SlideShare a Scribd company logo
1 of 23
Digital Disruption and Consumer Trust
Resolving the Challenge of GDPR
Richard Veryard
GDPR Making it Real – DAMA UK and BCS DMSG – 12 June 2017
2
The GDPR challenge
The trajectory of
innovation may
possibly diverge
from the
trajectory of
consumer
expectations,
thus opening up
a trust gap.
The Innovation
Curve
Consumer
Expectations
Trust Gap
3
Four Types of Trust
Definition GDPR Consequences
Authority
Trust
Trust is based on a
central authority.
Data Protection standards
defined by GDPR and
enforced by Information
Commissioner.
Enforcement
Penalties
Commodity
Trust
Trust is based on a
negotiated
exchange.
Explicit consent. Consumer
gets something in return for
consent.
Compensation
Network
Trust
Trust is based on
the community.
Good practice enforced by
the internet.
Reputation
Damage
Relationship
Trust
Trust is based on
authentic
relationships
between people.
?? ??
4
Who gives their real
email address to get
free coffee shop wifi?
Cycle of Mistrust
Date of birth:1st January 1970
Email address: rubbish@junk.com
Based on your data, we think you might
like to buy yet another book on Privacy.
5
“When you look at systems like Facebook, all the hints
and nudges that the website gives you are towards
sharing your data so it can be sold to the advertisers.
They’re all towards making you feel that you’re in a
much safer and warmer place than you actually are.
Under those circumstances, it’s entirely understandable
that people end up sharing information in ways that
they later regret and which end up being exploited.
People learn over time, and you end up with a tussle
between Facebook and its users whereby Facebook
changes the privacy settings every few years to opt
everybody back into advertising, people protest, and
they opt out again.
This doesn’t seem to have any stable equilibrium.”
https://www.edge.org/conversation/ross_anderson-the-threat
Cycle of False Trust
Ross Anderson
May 2017
6
Different Types of Consumer
• Digital Literacy
• Facebook
Smartphone
Generation
The Innovation
Curve
Consumer
Expectations
Trust Gap
7
Different Types of Innovation
Data
Big Data
TotalData™
Consumer
Expectations
Trust Gap
The Innovation
Curve
8
Digital Marketing Hype Curve 2015
How many of these are
affected by GDPR?
It’s not a cycle
9
Innovation  Digital Disruption
Personalization
Positive
experience
helpful,
anticipating
Negative
experience
intrusive,
stalking
Automation
Positive
experience
frictionless,
instant
access
Negative
experience
inflexible,
soulless
Big Data
Positive
experience
Filter
Bubble
Negative
experience
Filter
bubble
10
Some technological
innovations may threaten
privacy
• Facial Recognition
• Customer Instore Tracking
• Employee Location Tracking
Some technological
innovations may enhance
privacy
• Encryption
• Tokenization
• Pseudonymization
Technological Change
11
The Choice
Maximum Engagement
• Create a trustworthy
data protection
environment.
• Actively seek data
subject participation
and consent.
• Gain competitive
advantage from
customer centricity
and trust.
Minimum Viable
Compliance
• Add essential
measures and
procedures (e.g.
encryption, consent).
• Fix systems and
processes to achieve
GDPR compliance
with minimum change
to business as usual.
Minimum Engagement
• Store and use as little
personal information
as possible.
• Delete most personal
information.
• Use verified secure
third parties for
essential transactions
(e.g. payments).
• Forsake customer
insight and
personalization.
Trust
Customer
Centricity
Data Frugality
Data
Avoidance
12
Awareness
(hopefully)
Clear and
costed plan of
work
+
Allocated
Resources
+
Decisions
GDPR
Compliance
+
Business as
usual
(hopefully)
Simple Story – Two Milestones
13
GDPR Work Packages
Data Discovery
•Identify all business processes, systems,
applications, data stores and other
places where personal data are
collected, stored, transmitted and used.
Risk Assessment
•Identify business and technology threats.
Evaluate high-impact threats.
•Assess the adequacy of existing security
and governance mechanisms to protect
against these threats.
Policy Assessment and
Alignment
•Review existing policies against GDPR
requirements
•Review policy adherence and
enforcement
•Identify and implement policy and
governance changes
Customer-Centric View
•Survey customer view of data protection.
•Identify any trust issues from the
customer perspective.
•Understand the factors that will lead to
customers granting or withholding
consent.
Technology Review
•Identify any new / recent technologies
that raise privacy concerns.
•Identify and evaluate relevant privacy
enhancement technologies.
•Select, adopt and configure privacy
enhancement technologies as
appropriate.
Privacy by Design
•Establish architectural principles and
structures to promote privacy
•Establish privacy impact assessments for
new solutions and technologies
Consent Engineering
•Build and implement standard modules
for consumer consent
•Establish business processes and
practices for consent and
withdrawal/erasure.
Privacy Engineering
•Establish robust systems and processes
for data encryption, tokenization,
detokenization and pseudonymization
•Establish secure mechanisms to prevent.
detect and repair any breaches
Governance
•Determine responsibilities for data
protection, including Data Protection
Officers.
•Align existing governance structure and
processes with the requirements of
GDPR, and/or establish additional
structure and processes.
14
I’m going to look at
these two in particular
15
Step 2 – Discovery
Triage Easy and obvious first? Hmm
Challenging first Risk-based approach
What to
look at
Business processes Important, because we need to know
why/where personal data is used
Business policies Data sharing agreements
Application / data Is there an application catalogue? Data
dictionary? Master data management?
How Interviews with system owners … if you can find them
Documentation … if there is any
System / Data Inspection Search for recognizable data – e.g.
postcodes, dates of birth, card numbers
16
In the traditional “traffic
light” schema, AMBER
is usually a fudge.
For senior management,
white is (or should be)
more worrying than red.
Aside – the Italian Flag schema
GREEN
OK, more or less under
control, no major issues
RED
One or more known
problems
WHITE
We don’t have a xxxing
clue
17
Touchpoints Data Types Business Context
Point-of-Sale Transaction
Email
Website Visit
App
Social Media
User-generated content
Paper
Phone
Visit
Name and address, postcode, email
address, phone number
Personal characteristics
Age, Ethnicity, Religion, Social Class,
Employment History, Education Level,
Marital Status, Sexual History, Health
History, Credit History, Travel History, …
Password Recovery Data
Mother’s maiden name
Name of pet
First school
Possessions
Car Registration Number, MAC address
Physical appearance and characteristics
(including images for face recognition)
Account Numbers
Bank, Credit Card, etc.
Internet
Social media handles and history
Cookies
IP Address
Direct Marketing (Targeting &
Personalization)
Credit / Fraud Screening
Pre-Sale
Sale
After-Sale
Customer Service
Data Discovery – Customer
Which applications
manage and monitor
these touchpoints?
How can we discover
this information in
informal systems as well
as formal applications?
Which business
capabilities are likely
to be using personal
information?
Which applications
(including reports and
analytics) support
these capabilities?
18
Touchpoints Data Types Business Context
System log
Workflow
Customer service
Intranet
Public internet
?
Name and address, postcode, email
address, phone number
Equipment issued to employee
Computer, phone, car, etc.
Personal details
Marital status, health history,
Bank account, pension fund,
Any business transaction that requires
authorization or approval
Purchase Order, Goods Received,
Payments, …
Any business activity with a potential for
employee malfeasance
Stock Movement, Customer
Refund, …
Work planning and monitoring,
productivity
Individual/team performance analysis,
career management, training history,
promotion prospects, …
Which applications
manage and monitor
these touchpoints?
Data Discovery – Employee
How can we discover
this information in
informal systems as well
as formal applications?
Which business
capabilities are likely
to be using personal
information?
Which applications
(including reports and
analytics) support
these capabilities?
Typically
• A few obvious systems and processes with
large amounts of employee data
• Many systems and processes with small
amounts of employee data
19
Customer
Employee
Third Party
BRM GDPR Heat-map example
20
Step 7 – Consent Engineering
Characteristics
 Non-reversible procedure
 Early sample trial
recommended
 Ambiguous identity
 Omnichannel
Current Status
CONSENT
GDPR Compliant Status
CONSENT
Current Status
NON-CONSENT
GDPR Compliant Status
NON-CONSENT
Procedure
RECONSENT
Metric
CONSENT PERCENT
E.g. opt-out bundled consent based
on unclear privacy policy
E.g. opt-in granular consent based
on clear privacy policy
21
Step 13 – Business as Usual?
Programmatic Advertising  DSP
Contextual Advertising
Machine-learning  Organizational
Intelligence
Humanizing Digital
Transparency
• To what extent is your
business-as-usual even
possible?
• How must you change the
way you do business?
• How must you change the
way you were planning to
do business in the future?
Richard Veryard is a consultant with Retail Reply,
specializing in enterprise information architecture for the
retail and consumer sector. He has written and presented
widely on such topics as business architecture, service-
oriented architecture, information management, and
organizational intelligence.
@richardveryard
Retail Reply are specialist retail consultants who help our
clients respond to digital transformation through customer
centric solutions.
http://www.reply.com/retail-reply/en/
retail@reply.com
+44 20 7730 6000
@retail_reply
23
References and Further Reading
https://ico.org.uk/media/for-organisations/documents/1624219/
preparing-for-the-gdpr-12-steps.pdf

More Related Content

What's hot

Analytical thinking 8 - June 2012
Analytical thinking 8 - June 2012Analytical thinking 8 - June 2012
Analytical thinking 8 - June 2012Charlotte Skornik
 
Big Data: Banking Industry Use Case
Big Data: Banking Industry Use Case Big Data: Banking Industry Use Case
Big Data: Banking Industry Use Case Ramandeep Kaur Bagri
 
Marketing analytics for the Banking Industry
Marketing analytics for the Banking IndustryMarketing analytics for the Banking Industry
Marketing analytics for the Banking IndustrySashindar Rajasekaran
 
Customer Lifecycle Engagement for Insurance Companies
Customer Lifecycle Engagement for Insurance CompaniesCustomer Lifecycle Engagement for Insurance Companies
Customer Lifecycle Engagement for Insurance Companiesedynamic
 
Big Data Analytics in light of Financial Industry
Big Data Analytics in light of Financial Industry Big Data Analytics in light of Financial Industry
Big Data Analytics in light of Financial Industry Capgemini
 
Big Data Meetup by Chad Richeson
Big Data Meetup by Chad RichesonBig Data Meetup by Chad Richeson
Big Data Meetup by Chad RichesonSocietyConsulting
 
Moving Forward with Big Data: The Future of Retail Analytics
Moving Forward with Big Data: The Future of Retail AnalyticsMoving Forward with Big Data: The Future of Retail Analytics
Moving Forward with Big Data: The Future of Retail AnalyticsBill Bishop
 
Integrating Analytics into the Operational Fabric of Your Business
Integrating Analytics into the Operational Fabric of Your BusinessIntegrating Analytics into the Operational Fabric of Your Business
Integrating Analytics into the Operational Fabric of Your BusinessIBM India Smarter Computing
 
Predictive analytics km chicago
Predictive analytics km chicagoPredictive analytics km chicago
Predictive analytics km chicagoKM Chicago
 
Big Data in Banking (White paper)
Big Data in Banking (White paper)Big Data in Banking (White paper)
Big Data in Banking (White paper)InData Labs
 
Modernizing the Insurance Value Chain: Top Three Digital Imperatives
Modernizing the Insurance Value Chain: Top Three Digital ImperativesModernizing the Insurance Value Chain: Top Three Digital Imperatives
Modernizing the Insurance Value Chain: Top Three Digital ImperativesCognizant
 
Worst practices in Business Intelligence setup
Worst practices in Business Intelligence setupWorst practices in Business Intelligence setup
Worst practices in Business Intelligence setupThe Marketing Distillery
 
Customer analytics for Startup and SMEs
Customer analytics for Startup and SMEsCustomer analytics for Startup and SMEs
Customer analytics for Startup and SMEsSWAGATO CHATTERJEE
 

What's hot (20)

Advanced Analytics in Banking, CITI
Advanced Analytics in Banking, CITIAdvanced Analytics in Banking, CITI
Advanced Analytics in Banking, CITI
 
Analytical thinking 8 - June 2012
Analytical thinking 8 - June 2012Analytical thinking 8 - June 2012
Analytical thinking 8 - June 2012
 
Big Data: Banking Industry Use Case
Big Data: Banking Industry Use Case Big Data: Banking Industry Use Case
Big Data: Banking Industry Use Case
 
Marketing analytics for the Banking Industry
Marketing analytics for the Banking IndustryMarketing analytics for the Banking Industry
Marketing analytics for the Banking Industry
 
Customer Lifecycle Engagement for Insurance Companies
Customer Lifecycle Engagement for Insurance CompaniesCustomer Lifecycle Engagement for Insurance Companies
Customer Lifecycle Engagement for Insurance Companies
 
Big Data Analytics in light of Financial Industry
Big Data Analytics in light of Financial Industry Big Data Analytics in light of Financial Industry
Big Data Analytics in light of Financial Industry
 
Big Data Meetup by Chad Richeson
Big Data Meetup by Chad RichesonBig Data Meetup by Chad Richeson
Big Data Meetup by Chad Richeson
 
Moving Forward with Big Data: The Future of Retail Analytics
Moving Forward with Big Data: The Future of Retail AnalyticsMoving Forward with Big Data: The Future of Retail Analytics
Moving Forward with Big Data: The Future of Retail Analytics
 
Integrating Analytics into the Operational Fabric of Your Business
Integrating Analytics into the Operational Fabric of Your BusinessIntegrating Analytics into the Operational Fabric of Your Business
Integrating Analytics into the Operational Fabric of Your Business
 
Predictive analytics 2025_br
Predictive analytics 2025_brPredictive analytics 2025_br
Predictive analytics 2025_br
 
Banking Big Data Analytics
Banking Big Data AnalyticsBanking Big Data Analytics
Banking Big Data Analytics
 
Predictive analytics km chicago
Predictive analytics km chicagoPredictive analytics km chicago
Predictive analytics km chicago
 
Big Data in Banking (White paper)
Big Data in Banking (White paper)Big Data in Banking (White paper)
Big Data in Banking (White paper)
 
Modernizing the Insurance Value Chain: Top Three Digital Imperatives
Modernizing the Insurance Value Chain: Top Three Digital ImperativesModernizing the Insurance Value Chain: Top Three Digital Imperatives
Modernizing the Insurance Value Chain: Top Three Digital Imperatives
 
Customer Journey Analytics
Customer Journey AnalyticsCustomer Journey Analytics
Customer Journey Analytics
 
BRIDGEi2i Customer Intelligence Solutions
BRIDGEi2i Customer Intelligence SolutionsBRIDGEi2i Customer Intelligence Solutions
BRIDGEi2i Customer Intelligence Solutions
 
Bridgei2i Analytics Solutions Introduction
Bridgei2i Analytics Solutions IntroductionBridgei2i Analytics Solutions Introduction
Bridgei2i Analytics Solutions Introduction
 
Worst practices in Business Intelligence setup
Worst practices in Business Intelligence setupWorst practices in Business Intelligence setup
Worst practices in Business Intelligence setup
 
Customer analytics for Startup and SMEs
Customer analytics for Startup and SMEsCustomer analytics for Startup and SMEs
Customer analytics for Startup and SMEs
 
The ABCs of Big Data
The ABCs of Big DataThe ABCs of Big Data
The ABCs of Big Data
 

Similar to Digital Disruption and Consumer Trust - Resolving the Challenge of GDPR

The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in ComplianceThe GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in ComplianceObservePoint
 
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018Human Capital Department
 
The GDPR - A data revolution
The GDPR - A data revolutionThe GDPR - A data revolution
The GDPR - A data revolutionDan Brookman
 
CRMCS GDPR - Why it matters and how to make it Easy
CRMCS   GDPR - Why it matters and how to make it EasyCRMCS   GDPR - Why it matters and how to make it Easy
CRMCS GDPR - Why it matters and how to make it EasyPaul McQuillan
 
What's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesWhat's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesOgilvy Consulting
 
GDPR - Why it matters and how to make it Easy
GDPR - Why it matters and how to make it EasyGDPR - Why it matters and how to make it Easy
GDPR - Why it matters and how to make it EasyPaul McQuillan
 
Are you GDPR Ready? Checklist Whitepaper
Are you GDPR Ready? Checklist WhitepaperAre you GDPR Ready? Checklist Whitepaper
Are you GDPR Ready? Checklist WhitepaperServersys
 
Records stored at third parties 081011
Records stored at third parties 081011Records stored at third parties 081011
Records stored at third parties 081011bodekn
 
GDPR Ready Presentation - Marc Michaels
GDPR Ready Presentation - Marc MichaelsGDPR Ready Presentation - Marc Michaels
GDPR Ready Presentation - Marc MichaelsPost Media
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsSarah Fane
 
GDPR & Data Privacy Guide - Free Download
GDPR & Data Privacy Guide - Free DownloadGDPR & Data Privacy Guide - Free Download
GDPR & Data Privacy Guide - Free DownloadVisitor Analytics
 
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...#Privacy Matters - Come il regolamento privacy europeo da un problema può div...
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...Giulio Coraggio
 
GDPR & Demand Generation: What Your Team Needs To Know
GDPR & Demand Generation: What Your Team Needs To KnowGDPR & Demand Generation: What Your Team Needs To Know
GDPR & Demand Generation: What Your Team Needs To KnowHannah Flynn
 
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...CIO Edge
 
GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slidesNaomi Holmes
 
GDPR & the Travel Industry: Practical recommendations for holiday rental owners
GDPR & the Travel Industry: Practical recommendations for holiday rental ownersGDPR & the Travel Industry: Practical recommendations for holiday rental owners
GDPR & the Travel Industry: Practical recommendations for holiday rental ownersSpain-Holiday.com
 

Similar to Digital Disruption and Consumer Trust - Resolving the Challenge of GDPR (20)

The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in ComplianceThe GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
 
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
 
The GDPR - A data revolution
The GDPR - A data revolutionThe GDPR - A data revolution
The GDPR - A data revolution
 
GDPR: Time to Act
GDPR: Time to ActGDPR: Time to Act
GDPR: Time to Act
 
GDPR - what you need to know
GDPR -  what you need to know GDPR -  what you need to know
GDPR - what you need to know
 
CRMCS GDPR - Why it matters and how to make it Easy
CRMCS   GDPR - Why it matters and how to make it EasyCRMCS   GDPR - Why it matters and how to make it Easy
CRMCS GDPR - Why it matters and how to make it Easy
 
What's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesWhat's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) Changes
 
GDPR - Why it matters and how to make it Easy
GDPR - Why it matters and how to make it EasyGDPR - Why it matters and how to make it Easy
GDPR - Why it matters and how to make it Easy
 
Are you GDPR Ready? Checklist Whitepaper
Are you GDPR Ready? Checklist WhitepaperAre you GDPR Ready? Checklist Whitepaper
Are you GDPR Ready? Checklist Whitepaper
 
Records stored at third parties 081011
Records stored at third parties 081011Records stored at third parties 081011
Records stored at third parties 081011
 
GDPR Ready Presentation - Marc Michaels
GDPR Ready Presentation - Marc MichaelsGDPR Ready Presentation - Marc Michaels
GDPR Ready Presentation - Marc Michaels
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security Fundamentals
 
Ekwensi ACC article
Ekwensi ACC articleEkwensi ACC article
Ekwensi ACC article
 
GDPR & Data Privacy Guide - Free Download
GDPR & Data Privacy Guide - Free DownloadGDPR & Data Privacy Guide - Free Download
GDPR & Data Privacy Guide - Free Download
 
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...#Privacy Matters - Come il regolamento privacy europeo da un problema può div...
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...
 
3GRC approach to GDPR V 0.1 www.3grc.co.uk
3GRC  approach to GDPR V 0.1 www.3grc.co.uk3GRC  approach to GDPR V 0.1 www.3grc.co.uk
3GRC approach to GDPR V 0.1 www.3grc.co.uk
 
GDPR & Demand Generation: What Your Team Needs To Know
GDPR & Demand Generation: What Your Team Needs To KnowGDPR & Demand Generation: What Your Team Needs To Know
GDPR & Demand Generation: What Your Team Needs To Know
 
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
 
GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slides
 
GDPR & the Travel Industry: Practical recommendations for holiday rental owners
GDPR & the Travel Industry: Practical recommendations for holiday rental ownersGDPR & the Travel Industry: Practical recommendations for holiday rental owners
GDPR & the Travel Industry: Practical recommendations for holiday rental owners
 

More from Richard Veryard

The New Economics of Manufacturing
The New Economics of ManufacturingThe New Economics of Manufacturing
The New Economics of ManufacturingRichard Veryard
 
EA Second Coming EA Forum Nov 2014
EA Second Coming EA Forum Nov 2014EA Second Coming EA Forum Nov 2014
EA Second Coming EA Forum Nov 2014Richard Veryard
 
What can Enterprise Architecture learn from Systems Thinking?
What can Enterprise Architecture learn from Systems Thinking?What can Enterprise Architecture learn from Systems Thinking?
What can Enterprise Architecture learn from Systems Thinking?Richard Veryard
 
Architecting multi sided business 2
Architecting multi sided business 2Architecting multi sided business 2
Architecting multi sided business 2Richard Veryard
 
Perspectives on Enterprise Architecture and Systems Thinking
Perspectives on Enterprise Architecture and Systems ThinkingPerspectives on Enterprise Architecture and Systems Thinking
Perspectives on Enterprise Architecture and Systems ThinkingRichard Veryard
 
Enterprise Architecture on Trial
Enterprise Architecture on TrialEnterprise Architecture on Trial
Enterprise Architecture on TrialRichard Veryard
 
Why do I need to understand business?
Why do I need to understand business?Why do I need to understand business?
Why do I need to understand business?Richard Veryard
 
Business Architecture - The Rise and Fall of Smart Retail
Business Architecture - The Rise and Fall of Smart RetailBusiness Architecture - The Rise and Fall of Smart Retail
Business Architecture - The Rise and Fall of Smart RetailRichard Veryard
 
Assessing Org Intelligence
Assessing Org IntelligenceAssessing Org Intelligence
Assessing Org IntelligenceRichard Veryard
 
Architecture led procurement
Architecture led procurementArchitecture led procurement
Architecture led procurementRichard Veryard
 
Architecting multi sided business
Architecting multi sided businessArchitecting multi sided business
Architecting multi sided businessRichard Veryard
 
Next Generation Enterprise Architecture
Next Generation Enterprise ArchitectureNext Generation Enterprise Architecture
Next Generation Enterprise ArchitectureRichard Veryard
 
OrgIntelligence Presentation at Open Group Conference, May 10th
OrgIntelligence Presentation at Open Group Conference, May 10thOrgIntelligence Presentation at Open Group Conference, May 10th
OrgIntelligence Presentation at Open Group Conference, May 10thRichard Veryard
 
EA Talk on Managing Complexity
EA Talk on Managing ComplexityEA Talk on Managing Complexity
EA Talk on Managing ComplexityRichard Veryard
 
How Can IT Fix the Problems of Stupid Organizations?
How Can IT Fix the Problems of Stupid Organizations?How Can IT Fix the Problems of Stupid Organizations?
How Can IT Fix the Problems of Stupid Organizations?Richard Veryard
 
Modelling Intelligence in Complex Organizations
Modelling Intelligence in Complex OrganizationsModelling Intelligence in Complex Organizations
Modelling Intelligence in Complex OrganizationsRichard Veryard
 

More from Richard Veryard (20)

IOT is coming to town
IOT is coming to townIOT is coming to town
IOT is coming to town
 
The New Economics of Manufacturing
The New Economics of ManufacturingThe New Economics of Manufacturing
The New Economics of Manufacturing
 
EA Second Coming EA Forum Nov 2014
EA Second Coming EA Forum Nov 2014EA Second Coming EA Forum Nov 2014
EA Second Coming EA Forum Nov 2014
 
What can Enterprise Architecture learn from Systems Thinking?
What can Enterprise Architecture learn from Systems Thinking?What can Enterprise Architecture learn from Systems Thinking?
What can Enterprise Architecture learn from Systems Thinking?
 
Architecting multi sided business 2
Architecting multi sided business 2Architecting multi sided business 2
Architecting multi sided business 2
 
Perspectives on Enterprise Architecture and Systems Thinking
Perspectives on Enterprise Architecture and Systems ThinkingPerspectives on Enterprise Architecture and Systems Thinking
Perspectives on Enterprise Architecture and Systems Thinking
 
Enterprise Architecture on Trial
Enterprise Architecture on TrialEnterprise Architecture on Trial
Enterprise Architecture on Trial
 
Why do I need to understand business?
Why do I need to understand business?Why do I need to understand business?
Why do I need to understand business?
 
Business Architecture - The Rise and Fall of Smart Retail
Business Architecture - The Rise and Fall of Smart RetailBusiness Architecture - The Rise and Fall of Smart Retail
Business Architecture - The Rise and Fall of Smart Retail
 
Implementation Roadmap
Implementation RoadmapImplementation Roadmap
Implementation Roadmap
 
Assessing Org Intelligence
Assessing Org IntelligenceAssessing Org Intelligence
Assessing Org Intelligence
 
Architecture led procurement
Architecture led procurementArchitecture led procurement
Architecture led procurement
 
Architecting multi sided business
Architecting multi sided businessArchitecting multi sided business
Architecting multi sided business
 
Next Generation Enterprise Architecture
Next Generation Enterprise ArchitectureNext Generation Enterprise Architecture
Next Generation Enterprise Architecture
 
Notes on Coupling
Notes on CouplingNotes on Coupling
Notes on Coupling
 
Notes on Interface
Notes on InterfaceNotes on Interface
Notes on Interface
 
OrgIntelligence Presentation at Open Group Conference, May 10th
OrgIntelligence Presentation at Open Group Conference, May 10thOrgIntelligence Presentation at Open Group Conference, May 10th
OrgIntelligence Presentation at Open Group Conference, May 10th
 
EA Talk on Managing Complexity
EA Talk on Managing ComplexityEA Talk on Managing Complexity
EA Talk on Managing Complexity
 
How Can IT Fix the Problems of Stupid Organizations?
How Can IT Fix the Problems of Stupid Organizations?How Can IT Fix the Problems of Stupid Organizations?
How Can IT Fix the Problems of Stupid Organizations?
 
Modelling Intelligence in Complex Organizations
Modelling Intelligence in Complex OrganizationsModelling Intelligence in Complex Organizations
Modelling Intelligence in Complex Organizations
 

Recently uploaded

Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...lizamodels9
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportMintel Group
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Timedelhimodelshub1
 
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadIslamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadAyesha Khan
 

Recently uploaded (20)

Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample Report
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Time
 
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadIslamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
 

Digital Disruption and Consumer Trust - Resolving the Challenge of GDPR

  • 1. Digital Disruption and Consumer Trust Resolving the Challenge of GDPR Richard Veryard GDPR Making it Real – DAMA UK and BCS DMSG – 12 June 2017
  • 2. 2 The GDPR challenge The trajectory of innovation may possibly diverge from the trajectory of consumer expectations, thus opening up a trust gap. The Innovation Curve Consumer Expectations Trust Gap
  • 3. 3 Four Types of Trust Definition GDPR Consequences Authority Trust Trust is based on a central authority. Data Protection standards defined by GDPR and enforced by Information Commissioner. Enforcement Penalties Commodity Trust Trust is based on a negotiated exchange. Explicit consent. Consumer gets something in return for consent. Compensation Network Trust Trust is based on the community. Good practice enforced by the internet. Reputation Damage Relationship Trust Trust is based on authentic relationships between people. ?? ??
  • 4. 4 Who gives their real email address to get free coffee shop wifi? Cycle of Mistrust Date of birth:1st January 1970 Email address: rubbish@junk.com Based on your data, we think you might like to buy yet another book on Privacy.
  • 5. 5 “When you look at systems like Facebook, all the hints and nudges that the website gives you are towards sharing your data so it can be sold to the advertisers. They’re all towards making you feel that you’re in a much safer and warmer place than you actually are. Under those circumstances, it’s entirely understandable that people end up sharing information in ways that they later regret and which end up being exploited. People learn over time, and you end up with a tussle between Facebook and its users whereby Facebook changes the privacy settings every few years to opt everybody back into advertising, people protest, and they opt out again. This doesn’t seem to have any stable equilibrium.” https://www.edge.org/conversation/ross_anderson-the-threat Cycle of False Trust Ross Anderson May 2017
  • 6. 6 Different Types of Consumer • Digital Literacy • Facebook Smartphone Generation The Innovation Curve Consumer Expectations Trust Gap
  • 7. 7 Different Types of Innovation Data Big Data TotalData™ Consumer Expectations Trust Gap The Innovation Curve
  • 8. 8 Digital Marketing Hype Curve 2015 How many of these are affected by GDPR? It’s not a cycle
  • 9. 9 Innovation  Digital Disruption Personalization Positive experience helpful, anticipating Negative experience intrusive, stalking Automation Positive experience frictionless, instant access Negative experience inflexible, soulless Big Data Positive experience Filter Bubble Negative experience Filter bubble
  • 10. 10 Some technological innovations may threaten privacy • Facial Recognition • Customer Instore Tracking • Employee Location Tracking Some technological innovations may enhance privacy • Encryption • Tokenization • Pseudonymization Technological Change
  • 11. 11 The Choice Maximum Engagement • Create a trustworthy data protection environment. • Actively seek data subject participation and consent. • Gain competitive advantage from customer centricity and trust. Minimum Viable Compliance • Add essential measures and procedures (e.g. encryption, consent). • Fix systems and processes to achieve GDPR compliance with minimum change to business as usual. Minimum Engagement • Store and use as little personal information as possible. • Delete most personal information. • Use verified secure third parties for essential transactions (e.g. payments). • Forsake customer insight and personalization. Trust Customer Centricity Data Frugality Data Avoidance
  • 12. 12 Awareness (hopefully) Clear and costed plan of work + Allocated Resources + Decisions GDPR Compliance + Business as usual (hopefully) Simple Story – Two Milestones
  • 13. 13 GDPR Work Packages Data Discovery •Identify all business processes, systems, applications, data stores and other places where personal data are collected, stored, transmitted and used. Risk Assessment •Identify business and technology threats. Evaluate high-impact threats. •Assess the adequacy of existing security and governance mechanisms to protect against these threats. Policy Assessment and Alignment •Review existing policies against GDPR requirements •Review policy adherence and enforcement •Identify and implement policy and governance changes Customer-Centric View •Survey customer view of data protection. •Identify any trust issues from the customer perspective. •Understand the factors that will lead to customers granting or withholding consent. Technology Review •Identify any new / recent technologies that raise privacy concerns. •Identify and evaluate relevant privacy enhancement technologies. •Select, adopt and configure privacy enhancement technologies as appropriate. Privacy by Design •Establish architectural principles and structures to promote privacy •Establish privacy impact assessments for new solutions and technologies Consent Engineering •Build and implement standard modules for consumer consent •Establish business processes and practices for consent and withdrawal/erasure. Privacy Engineering •Establish robust systems and processes for data encryption, tokenization, detokenization and pseudonymization •Establish secure mechanisms to prevent. detect and repair any breaches Governance •Determine responsibilities for data protection, including Data Protection Officers. •Align existing governance structure and processes with the requirements of GDPR, and/or establish additional structure and processes.
  • 14. 14 I’m going to look at these two in particular
  • 15. 15 Step 2 – Discovery Triage Easy and obvious first? Hmm Challenging first Risk-based approach What to look at Business processes Important, because we need to know why/where personal data is used Business policies Data sharing agreements Application / data Is there an application catalogue? Data dictionary? Master data management? How Interviews with system owners … if you can find them Documentation … if there is any System / Data Inspection Search for recognizable data – e.g. postcodes, dates of birth, card numbers
  • 16. 16 In the traditional “traffic light” schema, AMBER is usually a fudge. For senior management, white is (or should be) more worrying than red. Aside – the Italian Flag schema GREEN OK, more or less under control, no major issues RED One or more known problems WHITE We don’t have a xxxing clue
  • 17. 17 Touchpoints Data Types Business Context Point-of-Sale Transaction Email Website Visit App Social Media User-generated content Paper Phone Visit Name and address, postcode, email address, phone number Personal characteristics Age, Ethnicity, Religion, Social Class, Employment History, Education Level, Marital Status, Sexual History, Health History, Credit History, Travel History, … Password Recovery Data Mother’s maiden name Name of pet First school Possessions Car Registration Number, MAC address Physical appearance and characteristics (including images for face recognition) Account Numbers Bank, Credit Card, etc. Internet Social media handles and history Cookies IP Address Direct Marketing (Targeting & Personalization) Credit / Fraud Screening Pre-Sale Sale After-Sale Customer Service Data Discovery – Customer Which applications manage and monitor these touchpoints? How can we discover this information in informal systems as well as formal applications? Which business capabilities are likely to be using personal information? Which applications (including reports and analytics) support these capabilities?
  • 18. 18 Touchpoints Data Types Business Context System log Workflow Customer service Intranet Public internet ? Name and address, postcode, email address, phone number Equipment issued to employee Computer, phone, car, etc. Personal details Marital status, health history, Bank account, pension fund, Any business transaction that requires authorization or approval Purchase Order, Goods Received, Payments, … Any business activity with a potential for employee malfeasance Stock Movement, Customer Refund, … Work planning and monitoring, productivity Individual/team performance analysis, career management, training history, promotion prospects, … Which applications manage and monitor these touchpoints? Data Discovery – Employee How can we discover this information in informal systems as well as formal applications? Which business capabilities are likely to be using personal information? Which applications (including reports and analytics) support these capabilities? Typically • A few obvious systems and processes with large amounts of employee data • Many systems and processes with small amounts of employee data
  • 20. 20 Step 7 – Consent Engineering Characteristics  Non-reversible procedure  Early sample trial recommended  Ambiguous identity  Omnichannel Current Status CONSENT GDPR Compliant Status CONSENT Current Status NON-CONSENT GDPR Compliant Status NON-CONSENT Procedure RECONSENT Metric CONSENT PERCENT E.g. opt-out bundled consent based on unclear privacy policy E.g. opt-in granular consent based on clear privacy policy
  • 21. 21 Step 13 – Business as Usual? Programmatic Advertising  DSP Contextual Advertising Machine-learning  Organizational Intelligence Humanizing Digital Transparency • To what extent is your business-as-usual even possible? • How must you change the way you do business? • How must you change the way you were planning to do business in the future?
  • 22. Richard Veryard is a consultant with Retail Reply, specializing in enterprise information architecture for the retail and consumer sector. He has written and presented widely on such topics as business architecture, service- oriented architecture, information management, and organizational intelligence. @richardveryard Retail Reply are specialist retail consultants who help our clients respond to digital transformation through customer centric solutions. http://www.reply.com/retail-reply/en/ retail@reply.com +44 20 7730 6000 @retail_reply
  • 23. 23 References and Further Reading https://ico.org.uk/media/for-organisations/documents/1624219/ preparing-for-the-gdpr-12-steps.pdf

Editor's Notes

  1. Trust in local butcher versus trust in Tesco
  2. “If you get this right, people could share more data with you.” Paul Malyon, Experian
  3. https://www.edge.org/conversation/ross_anderson-the-threat
  4. Datensparsamkeit Datenvermeidung
  5. The second milestone is May 2018. The first milestone is having a clear plan of work and allocated resources to get to the second milestone. If you haven’t reached the first milestone by early autumn at the absolute latest, then there is no way you are going to hit the second milestone.  There are various things you have to do before you can get to the first milestone, including high-level reviews of systems and processes, reviews of privacy policies and data protection practices, reviews of storage arrangements and third party service agreements, and so on. There will also be some key management decisions, and you’ll probably want to get specialist legal advice on some issues. Above all, you need to get a reasonable idea of the scale of the effort that will be required to get to the second milestone. We are currently doing some discovery and risk analysis for one large retailer, with a view to reaching the first milestone by early July. We are also supporting another large retailer, which is on a similar journey. There may also be some quick pilot projects – for example, to test assumptions around customer consent and trust. The critical success factor is avoiding discovery for its own sake, but doing just enough discovery to mitigate most of the risks and uncertainties, in order to get to a plan that everyone can feel confident about.
  6. Data Discovery Identify all business processes, systems, applications, data stores and other places where personal data are collected, stored, transmitted and used. Risk Assessment Identify business and technology threats. Evaluate high-impact threats. Assess the adequacy of existing security and governance mechanisms to protect against these threats. Policy Assessment and Alignment Review existing policies against GDPR requirements Review policy adherence and enforcement Identify and implement policy and governance changes Customer-Centric View Survey customer view of data protection. Identify any trust issues from the customer perspective. Understand the factors that will lead to customers granting or withholding consent. Technology Review Identify any new / recent technologies that raise privacy concerns. Identify and evaluate relevant privacy enhancement technologies. Select, adopt and configure privacy enhancement technologies as appropriate. Privacy by Design Establish architectural principles and structures to promote privacy Establish privacy impact assessments for new solutions and technologies Consent Engineering Build and implement standard modules for consumer consent Establish business processes and practices for consent and withdrawal/erasure. Privacy Engineering Establish robust systems and processes for data encryption, tokenization, detokenization and pseudonymization Establish secure mechanisms to prevent. detect and repair any breaches Governance Determine responsibilities for data protection, including Data Protection Officers. Align existing governance structure and processes with the requirements of GDPR, and/or establish additional structure and processes.
  7. https://ico.org.uk/media/for-organisations/documents/1624219/preparing-for-the-gdpr-12-steps.pdf
  8. https://www.computing.co.uk/ctg/analysis/3011378/gdpr-spells-the-end-of-programmatic-advertising-as-we-know-it https://pagefair.com/blog/2017/contextual-targeting-offers-solution-to-strict-gdpr-regulations/ https://tamtamy.reply.com/tamtamy/permalink/digital-disruption-and-consumer-trust-notes.action
  9. https://ico.org.uk/media/for-organisations/documents/1624219/preparing-for-the-gdpr-12-steps.pdf