)
 Learner delete in ELM
Data Right to be Forgotten
 Data Archive Manager is already available to day (PeopleTools)
 Configurable framework supports data retention policies
 Defines tables/records to be archived
 Identifies criteria for rows of data to be archived (query)
 Allows archive, delete and restore
 Sample templates delivered for many products
 Use person or applicant delete for individuals, use Data Archive
Manager for rules based (specific countries, timeframes etc)
Data Subject Consent
 The Acknowledgement Framework was delivered in PI 26
(configurable)
 RTF text display
 Used for acknowledgements and agreements
 Electronic signature capture and audit trail
 Verify identity of individual
 Can be added as a step in an activity guide
 Example is delivered in onboarding
 PeopleSoft HCM Acknowledgement Framework Red Paper (Doc ID
2377140.1)
Auditing
 Future plans
 A solution is needed to track who viewed information
 Ability to configure (rather than customize) the transactions
which are audited
 Most third party solutions today usually track the SQL request of
data (what was retrieved from the database), this does not
mean the data was actually viewed since it could be hidden in
the User Interface
Right to Portability
PeopleSoft provides a number of methods to report on and extract
information from the application:
 “Grids” in the PeopleSoft UI on a transaction page allow download to Excel
 Query Manager reports/extracts data to the browser, file, spreadsheet, or XML
 Pivot Grids leverage queries to generate analytics similar to those provided by
common software such as Microsoft Excel
 BI Publisher formats reports based on a data input source
 Structure Query Reporting (SQR) is a development tool for complex extraction,
formatting, and reporting of data from PeopleSoft or other data sources
 Many sample queries, analytics, and reports are delivered by the application
Privacy by Design…
PEOPLE
People
• Employees/Customers
Suppliers
• Users
• IT/Security
Privacy by Design…
PROCESSPEOPLE
Process
• Threat Management
• Consent Management
• Third Party Due Diligence
• Access Management
People
• Employees/Customers
Suppliers
• Users
• IT/Security
Privacy by Design…
TECHNOLOGY
PROCESSPEOPLE
PRIVACY BY
DESIGN
Process
• Threat Management
• Consent Management
• Third Party Due Diligence
• Access Management
People
• Employees/Customers
Suppliers
• Users
• IT/Security
Technology
• Vulnerability Management
(patching)
• Pseudoanonymisation/
Anonymisation
• Data Classification and
Retention
Privacy by Design…
TECHNOLOGY
PROCESSPEOPLE
PRIVACY BY
DESIGN
PRIVACY
BY DESIGN
WHERE
THESE
AREAS
INTERSECT
Cedar Security Assessment
Client completes Cedar PS Security Questionnaire
Cedar join the client on site looking at relevant
configuration and questionnaire follow-up
Cedar deliver “PS Security Assessment” with
vulnerabilities graded and suggested remediation
Cedar present report on site to allow for an in
depth discussion re vulnerabilities and next steps
Initial
Assessment
Onsite
Consultancy
Security
Assessment
Findings
Delivered
01
02
03
04
Cedar Security Assessment
Better appreciation of
PeopleSoft patching
A patching strategy in place
including recommended
PeopleTools upgrades
Key vulnerabilities
remediated
Proposals for improved IS
procedures
Suggested infrastructure
and/or architecture changes
Automated Data Anonymisation
Production Data
Individual Identifiable
Lower Environments
(e.g. Test)Anonymisation Scripts
Individual Not Identifiable
Automated Data Anonymisation
Production Data
Individual Identifiable
Lower Environments
(e.g. Test)Anonymisation Scripts
Individual Not Identifiable
Cedar are in the early stages of
development of a configurable
anonymisation tool for PeopleSoft.
Next Steps
Assess Vulnerabilities
•-Security Assessment
•-GDPR Programme
•-Disaster Recovery
•-Penetration Testing
•-Selective Adoption
Strategy
Review Architecture
-Data Classification
-Production
-Non Production
-Interfaces
-Third party due
diligence
Review Processes
Joiners/Leavers/Movers
Data Retention
Lawful Processing
• GDPR is a marathon not a
sprint.
• Look for the quickest wins ‘low
hanging fruit’
• New technology might not be
the answer
• GDPR compliance is the
responsibility of EVERY
employee of a company (make
sure they understand)
Tips:
Questions…
+44(0)207 822 2997
www.blackstarglobalrisk.com

More Related Content

What's hot

Data centric security key to cloud and digital business
Data centric security key to cloud and digital businessData centric security key to cloud and digital business
Data centric security key to cloud and digital business
Ulf Mattsson
 
Umer Khalid Thesis Abstract
Umer Khalid Thesis AbstractUmer Khalid Thesis Abstract
Umer Khalid Thesis AbstractUmer Khalid
 
E Control Summary
E Control   SummaryE Control   Summary
E Control Summary
Teruel A. Carrasco
 
Advantages of an Electronic Document Management System
Advantages of an Electronic Document Management SystemAdvantages of an Electronic Document Management System
Advantages of an Electronic Document Management System
Charles, Shouky Abu Ayash
 
Dbms ii mca-ch12-security-2013
Dbms ii mca-ch12-security-2013Dbms ii mca-ch12-security-2013
Dbms ii mca-ch12-security-2013
Prosanta Ghosh
 
Cybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityCybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber Security
Eryk Budi Pratama
 
01 database security ent-db
01  database security ent-db01  database security ent-db
01 database security ent-db
uncleRhyme
 
Organizational Benefits Of Document Management System
Organizational Benefits Of Document Management SystemOrganizational Benefits Of Document Management System
Organizational Benefits Of Document Management System
Clare White
 
Uid security
Uid securityUid security
Uid security
Fardin Shaikh
 
security and privacy in dbms and in sql database
security and privacy in dbms and in sql databasesecurity and privacy in dbms and in sql database
security and privacy in dbms and in sql database
gourav kottawar
 
A Survey on Context Security Policies in the Cloud
A Survey on Context Security Policies in the CloudA Survey on Context Security Policies in the Cloud
A Survey on Context Security Policies in the Cloud
PaaSword EU Project
 
Logs in Security and Compliance flare
Logs in Security and Compliance flareLogs in Security and Compliance flare
Logs in Security and Compliance flare
zilberberg
 
Laserfiche10 highlights- how the new features can benefit your mobile and wor...
Laserfiche10 highlights- how the new features can benefit your mobile and wor...Laserfiche10 highlights- how the new features can benefit your mobile and wor...
Laserfiche10 highlights- how the new features can benefit your mobile and wor...
Christopher Wynder
 

What's hot (20)

Data centric security key to cloud and digital business
Data centric security key to cloud and digital businessData centric security key to cloud and digital business
Data centric security key to cloud and digital business
 
Umer Khalid Thesis Abstract
Umer Khalid Thesis AbstractUmer Khalid Thesis Abstract
Umer Khalid Thesis Abstract
 
Edms
EdmsEdms
Edms
 
Dit yvol3iss33
Dit yvol3iss33Dit yvol3iss33
Dit yvol3iss33
 
E Control Summary
E Control   SummaryE Control   Summary
E Control Summary
 
Advantages of an Electronic Document Management System
Advantages of an Electronic Document Management SystemAdvantages of an Electronic Document Management System
Advantages of an Electronic Document Management System
 
Dbms ii mca-ch12-security-2013
Dbms ii mca-ch12-security-2013Dbms ii mca-ch12-security-2013
Dbms ii mca-ch12-security-2013
 
Database modeling and security
Database modeling and securityDatabase modeling and security
Database modeling and security
 
Cybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityCybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber Security
 
Database Security
Database SecurityDatabase Security
Database Security
 
01 database security ent-db
01  database security ent-db01  database security ent-db
01 database security ent-db
 
Organizational Benefits Of Document Management System
Organizational Benefits Of Document Management SystemOrganizational Benefits Of Document Management System
Organizational Benefits Of Document Management System
 
Uid security
Uid securityUid security
Uid security
 
DMS
DMSDMS
DMS
 
security and privacy in dbms and in sql database
security and privacy in dbms and in sql databasesecurity and privacy in dbms and in sql database
security and privacy in dbms and in sql database
 
A Survey on Context Security Policies in the Cloud
A Survey on Context Security Policies in the CloudA Survey on Context Security Policies in the Cloud
A Survey on Context Security Policies in the Cloud
 
Logs in Security and Compliance flare
Logs in Security and Compliance flareLogs in Security and Compliance flare
Logs in Security and Compliance flare
 
Database security
Database securityDatabase security
Database security
 
Gartner Predicts 2018
Gartner Predicts 2018Gartner Predicts 2018
Gartner Predicts 2018
 
Laserfiche10 highlights- how the new features can benefit your mobile and wor...
Laserfiche10 highlights- how the new features can benefit your mobile and wor...Laserfiche10 highlights- how the new features can benefit your mobile and wor...
Laserfiche10 highlights- how the new features can benefit your mobile and wor...
 

Similar to Cedar Day 2018 - Is Your PeopleSoft Ready for the GDPR - Sarah Hurley

data collection, data integration, data management, data modeling.pptx
data collection, data integration, data management, data modeling.pptxdata collection, data integration, data management, data modeling.pptx
data collection, data integration, data management, data modeling.pptx
Sourabhkumar729579
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)
Andy Talbot
 
Toreon adding privacy by design in secure application development oss18 v20...
Toreon adding privacy by design in secure application development   oss18 v20...Toreon adding privacy by design in secure application development   oss18 v20...
Toreon adding privacy by design in secure application development oss18 v20...
Sebastien Deleersnyder
 
Agile Mumbai 2022 - Balvinder Kaur & Sushant Joshi | Real-Time Insights and A...
Agile Mumbai 2022 - Balvinder Kaur & Sushant Joshi | Real-Time Insights and A...Agile Mumbai 2022 - Balvinder Kaur & Sushant Joshi | Real-Time Insights and A...
Agile Mumbai 2022 - Balvinder Kaur & Sushant Joshi | Real-Time Insights and A...
AgileNetwork
 
Data protection services lifecycle approach to critical information protection
Data protection services  lifecycle approach to critical information protectionData protection services  lifecycle approach to critical information protection
Data protection services lifecycle approach to critical information protection
Aujas Networks Pvt. Ltd.
 
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data TeamsEthyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Cillian Kieran
 
System analysis and design
System analysis and designSystem analysis and design
System analysis and design
RobinsonObura
 
Enterprise Data Marketplace: A Centralized Portal for All Your Data Assets
Enterprise Data Marketplace: A Centralized Portal for All Your Data AssetsEnterprise Data Marketplace: A Centralized Portal for All Your Data Assets
Enterprise Data Marketplace: A Centralized Portal for All Your Data Assets
Denodo
 
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
AIIM International
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
Drew Madelung
 
GraphSummit - Process Tempo - Build Graph Applications.pdf
GraphSummit - Process Tempo - Build Graph Applications.pdfGraphSummit - Process Tempo - Build Graph Applications.pdf
GraphSummit - Process Tempo - Build Graph Applications.pdf
Neo4j
 
DATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docx
DATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docxDATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docx
DATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docx
SteveNgigi2
 
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
IJERA Editor
 
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Ravikumar Sathyamurthy
 
InsiderAttack_p3.ppt
InsiderAttack_p3.pptInsiderAttack_p3.ppt
InsiderAttack_p3.ppt
VaishnavGhadge1
 
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
Priyanka Aash
 
Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17Carl Binder
 
Advanced Analytics and Machine Learning with Data Virtualization
Advanced Analytics and Machine Learning with Data VirtualizationAdvanced Analytics and Machine Learning with Data Virtualization
Advanced Analytics and Machine Learning with Data Virtualization
Denodo
 
Database Management System.pptx
Database Management System.pptxDatabase Management System.pptx
Database Management System.pptx
ShuvrojitMajumder
 
Security Framework for Multitenant Architecture
Security Framework for Multitenant ArchitectureSecurity Framework for Multitenant Architecture
Security Framework for Multitenant Architecture
DataWorks Summit
 

Similar to Cedar Day 2018 - Is Your PeopleSoft Ready for the GDPR - Sarah Hurley (20)

data collection, data integration, data management, data modeling.pptx
data collection, data integration, data management, data modeling.pptxdata collection, data integration, data management, data modeling.pptx
data collection, data integration, data management, data modeling.pptx
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)
 
Toreon adding privacy by design in secure application development oss18 v20...
Toreon adding privacy by design in secure application development   oss18 v20...Toreon adding privacy by design in secure application development   oss18 v20...
Toreon adding privacy by design in secure application development oss18 v20...
 
Agile Mumbai 2022 - Balvinder Kaur & Sushant Joshi | Real-Time Insights and A...
Agile Mumbai 2022 - Balvinder Kaur & Sushant Joshi | Real-Time Insights and A...Agile Mumbai 2022 - Balvinder Kaur & Sushant Joshi | Real-Time Insights and A...
Agile Mumbai 2022 - Balvinder Kaur & Sushant Joshi | Real-Time Insights and A...
 
Data protection services lifecycle approach to critical information protection
Data protection services  lifecycle approach to critical information protectionData protection services  lifecycle approach to critical information protection
Data protection services lifecycle approach to critical information protection
 
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data TeamsEthyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
 
System analysis and design
System analysis and designSystem analysis and design
System analysis and design
 
Enterprise Data Marketplace: A Centralized Portal for All Your Data Assets
Enterprise Data Marketplace: A Centralized Portal for All Your Data AssetsEnterprise Data Marketplace: A Centralized Portal for All Your Data Assets
Enterprise Data Marketplace: A Centralized Portal for All Your Data Assets
 
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
 
GraphSummit - Process Tempo - Build Graph Applications.pdf
GraphSummit - Process Tempo - Build Graph Applications.pdfGraphSummit - Process Tempo - Build Graph Applications.pdf
GraphSummit - Process Tempo - Build Graph Applications.pdf
 
DATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docx
DATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docxDATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docx
DATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docx
 
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
 
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
 
InsiderAttack_p3.ppt
InsiderAttack_p3.pptInsiderAttack_p3.ppt
InsiderAttack_p3.ppt
 
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
 
Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17
 
Advanced Analytics and Machine Learning with Data Virtualization
Advanced Analytics and Machine Learning with Data VirtualizationAdvanced Analytics and Machine Learning with Data Virtualization
Advanced Analytics and Machine Learning with Data Virtualization
 
Database Management System.pptx
Database Management System.pptxDatabase Management System.pptx
Database Management System.pptx
 
Security Framework for Multitenant Architecture
Security Framework for Multitenant ArchitectureSecurity Framework for Multitenant Architecture
Security Framework for Multitenant Architecture
 

More from Cedar Consulting

Cedar Day 2018 - Cloud IaaS - Ken MacMahon
Cedar Day 2018 - Cloud IaaS - Ken MacMahonCedar Day 2018 - Cloud IaaS - Ken MacMahon
Cedar Day 2018 - Cloud IaaS - Ken MacMahon
Cedar Consulting
 
Cedar Day 2018 - Winning PeopleSoft Innovator - Kevin Gavaghan
Cedar Day 2018 - Winning PeopleSoft Innovator - Kevin GavaghanCedar Day 2018 - Winning PeopleSoft Innovator - Kevin Gavaghan
Cedar Day 2018 - Winning PeopleSoft Innovator - Kevin Gavaghan
Cedar Consulting
 
Cedar Day 2018 - Smarter Customisation at 9.2 - Graham Smith & Sarah Hurley
Cedar Day 2018 - Smarter Customisation at 9.2 - Graham Smith & Sarah HurleyCedar Day 2018 - Smarter Customisation at 9.2 - Graham Smith & Sarah Hurley
Cedar Day 2018 - Smarter Customisation at 9.2 - Graham Smith & Sarah Hurley
Cedar Consulting
 
Cedar Day 2018 - Integrating PeopleSoft Payroll - Alex Lightstone
Cedar Day 2018 - Integrating PeopleSoft Payroll - Alex LightstoneCedar Day 2018 - Integrating PeopleSoft Payroll - Alex Lightstone
Cedar Day 2018 - Integrating PeopleSoft Payroll - Alex Lightstone
Cedar Consulting
 
Cedar Day 2018 - HCM 9.2 Top Ten Enhancements - Russell Lakin
Cedar Day 2018 - HCM 9.2 Top Ten Enhancements - Russell LakinCedar Day 2018 - HCM 9.2 Top Ten Enhancements - Russell Lakin
Cedar Day 2018 - HCM 9.2 Top Ten Enhancements - Russell Lakin
Cedar Consulting
 
Cedar Day 2018 - How to Create Business Value from Your PeopleSoft HCM Techno...
Cedar Day 2018 - How to Create Business Value from Your PeopleSoft HCM Techno...Cedar Day 2018 - How to Create Business Value from Your PeopleSoft HCM Techno...
Cedar Day 2018 - How to Create Business Value from Your PeopleSoft HCM Techno...
Cedar Consulting
 
Cedar Day 2018 - Avoid Top Payroll Errors
Cedar Day 2018 -  Avoid Top Payroll ErrorsCedar Day 2018 -  Avoid Top Payroll Errors
Cedar Day 2018 - Avoid Top Payroll Errors
Cedar Consulting
 
18. Madhur Hemnani - Result Orientated Innovation with Oracle HR Analytics
18. Madhur Hemnani - Result Orientated Innovation with Oracle HR Analytics18. Madhur Hemnani - Result Orientated Innovation with Oracle HR Analytics
18. Madhur Hemnani - Result Orientated Innovation with Oracle HR Analytics
Cedar Consulting
 
17. Graham Smith - PeopleSoft in the Cloud 2017
17. Graham Smith - PeopleSoft in the Cloud 201717. Graham Smith - PeopleSoft in the Cloud 2017
17. Graham Smith - PeopleSoft in the Cloud 2017
Cedar Consulting
 
16. Hays, Oxfam & BAT - Maintaining PeopleSoft at 9.2
16. Hays, Oxfam & BAT -  Maintaining PeopleSoft at 9.216. Hays, Oxfam & BAT -  Maintaining PeopleSoft at 9.2
16. Hays, Oxfam & BAT - Maintaining PeopleSoft at 9.2
Cedar Consulting
 
15. Gary Winstanley - The Lucy Group Story
15. Gary Winstanley - The Lucy Group Story15. Gary Winstanley - The Lucy Group Story
15. Gary Winstanley - The Lucy Group Story
Cedar Consulting
 
14. Alex Lightstone & Bill Prescot - Exploiting PeopleSoft Query & Pivot Grids
14. Alex Lightstone & Bill Prescot - Exploiting PeopleSoft Query & Pivot Grids14. Alex Lightstone & Bill Prescot - Exploiting PeopleSoft Query & Pivot Grids
14. Alex Lightstone & Bill Prescot - Exploiting PeopleSoft Query & Pivot Grids
Cedar Consulting
 
13. Neville Varnham - PeopleSoft Cyber Security
13. Neville Varnham - PeopleSoft Cyber Security13. Neville Varnham - PeopleSoft Cyber Security
13. Neville Varnham - PeopleSoft Cyber Security
Cedar Consulting
 
11. Transforming Recruitment at CMS UK
11. Transforming Recruitment at CMS UK11. Transforming Recruitment at CMS UK
11. Transforming Recruitment at CMS UK
Cedar Consulting
 
10. Linda Pullan - Important Changes to Payroll
10. Linda Pullan - Important Changes to Payroll10. Linda Pullan - Important Changes to Payroll
10. Linda Pullan - Important Changes to Payroll
Cedar Consulting
 
9. Sue Heron - Patient Administration & Auto Billing
9. Sue Heron - Patient Administration & Auto Billing9. Sue Heron - Patient Administration & Auto Billing
9. Sue Heron - Patient Administration & Auto Billing
Cedar Consulting
 
8. Chris Pannell - PeopleSoft Optimisation Impact
8. Chris Pannell - PeopleSoft Optimisation Impact8. Chris Pannell - PeopleSoft Optimisation Impact
8. Chris Pannell - PeopleSoft Optimisation Impact
Cedar Consulting
 
20. Marc Weintraub - PeopleSoft Keynote - The PeopleSoft Investment Strategy
20. Marc Weintraub - PeopleSoft Keynote - The PeopleSoft Investment Strategy20. Marc Weintraub - PeopleSoft Keynote - The PeopleSoft Investment Strategy
20. Marc Weintraub - PeopleSoft Keynote - The PeopleSoft Investment Strategy
Cedar Consulting
 
19. Graham Smith & Sarah Hurley - Implementing the Oracle Vision For PeopleSo...
19. Graham Smith & Sarah Hurley - Implementing the Oracle Vision For PeopleSo...19. Graham Smith & Sarah Hurley - Implementing the Oracle Vision For PeopleSo...
19. Graham Smith & Sarah Hurley - Implementing the Oracle Vision For PeopleSo...
Cedar Consulting
 
6. Paul Smit - Global Payroll Update & Roadmap June 2017
6. Paul Smit - Global Payroll Update & Roadmap June 20176. Paul Smit - Global Payroll Update & Roadmap June 2017
6. Paul Smit - Global Payroll Update & Roadmap June 2017
Cedar Consulting
 

More from Cedar Consulting (20)

Cedar Day 2018 - Cloud IaaS - Ken MacMahon
Cedar Day 2018 - Cloud IaaS - Ken MacMahonCedar Day 2018 - Cloud IaaS - Ken MacMahon
Cedar Day 2018 - Cloud IaaS - Ken MacMahon
 
Cedar Day 2018 - Winning PeopleSoft Innovator - Kevin Gavaghan
Cedar Day 2018 - Winning PeopleSoft Innovator - Kevin GavaghanCedar Day 2018 - Winning PeopleSoft Innovator - Kevin Gavaghan
Cedar Day 2018 - Winning PeopleSoft Innovator - Kevin Gavaghan
 
Cedar Day 2018 - Smarter Customisation at 9.2 - Graham Smith & Sarah Hurley
Cedar Day 2018 - Smarter Customisation at 9.2 - Graham Smith & Sarah HurleyCedar Day 2018 - Smarter Customisation at 9.2 - Graham Smith & Sarah Hurley
Cedar Day 2018 - Smarter Customisation at 9.2 - Graham Smith & Sarah Hurley
 
Cedar Day 2018 - Integrating PeopleSoft Payroll - Alex Lightstone
Cedar Day 2018 - Integrating PeopleSoft Payroll - Alex LightstoneCedar Day 2018 - Integrating PeopleSoft Payroll - Alex Lightstone
Cedar Day 2018 - Integrating PeopleSoft Payroll - Alex Lightstone
 
Cedar Day 2018 - HCM 9.2 Top Ten Enhancements - Russell Lakin
Cedar Day 2018 - HCM 9.2 Top Ten Enhancements - Russell LakinCedar Day 2018 - HCM 9.2 Top Ten Enhancements - Russell Lakin
Cedar Day 2018 - HCM 9.2 Top Ten Enhancements - Russell Lakin
 
Cedar Day 2018 - How to Create Business Value from Your PeopleSoft HCM Techno...
Cedar Day 2018 - How to Create Business Value from Your PeopleSoft HCM Techno...Cedar Day 2018 - How to Create Business Value from Your PeopleSoft HCM Techno...
Cedar Day 2018 - How to Create Business Value from Your PeopleSoft HCM Techno...
 
Cedar Day 2018 - Avoid Top Payroll Errors
Cedar Day 2018 -  Avoid Top Payroll ErrorsCedar Day 2018 -  Avoid Top Payroll Errors
Cedar Day 2018 - Avoid Top Payroll Errors
 
18. Madhur Hemnani - Result Orientated Innovation with Oracle HR Analytics
18. Madhur Hemnani - Result Orientated Innovation with Oracle HR Analytics18. Madhur Hemnani - Result Orientated Innovation with Oracle HR Analytics
18. Madhur Hemnani - Result Orientated Innovation with Oracle HR Analytics
 
17. Graham Smith - PeopleSoft in the Cloud 2017
17. Graham Smith - PeopleSoft in the Cloud 201717. Graham Smith - PeopleSoft in the Cloud 2017
17. Graham Smith - PeopleSoft in the Cloud 2017
 
16. Hays, Oxfam & BAT - Maintaining PeopleSoft at 9.2
16. Hays, Oxfam & BAT -  Maintaining PeopleSoft at 9.216. Hays, Oxfam & BAT -  Maintaining PeopleSoft at 9.2
16. Hays, Oxfam & BAT - Maintaining PeopleSoft at 9.2
 
15. Gary Winstanley - The Lucy Group Story
15. Gary Winstanley - The Lucy Group Story15. Gary Winstanley - The Lucy Group Story
15. Gary Winstanley - The Lucy Group Story
 
14. Alex Lightstone & Bill Prescot - Exploiting PeopleSoft Query & Pivot Grids
14. Alex Lightstone & Bill Prescot - Exploiting PeopleSoft Query & Pivot Grids14. Alex Lightstone & Bill Prescot - Exploiting PeopleSoft Query & Pivot Grids
14. Alex Lightstone & Bill Prescot - Exploiting PeopleSoft Query & Pivot Grids
 
13. Neville Varnham - PeopleSoft Cyber Security
13. Neville Varnham - PeopleSoft Cyber Security13. Neville Varnham - PeopleSoft Cyber Security
13. Neville Varnham - PeopleSoft Cyber Security
 
11. Transforming Recruitment at CMS UK
11. Transforming Recruitment at CMS UK11. Transforming Recruitment at CMS UK
11. Transforming Recruitment at CMS UK
 
10. Linda Pullan - Important Changes to Payroll
10. Linda Pullan - Important Changes to Payroll10. Linda Pullan - Important Changes to Payroll
10. Linda Pullan - Important Changes to Payroll
 
9. Sue Heron - Patient Administration & Auto Billing
9. Sue Heron - Patient Administration & Auto Billing9. Sue Heron - Patient Administration & Auto Billing
9. Sue Heron - Patient Administration & Auto Billing
 
8. Chris Pannell - PeopleSoft Optimisation Impact
8. Chris Pannell - PeopleSoft Optimisation Impact8. Chris Pannell - PeopleSoft Optimisation Impact
8. Chris Pannell - PeopleSoft Optimisation Impact
 
20. Marc Weintraub - PeopleSoft Keynote - The PeopleSoft Investment Strategy
20. Marc Weintraub - PeopleSoft Keynote - The PeopleSoft Investment Strategy20. Marc Weintraub - PeopleSoft Keynote - The PeopleSoft Investment Strategy
20. Marc Weintraub - PeopleSoft Keynote - The PeopleSoft Investment Strategy
 
19. Graham Smith & Sarah Hurley - Implementing the Oracle Vision For PeopleSo...
19. Graham Smith & Sarah Hurley - Implementing the Oracle Vision For PeopleSo...19. Graham Smith & Sarah Hurley - Implementing the Oracle Vision For PeopleSo...
19. Graham Smith & Sarah Hurley - Implementing the Oracle Vision For PeopleSo...
 
6. Paul Smit - Global Payroll Update & Roadmap June 2017
6. Paul Smit - Global Payroll Update & Roadmap June 20176. Paul Smit - Global Payroll Update & Roadmap June 2017
6. Paul Smit - Global Payroll Update & Roadmap June 2017
 

Recently uploaded

Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 

Recently uploaded (20)

Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 

Cedar Day 2018 - Is Your PeopleSoft Ready for the GDPR - Sarah Hurley

  • 1. Is Your PeopleSoft Ready For the GDPR? 48 Hours to Go... Oracle HCM Cloud & PeopleSoft Cedar Day 2018 Wednesday, 23rd May 2018 Sarah Hurley, Cedar Consulting
  • 3. The GDPR on a Page 3
  • 4. The GDPR on a Page 4 ₋ Lawful, fair, and transparent ₋ Purpose limitation ₋ Data minimization ₋ Accurate and up-to-date processing ₋ Limitation of storage ₋ Confidential and secure ₋ Accountability andliability 7 Principles:
  • 5. Data Classification PeopleSoft captures a plethora of personal and sensitive data Examples of this data can include the following depending on context: – Name – Ethnic or racial origin – Political opinions – Memberships – Physical or mental health details – Criminal orcivil offenses – IP Address – Photo – Meal Preferences Personal and Sensitive Data ORACLE©. (2018, May). Be in the Know for PeopleSoft HCM Data Privacy [Webinar].
  • 6. Data Classification  The Personally Identifiable and Sensitive data (doc ID 2313438.1) is being updated (likely this month) with NA payroll and benefits being added  Future plans:  An online (in app) version of the tool is being released which will allow the addition of custom fields  Additional spreadsheets being launched for FSCM, ELM and CRM
  • 7. Data Classification Oracle’s Mockup of the Online Identification and Usage solution
  • 8. Data Masking  Masking of production environments in the user interface (security driven) – released in PI 26 – currently limited to:  Date of Birth  National ID  Bank Account Number (all but last 4 digits)  This document is really useful: Implementing Sensitive Data Masking (Doc ID 2375376.1)
  • 9. Data Masking  Future plans:  A more configurable approach to managing personal and sensitive data is planned in the form of a Data Privacy Framework  Field level security as masked, hidden or display-only  Full or partial masking  Support custom masking formats  Any personal or sensitive data field on any transaction  Role security or additional controls (country or reg region)
  • 10. Data Right to be Forgotten  Person Delete – improved in Image 25 & 26  Data deleted from all tables with Emplid field  Configure records excluded from delete e.g. Audit tables  Individuals ignored with payroll calcs (can be overridden)  Applicant delete available since image 25  Future plans  Integration from HCM to notify ‘subscribers’ that emp info has been deleted (FSCM, ELM, CRM and third party systems integrated with IB)  Learner delete in ELM
  • 11. Data Right to be Forgotten  Data Archive Manager is already available to day (PeopleTools)  Configurable framework supports data retention policies  Defines tables/records to be archived  Identifies criteria for rows of data to be archived (query)  Allows archive, delete and restore  Sample templates delivered for many products  Use person or applicant delete for individuals, use Data Archive Manager for rules based (specific countries, timeframes etc)
  • 12. Data Subject Consent  The Acknowledgement Framework was delivered in PI 26 (configurable)  RTF text display  Used for acknowledgements and agreements  Electronic signature capture and audit trail  Verify identity of individual  Can be added as a step in an activity guide  Example is delivered in onboarding  PeopleSoft HCM Acknowledgement Framework Red Paper (Doc ID 2377140.1)
  • 13. Auditing  Future plans  A solution is needed to track who viewed information  Ability to configure (rather than customize) the transactions which are audited  Most third party solutions today usually track the SQL request of data (what was retrieved from the database), this does not mean the data was actually viewed since it could be hidden in the User Interface
  • 14. Right to Portability PeopleSoft provides a number of methods to report on and extract information from the application:  “Grids” in the PeopleSoft UI on a transaction page allow download to Excel  Query Manager reports/extracts data to the browser, file, spreadsheet, or XML  Pivot Grids leverage queries to generate analytics similar to those provided by common software such as Microsoft Excel  BI Publisher formats reports based on a data input source  Structure Query Reporting (SQR) is a development tool for complex extraction, formatting, and reporting of data from PeopleSoft or other data sources  Many sample queries, analytics, and reports are delivered by the application
  • 15. Privacy by Design… PEOPLE People • Employees/Customers Suppliers • Users • IT/Security
  • 16. Privacy by Design… PROCESSPEOPLE Process • Threat Management • Consent Management • Third Party Due Diligence • Access Management People • Employees/Customers Suppliers • Users • IT/Security
  • 17. Privacy by Design… TECHNOLOGY PROCESSPEOPLE PRIVACY BY DESIGN Process • Threat Management • Consent Management • Third Party Due Diligence • Access Management People • Employees/Customers Suppliers • Users • IT/Security Technology • Vulnerability Management (patching) • Pseudoanonymisation/ Anonymisation • Data Classification and Retention
  • 18. Privacy by Design… TECHNOLOGY PROCESSPEOPLE PRIVACY BY DESIGN PRIVACY BY DESIGN WHERE THESE AREAS INTERSECT
  • 19. Cedar Security Assessment Client completes Cedar PS Security Questionnaire Cedar join the client on site looking at relevant configuration and questionnaire follow-up Cedar deliver “PS Security Assessment” with vulnerabilities graded and suggested remediation Cedar present report on site to allow for an in depth discussion re vulnerabilities and next steps Initial Assessment Onsite Consultancy Security Assessment Findings Delivered 01 02 03 04
  • 20. Cedar Security Assessment Better appreciation of PeopleSoft patching A patching strategy in place including recommended PeopleTools upgrades Key vulnerabilities remediated Proposals for improved IS procedures Suggested infrastructure and/or architecture changes
  • 21. Automated Data Anonymisation Production Data Individual Identifiable Lower Environments (e.g. Test)Anonymisation Scripts Individual Not Identifiable
  • 22. Automated Data Anonymisation Production Data Individual Identifiable Lower Environments (e.g. Test)Anonymisation Scripts Individual Not Identifiable Cedar are in the early stages of development of a configurable anonymisation tool for PeopleSoft.
  • 23. Next Steps Assess Vulnerabilities •-Security Assessment •-GDPR Programme •-Disaster Recovery •-Penetration Testing •-Selective Adoption Strategy Review Architecture -Data Classification -Production -Non Production -Interfaces -Third party due diligence Review Processes Joiners/Leavers/Movers Data Retention Lawful Processing • GDPR is a marathon not a sprint. • Look for the quickest wins ‘low hanging fruit’ • New technology might not be the answer • GDPR compliance is the responsibility of EVERY employee of a company (make sure they understand) Tips: