SlideShare a Scribd company logo
1 of 35
Download to read offline
Data Flow Mapping and the
EU GDPR
Adrian Ross LLB (Hons), MBA
GRC Consultant
IT Governance Ltd
29 September 2016
www.itgovernance.co.uk
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Introduction
• Adrian Ross
• GRC Consultant
– Infrastructure services
– Business process re-engineering
– Business intelligence
– Business architecture
– Intellectual property
– Legal compliance
– Data protection and information security
– Enterprise risk management
2
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
IT Governance Ltd: GRC one-stop shop
All verticals, all sectors, all organisational sizes
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Agenda
• An overview of the regulatory landscape
• Territorial scope
• Remedies, liabilities and penalties
• Risk management and the GDPR
• Legal requirements for a DPIA
• Why and how to conduct a data flow mapping exercise
• What are the challenges?
• What is an information flow?
• The questions to ask
• Data flow mapping techniques
4
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
The nature of European law
• Two main types of legislation:
– Directives
º Require individual implementation in each member state
º Implemented by the creation of national laws approved by the parliaments of
each member state
º European Directive 95/46/EC is a directive
º UK Data Protection Act 1998
– Regulations
º Immediately applicable in each member state
º Require no local implementing legislation
º The EU GDPR is a regulation
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Article 99: Entry into force and
application
This Regulation shall be binding in its entirety and directly
applicable in all member states.
KEY DATES
• On 8 April 2016 the Regulation was adopted by the European Council.
• On 14 April 2016 the Regulation was adopted by the European Parliament.
• On 4 May 2016 the official text of the Regulation was published in the EU Official
Journal in all the official languages.
• The Regulation entered into force on 24 May 2016 and will apply from 25 May
2018.
• http://ec.europa.eu/justice/data-protection/reform/index_en.htm
Final text of the Regulation: http://data.consilium.europa.eu/doc/document/ST-
5419-2016-REV-1/en/pdf
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
GDPR
The GDPR has eleven chapters:
1
• Chapter I – General Provisions: Articles 1 - 4
2
• Chapter II – Principles: Articles 5 - 11
3
• Chapter III – Rights of the Data Subject: Articles 12 - 23
4
• Chapter IV – Controller and Processor: Articles 24 - 43
5
• Chapter V – Transfer of Personal Data to Third Countries: Articles 44 - 50
6
• Chapter VI – Independent Supervisory Authorities: Articles 51 - 59
7
• Chapter VII – Cooperation and Consistency: Articles 60 - 76
8
• Chapter VIII – Remedies, Liabilities and Penalties: Articles 77 - 84
9
• Chapter IX – Provisions Relating to Specific Processing Situations: Articles 85 - 91
Data protection model
under the GDPR
Information Commissioner’s Office (ICO)
(supervising authority)
Data controller
(organisations)
Data subject
(individuals)
Data
processor
Third
countries
Third
parties
Duties
Rights
Disclosure?
Inform?
Security?
Guarantees?
Assessment
Enforcement
European Data Protection Board
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Articles 1 – 3: Who and where?
• Natural person = a living individual
• Natural persons have rights associated with:
– The protection of personal data.
– The protection of the processing personal data.
– The unrestricted movement of personal data within the EU.
• In material scope:
– Personal data that is processed wholly or partly by automated means.
– Personal data that is part of a filing system, or intended to be.
• The Regulation applies to controllers and processors in the EU
irrespective of where processing takes place.
• The Regulation also applies to controllers not in the EU.
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Remedies, liabilities and penalties
• Article 79: Right to an effective judicial remedy against a
controller or processor
– Judicial remedy where their rights have been infringed as a result of the
processing of personal data.
º In the courts of the member state where the controller or processor has an establishment.
º In the courts of the member state where the data subject habitually resides.
• Article 82: Right to compensation and liability
– Any person who has suffered material or non-material damage shall have the
right to receive compensation from the controller or processor.
– A controller involved in processing shall be liable for damage caused by
processing.
• Article 83: General conditions for imposing administrative fines
– Imposition of administrative fines will in each case be effective, proportionate
and dissuasive.
º Fines shall take into account technical and organisational measures implemented.
– €20,000,000 or, in the case of an undertaking, 4% of total worldwide
annual turnover in the preceding financial year (whichever is higher).
Module I
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Remedies, liability and penalties (cont.)
Article 83: General conditions for imposing administrative fines
• €10,000,000 or, in the case of an undertaking, 2% of total worldwide annual
turnover in the preceding financial year (whichever is greater).
• Articles:
– 8: Child’s consent
– 11: Processing not requiring identification
– 25: Data protection by design and by default
– 26: Joint controllers
– 27: Representatives of controllers not established in EU
– 26 - 29 & 30: Processing
– 31: Cooperation with the supervisory authority
– 32: Data security
– 33: Notification of breaches to supervisory authority
– 34: Communication of breaches to data subjects
– 35: Data protection impact assessment
– 36: Prior consultation
– 37 - 39: DPOs
– 41(4): Monitoring approved codes of conduct
– 42: Certification
– 43: Certification bodies
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Remedies, liability and penalties (cont.)
Article 83: General conditions for imposing administrative fines
• €20,000,000 or, in the case of an undertaking, 4% total worldwide
annual turnover in the preceding financial year (whichever is higher).
• Articles
– 5: Principles relating to the processing of personal data
– 6: Lawfulness of processing
– 7: Conditions for consent
– 9: Processing special categories of personal data (i.e. sensitive personal data)
– 12 - 22: Data subject rights to information, access, rectification, erasure,
restriction of processing, data portability, object, profiling
– 44 - 49: Transfers to third countries
– 58(1): Requirement to provide access to supervisory authority
– 58(2): Orders/limitations on processing or the suspension of data flows
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Riskmanagement and the GDPR
RISK is mentioned over
60
times in the Regulation.
It is important to understand privacy risk and integrate it into your risk framework.
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
What is risk?
• The effect of uncertainty on objectives (ISO 31000 etc.)
• The combination of the probability of an event and its consequences
(IRM)
• A situation involving exposure to danger (OED)
• Uncertainty of outcome, within a range of exposure, arising from a
combination of the impact and the probability of events (Orange
Book HM Treasury)
• The uncertainty of an event occurring that could have an impact on
the achievement of objectives (Institute of Internal Auditors)
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Standards and codes
• ISO 31000 – Risk management – Principles and guidelines
– AS/NZS 4360:2004 now replaced by ISO 31000
• ISO 31010 – Risk management – Risk assessment techniques
• IRM/ALARM/AIRMIC – A risk management standard
• UK Combined Code on UK Corporate Governance
• OECD Principles of Corporate Governance
• COSO Enterprise Risk Management – Integrated Framework
• Sector specific, e.g. clinical, food
• Discipline specific, e.g. ISO 27005
• ISO 22301 – Business continuity management
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
ISO 31000: Risk management
• Management framework approach
• PDCA model modified in ISO 27005
• Generic (all risks)
• Very similar to a management system
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Risk assessment
Risk management process
Establishing the context
Risk identification
Risk analysis
Risk evaluation
Risk treatment
Communication
and
consultation
Monitoring
and
review
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Enterprise risk management
• Capabilities:
– Aligning risk appetite and strategy
– Enhancing risk response decisions
– Reducing operational surprises and losses
– Identifying and managing multiple and cross-enterprise risks
– Seizing opportunities
– Improving deployment of capital
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Risk management
• Organisational risk ‘landscape’
• Strategic
– Business performance
– Financial performance
– Reputation
• Operational
– Output capacity
– Demand response
– Interruption and disruption
• Statutory
– Employment law
– Health & safety
– Company law
• Regulatory
– Industry/sector-specific
compliance requirements
– Licence to operate
• Contractual
– SLA targets/levels
– Product/service availability
– Quality/warranty
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Information security
• Preservation of confidentiality, integrity and availability of information
and the assets and processes that support and enable its
acquisition, storage, use, protection and disposal.
• Wide variety of assets:
– information
– ICT
– infrastructure
• Prevent compromise (loss, disclosure, corruption, etc.).
• Includes IT security and other forms of security:
– physical
– HR
– supply
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Legal requirements for a DPIA
Article 35: Data protection impact assessment
• Controller must seek the advice of the data protection officer.
• This is particularly required in situations that involve:
– Automated processing
– Profiling
– Creation of legal effects
– Significantly affecting the natural person
– Processing of large-scale categories of sensitive data
– Data that relates to criminal offences or convictions
– Monitoring on a large scale
• Conduct a post-implementation review when risk profile changes.
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Legal requirements for a DPIA
Article 35: Data protection impact assessment
• DPIA must be performed where:
– New technologies are deployed
– Nature, scope and context of the project demand it
– Processes are likely to result in a high risk to the rights and freedom
– It can be used to address sets of processing and risks
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Legal requirements for a DPIA
• The DPIA will set out as a minimum:
– A description of the processing and purposes
– Legitimate interests pursued by the controller
– An assessment of the necessity and proportionality of the processing
– An assessment of the risks to the rights and freedoms of data subjects
– The measures envisaged to address the risks
– All safeguards & security measures to demonstrate compliance
– Indications of timeframes if processing relates to erasure
– An indication of any data protection by design and default measures
– List of recipients of personal data
– Compliance with approved codes of conduct
– Whether data subjects have been consulted.
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Linking the DPIA to the privacy principles
1
• Processed lawfully, fairly and in a transparent manner
2
• Collected for specified, explicit and legitimate purposes
3
• Adequate, relevant and limited to what is necessary
4
• Accurate and, where necessary, kept up to date
5
• Retained only for as long as necessary
6
• Processed in an appropriate manner to maintain security
Accountability
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
How to conduct a data mapping exercise
• The ICO staged approach to an effective DPIA:
1. Required when there is a change in processing of personally identifiable
information (PII).
2. Determine the information flows throughout the organisation in order to
make a proper assessment of the privacy risks.
3. Identify the risks related to privacy and processing, including the necessity and
proportionality of the change in processing.
4. Identify possible privacy solutions to address the risks that have been identified.
5. Assess how the data protection principles have been applied throughout the
organisation.
6. Sign-off and record the DPIA, including details of which privacy solutions are too
be implemented.
7. Integrate the result of the DPIA back into the project plan.
8. Conduct a post-implementation review where risk profile of PII data has
changed.
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Why and how to conduct a data
mapping exercise
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Data mapping – what are the
challenges?
Identify
personal
data
Identify
appropriate
technical and
organisational
safeguards
Understand
legal &
regulatory
obligations
Trust and
confidence
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
What is an information flow?
A transfer of information from one location to another. For example:
– Inside and outside the European Union.
– From suppliers and sub-suppliers through to customers.
When mapping information flow, you should identify the interaction
points between the parties involved.
NB: Cloud providers present their own challenges.
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Describing information flows
Consider the potential future uses
of the information collected, even if it is not
immediately necessary.
Ensure the people who will be using
the information are consulted on the
practical implications.
Walk through the information
lifecycle to
identify unforeseen or unintended
uses of the data.
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Information flow – identify the key
elements
Data items
Name, email, address Health data, criminal
records
Biometrics, location data
Formats
Hardcopy (paper records) Digital (USB) Database
Transfer methods
Post, telephone, social
media
Internal (within group) External (data sharing)
Locations
Offices Cloud Third parties
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Data flow mapping – questions to ask
• Workflow inputs and outputs:
– How is personal data collected (e.g. form, online, call centre, other)?
– Who is accountable for personal data?
– What is the location of the systems/filing systems containing the data?
– Who has access to the information?
– Is the information disclosed/shared with anyone (e.g suppliers, third parties)?
– Does the system interface with, or transfer information to, other systems?
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Data flow mapping – techniques
• Inspect existing documents
• Facilitation workshops
• Questionnaires
• Observation
• Whiteboard – freeform diagrams
• Template drawings (Visio, mind map tools)
• Post-it notes
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Example information flow
HR users
HR
system
Finance
system
Workforce
metrics
EmailRecruitment
system
Third-party users
CV
database
Outplacement
data
Candidate
information
Agency
employment
screening
Recruitment services
Outsourced management
Outplacement services
Candidates
HR
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
IT Governance: GDPR one-stop shop
• Accredited training, one-day foundation course:
– London OR Cambridge: http://www.itgovernance.co.uk/shop/p-1795-certified-eu-
general-data-protection-regulation-foundation-gdpr-training-course.aspx
– ONLINE: http://www.itgovernance.co.uk/shop/p-1834-certified-eu-general-data-
protection-regulation-foundation-gdpr-online-training-course.aspx
• Practitioner course, classroom or online:
– http://www.itgovernance.co.uk/shop/p-1824-certified-eu-general-data-protection-
regulation-practitioner-gdpr-training-course.aspx
• Pocket guide: http://www.itgovernance.co.uk/shop/p-1830-eu-gdpr-a-pocket-
guide.aspx
• Documentation toolkit: http://www.itgovernance.co.uk/shop/p-1796-eu-general-
data-protection-regulation-gdpr-documentation-toolkit.aspx
• Consultancy support :
– Data audit
– Transition/implementation consultancy
– http://www.itgovernance.co.uk/dpa-compliance-consultancy.aspx
TM
© IT Governance Ltd 2016
Copyright IT Governance Ltd 2016 – v1.0
Questions?
aross@itgovernance.co.uk
0845 070 1750
www.itgovernance.co.uk

More Related Content

What's hot

Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and PrivacyVertex Holdings
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Edureka!
 
Cybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation SlidesCybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation SlidesSlideTeam
 
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to Know
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to KnowISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to Know
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to KnowPECB
 
GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slidesNaomi Holmes
 
Enterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating ModelEnterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating ModelEryk Budi Pratama
 
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykData Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykEryk Budi Pratama
 
Privacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationPrivacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationEryk Budi Pratama
 
The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...IT Governance Ltd
 
Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032PECB
 
GDPR Are you ready for auditing privacy ?
GDPR Are you ready for auditing privacy ?GDPR Are you ready for auditing privacy ?
GDPR Are you ready for auditing privacy ?Patrick Soenen
 
European Cybersecurity Context
European Cybersecurity ContextEuropean Cybersecurity Context
European Cybersecurity ContextMiguel A. Amutio
 
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness TrainingISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness TrainingOperational Excellence Consulting
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecturePriyanka Aash
 
Staff awareness: developing a security culture
Staff awareness: developing a security cultureStaff awareness: developing a security culture
Staff awareness: developing a security cultureIT Governance Ltd
 
ISMS: A7-Human Resources Security ISO 27001
ISMS: A7-Human Resources Security ISO 27001ISMS: A7-Human Resources Security ISO 27001
ISMS: A7-Human Resources Security ISO 27001chutinhha
 

What's hot (20)

Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and Privacy
 
All about a DPIA by Andrey Prozorov 2.0, 220518.pdf
All about a DPIA by Andrey Prozorov 2.0, 220518.pdfAll about a DPIA by Andrey Prozorov 2.0, 220518.pdf
All about a DPIA by Andrey Prozorov 2.0, 220518.pdf
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
Cybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation SlidesCybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation Slides
 
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to Know
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to KnowISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to Know
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to Know
 
GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slides
 
Introduction to GDPR
Introduction to GDPRIntroduction to GDPR
Introduction to GDPR
 
Enterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating ModelEnterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating Model
 
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykData Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
 
Privacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationPrivacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program Implementation
 
The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...
 
GDPR
GDPRGDPR
GDPR
 
Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032
 
GDPR Overview
GDPR OverviewGDPR Overview
GDPR Overview
 
GDPR Are you ready for auditing privacy ?
GDPR Are you ready for auditing privacy ?GDPR Are you ready for auditing privacy ?
GDPR Are you ready for auditing privacy ?
 
European Cybersecurity Context
European Cybersecurity ContextEuropean Cybersecurity Context
European Cybersecurity Context
 
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness TrainingISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecture
 
Staff awareness: developing a security culture
Staff awareness: developing a security cultureStaff awareness: developing a security culture
Staff awareness: developing a security culture
 
ISMS: A7-Human Resources Security ISO 27001
ISMS: A7-Human Resources Security ISO 27001ISMS: A7-Human Resources Security ISO 27001
ISMS: A7-Human Resources Security ISO 27001
 

Viewers also liked

GDPR: Requirements for Cloud Providers
GDPR: Requirements for Cloud ProvidersGDPR: Requirements for Cloud Providers
GDPR: Requirements for Cloud ProvidersIT Governance Ltd
 
Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?IT Governance Ltd
 
Privacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failingPrivacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failingIT Governance Ltd
 
Revising policies and procedures under the new EU GDPR
Revising policies and procedures under the new EU GDPRRevising policies and procedures under the new EU GDPR
Revising policies and procedures under the new EU GDPRIT Governance Ltd
 
Appointing a Data Protection Officer under the GDPR
Appointing a Data Protection Officer under the GDPRAppointing a Data Protection Officer under the GDPR
Appointing a Data Protection Officer under the GDPRIT Governance Ltd
 
EU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingEU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingIT Governance Ltd
 
GDPR in practice
GDPR in practiceGDPR in practice
GDPR in practiceZoneFox
 
GDPR in a nutshell
GDPR in a nutshellGDPR in a nutshell
GDPR in a nutshellInitio
 
An Essential Guide to EU GDPR
An Essential Guide to EU GDPRAn Essential Guide to EU GDPR
An Essential Guide to EU GDPRTripwire
 
EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer IT Governance Ltd
 
GDPR and technology - details matter
GDPR and technology - details matterGDPR and technology - details matter
GDPR and technology - details matterExove
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerCapgemini
 
The Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection RegulationThe Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection RegulationGhostery, Inc.
 
The top 5 factors impacting third party risk management
The top 5 factors impacting third party risk managementThe top 5 factors impacting third party risk management
The top 5 factors impacting third party risk managementMarkit
 
MindMap AVG Louwers Advocaten V 4.0 (EN)
MindMap AVG Louwers Advocaten V 4.0 (EN)MindMap AVG Louwers Advocaten V 4.0 (EN)
MindMap AVG Louwers Advocaten V 4.0 (EN)Huub de Jong
 
Privacy of patient data versus patient safety. HIMSS Europe, Nov 6, 2014
Privacy of patient data versus patient safety. HIMSS Europe, Nov 6, 2014Privacy of patient data versus patient safety. HIMSS Europe, Nov 6, 2014
Privacy of patient data versus patient safety. HIMSS Europe, Nov 6, 2014Arjen Noordzij
 
Gender pay gap in the EU
Gender pay gap in the EUGender pay gap in the EU
Gender pay gap in the EUChristineKrumm
 
ERP System Process and Data Flow in Gane & Sarson Notation
ERP System Process and Data Flow in Gane & Sarson NotationERP System Process and Data Flow in Gane & Sarson Notation
ERP System Process and Data Flow in Gane & Sarson NotationGlen Alleman
 
GDPR From Implementation to Opportunity
GDPR From Implementation to OpportunityGDPR From Implementation to Opportunity
GDPR From Implementation to OpportunityDean Sappey
 

Viewers also liked (20)

GDPR: Requirements for Cloud Providers
GDPR: Requirements for Cloud ProvidersGDPR: Requirements for Cloud Providers
GDPR: Requirements for Cloud Providers
 
Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?
 
Privacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failingPrivacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failing
 
Revising policies and procedures under the new EU GDPR
Revising policies and procedures under the new EU GDPRRevising policies and procedures under the new EU GDPR
Revising policies and procedures under the new EU GDPR
 
Preparing for EU GDPR
Preparing for EU GDPRPreparing for EU GDPR
Preparing for EU GDPR
 
Appointing a Data Protection Officer under the GDPR
Appointing a Data Protection Officer under the GDPRAppointing a Data Protection Officer under the GDPR
Appointing a Data Protection Officer under the GDPR
 
EU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingEU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketing
 
GDPR in practice
GDPR in practiceGDPR in practice
GDPR in practice
 
GDPR in a nutshell
GDPR in a nutshellGDPR in a nutshell
GDPR in a nutshell
 
An Essential Guide to EU GDPR
An Essential Guide to EU GDPRAn Essential Guide to EU GDPR
An Essential Guide to EU GDPR
 
EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer
 
GDPR and technology - details matter
GDPR and technology - details matterGDPR and technology - details matter
GDPR and technology - details matter
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offer
 
The Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection RegulationThe Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection Regulation
 
The top 5 factors impacting third party risk management
The top 5 factors impacting third party risk managementThe top 5 factors impacting third party risk management
The top 5 factors impacting third party risk management
 
MindMap AVG Louwers Advocaten V 4.0 (EN)
MindMap AVG Louwers Advocaten V 4.0 (EN)MindMap AVG Louwers Advocaten V 4.0 (EN)
MindMap AVG Louwers Advocaten V 4.0 (EN)
 
Privacy of patient data versus patient safety. HIMSS Europe, Nov 6, 2014
Privacy of patient data versus patient safety. HIMSS Europe, Nov 6, 2014Privacy of patient data versus patient safety. HIMSS Europe, Nov 6, 2014
Privacy of patient data versus patient safety. HIMSS Europe, Nov 6, 2014
 
Gender pay gap in the EU
Gender pay gap in the EUGender pay gap in the EU
Gender pay gap in the EU
 
ERP System Process and Data Flow in Gane & Sarson Notation
ERP System Process and Data Flow in Gane & Sarson NotationERP System Process and Data Flow in Gane & Sarson Notation
ERP System Process and Data Flow in Gane & Sarson Notation
 
GDPR From Implementation to Opportunity
GDPR From Implementation to OpportunityGDPR From Implementation to Opportunity
GDPR From Implementation to Opportunity
 

Similar to Data Flow Mapping and the EU GDPR

Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRIT Governance Ltd
 
Data Breaches and the EU GDPR
Data Breaches and the EU GDPRData Breaches and the EU GDPR
Data Breaches and the EU GDPRIT Governance Ltd
 
The first steps towards GDPR compliance 
The first steps towards GDPR compliance The first steps towards GDPR compliance 
The first steps towards GDPR compliance IT Governance Ltd
 
The GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for complianceThe GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for complianceIT Governance Ltd
 
CyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPRCyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPRIryna Chekanava
 
CyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRCyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRShadi A. Razak
 
Data Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your businessData Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your businessEversheds Sutherland
 
Data transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPRData transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPRIT Governance Ltd
 
Ipswitch and cordery on the road " All you need to know about GDPR but are t...
Ipswitch and cordery on the road  " All you need to know about GDPR but are t...Ipswitch and cordery on the road  " All you need to know about GDPR but are t...
Ipswitch and cordery on the road " All you need to know about GDPR but are t...Sébastien Roques
 
eu-market-access-gdpr-fundamentals-by-risk-associates
eu-market-access-gdpr-fundamentals-by-risk-associateseu-market-access-gdpr-fundamentals-by-risk-associates
eu-market-access-gdpr-fundamentals-by-risk-associatesMohsin Termezy
 
Fintech and Data Protection by Balint Halasz and Zoltan Tarjan 25 10 2016
Fintech and Data Protection by Balint Halasz and Zoltan Tarjan 25 10 2016Fintech and Data Protection by Balint Halasz and Zoltan Tarjan 25 10 2016
Fintech and Data Protection by Balint Halasz and Zoltan Tarjan 25 10 2016bhalasz
 
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...ARMA International
 
GDPR: The Catalyst for Customer 360
GDPR: The Catalyst for Customer 360GDPR: The Catalyst for Customer 360
GDPR: The Catalyst for Customer 360DataStax
 
EU GDPR(general data protection regulation)
EU GDPR(general data protection regulation)EU GDPR(general data protection regulation)
EU GDPR(general data protection regulation)RAKESH S
 
EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?VYTIS MALECKAS
 
EU Data Protection Legislation, Peter Ridley (HPE)
EU Data Protection Legislation, Peter Ridley (HPE)EU Data Protection Legislation, Peter Ridley (HPE)
EU Data Protection Legislation, Peter Ridley (HPE)Napier University
 
05 standards and general purpose regulations - impact on finance
05 standards and general purpose regulations - impact on finance05 standards and general purpose regulations - impact on finance
05 standards and general purpose regulations - impact on financeinnov-acts-ltd
 
GDPR - Context, Principles, Implementation, Operation, Impact on Outsourcing,...
GDPR - Context, Principles, Implementation, Operation, Impact on Outsourcing,...GDPR - Context, Principles, Implementation, Operation, Impact on Outsourcing,...
GDPR - Context, Principles, Implementation, Operation, Impact on Outsourcing,...Alan McSweeney
 
Dataprotectionpackage 2015pptx
Dataprotectionpackage 2015pptxDataprotectionpackage 2015pptx
Dataprotectionpackage 2015pptxMarco Gioanola
 
Big data minute privacy
Big data minute privacyBig data minute privacy
Big data minute privacyGuyVanderSande
 

Similar to Data Flow Mapping and the EU GDPR (20)

Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPR
 
Data Breaches and the EU GDPR
Data Breaches and the EU GDPRData Breaches and the EU GDPR
Data Breaches and the EU GDPR
 
The first steps towards GDPR compliance 
The first steps towards GDPR compliance The first steps towards GDPR compliance 
The first steps towards GDPR compliance 
 
The GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for complianceThe GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for compliance
 
CyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPRCyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPR
 
CyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRCyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPR
 
Data Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your businessData Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your business
 
Data transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPRData transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPR
 
Ipswitch and cordery on the road " All you need to know about GDPR but are t...
Ipswitch and cordery on the road  " All you need to know about GDPR but are t...Ipswitch and cordery on the road  " All you need to know about GDPR but are t...
Ipswitch and cordery on the road " All you need to know about GDPR but are t...
 
eu-market-access-gdpr-fundamentals-by-risk-associates
eu-market-access-gdpr-fundamentals-by-risk-associateseu-market-access-gdpr-fundamentals-by-risk-associates
eu-market-access-gdpr-fundamentals-by-risk-associates
 
Fintech and Data Protection by Balint Halasz and Zoltan Tarjan 25 10 2016
Fintech and Data Protection by Balint Halasz and Zoltan Tarjan 25 10 2016Fintech and Data Protection by Balint Halasz and Zoltan Tarjan 25 10 2016
Fintech and Data Protection by Balint Halasz and Zoltan Tarjan 25 10 2016
 
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
 
GDPR: The Catalyst for Customer 360
GDPR: The Catalyst for Customer 360GDPR: The Catalyst for Customer 360
GDPR: The Catalyst for Customer 360
 
EU GDPR(general data protection regulation)
EU GDPR(general data protection regulation)EU GDPR(general data protection regulation)
EU GDPR(general data protection regulation)
 
EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?
 
EU Data Protection Legislation, Peter Ridley (HPE)
EU Data Protection Legislation, Peter Ridley (HPE)EU Data Protection Legislation, Peter Ridley (HPE)
EU Data Protection Legislation, Peter Ridley (HPE)
 
05 standards and general purpose regulations - impact on finance
05 standards and general purpose regulations - impact on finance05 standards and general purpose regulations - impact on finance
05 standards and general purpose regulations - impact on finance
 
GDPR - Context, Principles, Implementation, Operation, Impact on Outsourcing,...
GDPR - Context, Principles, Implementation, Operation, Impact on Outsourcing,...GDPR - Context, Principles, Implementation, Operation, Impact on Outsourcing,...
GDPR - Context, Principles, Implementation, Operation, Impact on Outsourcing,...
 
Dataprotectionpackage 2015pptx
Dataprotectionpackage 2015pptxDataprotectionpackage 2015pptx
Dataprotectionpackage 2015pptx
 
Big data minute privacy
Big data minute privacyBig data minute privacy
Big data minute privacy
 

More from IT Governance Ltd

GDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risksGDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risksIT Governance Ltd
 
Business Continuity Management: How to get started
Business Continuity Management: How to get startedBusiness Continuity Management: How to get started
Business Continuity Management: How to get startedIT Governance Ltd
 
GDPR compliance: getting everyone in the organisation on board
GDPR compliance: getting everyone in the organisation on boardGDPR compliance: getting everyone in the organisation on board
GDPR compliance: getting everyone in the organisation on boardIT Governance Ltd
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceIT Governance Ltd
 
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...IT Governance Ltd
 
Creating an effective cyber security awareness programme
Creating an effective cyber security awareness programmeCreating an effective cyber security awareness programme
Creating an effective cyber security awareness programmeIT Governance Ltd
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...IT Governance Ltd
 
Addressing penetration testing and vulnerabilities, and adding verification m...
Addressing penetration testing and vulnerabilities, and adding verification m...Addressing penetration testing and vulnerabilities, and adding verification m...
Addressing penetration testing and vulnerabilities, and adding verification m...IT Governance Ltd
 
NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...IT Governance Ltd
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurityIT Governance Ltd
 
Using international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityUsing international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityIT Governance Ltd
 
Using international standards to improve EU cyber security
Using international standards to improve EU cyber securityUsing international standards to improve EU cyber security
Using international standards to improve EU cyber securityIT Governance Ltd
 
Implementing PCI DSS v 2.0 and v 3.0
Implementing PCI DSS v 2.0 and v 3.0Implementing PCI DSS v 2.0 and v 3.0
Implementing PCI DSS v 2.0 and v 3.0IT Governance Ltd
 

More from IT Governance Ltd (13)

GDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risksGDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risks
 
Business Continuity Management: How to get started
Business Continuity Management: How to get startedBusiness Continuity Management: How to get started
Business Continuity Management: How to get started
 
GDPR compliance: getting everyone in the organisation on board
GDPR compliance: getting everyone in the organisation on boardGDPR compliance: getting everyone in the organisation on board
GDPR compliance: getting everyone in the organisation on board
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to compliance
 
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
 
Creating an effective cyber security awareness programme
Creating an effective cyber security awareness programmeCreating an effective cyber security awareness programme
Creating an effective cyber security awareness programme
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...
 
Addressing penetration testing and vulnerabilities, and adding verification m...
Addressing penetration testing and vulnerabilities, and adding verification m...Addressing penetration testing and vulnerabilities, and adding verification m...
Addressing penetration testing and vulnerabilities, and adding verification m...
 
NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurity
 
Using international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityUsing international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber security
 
Using international standards to improve EU cyber security
Using international standards to improve EU cyber securityUsing international standards to improve EU cyber security
Using international standards to improve EU cyber security
 
Implementing PCI DSS v 2.0 and v 3.0
Implementing PCI DSS v 2.0 and v 3.0Implementing PCI DSS v 2.0 and v 3.0
Implementing PCI DSS v 2.0 and v 3.0
 

Recently uploaded

Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...lizamodels9
 
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc.../:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...lizamodels9
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfmuskan1121w
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewasmakika9823
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Serviceankitnayak356677
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdfOrient Homes
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 

Recently uploaded (20)

Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
 
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc.../:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdf
 
KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdf
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 

Data Flow Mapping and the EU GDPR

  • 1. Data Flow Mapping and the EU GDPR Adrian Ross LLB (Hons), MBA GRC Consultant IT Governance Ltd 29 September 2016 www.itgovernance.co.uk
  • 2. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Introduction • Adrian Ross • GRC Consultant – Infrastructure services – Business process re-engineering – Business intelligence – Business architecture – Intellectual property – Legal compliance – Data protection and information security – Enterprise risk management 2
  • 3. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 IT Governance Ltd: GRC one-stop shop All verticals, all sectors, all organisational sizes
  • 4. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Agenda • An overview of the regulatory landscape • Territorial scope • Remedies, liabilities and penalties • Risk management and the GDPR • Legal requirements for a DPIA • Why and how to conduct a data flow mapping exercise • What are the challenges? • What is an information flow? • The questions to ask • Data flow mapping techniques 4
  • 5. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 The nature of European law • Two main types of legislation: – Directives º Require individual implementation in each member state º Implemented by the creation of national laws approved by the parliaments of each member state º European Directive 95/46/EC is a directive º UK Data Protection Act 1998 – Regulations º Immediately applicable in each member state º Require no local implementing legislation º The EU GDPR is a regulation
  • 6. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Article 99: Entry into force and application This Regulation shall be binding in its entirety and directly applicable in all member states. KEY DATES • On 8 April 2016 the Regulation was adopted by the European Council. • On 14 April 2016 the Regulation was adopted by the European Parliament. • On 4 May 2016 the official text of the Regulation was published in the EU Official Journal in all the official languages. • The Regulation entered into force on 24 May 2016 and will apply from 25 May 2018. • http://ec.europa.eu/justice/data-protection/reform/index_en.htm Final text of the Regulation: http://data.consilium.europa.eu/doc/document/ST- 5419-2016-REV-1/en/pdf
  • 7. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 GDPR The GDPR has eleven chapters: 1 • Chapter I – General Provisions: Articles 1 - 4 2 • Chapter II – Principles: Articles 5 - 11 3 • Chapter III – Rights of the Data Subject: Articles 12 - 23 4 • Chapter IV – Controller and Processor: Articles 24 - 43 5 • Chapter V – Transfer of Personal Data to Third Countries: Articles 44 - 50 6 • Chapter VI – Independent Supervisory Authorities: Articles 51 - 59 7 • Chapter VII – Cooperation and Consistency: Articles 60 - 76 8 • Chapter VIII – Remedies, Liabilities and Penalties: Articles 77 - 84 9 • Chapter IX – Provisions Relating to Specific Processing Situations: Articles 85 - 91
  • 8. Data protection model under the GDPR Information Commissioner’s Office (ICO) (supervising authority) Data controller (organisations) Data subject (individuals) Data processor Third countries Third parties Duties Rights Disclosure? Inform? Security? Guarantees? Assessment Enforcement European Data Protection Board
  • 9. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Articles 1 – 3: Who and where? • Natural person = a living individual • Natural persons have rights associated with: – The protection of personal data. – The protection of the processing personal data. – The unrestricted movement of personal data within the EU. • In material scope: – Personal data that is processed wholly or partly by automated means. – Personal data that is part of a filing system, or intended to be. • The Regulation applies to controllers and processors in the EU irrespective of where processing takes place. • The Regulation also applies to controllers not in the EU.
  • 10. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Remedies, liabilities and penalties • Article 79: Right to an effective judicial remedy against a controller or processor – Judicial remedy where their rights have been infringed as a result of the processing of personal data. º In the courts of the member state where the controller or processor has an establishment. º In the courts of the member state where the data subject habitually resides. • Article 82: Right to compensation and liability – Any person who has suffered material or non-material damage shall have the right to receive compensation from the controller or processor. – A controller involved in processing shall be liable for damage caused by processing. • Article 83: General conditions for imposing administrative fines – Imposition of administrative fines will in each case be effective, proportionate and dissuasive. º Fines shall take into account technical and organisational measures implemented. – €20,000,000 or, in the case of an undertaking, 4% of total worldwide annual turnover in the preceding financial year (whichever is higher). Module I
  • 11. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Remedies, liability and penalties (cont.) Article 83: General conditions for imposing administrative fines • €10,000,000 or, in the case of an undertaking, 2% of total worldwide annual turnover in the preceding financial year (whichever is greater). • Articles: – 8: Child’s consent – 11: Processing not requiring identification – 25: Data protection by design and by default – 26: Joint controllers – 27: Representatives of controllers not established in EU – 26 - 29 & 30: Processing – 31: Cooperation with the supervisory authority – 32: Data security – 33: Notification of breaches to supervisory authority – 34: Communication of breaches to data subjects – 35: Data protection impact assessment – 36: Prior consultation – 37 - 39: DPOs – 41(4): Monitoring approved codes of conduct – 42: Certification – 43: Certification bodies
  • 12. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Remedies, liability and penalties (cont.) Article 83: General conditions for imposing administrative fines • €20,000,000 or, in the case of an undertaking, 4% total worldwide annual turnover in the preceding financial year (whichever is higher). • Articles – 5: Principles relating to the processing of personal data – 6: Lawfulness of processing – 7: Conditions for consent – 9: Processing special categories of personal data (i.e. sensitive personal data) – 12 - 22: Data subject rights to information, access, rectification, erasure, restriction of processing, data portability, object, profiling – 44 - 49: Transfers to third countries – 58(1): Requirement to provide access to supervisory authority – 58(2): Orders/limitations on processing or the suspension of data flows
  • 13. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Riskmanagement and the GDPR RISK is mentioned over 60 times in the Regulation. It is important to understand privacy risk and integrate it into your risk framework.
  • 14. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 What is risk? • The effect of uncertainty on objectives (ISO 31000 etc.) • The combination of the probability of an event and its consequences (IRM) • A situation involving exposure to danger (OED) • Uncertainty of outcome, within a range of exposure, arising from a combination of the impact and the probability of events (Orange Book HM Treasury) • The uncertainty of an event occurring that could have an impact on the achievement of objectives (Institute of Internal Auditors)
  • 15. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Standards and codes • ISO 31000 – Risk management – Principles and guidelines – AS/NZS 4360:2004 now replaced by ISO 31000 • ISO 31010 – Risk management – Risk assessment techniques • IRM/ALARM/AIRMIC – A risk management standard • UK Combined Code on UK Corporate Governance • OECD Principles of Corporate Governance • COSO Enterprise Risk Management – Integrated Framework • Sector specific, e.g. clinical, food • Discipline specific, e.g. ISO 27005 • ISO 22301 – Business continuity management
  • 16. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 ISO 31000: Risk management • Management framework approach • PDCA model modified in ISO 27005 • Generic (all risks) • Very similar to a management system
  • 17. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Risk assessment Risk management process Establishing the context Risk identification Risk analysis Risk evaluation Risk treatment Communication and consultation Monitoring and review
  • 18. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Enterprise risk management • Capabilities: – Aligning risk appetite and strategy – Enhancing risk response decisions – Reducing operational surprises and losses – Identifying and managing multiple and cross-enterprise risks – Seizing opportunities – Improving deployment of capital
  • 19. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Risk management • Organisational risk ‘landscape’ • Strategic – Business performance – Financial performance – Reputation • Operational – Output capacity – Demand response – Interruption and disruption • Statutory – Employment law – Health & safety – Company law • Regulatory – Industry/sector-specific compliance requirements – Licence to operate • Contractual – SLA targets/levels – Product/service availability – Quality/warranty
  • 20. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Information security • Preservation of confidentiality, integrity and availability of information and the assets and processes that support and enable its acquisition, storage, use, protection and disposal. • Wide variety of assets: – information – ICT – infrastructure • Prevent compromise (loss, disclosure, corruption, etc.). • Includes IT security and other forms of security: – physical – HR – supply
  • 21. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Legal requirements for a DPIA Article 35: Data protection impact assessment • Controller must seek the advice of the data protection officer. • This is particularly required in situations that involve: – Automated processing – Profiling – Creation of legal effects – Significantly affecting the natural person – Processing of large-scale categories of sensitive data – Data that relates to criminal offences or convictions – Monitoring on a large scale • Conduct a post-implementation review when risk profile changes.
  • 22. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Legal requirements for a DPIA Article 35: Data protection impact assessment • DPIA must be performed where: – New technologies are deployed – Nature, scope and context of the project demand it – Processes are likely to result in a high risk to the rights and freedom – It can be used to address sets of processing and risks
  • 23. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Legal requirements for a DPIA • The DPIA will set out as a minimum: – A description of the processing and purposes – Legitimate interests pursued by the controller – An assessment of the necessity and proportionality of the processing – An assessment of the risks to the rights and freedoms of data subjects – The measures envisaged to address the risks – All safeguards & security measures to demonstrate compliance – Indications of timeframes if processing relates to erasure – An indication of any data protection by design and default measures – List of recipients of personal data – Compliance with approved codes of conduct – Whether data subjects have been consulted.
  • 24. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Linking the DPIA to the privacy principles 1 • Processed lawfully, fairly and in a transparent manner 2 • Collected for specified, explicit and legitimate purposes 3 • Adequate, relevant and limited to what is necessary 4 • Accurate and, where necessary, kept up to date 5 • Retained only for as long as necessary 6 • Processed in an appropriate manner to maintain security Accountability
  • 25. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 How to conduct a data mapping exercise • The ICO staged approach to an effective DPIA: 1. Required when there is a change in processing of personally identifiable information (PII). 2. Determine the information flows throughout the organisation in order to make a proper assessment of the privacy risks. 3. Identify the risks related to privacy and processing, including the necessity and proportionality of the change in processing. 4. Identify possible privacy solutions to address the risks that have been identified. 5. Assess how the data protection principles have been applied throughout the organisation. 6. Sign-off and record the DPIA, including details of which privacy solutions are too be implemented. 7. Integrate the result of the DPIA back into the project plan. 8. Conduct a post-implementation review where risk profile of PII data has changed.
  • 26. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Why and how to conduct a data mapping exercise
  • 27. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Data mapping – what are the challenges? Identify personal data Identify appropriate technical and organisational safeguards Understand legal & regulatory obligations Trust and confidence
  • 28. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 What is an information flow? A transfer of information from one location to another. For example: – Inside and outside the European Union. – From suppliers and sub-suppliers through to customers. When mapping information flow, you should identify the interaction points between the parties involved. NB: Cloud providers present their own challenges.
  • 29. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Describing information flows Consider the potential future uses of the information collected, even if it is not immediately necessary. Ensure the people who will be using the information are consulted on the practical implications. Walk through the information lifecycle to identify unforeseen or unintended uses of the data.
  • 30. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Information flow – identify the key elements Data items Name, email, address Health data, criminal records Biometrics, location data Formats Hardcopy (paper records) Digital (USB) Database Transfer methods Post, telephone, social media Internal (within group) External (data sharing) Locations Offices Cloud Third parties
  • 31. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Data flow mapping – questions to ask • Workflow inputs and outputs: – How is personal data collected (e.g. form, online, call centre, other)? – Who is accountable for personal data? – What is the location of the systems/filing systems containing the data? – Who has access to the information? – Is the information disclosed/shared with anyone (e.g suppliers, third parties)? – Does the system interface with, or transfer information to, other systems?
  • 32. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Data flow mapping – techniques • Inspect existing documents • Facilitation workshops • Questionnaires • Observation • Whiteboard – freeform diagrams • Template drawings (Visio, mind map tools) • Post-it notes
  • 33. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Example information flow HR users HR system Finance system Workforce metrics EmailRecruitment system Third-party users CV database Outplacement data Candidate information Agency employment screening Recruitment services Outsourced management Outplacement services Candidates HR
  • 34. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 IT Governance: GDPR one-stop shop • Accredited training, one-day foundation course: – London OR Cambridge: http://www.itgovernance.co.uk/shop/p-1795-certified-eu- general-data-protection-regulation-foundation-gdpr-training-course.aspx – ONLINE: http://www.itgovernance.co.uk/shop/p-1834-certified-eu-general-data- protection-regulation-foundation-gdpr-online-training-course.aspx • Practitioner course, classroom or online: – http://www.itgovernance.co.uk/shop/p-1824-certified-eu-general-data-protection- regulation-practitioner-gdpr-training-course.aspx • Pocket guide: http://www.itgovernance.co.uk/shop/p-1830-eu-gdpr-a-pocket- guide.aspx • Documentation toolkit: http://www.itgovernance.co.uk/shop/p-1796-eu-general- data-protection-regulation-gdpr-documentation-toolkit.aspx • Consultancy support : – Data audit – Transition/implementation consultancy – http://www.itgovernance.co.uk/dpa-compliance-consultancy.aspx
  • 35. TM © IT Governance Ltd 2016 Copyright IT Governance Ltd 2016 – v1.0 Questions? aross@itgovernance.co.uk 0845 070 1750 www.itgovernance.co.uk