SlideShare a Scribd company logo
1 of 12
Download to read offline
Mobile RDD
Sample
Pulsed Mobile RDD
Consumer Sample
Global coverage with more than 250
key variables
RDD onDemand
RDD onDemand provides direct access
to our global RDD data base
Geocoding Services
Enrich Data with NUTS regions or
other socio-demgraphic data
Data Security Whitepaper Wh
Sample Solutions
P R E M I E R . S A M P L E . P R O V I D E R
PREMIER.SAMPLE.PROVIDER
SAMPLE SOLUTIONS
Landline RDD Sample
Pulsed landline RDD for more than
140 countries
NAME OF THE CHAPTER
3Brochurename or the title
Introduction
Data security is a critical component
for all businesses. Business data protection
helps to secure customer details, financial
information, survey data and other key
business data which are key company assets.
Many companies, including Sample
Solutions, rely on the fact that data they
have and work with is secure, encrypted
and can not be breached. Losing the data
in a natural catastrophe is one thing but
losing it to a breach can lead to severe
consequences. Not only do data breaches
damage a company’s reputation and destroy
consumer trust, breaching may also lead to
lost business opportunities and financial
consequences, along with disrupt safety
and natural workflow.
NAME OF THE CHAPTER
4 Brochurename or the title
Content
More rigorous requirements
for obtaining consent
for collecting personal data
3
6
8
Data security is a critical
component for all
businesses
Background
General
Approach to
Data Protection
Introduction
NAME OF THE CHAPTER
5Brochurename or the title
10
11
12
Products
of Sample
Solutions
Future Steps
towards
2018
Works
Referenced
SMS Survey Platform;
Sample on Demand.
Breaching may also lead to
lost business opportunities
6 Brochurename or the title
NAME OF THE CHAPTER
Background
In the age of digitalization and e-commerce, data protection and security have become
increasingly important. Not only must companies protect their own data from cyber
espionage, but they must also safeguard consumer data and abide by ever-changing
data protection regulations or face severe consequences. Data breaches cost compa-
nies millions each year, just ask Target--a large US retailer--who had to pay out 67
million for a massive data breach in 2013. According to the Ponemon Institute in 2015
alone, data breaches cost companies an average of $3.79 million (≈3.39 million euros).
Thus it is essential for companies to have proper data safeguard mechanisms inte-
grated into their systems along with regulatory compliance for all countries in which
they conduct business. Issues like new Data Protection Regulation as well as what
companies need to do regarding this will be discussed later in this whitepaper.
Data protection regulation is intended to strike a balance between the rights
of individuals to privacy and the ability of companies to use data for com-
mercial purposes. The main purpose for the existence of data legislation
is that the personal data is not processed without the knowledge of the individual.
Moreover, In 2018 the General Data Protection Regulation (GDPR) will come into
place which requires all companies conducting business within the EU to handle
I
7Brochurename or the title
NAME OF THE CHAPTER
Data protection regulation is intended
to strike a balance
“the personal data is not processed
without the knowledge of the
individual.”
It is essential for companies to have
proper data safeguard mechanisms
“regulatory compliance for all
countries in which they conduct
business”
Intensive work with data
“we will look at how these new practices apply
to our core products: telephone
samples, sms surveys and lastly -
data services.”
data in specific ways. Besides the EU countries, it also addresses the transfer of
personal data outside the EU.
Key changes to EU data protection introduced by the GDPR are the following:
- More rigorous requirements for obtaining consent for collecting personal data
- Raising the age of consent for collecting an individual’s data from 13 to 16 years
old
- Requiring a company to delete data if it is no longer used for the purpose for
which it was collected
- Requiring a company to delete data if the individual revokes consent for the
company to hold the data
- Requiring companies to notify the EU government of data breaches within 72
hours of learning about the breach
- Establishing a single national office for monitoring and handling complaints
brought under the GDPR
- Companies handling significant amounts of sensitive data or monitoring the
behaviour - of many consumers will be required to appoint a data protection
officer
Fines up to €20m or 4% of a company’s global revenue for its non-compliance.
NAME OF THE CHAPTER
8 Brochurename or the title
General approach to data protection policies
Data security and the challenge of data protection is increasing in scope—and difficulty. While organiza-
tions have long needed to safeguard intellectual property and confidential information, changes in informa-
tion technology and business models introduce new actors, new threats, and new regulations. As a result,
companies, including Sample Solutions, need to think beyond the traditional models of securing the perim-
eter and locking down specific segments of IT infrastructure in order to achieve their data protection goals.
Even before the new Data Protection Regulation comes into force, Sample Solutions has always complied with the EU’s Data
Protection Directive which requires data controllers to ensure data protection requirements are met and safeguards are
in place including measures related to security, and we continually strive to further improve and develop these measures
beyond what is required. Our systems require identity assurance, visible trust and strong protection, some of Sample Solu-
tions general policies include data encryption, safely storing the data, SSL certificates for security and reliable web hosting.
All of our data is delivered via our own platform where we host the data on a dedicated server -
https://www.surveyplatform.eu There are several advantages of providing the data via platform and not FTP
or other third-party applications. Reliable web hosting, SSL and encryption are provided for each and every
sub-platform as well as all orders that we deliver to clients. We discuss security security protection pro-
vided by third party applications and how they contribute to better data protection in the following sections.
NAME OF THE CHAPTER
9Brochurename or the title
Web Hosting
The server hosting for our platform is provided by Strato ( https://www.strato.nl/ ) . It’s 100% hosted in Germany as they
provide excellent IT security which is verified repeatedly each year through independent TÜV certification (ISO 27001).
STRATO also offers three-tiered security concept which includes:
- Security data centers, complying with Germany’s strict legal requirements where they host more than 60.000 serves
and 4 million websites
- Backup control and risk management at the highest level
- Secure data transmission through encryption
SSL Certificate
SSL (Secure Sockets Layer) is the standard security technology for establishing an encrypted link between a web server
and a browser. The adoption of SSL certification is on the rise. SSL is a transparent protocol which requires little inter-
action from the end user when establishing a secure session. As opposed to unsecured HTTP URLs which begin with
“http://” and use port 80 by default, secure HTTPS URLs begin with “https://” and use port 443 by default.
Most information security professionals would think that SSL is a basic security measure due to the fact that HTTP is
insecure and is subject to eavesdropping attacks which can let attackers gain access to online accounts and sensitive
information. Data that is sent or posted through the browser using HTTPS is ensured that is encrypted and secure.
Sample Solutions has enabled Extended Validation SSL Certificates ( EV SSL ) as the highest class of SSL available. This
kind of certificate activate both the padlock and the green address bar in all major browsers. EV SSL Certificates provide
the strongest encryption level available and enables us to present our own verified identity to website visitors. EV SSL
Certificates offer a stronger guarantee, are globally standardized and have verification process defined within the EV
Encryption
As a concept , encryption does not prevent inter-
ception, but it denies the message content to the
interceptor. In our system all of the delicate data is
encoded in such a way that only authorized parties
can read it. In our platform we encrypt the files
with an encryption key which specifies how the
messages should be encoded. All the sessions and
session variables are encoded in the backso all the
sub-platforms are secured as well.
Everyone agrees that - usernames and passwords
are the ultimate thing that needs to be protected.
Sample Solutions encryption offers encoding for
these as well , so that in the unlikely case of a data
breach, this information will not be published or
accessible by third parties.
NAME OF THE CHAPTER
10 Brochurename or the title
Sample Solutions wants to make sure all of our security policies are provided for the products we offer to clients.
Here we are mention policies for our two most used platforms - the SMS survey platform which enables one
and two-way SMS surveys and Sample on Demand which offers internal work with RDD and B2B databases and
includes our Client Delivery System where all the processed orders are safely stored and delivered to clients.
1. SMS Survey Platform
The SMS Survey Platform is currently our only platform in Sample Solutions that handles personal data.
So far the company has complied with all internal regulations in every country that we have performed
surveys in. Based on the data protection regulations discussed in the preceding sections, the SMS Survey
platform is built with a modern and widely popular web framework that provides additional safety measures.
The SMS Survey platform utilizes a sophisticated authentication and user- management system. This provides
a safe and secure way of logging into the application and managing the users accordingly. The system also
provides user roles, so that not all users are allowed to have access to the delicate parts of the application.
By using a modern web framework to develop the SMS plat-
form – several security measures are already covered, such as:
Cross-site request forgeries – targeting some URLs may have some side effects. That is why
not all users have the same roles and cannot access all the parts and routes of the application.
XSS Cross-site scripting – placing unwanted client-side code that steals informa-
tion. This is solved by escaping and making sure that every user-submitted data is safe.
SQL Injection – when an application uses unfiltered user input in communication with the database. By
default, the framework offers techniques that are SQL injection proof which the SMS platform extensively uses.
Forced HTTPS when exchanging sensitive data – if someone tries to communicate with the system without
a secure connection, the system forces them to use HTTPS over HTTP for additional security measures.
By using a popularly, supported and regularly maintained web framework for developing this platform and also
implementingthebestprogrammingtechniques–wehavemadesurethatthisplatformiscompletelydata-secure.
2. Sample On Demand
Sample on Demand is the general tool for delivering the main product of Sample Solu-
tions - RDD, B2B, B2C samples - can be found under https://sample.surveyplatform,eu
SSL protected and encrypted as well, this platform is highly protected in several ways since
the data we are delivering are delicate and of great importance to our clients. Generally devel-
oped both for administrators and users it provides encrypted authentication for both parties.
During the upload and delivery of an order the following actions are taken:
Products of Sample Solutions
NAME OF THE CHAPTER
11Brochurename or the title
Future steps
towards 2018
Around 18 months are left till 2018
and the implementation of the
new EU data protection guidelines.
Therefore we have developed a
roadmap towards 2018 to further
strengthen our data protection
policies. Although, only a part of the
data that Sample Solutions works
with is classified as personal data,
we will strive to comply with the new
regulations and continually improve
our system. As part of our next steps,
we will establish a data protection
management team to implement the
ISO27001 international standard for
Information Security Management.
Furthermore, we plan on appointing
a data protection officer, to ensure
that the use personal data only in
cases the data protection regime
allows using the data in question and
obtain specific and explicit consent
by individuals for the processing of
their data ( Opt - In ).
-Oncetheorderisuploaded,theclientwillimmediatelyreceivetwosep-
arate emails. One contains the access link to the order and the second
email contains the password for the submitted order. The files are kept
inourowndedicatedserverthustheycannotbeaccessinanyotherway.
- After the order is processed, the system automatically sends the client
an internal and external link to access the files. The internal URL demands
authentication by the user itself, and the external URL is equipped with
additional protection by including randomly generated unique strings
that do not allow any kind of prediction guessing from an outside party.
- The platform offers a unique password per order after the client
passes the general verification and is equipped with a limited number
of downloads per order to prevent outside attacks or abuse of data.
- For general protection, the link to the platform automatically
expires after 21 days. However, the client can still access the origi-
nal files past the expiration date upon request as we store these.
“By using a modern web framework
to develop the SMS platform -
several security measures are already
covered”
Works Referenced
1. Directive 2002/58/EC of the European Parliament and of the
Council of 12 July 2002 concerning the processing of personal data
and the protection of privacy in the electronic communications sec-
tor (Directive on privacy and electronic
communications)
2. Official Journal L 201 , 31/07/2002 P. 0037 - 0047
Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND
OF THE COUNCIL concerning measures to ensure a high com-
mon level of network and information security across the Union /*
COM/2013/048 final - 2013/0027 (COD) */.
3. M Law Group, 2012, New Draft European Protection Regime.
Available from:
http://www.mlawgroup.de/news/publications/detail.php?we_ob-
jectID=227
4. Global Sign, What is SSL? Available from: https://www.globalsign.
com/en/ssl-information-center/what-is-ssl/
5. Ponemon Institute Research Report, 2015, 2015 Cost of Data
Breach Study: Global Analysis. Available from:
www.ibm.com/security/data-breach
		
www.sample.solutons

More Related Content

What's hot

Convince your board - Ten steps to GDPR compliance
Convince your board  - Ten steps to GDPR complianceConvince your board  - Ten steps to GDPR compliance
Convince your board - Ten steps to GDPR complianceDave James
 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniquesUlf Mattsson
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerCapgemini
 
Cybersecurity & Data Challenges
Cybersecurity & Data ChallengesCybersecurity & Data Challenges
Cybersecurity & Data ChallengesJoão Bocas
 
Beyond GDPR Compliance - Role of Internal Audit
Beyond GDPR Compliance - Role of Internal AuditBeyond GDPR Compliance - Role of Internal Audit
Beyond GDPR Compliance - Role of Internal AuditOmo Osagiede
 
GDPR Guide: The ICO's 12 Recommended Steps To Take Now
GDPR Guide: The ICO's 12 Recommended Steps To Take NowGDPR Guide: The ICO's 12 Recommended Steps To Take Now
GDPR Guide: The ICO's 12 Recommended Steps To Take NowHackerOne
 
Beginning your General Data Protection Regulation (GDPR) Journey
Beginning your General Data Protection Regulation (GDPR) JourneyBeginning your General Data Protection Regulation (GDPR) Journey
Beginning your General Data Protection Regulation (GDPR) JourneyMicrosoft Österreich
 
Data Protection and Data Privacy
Data Protection and Data PrivacyData Protection and Data Privacy
Data Protection and Data PrivacyIT Governance Ltd
 
GDPR Changing Mindset
GDPR Changing MindsetGDPR Changing Mindset
GDPR Changing MindsetNetworkIQ
 
GDPR and technology - details matter
GDPR and technology - details matterGDPR and technology - details matter
GDPR and technology - details matterExove
 
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in ComplianceThe GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in ComplianceObservePoint
 
Azure Privacy & GDPR @ Service Management World
Azure Privacy & GDPR @ Service Management WorldAzure Privacy & GDPR @ Service Management World
Azure Privacy & GDPR @ Service Management WorldJP Clementi
 
Teradata's approach to addressing GDPR
Teradata's approach to addressing GDPRTeradata's approach to addressing GDPR
Teradata's approach to addressing GDPRPaul O'Carroll
 
Operational impact of gdpr finance industries in the caribbean
Operational impact of gdpr finance industries in the caribbeanOperational impact of gdpr finance industries in the caribbean
Operational impact of gdpr finance industries in the caribbeanEquiGov Institute
 
The Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowThe Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowSymantec
 
Data Protection Forum Brussels 230517 - Implementing GDPR
Data Protection Forum Brussels 230517 - Implementing GDPRData Protection Forum Brussels 230517 - Implementing GDPR
Data Protection Forum Brussels 230517 - Implementing GDPRJohn M Walsh
 
The implications of gdpr for the solutions industry tatech 2018
The implications of gdpr for the solutions industry tatech 2018The implications of gdpr for the solutions industry tatech 2018
The implications of gdpr for the solutions industry tatech 2018Shane Gray
 

What's hot (20)

Convince your board - Ten steps to GDPR compliance
Convince your board  - Ten steps to GDPR complianceConvince your board  - Ten steps to GDPR compliance
Convince your board - Ten steps to GDPR compliance
 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniques
 
ZyLAB ACEDS Webinar- GDPR
ZyLAB ACEDS Webinar- GDPR ZyLAB ACEDS Webinar- GDPR
ZyLAB ACEDS Webinar- GDPR
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offer
 
GDPR: Time to Act
GDPR: Time to ActGDPR: Time to Act
GDPR: Time to Act
 
Cybersecurity & Data Challenges
Cybersecurity & Data ChallengesCybersecurity & Data Challenges
Cybersecurity & Data Challenges
 
Beyond GDPR Compliance - Role of Internal Audit
Beyond GDPR Compliance - Role of Internal AuditBeyond GDPR Compliance - Role of Internal Audit
Beyond GDPR Compliance - Role of Internal Audit
 
GDPR Guide: The ICO's 12 Recommended Steps To Take Now
GDPR Guide: The ICO's 12 Recommended Steps To Take NowGDPR Guide: The ICO's 12 Recommended Steps To Take Now
GDPR Guide: The ICO's 12 Recommended Steps To Take Now
 
Beginning your General Data Protection Regulation (GDPR) Journey
Beginning your General Data Protection Regulation (GDPR) JourneyBeginning your General Data Protection Regulation (GDPR) Journey
Beginning your General Data Protection Regulation (GDPR) Journey
 
Data Protection and Data Privacy
Data Protection and Data PrivacyData Protection and Data Privacy
Data Protection and Data Privacy
 
GDPR Changing Mindset
GDPR Changing MindsetGDPR Changing Mindset
GDPR Changing Mindset
 
Materializing dataprivacy in sap .. how?
Materializing dataprivacy in sap .. how?Materializing dataprivacy in sap .. how?
Materializing dataprivacy in sap .. how?
 
GDPR and technology - details matter
GDPR and technology - details matterGDPR and technology - details matter
GDPR and technology - details matter
 
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in ComplianceThe GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
 
Azure Privacy & GDPR @ Service Management World
Azure Privacy & GDPR @ Service Management WorldAzure Privacy & GDPR @ Service Management World
Azure Privacy & GDPR @ Service Management World
 
Teradata's approach to addressing GDPR
Teradata's approach to addressing GDPRTeradata's approach to addressing GDPR
Teradata's approach to addressing GDPR
 
Operational impact of gdpr finance industries in the caribbean
Operational impact of gdpr finance industries in the caribbeanOperational impact of gdpr finance industries in the caribbean
Operational impact of gdpr finance industries in the caribbean
 
The Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowThe Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t know
 
Data Protection Forum Brussels 230517 - Implementing GDPR
Data Protection Forum Brussels 230517 - Implementing GDPRData Protection Forum Brussels 230517 - Implementing GDPR
Data Protection Forum Brussels 230517 - Implementing GDPR
 
The implications of gdpr for the solutions industry tatech 2018
The implications of gdpr for the solutions industry tatech 2018The implications of gdpr for the solutions industry tatech 2018
The implications of gdpr for the solutions industry tatech 2018
 

Similar to Data Security Whitepaper

Data-Centric Security | Seclore
Data-Centric Security | Seclore Data-Centric Security | Seclore
Data-Centric Security | Seclore Seclore
 
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 EuroCloud
 
How Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR complianceHow Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR complianceCloudera, Inc.
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2sharing notes123
 
Data Privacy and Security in UAE.pptx
Data Privacy and Security in UAE.pptxData Privacy and Security in UAE.pptx
Data Privacy and Security in UAE.pptxAdarsh748147
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2SafeNet
 
The Evolution of Data Privacy: 3 Things You Need To Consider
The Evolution of Data Privacy:  3 Things You Need To ConsiderThe Evolution of Data Privacy:  3 Things You Need To Consider
The Evolution of Data Privacy: 3 Things You Need To ConsiderSymantec
 
Generic_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_ProceduresGeneric_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_ProceduresSamuel Loomis
 
2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf
2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf
2022-Q3-Webinar-PPT-DataProtectionByDesign.pdfControlCase
 
Securing data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law FirmsSecuring data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law FirmsCloudMask inc.
 
Carrying out safe exploration short of the actual data of codes and trapdoors
Carrying out safe exploration short of the actual data of codes and trapdoorsCarrying out safe exploration short of the actual data of codes and trapdoors
Carrying out safe exploration short of the actual data of codes and trapdoorsIaetsd Iaetsd
 
Frukostseminarium om molntjänster
Frukostseminarium om molntjänsterFrukostseminarium om molntjänster
Frukostseminarium om molntjänsterTranscendent Group
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRMatt Stubbs
 
Symantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR ComplianceSymantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR ComplianceSymantec
 
GDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpGDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpJason Lackey
 
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, RubrikVMUG IT
 
Guide: Security and Compliance
Guide: Security and ComplianceGuide: Security and Compliance
Guide: Security and ComplianceQuestionPro
 
Achieving Data Privacy in the Enterprise
Achieving Data Privacy in the EnterpriseAchieving Data Privacy in the Enterprise
Achieving Data Privacy in the EnterpriseSafeNet
 

Similar to Data Security Whitepaper (20)

Data-Centric Security | Seclore
Data-Centric Security | Seclore Data-Centric Security | Seclore
Data-Centric Security | Seclore
 
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
 
How Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR complianceHow Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR compliance
 
PREPARING FOR THE GDPR
PREPARING FOR THE GDPRPREPARING FOR THE GDPR
PREPARING FOR THE GDPR
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2
 
Data Privacy and Security in UAE.pptx
Data Privacy and Security in UAE.pptxData Privacy and Security in UAE.pptx
Data Privacy and Security in UAE.pptx
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
 
The Evolution of Data Privacy: 3 Things You Need To Consider
The Evolution of Data Privacy:  3 Things You Need To ConsiderThe Evolution of Data Privacy:  3 Things You Need To Consider
The Evolution of Data Privacy: 3 Things You Need To Consider
 
Generic_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_ProceduresGeneric_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_Procedures
 
2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf
2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf
2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf
 
Securing data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law FirmsSecuring data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law Firms
 
Carrying out safe exploration short of the actual data of codes and trapdoors
Carrying out safe exploration short of the actual data of codes and trapdoorsCarrying out safe exploration short of the actual data of codes and trapdoors
Carrying out safe exploration short of the actual data of codes and trapdoors
 
Frukostseminarium om molntjänster
Frukostseminarium om molntjänsterFrukostseminarium om molntjänster
Frukostseminarium om molntjänster
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
 
Symantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR ComplianceSymantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR Compliance
 
GDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpGDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can Help
 
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
 
Guide: Security and Compliance
Guide: Security and ComplianceGuide: Security and Compliance
Guide: Security and Compliance
 
Achieving Data Privacy in the Enterprise
Achieving Data Privacy in the EnterpriseAchieving Data Privacy in the Enterprise
Achieving Data Privacy in the Enterprise
 

Recently uploaded

FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 

Recently uploaded (20)

FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 

Data Security Whitepaper

  • 1. Mobile RDD Sample Pulsed Mobile RDD Consumer Sample Global coverage with more than 250 key variables RDD onDemand RDD onDemand provides direct access to our global RDD data base Geocoding Services Enrich Data with NUTS regions or other socio-demgraphic data Data Security Whitepaper Wh Sample Solutions P R E M I E R . S A M P L E . P R O V I D E R PREMIER.SAMPLE.PROVIDER SAMPLE SOLUTIONS Landline RDD Sample Pulsed landline RDD for more than 140 countries
  • 2.
  • 3. NAME OF THE CHAPTER 3Brochurename or the title Introduction Data security is a critical component for all businesses. Business data protection helps to secure customer details, financial information, survey data and other key business data which are key company assets. Many companies, including Sample Solutions, rely on the fact that data they have and work with is secure, encrypted and can not be breached. Losing the data in a natural catastrophe is one thing but losing it to a breach can lead to severe consequences. Not only do data breaches damage a company’s reputation and destroy consumer trust, breaching may also lead to lost business opportunities and financial consequences, along with disrupt safety and natural workflow.
  • 4. NAME OF THE CHAPTER 4 Brochurename or the title Content More rigorous requirements for obtaining consent for collecting personal data 3 6 8 Data security is a critical component for all businesses Background General Approach to Data Protection Introduction
  • 5. NAME OF THE CHAPTER 5Brochurename or the title 10 11 12 Products of Sample Solutions Future Steps towards 2018 Works Referenced SMS Survey Platform; Sample on Demand. Breaching may also lead to lost business opportunities
  • 6. 6 Brochurename or the title NAME OF THE CHAPTER Background In the age of digitalization and e-commerce, data protection and security have become increasingly important. Not only must companies protect their own data from cyber espionage, but they must also safeguard consumer data and abide by ever-changing data protection regulations or face severe consequences. Data breaches cost compa- nies millions each year, just ask Target--a large US retailer--who had to pay out 67 million for a massive data breach in 2013. According to the Ponemon Institute in 2015 alone, data breaches cost companies an average of $3.79 million (≈3.39 million euros). Thus it is essential for companies to have proper data safeguard mechanisms inte- grated into their systems along with regulatory compliance for all countries in which they conduct business. Issues like new Data Protection Regulation as well as what companies need to do regarding this will be discussed later in this whitepaper. Data protection regulation is intended to strike a balance between the rights of individuals to privacy and the ability of companies to use data for com- mercial purposes. The main purpose for the existence of data legislation is that the personal data is not processed without the knowledge of the individual. Moreover, In 2018 the General Data Protection Regulation (GDPR) will come into place which requires all companies conducting business within the EU to handle I
  • 7. 7Brochurename or the title NAME OF THE CHAPTER Data protection regulation is intended to strike a balance “the personal data is not processed without the knowledge of the individual.” It is essential for companies to have proper data safeguard mechanisms “regulatory compliance for all countries in which they conduct business” Intensive work with data “we will look at how these new practices apply to our core products: telephone samples, sms surveys and lastly - data services.” data in specific ways. Besides the EU countries, it also addresses the transfer of personal data outside the EU. Key changes to EU data protection introduced by the GDPR are the following: - More rigorous requirements for obtaining consent for collecting personal data - Raising the age of consent for collecting an individual’s data from 13 to 16 years old - Requiring a company to delete data if it is no longer used for the purpose for which it was collected - Requiring a company to delete data if the individual revokes consent for the company to hold the data - Requiring companies to notify the EU government of data breaches within 72 hours of learning about the breach - Establishing a single national office for monitoring and handling complaints brought under the GDPR - Companies handling significant amounts of sensitive data or monitoring the behaviour - of many consumers will be required to appoint a data protection officer Fines up to €20m or 4% of a company’s global revenue for its non-compliance.
  • 8. NAME OF THE CHAPTER 8 Brochurename or the title General approach to data protection policies Data security and the challenge of data protection is increasing in scope—and difficulty. While organiza- tions have long needed to safeguard intellectual property and confidential information, changes in informa- tion technology and business models introduce new actors, new threats, and new regulations. As a result, companies, including Sample Solutions, need to think beyond the traditional models of securing the perim- eter and locking down specific segments of IT infrastructure in order to achieve their data protection goals. Even before the new Data Protection Regulation comes into force, Sample Solutions has always complied with the EU’s Data Protection Directive which requires data controllers to ensure data protection requirements are met and safeguards are in place including measures related to security, and we continually strive to further improve and develop these measures beyond what is required. Our systems require identity assurance, visible trust and strong protection, some of Sample Solu- tions general policies include data encryption, safely storing the data, SSL certificates for security and reliable web hosting. All of our data is delivered via our own platform where we host the data on a dedicated server - https://www.surveyplatform.eu There are several advantages of providing the data via platform and not FTP or other third-party applications. Reliable web hosting, SSL and encryption are provided for each and every sub-platform as well as all orders that we deliver to clients. We discuss security security protection pro- vided by third party applications and how they contribute to better data protection in the following sections.
  • 9. NAME OF THE CHAPTER 9Brochurename or the title Web Hosting The server hosting for our platform is provided by Strato ( https://www.strato.nl/ ) . It’s 100% hosted in Germany as they provide excellent IT security which is verified repeatedly each year through independent TÜV certification (ISO 27001). STRATO also offers three-tiered security concept which includes: - Security data centers, complying with Germany’s strict legal requirements where they host more than 60.000 serves and 4 million websites - Backup control and risk management at the highest level - Secure data transmission through encryption SSL Certificate SSL (Secure Sockets Layer) is the standard security technology for establishing an encrypted link between a web server and a browser. The adoption of SSL certification is on the rise. SSL is a transparent protocol which requires little inter- action from the end user when establishing a secure session. As opposed to unsecured HTTP URLs which begin with “http://” and use port 80 by default, secure HTTPS URLs begin with “https://” and use port 443 by default. Most information security professionals would think that SSL is a basic security measure due to the fact that HTTP is insecure and is subject to eavesdropping attacks which can let attackers gain access to online accounts and sensitive information. Data that is sent or posted through the browser using HTTPS is ensured that is encrypted and secure. Sample Solutions has enabled Extended Validation SSL Certificates ( EV SSL ) as the highest class of SSL available. This kind of certificate activate both the padlock and the green address bar in all major browsers. EV SSL Certificates provide the strongest encryption level available and enables us to present our own verified identity to website visitors. EV SSL Certificates offer a stronger guarantee, are globally standardized and have verification process defined within the EV Encryption As a concept , encryption does not prevent inter- ception, but it denies the message content to the interceptor. In our system all of the delicate data is encoded in such a way that only authorized parties can read it. In our platform we encrypt the files with an encryption key which specifies how the messages should be encoded. All the sessions and session variables are encoded in the backso all the sub-platforms are secured as well. Everyone agrees that - usernames and passwords are the ultimate thing that needs to be protected. Sample Solutions encryption offers encoding for these as well , so that in the unlikely case of a data breach, this information will not be published or accessible by third parties.
  • 10. NAME OF THE CHAPTER 10 Brochurename or the title Sample Solutions wants to make sure all of our security policies are provided for the products we offer to clients. Here we are mention policies for our two most used platforms - the SMS survey platform which enables one and two-way SMS surveys and Sample on Demand which offers internal work with RDD and B2B databases and includes our Client Delivery System where all the processed orders are safely stored and delivered to clients. 1. SMS Survey Platform The SMS Survey Platform is currently our only platform in Sample Solutions that handles personal data. So far the company has complied with all internal regulations in every country that we have performed surveys in. Based on the data protection regulations discussed in the preceding sections, the SMS Survey platform is built with a modern and widely popular web framework that provides additional safety measures. The SMS Survey platform utilizes a sophisticated authentication and user- management system. This provides a safe and secure way of logging into the application and managing the users accordingly. The system also provides user roles, so that not all users are allowed to have access to the delicate parts of the application. By using a modern web framework to develop the SMS plat- form – several security measures are already covered, such as: Cross-site request forgeries – targeting some URLs may have some side effects. That is why not all users have the same roles and cannot access all the parts and routes of the application. XSS Cross-site scripting – placing unwanted client-side code that steals informa- tion. This is solved by escaping and making sure that every user-submitted data is safe. SQL Injection – when an application uses unfiltered user input in communication with the database. By default, the framework offers techniques that are SQL injection proof which the SMS platform extensively uses. Forced HTTPS when exchanging sensitive data – if someone tries to communicate with the system without a secure connection, the system forces them to use HTTPS over HTTP for additional security measures. By using a popularly, supported and regularly maintained web framework for developing this platform and also implementingthebestprogrammingtechniques–wehavemadesurethatthisplatformiscompletelydata-secure. 2. Sample On Demand Sample on Demand is the general tool for delivering the main product of Sample Solu- tions - RDD, B2B, B2C samples - can be found under https://sample.surveyplatform,eu SSL protected and encrypted as well, this platform is highly protected in several ways since the data we are delivering are delicate and of great importance to our clients. Generally devel- oped both for administrators and users it provides encrypted authentication for both parties. During the upload and delivery of an order the following actions are taken: Products of Sample Solutions
  • 11. NAME OF THE CHAPTER 11Brochurename or the title Future steps towards 2018 Around 18 months are left till 2018 and the implementation of the new EU data protection guidelines. Therefore we have developed a roadmap towards 2018 to further strengthen our data protection policies. Although, only a part of the data that Sample Solutions works with is classified as personal data, we will strive to comply with the new regulations and continually improve our system. As part of our next steps, we will establish a data protection management team to implement the ISO27001 international standard for Information Security Management. Furthermore, we plan on appointing a data protection officer, to ensure that the use personal data only in cases the data protection regime allows using the data in question and obtain specific and explicit consent by individuals for the processing of their data ( Opt - In ). -Oncetheorderisuploaded,theclientwillimmediatelyreceivetwosep- arate emails. One contains the access link to the order and the second email contains the password for the submitted order. The files are kept inourowndedicatedserverthustheycannotbeaccessinanyotherway. - After the order is processed, the system automatically sends the client an internal and external link to access the files. The internal URL demands authentication by the user itself, and the external URL is equipped with additional protection by including randomly generated unique strings that do not allow any kind of prediction guessing from an outside party. - The platform offers a unique password per order after the client passes the general verification and is equipped with a limited number of downloads per order to prevent outside attacks or abuse of data. - For general protection, the link to the platform automatically expires after 21 days. However, the client can still access the origi- nal files past the expiration date upon request as we store these. “By using a modern web framework to develop the SMS platform - several security measures are already covered”
  • 12. Works Referenced 1. Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sec- tor (Directive on privacy and electronic communications) 2. Official Journal L 201 , 31/07/2002 P. 0037 - 0047 Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL concerning measures to ensure a high com- mon level of network and information security across the Union /* COM/2013/048 final - 2013/0027 (COD) */. 3. M Law Group, 2012, New Draft European Protection Regime. Available from: http://www.mlawgroup.de/news/publications/detail.php?we_ob- jectID=227 4. Global Sign, What is SSL? Available from: https://www.globalsign. com/en/ssl-information-center/what-is-ssl/ 5. Ponemon Institute Research Report, 2015, 2015 Cost of Data Breach Study: Global Analysis. Available from: www.ibm.com/security/data-breach www.sample.solutons