SlideShare a Scribd company logo
1 of 50
Download to read offline
Creating a GDPR Action
Plan; Not Freakout Plan
Webinar slide deck: May 22nd, 2018
| 2
Watch the recorded webinar
http://bit.ly/2MVhON9
| 3
Mediacurrent is a full-service digital agency that
implements world class open source software
development, strategy and design to achieve defined
goals for enterprise organizations seeking a better
return on investment.
Who We Are
| 4
Today’s Team
Dawn Aly
VP, Digital Strategy
Mediacurrent
@dawnashleealy
Mark Shropshire
Open Source Security Lead
Mediacurrent
@shrop
| 5
Disclaimers
1. We are not lawyers.
2. This session is not a replacement for
legal council.
3. The scope of this talk is on the website
and not overall compliance.
| 6
Today’s Agenda
I. Guiding Principles of the GDPR
II. Creating a Positive PX
III. Security by Design
IV. Advanced Marketing Strategies
in a Post GDPR World
V. Creating an Action Plan
(not a Freak-Out Plan)
| 7
60%
The percentage of organizations that are at risk of
missing the GDPR compliance deadline.
Only 7% of surveyed organizations say they are in full
compliance with GDPR requirements today.
-Crowd Research Partners 2018 GDPR Compliance Report
| 8
Guiding Principles of the GDPR
GDPR (General Data Protection Regulation)
| 9
What is GDPR?
GDPR (General Data Protection Regulation), adopted by the the European Union
Parliament April 27, 2016, intends to give individuals in the EU the ability to control
their personal data. International businesses will benefit by having simpler clarity
around user privacy related regulations, leading to consistent implementations.
The GDPR become enforceable on May 25th, 2018 and replaces the 1995 Data
Protection Directive.
Searchable GDPR: https://gdpr.algolia.com
Source: https://www.eugdpr.org
| 10
Who is at Risk for Compliance?
Anyone who can say yes to at least one of the following:
● Do you have a website with international traffic?
● Do you use a CRM or Marketing Automation platform?
● Does your site have an analytics platform like Google Analytics?
● Does your website use cookies?
● Does your website collect personal information? Anything from a store or a
contact form counts!
● Can users log in to your website?
| 11
Yep. Pretty much
everyone.
| 12
The GDPR is not just an IT Discussion
43%of cyber attacks targeted
small businesses in 2015
$150 millionanticipated increase of data breach costs by 2020
89%Believe their competitive
advantage will be based on
the customer experience
85%Percentage of relationships
consumers will manage
without talking to a
human by 2020
Sources: Gartner, Gartner, Symantec, Microsoft, Juniper Research
$3.8 millioncost of a data breach for the average company
| 13
GDPR Roles
Legal entity or person
processing the actual
data on behalf of the
controller
GDPR required leadership position in
organizations for monitoring internal
GDPR compliance
Legal entity or person
determining need and
means for processing
personal data
Data Subject
Individual
whose personal
data has been
collected
Public authority appointed in EU
countries for monitoring
compliance of GDPR
Supervisory
Authority
Controller Processor
Data
Protection
Officer
| 14
User Rights and Requirements Overview
Right to Erasure
Breach Notification
Data Portability
Right to Access
Data Protection OfficersPrivacy by Design
| 15
Key Challenges Ahead
● Implementation requirements
are vague and often require
interpretation
● Compliance and continued
process improvements will come
at a cost to organizations
Fines up to 20 million
EUR or 4% or annual
global turnover for
noncompliance
| 16
Creating a Positive PX
PX (Privacy Experience)
| 17
Data + Privacy
doesn’t have to
be scary.
| 18
Universal PX Principles
● Always be transparent with users
● Use easy to understand language / no “lawyer speak”
● Consent must be given and not assumed
● Protect user data
● Don’t collect more than absolutely necessary
● User must have the right to be forgotten
● Follow security and privacy by design methodologies
| 19PX Do’s and Don’ts
Data Collection Transparency Data Portability
Do’s
Don’ts
● Know what you collect
● Only retain for as long as you
need
● Protect data with encryption
● Audit and log
● Have clear privacy policies
● Let users know how you use
data and why
● Give users the right to decide
how and when data is
processed and shared
● Explain things in easy to
understand language
● Allow users control over their
data including:
○ Exporting data
○ Deleting data
○ Seeing the details of
their stored data
● Collect any PII that you don’t
absolutely need
● Allow anyone or system
access to data who doesn’t
have legitimate reason for
processing
● Hide who you share data with
and why you share it with
them
● Force users to opt-out (opt-in
should be the pattern)
● Create hard to read privacy
policies and other
documents related to data
privacy
● Rely on blanket consents
● Make it hard for users to
export data in a standard
format that is usable for
imports to other systems and
services
● Delay processing user
request for deletion, export,
or reporting
| 20
Pinterest Example
What works?
● Banner is located in a high
engagement section.
What doesn’t work?
● Poorly worded language
implies you should Accept
without seeing the changes.
● Links don’t easily outline the
differences between the
previous and the new policies.
| 21
Twitter Example
What works?
● Overlay is prominent.
● Clear, easy to understand language.
● Explains current settings.
● CTAs and features allows users to
control specific settings.
What could be better?
● Change sharing from an opt-out to an
opt-in process.
| 22
Security by Design
No waiting till launch time!
| 23
Secure by Design
Secure by design, in software engineering, means that
the software has been designed from the ground up to
be secure. Malicious practices are taken for granted and
care is taken to minimize impact when a security
vulnerability is discovered or on invalid user input.
https://en.wikipedia.org/wiki/Secure_by_design
| 24
Privacy and Security SDLC
1. PLANNING
Document and understand security
controls and regulatory requirements to
include in feature planning.
Software
Development
Life Cycle
3. TESTING
Identify defects through review
and testing controls guided by
security and privacy requirements.
4. DOCUMENTATION
Document detailed project feature
implementations and processes
and how they apply to security and
privacy requirements.
5. DEPLOYMENT
Release software to production
environments after approved
through agreed upon processes.
6. MAINTENANCE
Consider and implement changes
to controls and regulations
affecting the project.
2. IMPLEMENTATION
Development with security and
privacy controls in mind.
Privacy and Security
| 25
Security and Privacy Principles
● Limit attack surface
● Keep solutions simple
● Encrypt PII (Personally Identifiable Information)
● Know your regulatory requirements: FERPA, GDPR,
HIPAA, PCI DSS, CAN SPAM etc.
● Write policies and procedures and then follow them
● Automate auditing and compliance processes
● Log events and transactions
| 26
Notorious PII (Personally Identifiable Information) Locations
● User profiles and accounts
● Web personalization data
● Webform data
● Data import and export files and database tables
● Geolocation data
● Server log files
● Database backups
| 27
Data encryption is a high-value GDPR
compliance implementation technique
| 28
One encryption key
per user
Source: Townsend Security
Delete key and
user is forgotten
Right to be Forgotten
| 29
● User data erasure
● User data reporting and export
○ Data portability
● Log and database backup retention
Automate Processes
| 30
Advanced Marketing Strategies
In a Post GDPR World
| 31
Make Trust Your
Competitive
Advantage
Sources: Inc.com, Label Insight, Harvard Business Review
94%
of customers are likely
to be more loyal to
transparent brands
| 32
Big Data May Not Be So Big
and definitely comes with
bigger responsibility
| 33
GDPR Benefits to Data
● Improved data quality because it’s submitted
by the people it describes
● Potential reduction in data cleansing costs
● Marketing strategies will be in-line with
customer desires vs marketers assuming what
they want
Sources: Altimeter
| 34
Google Analytics Retention
https://www.mediacurrent.com/blog/google-analytics-data-retention-controls-and-gdpr
| 35
Marketing Automation and CRM
● Be able to prove you have consent- even on
past opt-ins
● Consent for one campaign doesn’t mean
consent for all
● Talk with your Marketing Automation and CRM
platforms to see if they offer tools.
○ Just because they say they are
compliant, does not mean by default you
are too
| 36
Salesforce Email Opt-In Example
| 37
Opportunity for More Data
Screenshots from the Drupal Association and Twitter
| 38
Creating an Action Plan
Not a Freak-Out Plan
| 39
Enforcement begins May 25, 2018
| 40
PX takes a team.
| 41
● Opt-in language
● Privacy policy & legal
documents
● Internal messaging
around value and
marketing impact
Creating a Plan
● Data portability
● Revoking consent
● Data erasure
● Consent
customization
● What are we
collecting & why
● Active vs. passive
● Storage & encryption
● Integration points
Data Collection Points Messaging and Consent User Control
| 42
Example of Data Collection Points Audit
| 43
Example Website Opt-Ins
Hooray an Overlay
Here is some text about our
cookies, what they do, and
why they’re helpful for you.
Here’s some info about where
to learn more.
Would you like to opt-in?
Yes No
Hooray an Overlay
Here is some text about our
cookies, what they do, and
why they’re helpful for you.
Here’s some info about where
to learn more.
Would you like to opt-in?
Yes Review Settings
| 44
Example User Controls
| 45
Next Steps
● Legal should assess risk
● Create/update security and privacy policies
● Technology teams prioritize remediations
● Implement remediations
● Document plans, remediations and next steps
● Automate processes
● Rinse and repeat
| 46
Let’s Talk Worst Case Scenario
| 47
Absolute Minimums
Planning
● Write out your GDPR plan
including any audits you may
need to conduct
● Document all compliance efforts
● Include your rationale in all
documents
● Set aside untouchable time for
maintenance and improvements
on a regular basis
Execution
● Appoint a Data Protection Officer
● Apply any patches or security
updates available to your system
● Improve the clarity of your
Privacy Policy
● Seek consent from users
(newsletter, cookies, etc)
● Give users an easy way to
contact you about their data
● Update Google Analytics
| 48
PX is the new
Golden Rule
Want to keep the conversation going?
Mediacurrent
Feel free to message Dawn or Mark with any questions you have
on getting your site GDPR compliant!
Dawn - dawn.aly@mediacurrent.com
shrop - mark.shropshire@mediacurrent.com
Have a GDPR project to discuss for your
organization? We can help!
@Mediacurrent Mediacurrent.comfacebook.com/mediacurrent
Thank you!

More Related Content

What's hot

Security architecture - Perform a gap analysis
Security architecture - Perform a gap analysisSecurity architecture - Perform a gap analysis
Security architecture - Perform a gap analysisCarlo Dapino
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness SnapComms
 
Netskope Overview
Netskope OverviewNetskope Overview
Netskope OverviewNetskope
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Preventiondj1arry
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Edureka!
 
ITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud IBM Security
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak preventionAriel Evans
 
microsoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptxmicrosoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptxGenericName6
 
Introduction to Cyber Resilience
Introduction to Cyber ResilienceIntroduction to Cyber Resilience
Introduction to Cyber ResiliencePeter Wood
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsShawn Tuma
 
Introduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkIntroduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkTuan Phan
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss PreventionReza Kopaee
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​AlgoSec
 

What's hot (20)

Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
 
Security architecture - Perform a gap analysis
Security architecture - Perform a gap analysisSecurity architecture - Perform a gap analysis
Security architecture - Perform a gap analysis
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Netskope Overview
Netskope OverviewNetskope Overview
Netskope Overview
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
CSSLP Course
CSSLP CourseCSSLP Course
CSSLP Course
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
ITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU Cybersecurity Capabilities
ITU Cybersecurity Capabilities
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak prevention
 
microsoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptxmicrosoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptx
 
Introduction to Cyber Resilience
Introduction to Cyber ResilienceIntroduction to Cyber Resilience
Introduction to Cyber Resilience
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
 
Introduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkIntroduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity Framework
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Mobile Hacking
Mobile HackingMobile Hacking
Mobile Hacking
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​
 
DLP
DLPDLP
DLP
 
Gdpr presentation
Gdpr presentationGdpr presentation
Gdpr presentation
 

Similar to Creating a GDPR Action Plan; Not a Freakout Plan

Toreon adding privacy by design in secure application development oss18 v20...
Toreon adding privacy by design in secure application development   oss18 v20...Toreon adding privacy by design in secure application development   oss18 v20...
Toreon adding privacy by design in secure application development oss18 v20...Sebastien Deleersnyder
 
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital MarketersOne North
 
CCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
CCPA Compliance from Ground Zero: Start to Finish with TrustArc SolutionsCCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
CCPA Compliance from Ground Zero: Start to Finish with TrustArc SolutionsTrustArc
 
How to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected DataHow to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected DataNeo4j
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityPriyanka Aash
 
MMV Webinar 1. GDPR Perspectives. November 2017
MMV Webinar 1. GDPR Perspectives. November 2017MMV Webinar 1. GDPR Perspectives. November 2017
MMV Webinar 1. GDPR Perspectives. November 2017Match-Maker Ventures
 
A Brief Overview on GDPR
A Brief Overview on GDPRA Brief Overview on GDPR
A Brief Overview on GDPRNeha Patel
 
2 -2-6 kista watson summit-gdpr how ibm preparing hogg-sm
2 -2-6 kista watson summit-gdpr how ibm preparing hogg-sm2 -2-6 kista watson summit-gdpr how ibm preparing hogg-sm
2 -2-6 kista watson summit-gdpr how ibm preparing hogg-smIBM Sverige
 
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in ComplianceThe GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in ComplianceObservePoint
 
GDPR and Remote Access Security: What You Need To Know
GDPR and Remote Access Security: What You Need To KnowGDPR and Remote Access Security: What You Need To Know
GDPR and Remote Access Security: What You Need To KnowBomgar
 
5 Signs Your Privacy Management Program is Not Working for You
5 Signs Your Privacy Management Program is Not Working for You5 Signs Your Privacy Management Program is Not Working for You
5 Signs Your Privacy Management Program is Not Working for YouTrustArc
 
Impact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A SecurityImpact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A SecurityEQS Group
 
Practical steps to GDPR compliance
Practical steps to GDPR compliance Practical steps to GDPR compliance
Practical steps to GDPR compliance Jean-Michel Franco
 
BigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesBigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesDimitri Sirota
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceAdrian Dumitrescu
 
Accelerating Your GDPR Compliance with the WSO2 Platform
Accelerating Your GDPR Compliance with the WSO2 PlatformAccelerating Your GDPR Compliance with the WSO2 Platform
Accelerating Your GDPR Compliance with the WSO2 PlatformWSO2
 
Cracking the Code- Expert Tips for Mastering GRC CollabDays Bletchley Sept 23...
Cracking the Code- Expert Tips for Mastering GRC CollabDays Bletchley Sept 23...Cracking the Code- Expert Tips for Mastering GRC CollabDays Bletchley Sept 23...
Cracking the Code- Expert Tips for Mastering GRC CollabDays Bletchley Sept 23...Nikki Chapple
 
The Next Gen Auditor - Auditing through technological disruptions
The Next Gen Auditor - Auditing through technological disruptionsThe Next Gen Auditor - Auditing through technological disruptions
The Next Gen Auditor - Auditing through technological disruptionsBharath Rao
 

Similar to Creating a GDPR Action Plan; Not a Freakout Plan (20)

Toreon adding privacy by design in secure application development oss18 v20...
Toreon adding privacy by design in secure application development   oss18 v20...Toreon adding privacy by design in secure application development   oss18 v20...
Toreon adding privacy by design in secure application development oss18 v20...
 
GDPR- The Buck Stops Here
GDPR-  The Buck Stops HereGDPR-  The Buck Stops Here
GDPR- The Buck Stops Here
 
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
 
CCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
CCPA Compliance from Ground Zero: Start to Finish with TrustArc SolutionsCCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
CCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
 
How to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected DataHow to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected Data
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
MMV Webinar 1. GDPR Perspectives. November 2017
MMV Webinar 1. GDPR Perspectives. November 2017MMV Webinar 1. GDPR Perspectives. November 2017
MMV Webinar 1. GDPR Perspectives. November 2017
 
A Brief Overview on GDPR
A Brief Overview on GDPRA Brief Overview on GDPR
A Brief Overview on GDPR
 
2 -2-6 kista watson summit-gdpr how ibm preparing hogg-sm
2 -2-6 kista watson summit-gdpr how ibm preparing hogg-sm2 -2-6 kista watson summit-gdpr how ibm preparing hogg-sm
2 -2-6 kista watson summit-gdpr how ibm preparing hogg-sm
 
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in ComplianceThe GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
 
GDPR and Remote Access Security: What You Need To Know
GDPR and Remote Access Security: What You Need To KnowGDPR and Remote Access Security: What You Need To Know
GDPR and Remote Access Security: What You Need To Know
 
5 Signs Your Privacy Management Program is Not Working for You
5 Signs Your Privacy Management Program is Not Working for You5 Signs Your Privacy Management Program is Not Working for You
5 Signs Your Privacy Management Program is Not Working for You
 
Impact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A SecurityImpact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A Security
 
Practical steps to GDPR compliance
Practical steps to GDPR compliance Practical steps to GDPR compliance
Practical steps to GDPR compliance
 
BigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesBigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar Slides
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
Accelerating Your GDPR Compliance with the WSO2 Platform
Accelerating Your GDPR Compliance with the WSO2 PlatformAccelerating Your GDPR Compliance with the WSO2 Platform
Accelerating Your GDPR Compliance with the WSO2 Platform
 
2016 11-17-gdpr-integro-webinar
2016 11-17-gdpr-integro-webinar2016 11-17-gdpr-integro-webinar
2016 11-17-gdpr-integro-webinar
 
Cracking the Code- Expert Tips for Mastering GRC CollabDays Bletchley Sept 23...
Cracking the Code- Expert Tips for Mastering GRC CollabDays Bletchley Sept 23...Cracking the Code- Expert Tips for Mastering GRC CollabDays Bletchley Sept 23...
Cracking the Code- Expert Tips for Mastering GRC CollabDays Bletchley Sept 23...
 
The Next Gen Auditor - Auditing through technological disruptions
The Next Gen Auditor - Auditing through technological disruptionsThe Next Gen Auditor - Auditing through technological disruptions
The Next Gen Auditor - Auditing through technological disruptions
 

More from Mediacurrent

Penn State News: Pivoting to Decoupled Drupal with Gatsby
Penn State News: Pivoting to Decoupled Drupal with GatsbyPenn State News: Pivoting to Decoupled Drupal with Gatsby
Penn State News: Pivoting to Decoupled Drupal with GatsbyMediacurrent
 
Evolving How We Measure Digital Success in Higher Ed
Evolving How We Measure Digital Success in Higher EdEvolving How We Measure Digital Success in Higher Ed
Evolving How We Measure Digital Success in Higher EdMediacurrent
 
Penn State scales static Drupal to new heights
Penn State scales static Drupal to new heightsPenn State scales static Drupal to new heights
Penn State scales static Drupal to new heightsMediacurrent
 
Delivering Meaningful Digital Experiences in Higher Ed
Delivering Meaningful Digital Experiences in Higher EdDelivering Meaningful Digital Experiences in Higher Ed
Delivering Meaningful Digital Experiences in Higher EdMediacurrent
 
Content Strategy: Building Connections with Your Audience
Content Strategy: Building Connections with Your AudienceContent Strategy: Building Connections with Your Audience
Content Strategy: Building Connections with Your AudienceMediacurrent
 
Decoupled Drupal and Gatsby in the Real World
Decoupled Drupal and Gatsby in the Real WorldDecoupled Drupal and Gatsby in the Real World
Decoupled Drupal and Gatsby in the Real WorldMediacurrent
 
A Better Way to Build and Manage Sites with Rain for Drupal 9
A Better Way to Build and Manage Sites with Rain for Drupal 9A Better Way to Build and Manage Sites with Rain for Drupal 9
A Better Way to Build and Manage Sites with Rain for Drupal 9Mediacurrent
 
Drupal Security: What You Need to Know
Drupal Security: What You Need to KnowDrupal Security: What You Need to Know
Drupal Security: What You Need to KnowMediacurrent
 
Leveraging Design Systems to Streamline Web Projects
Leveraging Design Systems to Streamline Web ProjectsLeveraging Design Systems to Streamline Web Projects
Leveraging Design Systems to Streamline Web ProjectsMediacurrent
 
Reimagining Your Higher Ed Web Strategy
Reimagining Your Higher Ed Web StrategyReimagining Your Higher Ed Web Strategy
Reimagining Your Higher Ed Web StrategyMediacurrent
 
How to Digitally Transform Higher Ed with Drupal
How to Digitally Transform Higher Ed with DrupalHow to Digitally Transform Higher Ed with Drupal
How to Digitally Transform Higher Ed with DrupalMediacurrent
 
Is my website accessible? Common mistakes (and how to fix them)
Is my website accessible? Common mistakes (and how to fix them)Is my website accessible? Common mistakes (and how to fix them)
Is my website accessible? Common mistakes (and how to fix them)Mediacurrent
 
Managing Images In Large Scale Drupal 8 & 9 Websites
Managing Images In Large Scale Drupal 8 & 9 WebsitesManaging Images In Large Scale Drupal 8 & 9 Websites
Managing Images In Large Scale Drupal 8 & 9 WebsitesMediacurrent
 
Paragraphs v Layout Builder - The Final Showdown
Paragraphs v Layout Builder - The Final ShowdownParagraphs v Layout Builder - The Final Showdown
Paragraphs v Layout Builder - The Final ShowdownMediacurrent
 
MagMutual.com: On the JAMStack with Gatsby and Drupal 8
 MagMutual.com: On the JAMStack with Gatsby and Drupal 8 MagMutual.com: On the JAMStack with Gatsby and Drupal 8
MagMutual.com: On the JAMStack with Gatsby and Drupal 8Mediacurrent
 
Creating an Organizational Culture of Giving Back to Drupal
Creating an Organizational Culture of Giving Back to DrupalCreating an Organizational Culture of Giving Back to Drupal
Creating an Organizational Culture of Giving Back to DrupalMediacurrent
 
Level Up Your Team: Front-End Development Best Practices
Level Up Your Team: Front-End Development Best PracticesLevel Up Your Team: Front-End Development Best Practices
Level Up Your Team: Front-End Development Best PracticesMediacurrent
 
Best Practices for Moving to Drupal 9
Best Practices for Moving to Drupal 9Best Practices for Moving to Drupal 9
Best Practices for Moving to Drupal 9Mediacurrent
 
How to Prove Marketing ROI: Overcoming Digital Marketing Challenges
How to Prove Marketing ROI: Overcoming Digital Marketing ChallengesHow to Prove Marketing ROI: Overcoming Digital Marketing Challenges
How to Prove Marketing ROI: Overcoming Digital Marketing ChallengesMediacurrent
 
Prepare Your Drupal 9 Action Plan
Prepare Your Drupal 9 Action Plan Prepare Your Drupal 9 Action Plan
Prepare Your Drupal 9 Action Plan Mediacurrent
 

More from Mediacurrent (20)

Penn State News: Pivoting to Decoupled Drupal with Gatsby
Penn State News: Pivoting to Decoupled Drupal with GatsbyPenn State News: Pivoting to Decoupled Drupal with Gatsby
Penn State News: Pivoting to Decoupled Drupal with Gatsby
 
Evolving How We Measure Digital Success in Higher Ed
Evolving How We Measure Digital Success in Higher EdEvolving How We Measure Digital Success in Higher Ed
Evolving How We Measure Digital Success in Higher Ed
 
Penn State scales static Drupal to new heights
Penn State scales static Drupal to new heightsPenn State scales static Drupal to new heights
Penn State scales static Drupal to new heights
 
Delivering Meaningful Digital Experiences in Higher Ed
Delivering Meaningful Digital Experiences in Higher EdDelivering Meaningful Digital Experiences in Higher Ed
Delivering Meaningful Digital Experiences in Higher Ed
 
Content Strategy: Building Connections with Your Audience
Content Strategy: Building Connections with Your AudienceContent Strategy: Building Connections with Your Audience
Content Strategy: Building Connections with Your Audience
 
Decoupled Drupal and Gatsby in the Real World
Decoupled Drupal and Gatsby in the Real WorldDecoupled Drupal and Gatsby in the Real World
Decoupled Drupal and Gatsby in the Real World
 
A Better Way to Build and Manage Sites with Rain for Drupal 9
A Better Way to Build and Manage Sites with Rain for Drupal 9A Better Way to Build and Manage Sites with Rain for Drupal 9
A Better Way to Build and Manage Sites with Rain for Drupal 9
 
Drupal Security: What You Need to Know
Drupal Security: What You Need to KnowDrupal Security: What You Need to Know
Drupal Security: What You Need to Know
 
Leveraging Design Systems to Streamline Web Projects
Leveraging Design Systems to Streamline Web ProjectsLeveraging Design Systems to Streamline Web Projects
Leveraging Design Systems to Streamline Web Projects
 
Reimagining Your Higher Ed Web Strategy
Reimagining Your Higher Ed Web StrategyReimagining Your Higher Ed Web Strategy
Reimagining Your Higher Ed Web Strategy
 
How to Digitally Transform Higher Ed with Drupal
How to Digitally Transform Higher Ed with DrupalHow to Digitally Transform Higher Ed with Drupal
How to Digitally Transform Higher Ed with Drupal
 
Is my website accessible? Common mistakes (and how to fix them)
Is my website accessible? Common mistakes (and how to fix them)Is my website accessible? Common mistakes (and how to fix them)
Is my website accessible? Common mistakes (and how to fix them)
 
Managing Images In Large Scale Drupal 8 & 9 Websites
Managing Images In Large Scale Drupal 8 & 9 WebsitesManaging Images In Large Scale Drupal 8 & 9 Websites
Managing Images In Large Scale Drupal 8 & 9 Websites
 
Paragraphs v Layout Builder - The Final Showdown
Paragraphs v Layout Builder - The Final ShowdownParagraphs v Layout Builder - The Final Showdown
Paragraphs v Layout Builder - The Final Showdown
 
MagMutual.com: On the JAMStack with Gatsby and Drupal 8
 MagMutual.com: On the JAMStack with Gatsby and Drupal 8 MagMutual.com: On the JAMStack with Gatsby and Drupal 8
MagMutual.com: On the JAMStack with Gatsby and Drupal 8
 
Creating an Organizational Culture of Giving Back to Drupal
Creating an Organizational Culture of Giving Back to DrupalCreating an Organizational Culture of Giving Back to Drupal
Creating an Organizational Culture of Giving Back to Drupal
 
Level Up Your Team: Front-End Development Best Practices
Level Up Your Team: Front-End Development Best PracticesLevel Up Your Team: Front-End Development Best Practices
Level Up Your Team: Front-End Development Best Practices
 
Best Practices for Moving to Drupal 9
Best Practices for Moving to Drupal 9Best Practices for Moving to Drupal 9
Best Practices for Moving to Drupal 9
 
How to Prove Marketing ROI: Overcoming Digital Marketing Challenges
How to Prove Marketing ROI: Overcoming Digital Marketing ChallengesHow to Prove Marketing ROI: Overcoming Digital Marketing Challenges
How to Prove Marketing ROI: Overcoming Digital Marketing Challenges
 
Prepare Your Drupal 9 Action Plan
Prepare Your Drupal 9 Action Plan Prepare Your Drupal 9 Action Plan
Prepare Your Drupal 9 Action Plan
 

Recently uploaded

Exploring The World Of Adult Ad Networks.pdf
Exploring The World Of Adult Ad Networks.pdfExploring The World Of Adult Ad Networks.pdf
Exploring The World Of Adult Ad Networks.pdfmarcuslary231
 
marketing strategy of tanishq word PPROJECT.pdf
marketing strategy of tanishq word PPROJECT.pdfmarketing strategy of tanishq word PPROJECT.pdf
marketing strategy of tanishq word PPROJECT.pdfarsathsahil
 
Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdf
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdfSnapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdf
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdfEastern Online-iSURVEY
 
SORA AI: Will It Be the Future of Video Creation?
SORA AI: Will It Be the Future of Video Creation?SORA AI: Will It Be the Future of Video Creation?
SORA AI: Will It Be the Future of Video Creation?Searchable Design
 
Jai Institute for Parenting Program Guide
Jai Institute for Parenting Program GuideJai Institute for Parenting Program Guide
Jai Institute for Parenting Program Guidekiva6
 
The Impact of Digital Technologies
The Impact of Digital Technologies The Impact of Digital Technologies
The Impact of Digital Technologies bruguardarib
 
TAM AdEx 2023 Cross Media Advertising Recap - Auto Sector
TAM AdEx 2023 Cross Media Advertising Recap - Auto SectorTAM AdEx 2023 Cross Media Advertising Recap - Auto Sector
TAM AdEx 2023 Cross Media Advertising Recap - Auto SectorSocial Samosa
 
Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...
Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...
Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...Search Engine Journal
 
What I learned from auditing over 1,000,000 websites - SERP Conf 2024 Patrick...
What I learned from auditing over 1,000,000 websites - SERP Conf 2024 Patrick...What I learned from auditing over 1,000,000 websites - SERP Conf 2024 Patrick...
What I learned from auditing over 1,000,000 websites - SERP Conf 2024 Patrick...Ahrefs
 
Best Persuasive selling skills presentation.pptx
Best Persuasive selling skills  presentation.pptxBest Persuasive selling skills  presentation.pptx
Best Persuasive selling skills presentation.pptxMasterPhil1
 
Word Count for Writers: Examples of Word Counts for Sample Genres
Word Count for Writers: Examples of Word Counts for Sample GenresWord Count for Writers: Examples of Word Counts for Sample Genres
Word Count for Writers: Examples of Word Counts for Sample GenresLisa M. Masiello
 
Common Culture: Paul Willis Symbolic Creativity
Common Culture: Paul Willis Symbolic CreativityCommon Culture: Paul Willis Symbolic Creativity
Common Culture: Paul Willis Symbolic CreativityMonishka Adhikari
 
DIGITAL MARKETING COURSE IN BTM -Influencer Marketing Strategy
DIGITAL MARKETING COURSE IN BTM -Influencer Marketing StrategyDIGITAL MARKETING COURSE IN BTM -Influencer Marketing Strategy
DIGITAL MARKETING COURSE IN BTM -Influencer Marketing StrategySouvikRay24
 
Social Samosa Guidebook for SAMMIES 2024.pdf
Social Samosa Guidebook for SAMMIES 2024.pdfSocial Samosa Guidebook for SAMMIES 2024.pdf
Social Samosa Guidebook for SAMMIES 2024.pdfSocial Samosa
 
定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一
定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一
定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一s SS
 
McDonald's: A Journey Through Time (PPT)
McDonald's: A Journey Through Time (PPT)McDonald's: A Journey Through Time (PPT)
McDonald's: A Journey Through Time (PPT)DEVARAJV16
 
Avoid the 2025 web accessibility rush: do not fear WCAG compliance
Avoid the 2025 web accessibility rush: do not fear WCAG complianceAvoid the 2025 web accessibility rush: do not fear WCAG compliance
Avoid the 2025 web accessibility rush: do not fear WCAG complianceDamien ROBERT
 
2024 SEO Trends for Business Success (WSA)
2024 SEO Trends for Business Success (WSA)2024 SEO Trends for Business Success (WSA)
2024 SEO Trends for Business Success (WSA)Jomer Gregorio
 
Mastering SEO in the Evolving AI-driven World
Mastering SEO in the Evolving AI-driven WorldMastering SEO in the Evolving AI-driven World
Mastering SEO in the Evolving AI-driven WorldScalenut
 

Recently uploaded (20)

Exploring The World Of Adult Ad Networks.pdf
Exploring The World Of Adult Ad Networks.pdfExploring The World Of Adult Ad Networks.pdf
Exploring The World Of Adult Ad Networks.pdf
 
marketing strategy of tanishq word PPROJECT.pdf
marketing strategy of tanishq word PPROJECT.pdfmarketing strategy of tanishq word PPROJECT.pdf
marketing strategy of tanishq word PPROJECT.pdf
 
Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdf
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdfSnapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdf
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdf
 
SORA AI: Will It Be the Future of Video Creation?
SORA AI: Will It Be the Future of Video Creation?SORA AI: Will It Be the Future of Video Creation?
SORA AI: Will It Be the Future of Video Creation?
 
Jai Institute for Parenting Program Guide
Jai Institute for Parenting Program GuideJai Institute for Parenting Program Guide
Jai Institute for Parenting Program Guide
 
The Impact of Digital Technologies
The Impact of Digital Technologies The Impact of Digital Technologies
The Impact of Digital Technologies
 
TAM AdEx 2023 Cross Media Advertising Recap - Auto Sector
TAM AdEx 2023 Cross Media Advertising Recap - Auto SectorTAM AdEx 2023 Cross Media Advertising Recap - Auto Sector
TAM AdEx 2023 Cross Media Advertising Recap - Auto Sector
 
Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...
Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...
Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...
 
What I learned from auditing over 1,000,000 websites - SERP Conf 2024 Patrick...
What I learned from auditing over 1,000,000 websites - SERP Conf 2024 Patrick...What I learned from auditing over 1,000,000 websites - SERP Conf 2024 Patrick...
What I learned from auditing over 1,000,000 websites - SERP Conf 2024 Patrick...
 
Best Persuasive selling skills presentation.pptx
Best Persuasive selling skills  presentation.pptxBest Persuasive selling skills  presentation.pptx
Best Persuasive selling skills presentation.pptx
 
Word Count for Writers: Examples of Word Counts for Sample Genres
Word Count for Writers: Examples of Word Counts for Sample GenresWord Count for Writers: Examples of Word Counts for Sample Genres
Word Count for Writers: Examples of Word Counts for Sample Genres
 
Common Culture: Paul Willis Symbolic Creativity
Common Culture: Paul Willis Symbolic CreativityCommon Culture: Paul Willis Symbolic Creativity
Common Culture: Paul Willis Symbolic Creativity
 
DIGITAL MARKETING COURSE IN BTM -Influencer Marketing Strategy
DIGITAL MARKETING COURSE IN BTM -Influencer Marketing StrategyDIGITAL MARKETING COURSE IN BTM -Influencer Marketing Strategy
DIGITAL MARKETING COURSE IN BTM -Influencer Marketing Strategy
 
Social Samosa Guidebook for SAMMIES 2024.pdf
Social Samosa Guidebook for SAMMIES 2024.pdfSocial Samosa Guidebook for SAMMIES 2024.pdf
Social Samosa Guidebook for SAMMIES 2024.pdf
 
定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一
定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一
定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一
 
McDonald's: A Journey Through Time (PPT)
McDonald's: A Journey Through Time (PPT)McDonald's: A Journey Through Time (PPT)
McDonald's: A Journey Through Time (PPT)
 
Avoid the 2025 web accessibility rush: do not fear WCAG compliance
Avoid the 2025 web accessibility rush: do not fear WCAG complianceAvoid the 2025 web accessibility rush: do not fear WCAG compliance
Avoid the 2025 web accessibility rush: do not fear WCAG compliance
 
2024 SEO Trends for Business Success (WSA)
2024 SEO Trends for Business Success (WSA)2024 SEO Trends for Business Success (WSA)
2024 SEO Trends for Business Success (WSA)
 
Mastering SEO in the Evolving AI-driven World
Mastering SEO in the Evolving AI-driven WorldMastering SEO in the Evolving AI-driven World
Mastering SEO in the Evolving AI-driven World
 

Creating a GDPR Action Plan; Not a Freakout Plan

  • 1. Creating a GDPR Action Plan; Not Freakout Plan Webinar slide deck: May 22nd, 2018
  • 2. | 2 Watch the recorded webinar http://bit.ly/2MVhON9
  • 3. | 3 Mediacurrent is a full-service digital agency that implements world class open source software development, strategy and design to achieve defined goals for enterprise organizations seeking a better return on investment. Who We Are
  • 4. | 4 Today’s Team Dawn Aly VP, Digital Strategy Mediacurrent @dawnashleealy Mark Shropshire Open Source Security Lead Mediacurrent @shrop
  • 5. | 5 Disclaimers 1. We are not lawyers. 2. This session is not a replacement for legal council. 3. The scope of this talk is on the website and not overall compliance.
  • 6. | 6 Today’s Agenda I. Guiding Principles of the GDPR II. Creating a Positive PX III. Security by Design IV. Advanced Marketing Strategies in a Post GDPR World V. Creating an Action Plan (not a Freak-Out Plan)
  • 7. | 7 60% The percentage of organizations that are at risk of missing the GDPR compliance deadline. Only 7% of surveyed organizations say they are in full compliance with GDPR requirements today. -Crowd Research Partners 2018 GDPR Compliance Report
  • 8. | 8 Guiding Principles of the GDPR GDPR (General Data Protection Regulation)
  • 9. | 9 What is GDPR? GDPR (General Data Protection Regulation), adopted by the the European Union Parliament April 27, 2016, intends to give individuals in the EU the ability to control their personal data. International businesses will benefit by having simpler clarity around user privacy related regulations, leading to consistent implementations. The GDPR become enforceable on May 25th, 2018 and replaces the 1995 Data Protection Directive. Searchable GDPR: https://gdpr.algolia.com Source: https://www.eugdpr.org
  • 10. | 10 Who is at Risk for Compliance? Anyone who can say yes to at least one of the following: ● Do you have a website with international traffic? ● Do you use a CRM or Marketing Automation platform? ● Does your site have an analytics platform like Google Analytics? ● Does your website use cookies? ● Does your website collect personal information? Anything from a store or a contact form counts! ● Can users log in to your website?
  • 11. | 11 Yep. Pretty much everyone.
  • 12. | 12 The GDPR is not just an IT Discussion 43%of cyber attacks targeted small businesses in 2015 $150 millionanticipated increase of data breach costs by 2020 89%Believe their competitive advantage will be based on the customer experience 85%Percentage of relationships consumers will manage without talking to a human by 2020 Sources: Gartner, Gartner, Symantec, Microsoft, Juniper Research $3.8 millioncost of a data breach for the average company
  • 13. | 13 GDPR Roles Legal entity or person processing the actual data on behalf of the controller GDPR required leadership position in organizations for monitoring internal GDPR compliance Legal entity or person determining need and means for processing personal data Data Subject Individual whose personal data has been collected Public authority appointed in EU countries for monitoring compliance of GDPR Supervisory Authority Controller Processor Data Protection Officer
  • 14. | 14 User Rights and Requirements Overview Right to Erasure Breach Notification Data Portability Right to Access Data Protection OfficersPrivacy by Design
  • 15. | 15 Key Challenges Ahead ● Implementation requirements are vague and often require interpretation ● Compliance and continued process improvements will come at a cost to organizations Fines up to 20 million EUR or 4% or annual global turnover for noncompliance
  • 16. | 16 Creating a Positive PX PX (Privacy Experience)
  • 17. | 17 Data + Privacy doesn’t have to be scary.
  • 18. | 18 Universal PX Principles ● Always be transparent with users ● Use easy to understand language / no “lawyer speak” ● Consent must be given and not assumed ● Protect user data ● Don’t collect more than absolutely necessary ● User must have the right to be forgotten ● Follow security and privacy by design methodologies
  • 19. | 19PX Do’s and Don’ts Data Collection Transparency Data Portability Do’s Don’ts ● Know what you collect ● Only retain for as long as you need ● Protect data with encryption ● Audit and log ● Have clear privacy policies ● Let users know how you use data and why ● Give users the right to decide how and when data is processed and shared ● Explain things in easy to understand language ● Allow users control over their data including: ○ Exporting data ○ Deleting data ○ Seeing the details of their stored data ● Collect any PII that you don’t absolutely need ● Allow anyone or system access to data who doesn’t have legitimate reason for processing ● Hide who you share data with and why you share it with them ● Force users to opt-out (opt-in should be the pattern) ● Create hard to read privacy policies and other documents related to data privacy ● Rely on blanket consents ● Make it hard for users to export data in a standard format that is usable for imports to other systems and services ● Delay processing user request for deletion, export, or reporting
  • 20. | 20 Pinterest Example What works? ● Banner is located in a high engagement section. What doesn’t work? ● Poorly worded language implies you should Accept without seeing the changes. ● Links don’t easily outline the differences between the previous and the new policies.
  • 21. | 21 Twitter Example What works? ● Overlay is prominent. ● Clear, easy to understand language. ● Explains current settings. ● CTAs and features allows users to control specific settings. What could be better? ● Change sharing from an opt-out to an opt-in process.
  • 22. | 22 Security by Design No waiting till launch time!
  • 23. | 23 Secure by Design Secure by design, in software engineering, means that the software has been designed from the ground up to be secure. Malicious practices are taken for granted and care is taken to minimize impact when a security vulnerability is discovered or on invalid user input. https://en.wikipedia.org/wiki/Secure_by_design
  • 24. | 24 Privacy and Security SDLC 1. PLANNING Document and understand security controls and regulatory requirements to include in feature planning. Software Development Life Cycle 3. TESTING Identify defects through review and testing controls guided by security and privacy requirements. 4. DOCUMENTATION Document detailed project feature implementations and processes and how they apply to security and privacy requirements. 5. DEPLOYMENT Release software to production environments after approved through agreed upon processes. 6. MAINTENANCE Consider and implement changes to controls and regulations affecting the project. 2. IMPLEMENTATION Development with security and privacy controls in mind. Privacy and Security
  • 25. | 25 Security and Privacy Principles ● Limit attack surface ● Keep solutions simple ● Encrypt PII (Personally Identifiable Information) ● Know your regulatory requirements: FERPA, GDPR, HIPAA, PCI DSS, CAN SPAM etc. ● Write policies and procedures and then follow them ● Automate auditing and compliance processes ● Log events and transactions
  • 26. | 26 Notorious PII (Personally Identifiable Information) Locations ● User profiles and accounts ● Web personalization data ● Webform data ● Data import and export files and database tables ● Geolocation data ● Server log files ● Database backups
  • 27. | 27 Data encryption is a high-value GDPR compliance implementation technique
  • 28. | 28 One encryption key per user Source: Townsend Security Delete key and user is forgotten Right to be Forgotten
  • 29. | 29 ● User data erasure ● User data reporting and export ○ Data portability ● Log and database backup retention Automate Processes
  • 30. | 30 Advanced Marketing Strategies In a Post GDPR World
  • 31. | 31 Make Trust Your Competitive Advantage Sources: Inc.com, Label Insight, Harvard Business Review 94% of customers are likely to be more loyal to transparent brands
  • 32. | 32 Big Data May Not Be So Big and definitely comes with bigger responsibility
  • 33. | 33 GDPR Benefits to Data ● Improved data quality because it’s submitted by the people it describes ● Potential reduction in data cleansing costs ● Marketing strategies will be in-line with customer desires vs marketers assuming what they want Sources: Altimeter
  • 34. | 34 Google Analytics Retention https://www.mediacurrent.com/blog/google-analytics-data-retention-controls-and-gdpr
  • 35. | 35 Marketing Automation and CRM ● Be able to prove you have consent- even on past opt-ins ● Consent for one campaign doesn’t mean consent for all ● Talk with your Marketing Automation and CRM platforms to see if they offer tools. ○ Just because they say they are compliant, does not mean by default you are too
  • 36. | 36 Salesforce Email Opt-In Example
  • 37. | 37 Opportunity for More Data Screenshots from the Drupal Association and Twitter
  • 38. | 38 Creating an Action Plan Not a Freak-Out Plan
  • 39. | 39 Enforcement begins May 25, 2018
  • 40. | 40 PX takes a team.
  • 41. | 41 ● Opt-in language ● Privacy policy & legal documents ● Internal messaging around value and marketing impact Creating a Plan ● Data portability ● Revoking consent ● Data erasure ● Consent customization ● What are we collecting & why ● Active vs. passive ● Storage & encryption ● Integration points Data Collection Points Messaging and Consent User Control
  • 42. | 42 Example of Data Collection Points Audit
  • 43. | 43 Example Website Opt-Ins Hooray an Overlay Here is some text about our cookies, what they do, and why they’re helpful for you. Here’s some info about where to learn more. Would you like to opt-in? Yes No Hooray an Overlay Here is some text about our cookies, what they do, and why they’re helpful for you. Here’s some info about where to learn more. Would you like to opt-in? Yes Review Settings
  • 44. | 44 Example User Controls
  • 45. | 45 Next Steps ● Legal should assess risk ● Create/update security and privacy policies ● Technology teams prioritize remediations ● Implement remediations ● Document plans, remediations and next steps ● Automate processes ● Rinse and repeat
  • 46. | 46 Let’s Talk Worst Case Scenario
  • 47. | 47 Absolute Minimums Planning ● Write out your GDPR plan including any audits you may need to conduct ● Document all compliance efforts ● Include your rationale in all documents ● Set aside untouchable time for maintenance and improvements on a regular basis Execution ● Appoint a Data Protection Officer ● Apply any patches or security updates available to your system ● Improve the clarity of your Privacy Policy ● Seek consent from users (newsletter, cookies, etc) ● Give users an easy way to contact you about their data ● Update Google Analytics
  • 48. | 48 PX is the new Golden Rule
  • 49. Want to keep the conversation going? Mediacurrent Feel free to message Dawn or Mark with any questions you have on getting your site GDPR compliant! Dawn - dawn.aly@mediacurrent.com shrop - mark.shropshire@mediacurrent.com Have a GDPR project to discuss for your organization? We can help!