SlideShare a Scribd company logo
www.yourlegalconsultants.com
info@yourlegalconsultants.com
Data protection and security
Process information
IMPLEMENTATION PROCEDURE: KEY ISSUES Free information
1. CONCEPT OF PERSONAL DATA PROTECTION
2. ANALYSIS AND DETECTION OF PERSONAL DATA PROCESSING
3. IDENTIFICATION OF THE RESPONSIBILITIES OF THE DIFFERENT DEPARTMENTS
4. CLASSIFICATION OF FILES
5. CREATION OF AN INTERNAL COMPANY POLICY
6. IDENTIFICATION OF THE PROCESSING OF PERSONAL DATA BY THIRD PARTIES
7. IDENTIFICATION OF THE NEED TO TRANSFER DATA BETWEEN COMPANIES
8. SECURITY DOCUMENT, NOTIFICATION, FILE REGISTERS AND CERTIFICATION OF CORRECT IMPLEMENTATION
DOCUMENTS FOR THE IMPLEMENTATION OF DATA PROTECTION Payment required
9. PROCEDURE DOCUMENTS
10. COMPLEMENTARY AND IT GOVERNMENT DOCUMENTS
11. SECURITY AND AUDIT DOCUMENTS
www.yourlegalconsultants.com
info@yourlegalconsultants.com
PERSONAL DATA PROTECTION
Free information
www.yourlegalconsultants.com
info@yourlegalconsultants.com
1. CONCEPT OF PERSONAL DATA PROTECTION
Concept
The protection of personal data is governed by Organic Law 15/1999, of 13 December, on the protection of personal data, and
its regulations.
Personal data is all numeric, alphabetical, graphic, photographic, acoustic or any other type of information concerning identified
or identifiable natural persons
It is classified into three levels:
Basic
Medium
High
We must make a special mention of personal data in relation to health: Information on the present, past and future physical or
mental health of an individual. In particular, information referring to a person's percentage of disability or genetic information
is considered health data.
www.yourlegalconsultants.com
info@yourlegalconsultants.com
2. ANALYSIS AND DETECTION OF PERSONAL DATA PROCESSING
The processing of personal data may be conducted internally or outsourced:
A. Internal processing
Examples:
1. Marketing- Mailing of sales information, etc.
2. Human Resources – Receipt of CVs, the carrying out of psychological assessments, etc.
3. Quality – Processes associated with personal data
4. Legal – Contracts, debts, audits, etc.
B. Processing of data by third companies
1. Accounting firms
2. Lawyers
It is important to bear in mind that the security manager should give clear instructions to subcontracted
companies with regard to security measures.
www.yourlegalconsultants.com
info@yourlegalconsultants.com
3. IDENTIFICATION OF THE RESPONSIBILITIES OF THE DIFFERENT DEPARTMENTS
It is important that each department is aware of its responsibility with regard to the protection of personal data:
A. Each type of data to be processed requires the adaptation of instructions to each department in the company
Examples:
1. Marketing- Was the data subject’s consent obtained for sending sales information?
2. Human Resources – Is the information that is received for job applications used only for this purpose?
3. Quality – Can the information associated with processes be simplified so that it can be classified as basic level data?
4. Legal – In what cases is it necessary to obtain the data subject's consent?
B. What are the advantages of appointing a personal data coordinator in each department?
1. Supervise interaction with other departments
2. Approval of processes to avoid complaints
It is important to centralise information in accordance with the instructions of the systems manager.
www.yourlegalconsultants.com
info@yourlegalconsultants.com
4. CLASSIFICATION OF FILES
Personal data is protected through the use of security measures appropriate to the nature of the data (basic, medium, high)
If the three types of data are stored in the same file, high level data security measures apply
It is advisable to classify files on the basis of the nature of the data contained therein in order to provide the appropriate
security measures
The systems or security manager plays a vital role in this classification
Nevertheless, it is important that the different databases or files that might be organised separately are unidentifiable
It is important to know when the systems can be designed according to these criteria or, alternatively, the files can be
classified according to their applicability. For example: (contacts in internal information systems, psychological assessments,
etc.)
www.yourlegalconsultants.com
info@yourlegalconsultants.com
5. CREATION OF AN INTERNAL COMPANY POLICY
A very effective tool for ensuring that company policy with regard to personal data is known and observed by all employees is
to include several clauses in the policy to prevent possible data leakage, just to mention an example.
Company policy is an internal document that sets out codes of conduct and aims to prevent conduct that could lead to the
dismissal of employees.
It is a very effective tool for the Human Resources Department when it comes to defining possible offences.
For the IT Department, it is a tool that prevents misuse of internal and external communication systems.
For the Legal Department, internal company policy is useful for the prevention of intellectual property offences.
When defining company policy, it is important to enlist the cooperation of the company’s senior management and, when
applicable, company associates.
www.yourlegalconsultants.com
info@yourlegalconsultants.com
6. IDENTIFICATION OF THE PROCESSING OF DATA BY THIRD PARTIES
It is necessary to draw a distinction between the communication and disclosure of data
The communication of data does not entail the processing of personal data by third parties, but it does involve the use of the
data to perform specific functions. (The development of a Web project, etc.)
The disclosure of data, however, involves the processing of personal data for the development of services (the carrying out of
promotional campaigns by third parties, the payment of wages by third parties, etc.)
When services that are outsourced to third parties require the communication of data, when the project has been completed,
the data should be returned or destroyed, and this obligation should be set out in writing.
When services that are outsourced require the processing of data, the security manager should take account of a number of
instructions that ensure the security of the data, and which should be conveyed to the persons concerned.
It is important to sign the appropriate documents for each situation.
www.yourlegalconsultants.com
info@yourlegalconsultants.com
7. IDENTIFICATION OF THE NEED TO TRANSFER DATA BETWEEN COMPANIES
There are two different situations, but with the same objective:
A. There is a group of companies that will probably share data
B. There is a transfer of data to another company with which the company has a business collaboration relationship.
In both cases, the data is transferred, but the scope of the transfer requires that this be organised in different ways and the
security manager has various alternatives available.
It is important to define the situations before signing the documents governing the transfer of data between companies.
www.yourlegalconsultants.com
info@yourlegalconsultants.com
8.SECURITY DOCUMENT, NOTIFICATION, REGISTERS AND CERTIFICATION
The security document sets out the appropriate security measures and indicates the security level (basic, medium, high) of files
that have already been registered in the Data Protection Agency or Competent Supervisory Authority register.
Any changes to a file registered in the Register must be communicated to the Data Protection Agency register.
It is advisable to design information systems in accordance with criteria that guarantees the nature of the personal data
processed, ensuring the quality, safekeeping and availability of the data.
The information systems manager or information services manager should make every effort to ensure implementation of the
proposed security measures and inform the security manager accordingly.
Nevertheless, it is vital to adequately segregate information systems on the basis of the nature of the personal data to be
processed.
It is important to certify information systems if substantial changes are made that affect the security thereof. In this way, we
can be sure that information systems are properly supervised and that the security document is current and up-to-date.
www.yourlegalconsultants.com
info@yourlegalconsultants.com
DOCUMENTS FOR THE MANAGEMENT
OF PERSONAL DATA
Payment required
www.yourlegalconsultants.com
info@yourlegalconsultants.com
9. PROCEDURE DOCUMENTS
List of issues to be taken into account in the implementation of data protection
Recommendations for the implementation of data protection
www.yourlegalconsultants.com
info@yourlegalconsultants.com
List of issues to be taken into account in the implementation of data protection
Recommendations for the implementation of data protection
10. COMPLEMENTARY AND IT GOVERNMENT DOCUMENTS
Internal company policy
Document for the processing of personal data by third parties
www.yourlegalconsultants.com
info@yourlegalconsultants.com
Internal company policy
Document for the processing of personal data by third parties
11. SECURITY AND AUDIT DOCUMENTS
Customer databases and Employee data management databases
Security document
www.yourlegalconsultants.com
info@yourlegalconsultants.com
Document for the transfer of data between companies
Security document
Certificate of compliance
Data protection: Certificate of compliance
Thank you for your interest
dataprotection@yourlegalconsultants.com
For personal queries, please contact:
www.yourlegalconsultants.com
info@yourlegalconsultants.com

More Related Content

What's hot

The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI Webinar
Eryk Budi Pratama
 
Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...
David Cunningham
 
The Role of Password Management in Achieving Compliance
The Role of Password Management in Achieving ComplianceThe Role of Password Management in Achieving Compliance
The Role of Password Management in Achieving Compliance
PortalGuard
 
2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance
Raffa Learning Community
 
2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?
Raffa Learning Community
 
Managing Personally Identifiable Information (PII)
Managing Personally Identifiable Information (PII)Managing Personally Identifiable Information (PII)
Managing Personally Identifiable Information (PII)
KP Naidu
 
The impact of regulatory compliance on DBA(latest)
The impact of regulatory compliance on DBA(latest)The impact of regulatory compliance on DBA(latest)
The impact of regulatory compliance on DBA(latest)
Craig Mullins
 
Governing the Chaos
Governing the ChaosGoverning the Chaos
Governing the Chaos
John Hansen
 
Unit 5 v2
Unit 5 v2Unit 5 v2
Unit 5 v2
ShubhraGoyal4
 
Data goverance two_8.2.18 - copy
Data goverance two_8.2.18 - copyData goverance two_8.2.18 - copy
Data goverance two_8.2.18 - copy
Sandra (Sandy) Dunn
 
Eight principles of consumer data privacy
Eight principles of consumer data privacyEight principles of consumer data privacy
Eight principles of consumer data privacy
Solix Technologies, Inc
 
Common Practice in Data Privacy Program Management
Common Practice in Data Privacy Program ManagementCommon Practice in Data Privacy Program Management
Common Practice in Data Privacy Program Management
Eryk Budi Pratama
 
Information Asset Registers: A Short Guide
Information Asset Registers: A Short GuideInformation Asset Registers: A Short Guide
Information Asset Registers: A Short Guide
Janet Brimson
 
Using an Information Asset Register for the GDPR
Using an Information Asset Register for the GDPRUsing an Information Asset Register for the GDPR
Using an Information Asset Register for the GDPR
Reynold Leming
 
Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...
- Mark - Fullbright
 
Where in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva incWhere in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva inc
Druva
 
Data Privacy & Security
Data Privacy & SecurityData Privacy & Security
Data Privacy & Security
Eryk Budi Pratama
 
Database auditing essentials
Database auditing essentialsDatabase auditing essentials
Database auditing essentials
Craig Mullins
 
Managing Information Asset Register
Managing Information Asset RegisterManaging Information Asset Register
Managing Information Asset Register
Ben Omoakin Oguntala, developingafrica(dot)net
 
[Presentation] GDPR - How to Ensure Compliance
[Presentation] GDPR - How to Ensure Compliance[Presentation] GDPR - How to Ensure Compliance
[Presentation] GDPR - How to Ensure Compliance
AIIM International
 

What's hot (20)

The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI Webinar
 
Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...
 
The Role of Password Management in Achieving Compliance
The Role of Password Management in Achieving ComplianceThe Role of Password Management in Achieving Compliance
The Role of Password Management in Achieving Compliance
 
2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance
 
2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?
 
Managing Personally Identifiable Information (PII)
Managing Personally Identifiable Information (PII)Managing Personally Identifiable Information (PII)
Managing Personally Identifiable Information (PII)
 
The impact of regulatory compliance on DBA(latest)
The impact of regulatory compliance on DBA(latest)The impact of regulatory compliance on DBA(latest)
The impact of regulatory compliance on DBA(latest)
 
Governing the Chaos
Governing the ChaosGoverning the Chaos
Governing the Chaos
 
Unit 5 v2
Unit 5 v2Unit 5 v2
Unit 5 v2
 
Data goverance two_8.2.18 - copy
Data goverance two_8.2.18 - copyData goverance two_8.2.18 - copy
Data goverance two_8.2.18 - copy
 
Eight principles of consumer data privacy
Eight principles of consumer data privacyEight principles of consumer data privacy
Eight principles of consumer data privacy
 
Common Practice in Data Privacy Program Management
Common Practice in Data Privacy Program ManagementCommon Practice in Data Privacy Program Management
Common Practice in Data Privacy Program Management
 
Information Asset Registers: A Short Guide
Information Asset Registers: A Short GuideInformation Asset Registers: A Short Guide
Information Asset Registers: A Short Guide
 
Using an Information Asset Register for the GDPR
Using an Information Asset Register for the GDPRUsing an Information Asset Register for the GDPR
Using an Information Asset Register for the GDPR
 
Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...
 
Where in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva incWhere in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva inc
 
Data Privacy & Security
Data Privacy & SecurityData Privacy & Security
Data Privacy & Security
 
Database auditing essentials
Database auditing essentialsDatabase auditing essentials
Database auditing essentials
 
Managing Information Asset Register
Managing Information Asset RegisterManaging Information Asset Register
Managing Information Asset Register
 
[Presentation] GDPR - How to Ensure Compliance
[Presentation] GDPR - How to Ensure Compliance[Presentation] GDPR - How to Ensure Compliance
[Presentation] GDPR - How to Ensure Compliance
 

Viewers also liked

Custom Search 85x11
Custom  Search 85x11Custom  Search 85x11
Custom Search 85x11
Juan Pittau
 
524 storyboardjeanninecadre16
524 storyboardjeanninecadre16524 storyboardjeanninecadre16
524 storyboardjeanninecadre16
Jeannine Hamilton
 
A Journey To The Stars
A Journey To The StarsA Journey To The Stars
A Journey To The Stars
amr hassaan
 
Adjectives
AdjectivesAdjectives
Adjectives
Shai Omarali
 
Aktuálne trendy v poskytovaní zdravotnej starostlivosti v krajinách OECD
Aktuálne trendy v poskytovaní zdravotnej starostlivosti v krajinách OECDAktuálne trendy v poskytovaní zdravotnej starostlivosti v krajinách OECD
Aktuálne trendy v poskytovaní zdravotnej starostlivosti v krajinách OECD
Maroš Žofčin
 
Social media observations in Asia
Social media observations in AsiaSocial media observations in Asia
Social media observations in Asia
Robin Low
 
Logeion Young Professionals - Vakimpuls The Next Step - Karel Winkelaar
Logeion Young Professionals - Vakimpuls The Next Step - Karel WinkelaarLogeion Young Professionals - Vakimpuls The Next Step - Karel Winkelaar
Logeion Young Professionals - Vakimpuls The Next Step - Karel WinkelaarBas van Glabbeek
 
Instructional Design
Instructional DesignInstructional Design
Instructional Design
deirdri1
 
Logeion Young Professionals - Vakimpuls Het Plan is dood - Andre Manning
Logeion Young Professionals - Vakimpuls Het Plan is dood - Andre ManningLogeion Young Professionals - Vakimpuls Het Plan is dood - Andre Manning
Logeion Young Professionals - Vakimpuls Het Plan is dood - Andre Manning
Bas van Glabbeek
 
Zmot handbook
Zmot handbookZmot handbook
Zmot handbook
Juan Pittau
 
ReSTFul Api's com FRAPI
ReSTFul Api's com FRAPIReSTFul Api's com FRAPI
ReSTFul Api's com FRAPI
Alex Piaz
 
How to use an atm
How to use an atmHow to use an atm
How to use an atm
American Debt Counseling Inc
 
Industry report home agent adoption 2010 print version
Industry report  home agent adoption 2010 print versionIndustry report  home agent adoption 2010 print version
Industry report home agent adoption 2010 print version
Daniel Willis
 
Dillard pay yourself first 6.10
Dillard pay yourself first 6.10Dillard pay yourself first 6.10
Dillard pay yourself first 6.10
American Debt Counseling Inc
 
Webinar Advertising With Ad Words
Webinar Advertising With Ad WordsWebinar Advertising With Ad Words
Webinar Advertising With Ad Words
Juan Pittau
 
Trial
TrialTrial
Risk
RiskRisk
Play Your Reactivity Cards Right
Play Your  Reactivity Cards RightPlay Your  Reactivity Cards Right
Play Your Reactivity Cards Right
amr hassaan
 
Anschp25
Anschp25Anschp25
Anschp25
FnC Music
 

Viewers also liked (20)

Bingo
BingoBingo
Bingo
 
Custom Search 85x11
Custom  Search 85x11Custom  Search 85x11
Custom Search 85x11
 
524 storyboardjeanninecadre16
524 storyboardjeanninecadre16524 storyboardjeanninecadre16
524 storyboardjeanninecadre16
 
A Journey To The Stars
A Journey To The StarsA Journey To The Stars
A Journey To The Stars
 
Adjectives
AdjectivesAdjectives
Adjectives
 
Aktuálne trendy v poskytovaní zdravotnej starostlivosti v krajinách OECD
Aktuálne trendy v poskytovaní zdravotnej starostlivosti v krajinách OECDAktuálne trendy v poskytovaní zdravotnej starostlivosti v krajinách OECD
Aktuálne trendy v poskytovaní zdravotnej starostlivosti v krajinách OECD
 
Social media observations in Asia
Social media observations in AsiaSocial media observations in Asia
Social media observations in Asia
 
Logeion Young Professionals - Vakimpuls The Next Step - Karel Winkelaar
Logeion Young Professionals - Vakimpuls The Next Step - Karel WinkelaarLogeion Young Professionals - Vakimpuls The Next Step - Karel Winkelaar
Logeion Young Professionals - Vakimpuls The Next Step - Karel Winkelaar
 
Instructional Design
Instructional DesignInstructional Design
Instructional Design
 
Logeion Young Professionals - Vakimpuls Het Plan is dood - Andre Manning
Logeion Young Professionals - Vakimpuls Het Plan is dood - Andre ManningLogeion Young Professionals - Vakimpuls Het Plan is dood - Andre Manning
Logeion Young Professionals - Vakimpuls Het Plan is dood - Andre Manning
 
Zmot handbook
Zmot handbookZmot handbook
Zmot handbook
 
ReSTFul Api's com FRAPI
ReSTFul Api's com FRAPIReSTFul Api's com FRAPI
ReSTFul Api's com FRAPI
 
How to use an atm
How to use an atmHow to use an atm
How to use an atm
 
Industry report home agent adoption 2010 print version
Industry report  home agent adoption 2010 print versionIndustry report  home agent adoption 2010 print version
Industry report home agent adoption 2010 print version
 
Dillard pay yourself first 6.10
Dillard pay yourself first 6.10Dillard pay yourself first 6.10
Dillard pay yourself first 6.10
 
Webinar Advertising With Ad Words
Webinar Advertising With Ad WordsWebinar Advertising With Ad Words
Webinar Advertising With Ad Words
 
Trial
TrialTrial
Trial
 
Risk
RiskRisk
Risk
 
Play Your Reactivity Cards Right
Play Your  Reactivity Cards RightPlay Your  Reactivity Cards Right
Play Your Reactivity Cards Right
 
Anschp25
Anschp25Anschp25
Anschp25
 

Similar to Data Protection: Process Information

The Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTThe Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOT
Compliancy Group
 
Article - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdfArticle - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdf
Enov8
 
Ai in compliance
Ai in compliance Ai in compliance
Ai in compliance
Ebere Ikerionwu
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Sirius
 
Opteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdf
Opteamix LLC
 
1 3Financial Service Security EngagementLearning Team .docx
1     3Financial Service Security EngagementLearning Team .docx1     3Financial Service Security EngagementLearning Team .docx
1 3Financial Service Security EngagementLearning Team .docx
oswald1horne84988
 
Module 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancemModule 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancem
IlonaThornburg83
 
27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx
lorainedeserre
 
27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx
jesusamckone
 
Boosting Cybersecurity with Data Governance (peer reviewed)
Boosting Cybersecurity with Data Governance (peer reviewed)Boosting Cybersecurity with Data Governance (peer reviewed)
Boosting Cybersecurity with Data Governance (peer reviewed)
Guy Pearce
 
Information security
Information securityInformation security
Information security
Sanjay Tiwari
 
DATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docx
DATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docxDATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docx
DATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docx
SteveNgigi2
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
rajab ssemwogerere
 
Setting the right GDPR priorities
Setting the right GDPR prioritiesSetting the right GDPR priorities
Setting the right GDPR priorities
Alberto Canadè
 
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
David Kearney
 
Sample Data Security PoliciesThis document provides three ex.docx
Sample Data Security PoliciesThis document provides three ex.docxSample Data Security PoliciesThis document provides three ex.docx
Sample Data Security PoliciesThis document provides three ex.docx
rtodd599
 
General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001
Owako Rodah
 
Wollmuth Maher & Deutsch LLP -Takeaways From The SEC Cybersecurity Examinatio...
Wollmuth Maher & Deutsch LLP -Takeaways From The SEC Cybersecurity Examinatio...Wollmuth Maher & Deutsch LLP -Takeaways From The SEC Cybersecurity Examinatio...
Wollmuth Maher & Deutsch LLP -Takeaways From The SEC Cybersecurity Examinatio...
Jason Glass, CFA, CISSP
 
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdfData Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
CIOWomenMagazine
 
ISSA Data Retention Policy Development
ISSA Data Retention Policy DevelopmentISSA Data Retention Policy Development
ISSA Data Retention Policy Development
Bill Lisse
 

Similar to Data Protection: Process Information (20)

The Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTThe Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOT
 
Article - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdfArticle - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdf
 
Ai in compliance
Ai in compliance Ai in compliance
Ai in compliance
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
 
Opteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdf
 
1 3Financial Service Security EngagementLearning Team .docx
1     3Financial Service Security EngagementLearning Team .docx1     3Financial Service Security EngagementLearning Team .docx
1 3Financial Service Security EngagementLearning Team .docx
 
Module 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancemModule 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancem
 
27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx
 
27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx
 
Boosting Cybersecurity with Data Governance (peer reviewed)
Boosting Cybersecurity with Data Governance (peer reviewed)Boosting Cybersecurity with Data Governance (peer reviewed)
Boosting Cybersecurity with Data Governance (peer reviewed)
 
Information security
Information securityInformation security
Information security
 
DATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docx
DATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docxDATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docx
DATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docx
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
 
Setting the right GDPR priorities
Setting the right GDPR prioritiesSetting the right GDPR priorities
Setting the right GDPR priorities
 
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
 
Sample Data Security PoliciesThis document provides three ex.docx
Sample Data Security PoliciesThis document provides three ex.docxSample Data Security PoliciesThis document provides three ex.docx
Sample Data Security PoliciesThis document provides three ex.docx
 
General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001
 
Wollmuth Maher & Deutsch LLP -Takeaways From The SEC Cybersecurity Examinatio...
Wollmuth Maher & Deutsch LLP -Takeaways From The SEC Cybersecurity Examinatio...Wollmuth Maher & Deutsch LLP -Takeaways From The SEC Cybersecurity Examinatio...
Wollmuth Maher & Deutsch LLP -Takeaways From The SEC Cybersecurity Examinatio...
 
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdfData Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
 
ISSA Data Retention Policy Development
ISSA Data Retention Policy DevelopmentISSA Data Retention Policy Development
ISSA Data Retention Policy Development
 

More from Cristina Villavicencio

El desarrollo personalizado del aprendizaje: La analítica del talento y la ét...
El desarrollo personalizado del aprendizaje: La analítica del talento y la ét...El desarrollo personalizado del aprendizaje: La analítica del talento y la ét...
El desarrollo personalizado del aprendizaje: La analítica del talento y la ét...
Cristina Villavicencio
 
Resumen ejecutivo Train Us
Resumen ejecutivo Train Us Resumen ejecutivo Train Us
Resumen ejecutivo Train Us
Cristina Villavicencio
 
Presentacion Train Us Empresa
Presentacion Train Us EmpresaPresentacion Train Us Empresa
Presentacion Train Us Empresa
Cristina Villavicencio
 
La gestion del talento en la sociedad digitalizada
La gestion del talento en la sociedad digitalizadaLa gestion del talento en la sociedad digitalizada
La gestion del talento en la sociedad digitalizada
Cristina Villavicencio
 
Auditoría cuestiones clave
Auditoría cuestiones claveAuditoría cuestiones clave
Auditoría cuestiones clave
Cristina Villavicencio
 
Contratos anexos
Contratos anexosContratos anexos
Contratos anexos
Cristina Villavicencio
 
Política interna de empresa
Política interna de empresaPolítica interna de empresa
Política interna de empresa
Cristina Villavicencio
 
Certificado de implementación
Certificado de implementaciónCertificado de implementación
Certificado de implementación
Cristina Villavicencio
 
Documento de seguridad
Documento de seguridadDocumento de seguridad
Documento de seguridad
Cristina Villavicencio
 
Index data protection
Index data protectionIndex data protection
Index data protection
Cristina Villavicencio
 
Digital Content Creations
Digital Content CreationsDigital Content Creations
Digital Content Creations
Cristina Villavicencio
 
Transferencia de Tecnología Parte II
Transferencia de Tecnología Parte IITransferencia de Tecnología Parte II
Transferencia de Tecnología Parte II
Cristina Villavicencio
 
Transferencia de Tecnología Parte I
Transferencia de Tecnología Parte ITransferencia de Tecnología Parte I
Transferencia de Tecnología Parte I
Cristina Villavicencio
 
Orientación Practica Creación de Contenidos Digitales
Orientación Practica Creación de Contenidos Digitales Orientación Practica Creación de Contenidos Digitales
Orientación Practica Creación de Contenidos Digitales
Cristina Villavicencio
 
Creación de Contenidos digitales
Creación de Contenidos digitalesCreación de Contenidos digitales
Creación de Contenidos digitales
Cristina Villavicencio
 
Indice factura electrónica
Indice factura electrónicaIndice factura electrónica
Indice factura electrónica
Cristina Villavicencio
 
Indice del Documento: Cómo Trabajar con Proveedores de Tecnologia
Indice del Documento: Cómo Trabajar con Proveedores de TecnologiaIndice del Documento: Cómo Trabajar con Proveedores de Tecnologia
Indice del Documento: Cómo Trabajar con Proveedores de Tecnologia
Cristina Villavicencio
 
Curso transferencia tecnologia. plug and play
Curso transferencia tecnologia. plug and playCurso transferencia tecnologia. plug and play
Curso transferencia tecnologia. plug and play
Cristina Villavicencio
 
Curso Transferencia Tecnologia. Introducción
Curso Transferencia Tecnologia. IntroducciónCurso Transferencia Tecnologia. Introducción
Curso Transferencia Tecnologia. Introducción
Cristina Villavicencio
 
Indice documentos protección de datos
Indice documentos protección de datosIndice documentos protección de datos
Indice documentos protección de datos
Cristina Villavicencio
 

More from Cristina Villavicencio (20)

El desarrollo personalizado del aprendizaje: La analítica del talento y la ét...
El desarrollo personalizado del aprendizaje: La analítica del talento y la ét...El desarrollo personalizado del aprendizaje: La analítica del talento y la ét...
El desarrollo personalizado del aprendizaje: La analítica del talento y la ét...
 
Resumen ejecutivo Train Us
Resumen ejecutivo Train Us Resumen ejecutivo Train Us
Resumen ejecutivo Train Us
 
Presentacion Train Us Empresa
Presentacion Train Us EmpresaPresentacion Train Us Empresa
Presentacion Train Us Empresa
 
La gestion del talento en la sociedad digitalizada
La gestion del talento en la sociedad digitalizadaLa gestion del talento en la sociedad digitalizada
La gestion del talento en la sociedad digitalizada
 
Auditoría cuestiones clave
Auditoría cuestiones claveAuditoría cuestiones clave
Auditoría cuestiones clave
 
Contratos anexos
Contratos anexosContratos anexos
Contratos anexos
 
Política interna de empresa
Política interna de empresaPolítica interna de empresa
Política interna de empresa
 
Certificado de implementación
Certificado de implementaciónCertificado de implementación
Certificado de implementación
 
Documento de seguridad
Documento de seguridadDocumento de seguridad
Documento de seguridad
 
Index data protection
Index data protectionIndex data protection
Index data protection
 
Digital Content Creations
Digital Content CreationsDigital Content Creations
Digital Content Creations
 
Transferencia de Tecnología Parte II
Transferencia de Tecnología Parte IITransferencia de Tecnología Parte II
Transferencia de Tecnología Parte II
 
Transferencia de Tecnología Parte I
Transferencia de Tecnología Parte ITransferencia de Tecnología Parte I
Transferencia de Tecnología Parte I
 
Orientación Practica Creación de Contenidos Digitales
Orientación Practica Creación de Contenidos Digitales Orientación Practica Creación de Contenidos Digitales
Orientación Practica Creación de Contenidos Digitales
 
Creación de Contenidos digitales
Creación de Contenidos digitalesCreación de Contenidos digitales
Creación de Contenidos digitales
 
Indice factura electrónica
Indice factura electrónicaIndice factura electrónica
Indice factura electrónica
 
Indice del Documento: Cómo Trabajar con Proveedores de Tecnologia
Indice del Documento: Cómo Trabajar con Proveedores de TecnologiaIndice del Documento: Cómo Trabajar con Proveedores de Tecnologia
Indice del Documento: Cómo Trabajar con Proveedores de Tecnologia
 
Curso transferencia tecnologia. plug and play
Curso transferencia tecnologia. plug and playCurso transferencia tecnologia. plug and play
Curso transferencia tecnologia. plug and play
 
Curso Transferencia Tecnologia. Introducción
Curso Transferencia Tecnologia. IntroducciónCurso Transferencia Tecnologia. Introducción
Curso Transferencia Tecnologia. Introducción
 
Indice documentos protección de datos
Indice documentos protección de datosIndice documentos protección de datos
Indice documentos protección de datos
 

Recently uploaded

GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 

Recently uploaded (20)

GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 

Data Protection: Process Information

  • 2. IMPLEMENTATION PROCEDURE: KEY ISSUES Free information 1. CONCEPT OF PERSONAL DATA PROTECTION 2. ANALYSIS AND DETECTION OF PERSONAL DATA PROCESSING 3. IDENTIFICATION OF THE RESPONSIBILITIES OF THE DIFFERENT DEPARTMENTS 4. CLASSIFICATION OF FILES 5. CREATION OF AN INTERNAL COMPANY POLICY 6. IDENTIFICATION OF THE PROCESSING OF PERSONAL DATA BY THIRD PARTIES 7. IDENTIFICATION OF THE NEED TO TRANSFER DATA BETWEEN COMPANIES 8. SECURITY DOCUMENT, NOTIFICATION, FILE REGISTERS AND CERTIFICATION OF CORRECT IMPLEMENTATION DOCUMENTS FOR THE IMPLEMENTATION OF DATA PROTECTION Payment required 9. PROCEDURE DOCUMENTS 10. COMPLEMENTARY AND IT GOVERNMENT DOCUMENTS 11. SECURITY AND AUDIT DOCUMENTS www.yourlegalconsultants.com info@yourlegalconsultants.com
  • 3. PERSONAL DATA PROTECTION Free information www.yourlegalconsultants.com info@yourlegalconsultants.com
  • 4. 1. CONCEPT OF PERSONAL DATA PROTECTION Concept The protection of personal data is governed by Organic Law 15/1999, of 13 December, on the protection of personal data, and its regulations. Personal data is all numeric, alphabetical, graphic, photographic, acoustic or any other type of information concerning identified or identifiable natural persons It is classified into three levels: Basic Medium High We must make a special mention of personal data in relation to health: Information on the present, past and future physical or mental health of an individual. In particular, information referring to a person's percentage of disability or genetic information is considered health data. www.yourlegalconsultants.com info@yourlegalconsultants.com
  • 5. 2. ANALYSIS AND DETECTION OF PERSONAL DATA PROCESSING The processing of personal data may be conducted internally or outsourced: A. Internal processing Examples: 1. Marketing- Mailing of sales information, etc. 2. Human Resources – Receipt of CVs, the carrying out of psychological assessments, etc. 3. Quality – Processes associated with personal data 4. Legal – Contracts, debts, audits, etc. B. Processing of data by third companies 1. Accounting firms 2. Lawyers It is important to bear in mind that the security manager should give clear instructions to subcontracted companies with regard to security measures. www.yourlegalconsultants.com info@yourlegalconsultants.com
  • 6. 3. IDENTIFICATION OF THE RESPONSIBILITIES OF THE DIFFERENT DEPARTMENTS It is important that each department is aware of its responsibility with regard to the protection of personal data: A. Each type of data to be processed requires the adaptation of instructions to each department in the company Examples: 1. Marketing- Was the data subject’s consent obtained for sending sales information? 2. Human Resources – Is the information that is received for job applications used only for this purpose? 3. Quality – Can the information associated with processes be simplified so that it can be classified as basic level data? 4. Legal – In what cases is it necessary to obtain the data subject's consent? B. What are the advantages of appointing a personal data coordinator in each department? 1. Supervise interaction with other departments 2. Approval of processes to avoid complaints It is important to centralise information in accordance with the instructions of the systems manager. www.yourlegalconsultants.com info@yourlegalconsultants.com
  • 7. 4. CLASSIFICATION OF FILES Personal data is protected through the use of security measures appropriate to the nature of the data (basic, medium, high) If the three types of data are stored in the same file, high level data security measures apply It is advisable to classify files on the basis of the nature of the data contained therein in order to provide the appropriate security measures The systems or security manager plays a vital role in this classification Nevertheless, it is important that the different databases or files that might be organised separately are unidentifiable It is important to know when the systems can be designed according to these criteria or, alternatively, the files can be classified according to their applicability. For example: (contacts in internal information systems, psychological assessments, etc.) www.yourlegalconsultants.com info@yourlegalconsultants.com
  • 8. 5. CREATION OF AN INTERNAL COMPANY POLICY A very effective tool for ensuring that company policy with regard to personal data is known and observed by all employees is to include several clauses in the policy to prevent possible data leakage, just to mention an example. Company policy is an internal document that sets out codes of conduct and aims to prevent conduct that could lead to the dismissal of employees. It is a very effective tool for the Human Resources Department when it comes to defining possible offences. For the IT Department, it is a tool that prevents misuse of internal and external communication systems. For the Legal Department, internal company policy is useful for the prevention of intellectual property offences. When defining company policy, it is important to enlist the cooperation of the company’s senior management and, when applicable, company associates. www.yourlegalconsultants.com info@yourlegalconsultants.com
  • 9. 6. IDENTIFICATION OF THE PROCESSING OF DATA BY THIRD PARTIES It is necessary to draw a distinction between the communication and disclosure of data The communication of data does not entail the processing of personal data by third parties, but it does involve the use of the data to perform specific functions. (The development of a Web project, etc.) The disclosure of data, however, involves the processing of personal data for the development of services (the carrying out of promotional campaigns by third parties, the payment of wages by third parties, etc.) When services that are outsourced to third parties require the communication of data, when the project has been completed, the data should be returned or destroyed, and this obligation should be set out in writing. When services that are outsourced require the processing of data, the security manager should take account of a number of instructions that ensure the security of the data, and which should be conveyed to the persons concerned. It is important to sign the appropriate documents for each situation. www.yourlegalconsultants.com info@yourlegalconsultants.com
  • 10. 7. IDENTIFICATION OF THE NEED TO TRANSFER DATA BETWEEN COMPANIES There are two different situations, but with the same objective: A. There is a group of companies that will probably share data B. There is a transfer of data to another company with which the company has a business collaboration relationship. In both cases, the data is transferred, but the scope of the transfer requires that this be organised in different ways and the security manager has various alternatives available. It is important to define the situations before signing the documents governing the transfer of data between companies. www.yourlegalconsultants.com info@yourlegalconsultants.com
  • 11. 8.SECURITY DOCUMENT, NOTIFICATION, REGISTERS AND CERTIFICATION The security document sets out the appropriate security measures and indicates the security level (basic, medium, high) of files that have already been registered in the Data Protection Agency or Competent Supervisory Authority register. Any changes to a file registered in the Register must be communicated to the Data Protection Agency register. It is advisable to design information systems in accordance with criteria that guarantees the nature of the personal data processed, ensuring the quality, safekeeping and availability of the data. The information systems manager or information services manager should make every effort to ensure implementation of the proposed security measures and inform the security manager accordingly. Nevertheless, it is vital to adequately segregate information systems on the basis of the nature of the personal data to be processed. It is important to certify information systems if substantial changes are made that affect the security thereof. In this way, we can be sure that information systems are properly supervised and that the security document is current and up-to-date. www.yourlegalconsultants.com info@yourlegalconsultants.com
  • 12. DOCUMENTS FOR THE MANAGEMENT OF PERSONAL DATA Payment required www.yourlegalconsultants.com info@yourlegalconsultants.com
  • 13. 9. PROCEDURE DOCUMENTS List of issues to be taken into account in the implementation of data protection Recommendations for the implementation of data protection www.yourlegalconsultants.com info@yourlegalconsultants.com List of issues to be taken into account in the implementation of data protection Recommendations for the implementation of data protection
  • 14. 10. COMPLEMENTARY AND IT GOVERNMENT DOCUMENTS Internal company policy Document for the processing of personal data by third parties www.yourlegalconsultants.com info@yourlegalconsultants.com Internal company policy Document for the processing of personal data by third parties
  • 15. 11. SECURITY AND AUDIT DOCUMENTS Customer databases and Employee data management databases Security document www.yourlegalconsultants.com info@yourlegalconsultants.com Document for the transfer of data between companies Security document Certificate of compliance Data protection: Certificate of compliance
  • 16. Thank you for your interest dataprotection@yourlegalconsultants.com For personal queries, please contact: www.yourlegalconsultants.com info@yourlegalconsultants.com