SlideShare a Scribd company logo
EU Data Protection
Legislation
The General Data Protection Regulation
April 2016
Accelerating Next
– Continual and rapid advancement in technologies
– Changes in global thinking regarding data protection and privacy
– Business frameworks need revision and enhancement.
– EU agreed the new General Data Protection Regulation in Europe.
– Other countries are also reviewing their existing Data Protection & Privacy arrangements.
Global Changes in Data Protection & Privacy Concepts
What are the issues facing our customers data?
Technological factors
3
Market trends
− 13.9% year-on-year growth in
cyber crime costs to business
− 46 days to contain cyber incidents
− 53% of the cost of dealing with
cyber incidents was spent on
detection and recovery
− financial services and utilities &
energy experience substantially
higher cyber crime costs
Business trends
− Malicious insiders cause the most
costly cyber attacks
− 1.9 attacks per company are
successful every week
− $7.7 million is the global
annualized cost is to detect,
respond to, and mitigate a breach
− US annualized costs are higher at
$15 million
Business Problem
− How do I detect and deal with the
new type of Advanced Persistent
Threats (APTs)?
− How do I deal with malicious
insider attacks more rapidly and
cost-effectively?
− How do I stop my business being
disrupted and damaged by legal
actions following a cyber attack?
Source: Ponemon 2015 Cost of Cyber Crime Study:
Global & UBM 2016 Cybersecurity Trend Report
What are the issues facing our customers?
Human Factors – UK Local Authorities
4
Market trends
− UK Local authorities commit 4
data breaches a day
− 4236 known data breaches over 3
year period
− Breach increase of > 300% over 3
years
Business trends
− More than 400 instances of loss or
theft
− 197 mobile phone, computers,
tablets, USB lost
− 628 cases where information was
inappropriately shared via email,
fax or letter
− 99 cases of unauthorized people
accessing or disclosing data
Business Problem
− How do I detect and deal with the
negligent human factor threats?
− How do I deal with malicious
human factor threat more rapidly
and cost-effectively?
− How do I stop my business being
disrupted and damaged by legal
actions following an unauthorized
disclosure or loss of personal
data?
Source: Big Brother Watch Report 2015
Recent Regulatory Enforcement UK
5
– An online holiday insurance company Staysure.co.uk Ltd was fined £175,000 after IT security failings let
hackers access customer records
– South Wales Police served with a £160,000 fine for losing a video recording which formed part of the
evidence in a sexual abuse case.
– The Ministry of Justice was fined £180,000 over serious failings in the way prisons in England and Wales
have been handling people’s information & previously £140,000 for incorrect disclosure of data via email
– Sony fined £250,000 over security failings that exposed 'millions' of customers' personal data
Fundamental failing to protect data
NEW EU GENERAL DATA PROTECTION REGULATION
–New ‘one law’ for all EU Countries and is called the General Data Protection
Regulations (GDPR)
– Will replace all current EU data protection laws drawn from the European Data Protection Directive 95/46 EC
–It is now law as of Q1 2016
– Provides businesses with a two year transitional period to implement the requirements.
– Current laws remain effective until that date.
– Full business compliance is expected by May 2018.
–Breaches will face tougher sanctions/fines
– The Regulations relate to the processing of data relating to people – anyone! (Customers, clients, staff, etc).
– Applies to all EU businesses, and companies they engage
– Any business providing services in EU regardless of location.
6
HIGH-LEVEL OBLIGATIONS/PRINCIPLES OF THE REGULATIONS
– OPENNESS & TRANSPARENCY
– data processing must be fair and lawful and transparent
– PURPOSE LIMITATION
– data shall only be processed for an explicit and legitimate purpose and shall not be further processed in any manner that is
incompatible with that purpose.
– DATA MINIMISATION
– only necessary data shall be processed to achieve the purpose and shall not be excessive
– ACCURACY
– data must be accurate for the processing purpose and inaccuracies must be erased or rectified without delay
– STORAGE LIMITATION
– data can only be kept for as long as is necessary to fulfil the purpose and then must be anonymised or erased
– INTEGRITY AND CONFIDENTIALITY
– data can only be processed if it is done in a secure way
– e.g. encryption, data loss prevention, access controls, policies, process, procedures.
– ACCOUNTABILITY
– Businesses must be able to actively ‘demonstrate compliance’ to the regulations.
7
FOR INDIVIDUALS
The new rules strengthen the existing rights and provide individuals with more control over their
personal data.
– MORE INFORMATION ABOUT DATA
– individuals will be provided with more information on how their data is processed; this information must be available in
a clear and understandable way
– DATA PORTABILITY
– provisions for easier transfer of personal data between service providers
– "RIGHT TO BE FORGOTTEN“
– when an individual no longer want their data to be processed, and provided that there are no legitimate grounds for
retaining it, the data shall be deleted
8
FOR BUSINESSES
– ONE LAW
– One set of rules for all 28 EU states, which will make it simpler
and cheaper for companies to do business in the EU.
– ONE-STOP-SHOP
– businesses will only have to deal with one national supervisory
authority.
– TERRITORIAL REACH
– companies based outside of Europe will have to apply the same
rules if offering services in the EU.
– RISK-BASED APPROACH
– No one size fits all obligation; the rules allow for tailoring based
on a balance of respective risk.
– PRIVACY BY DESIGN
– Businesses must apply data protection safeguards into all
products and services (Privacy by design). For example, privacy
enhancing technologies and techniques such as encryption and
pseudonomysation.
– NO MORE REGISTRATION
– registration not needed, but businesses must maintain
documentary evidence of compliance.
– DATA PROTECTION OFFICER
– where businesses meet certain criteria they must designate a
Data Protection Officer
– PRIVACY IMPACT ASSESSMENTS
– Privacy impact assessment are to be conducted where
processing activities present specific risk to the rights and
freedoms of individuals
– BREACH NOTIFICATION
– Businesses must notify of a breach within 72 hours so that
users can take appropriate measures.
– TOUGHER SANCTIONS
– for businesses that flout the rules of the regulations they could
face fines of up to 4% of global turnover or €20m whichever is
greater.
9
Data Protection & Privacy
CRA – Cyber Risk Architecture
10
Data Protection & Privacy (DPP)
Objective
Securing the information assets
Methods, tools and techniques to identify and classify information,
define data security modeling and associated security requirements,
to protect data by preventing unauthorized loss, modification and use
of data.
Sub-Domains
Physical Security (PS)
Strategy,
Leadership
& Governance
(SLG)
Security Resilient
Architecture (SRA)
Cyber Defense (CD)
Applications
Security (AS)
Converged Security (CS)
Risk & Compliance
Management (RCM)
Resilient Workforce (RW)
Security & Operations Management (SOM)
Identity &
Access
Management
(IAM)
Infrastructure
& Network
Security (INS)
Data
Protection &
Privacy (DPP)
Data Security
Lifecycle
Management
Certificate &
Key
Management
Data Discovery
& Classification
Data ProtectionData Assurance
© Copyright 2016 Hewlett Packard Enterprise Development LP 11
Data ProtectionData Assurance
Data Discovery
& Classification
Identifying, classifying and tagging data elements such as geolocation, content, file type or other attributes.
Based on information asset classification schema and data patterns, process to automatically discover and identify data repositories in the organization, how
data is used and by whom or which processes, then by analyzing data patterns and values, improving data inventory and classification.
Data Protection & Privacy (DPP)
Capabilities
Certificate & Key
Management
Data Security
Lifecycle
Management
Data Tagging
Data Discovery
& Inventory
© Copyright 2016 Hewlett Packard Enterprise Development LP 12
Data ProtectionData Assurance
Data Discovery
& Classification
Activities to define a data model and semantics for security to support technical experts and security officers understanding of the data security requirements to
be taken into account in application design or system development (example: Database design). This includes business oriented data constraints and
relationships among data defined by the organization, by industry standards or some regulations to allow interoperability between organizations and applications
(example: bank routing codes to allow inter-bank transactions).
Activities to ensure that data is cleansed and standardized to a defined model before it is used, including data origin identification for audit and compliance
purpose.
Data Protection & Privacy (DPP)
Capabilities
Certificate & Key
Management
Data Security
Lifecycle
Management
Data Security
Modeling
Data Assurance
© Copyright 2016 Hewlett Packard Enterprise Development LP 13
Data ProtectionData Assurance
Data Discovery
& Classification
Methods and tools to prevent copying, modification or distribution of intellectual property, copyrighted material or other digital media, by copy-, write-, forward- or
print-protecting the information.
Protecting Personally Identifiable Information, Personal Health Information, cardholder data, or other confidential and sensitive records by substituting field
values with a vault-based or vault-less tokens stored in look-up tables that can be used to de-tokenize to original values.
Data Protection & Privacy (DPP)
Capabilities
Certificate & Key
Management
Data Security
Lifecycle
Management
Digital Rights
Management
Data
Tokenization
Protecting Personally Identifiable Information, Personal Health Information, cardholder data or other confidential and sensitive records by hiding data with
random characters, and by using different techniques such as substitution, encryption or shuffling. Synonymous with data anonymization.
Data Masking
Preventing unauthorized loss and use of sensitive or confidential information, by protecting data in use, in transit and at rest, based on information classification
labels, tags or other identifiers.
Preventing unauthorized access to sensitive or confidential information by administrators or third parties, by encrypting data at rest in databases or file systems.
Data Loss
Prevention
Data Encryption
continued on next slide…
© Copyright 2016 Hewlett Packard Enterprise Development LP 14
Data ProtectionData Assurance
Data Discovery
& Classification
Preventing unauthorized use and loss of sensitive or confidential information in case of theft or loss of endpoint device, by encrypting internal or removable
storage.
Preventing data from being modified, tampered or altered by unauthorized users.
Data Protection & Privacy (DPP)
Capabilities
Certificate & Key
Management
Data Security
Lifecycle
Management
Disk Encryption
Data Integrity
© Copyright 2016 Hewlett Packard Enterprise Development LP 15
Data ProtectionData Assurance
Data Discovery
& Classification
Solutions for data restoration in the event of hardware or software failures or disasters.
Solutions for backup generation which can subsequently be used in the event of hardware or software failures or disasters.
Data Protection & Privacy (DPP)
Capabilities
Certificate & Key
Management
Data Security
Lifecycle
Management
Data Recovery
Data Backup
The process of moving older data that is no longer actively used to a separate storage device for long-term retention, needed future references, as well as for
regulatory compliance.
Data Archiving
Recovering and converting data from complex, outdated or decommissioned systems.
Irrevocably destroying data prior to disposal of internal or removable storage or when terminating third party ICT services.
Data Migration
Data
Destruction
© Copyright 2016 Hewlett Packard Enterprise Development LP 16
Data ProtectionData Assurance
Data Discovery
& Classification
The complete process of registration, issuance, distribution, storage, backup, usage, renewal, expiration, revocation, recovery, notification, archiving and
auditing of certificates in PKI environments.
The trusted entity that issues certificates and vouches that certificates belong to an individual or organization, compliant to the Certificate Policy (CP) and
Certificate Practice Statement (CPS).
Data Protection & Privacy (DPP)
Capabilities
Certificate & Key
Management
Data Security
Lifecycle
Management
Certificate
Lifecycle
Management
Certificate
Authority
The organizational entity responsible for assuring the identity and authenticity of entities requesting certificates.
Registration
Authority
The defined business practices and procedures surrounding the entire use of PKI.
The defined business practices and procedures surrounding the entire use of keys.
Certificate
Policy
Management
Key Policy
Management
continued on next slide…
© Copyright 2016 Hewlett Packard Enterprise Development LP 17
Data ProtectionData Assurance
Data Discovery
& Classification
The complete process of registration, key generation, distribution, storage, backup, integrity, usage, renewal, expiration, revocation, recovery, notification,
archiving and auditing of private and public keys including but not limited to SSH and IPSec.
The science and mathematics of encrypting and decrypting data by using block ciphers, stream ciphers or hashes with symmetric or asymmetric algorithms, and
by using different strengths and protocol to prevent unauthorized users to decrypt the data.
Data Protection & Privacy (DPP)
Capabilities
Certificate & Key
Management
Data Security
Lifecycle
Management
Key Lifecycle
Management
Cryptography
© Copyright 2016 Hewlett Packard Enterprise Development LP 18
Thankyou
19
Peter Ridley
UK&I Practice Lead
Data Protection & Privacy
Enterprise Security Services

More Related Content

What's hot

Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and Privacy
Vertex Holdings
 
Data Privacy & Security
Data Privacy & SecurityData Privacy & Security
Data Privacy & Security
Eryk Budi Pratama
 
Gdpr overview ciso platform presentation
Gdpr overview ciso platform presentationGdpr overview ciso platform presentation
Gdpr overview ciso platform presentation
Priyanka Aash
 
The GDPR for Techies
The GDPR for TechiesThe GDPR for Techies
The GDPR for Techies
Lilian Edwards
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protection
sp_krishna
 
Payroll Data & GDPR: What you need to know?
Payroll Data & GDPR: What you need to know?Payroll Data & GDPR: What you need to know?
Payroll Data & GDPR: What you need to know?
BrightPay Payroll and Auto Enrolment Software
 
Teradata's approach to addressing GDPR
Teradata's approach to addressing GDPRTeradata's approach to addressing GDPR
Teradata's approach to addressing GDPR
Paul O'Carroll
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by Qualsys
Qualsys Ltd
 
GDPR Workshop
GDPR WorkshopGDPR Workshop
GDPR Workshop
Curt Lewis
 
NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...
IT Governance Ltd
 
Privacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital WorldPrivacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital World
Arab Federation for Digital Economy
 
How IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity LegislationHow IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity Legislation
IBM Security
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Qualsys Ltd
 
GDPR-Overview
GDPR-OverviewGDPR-Overview
GDPR-Overview
Erica Walker
 
#CyberSafeLambeth
#CyberSafeLambeth#CyberSafeLambeth
#CyberSafeLambeth
The Integrate Agency CIC
 
Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?
PECB
 
GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slides
Naomi Holmes
 
Get you and your business GDPR ready
Get you and your business GDPR readyGet you and your business GDPR ready
Get you and your business GDPR ready
Harrison Clark Rickerbys
 
The General Data Protection Regulation ("GDPR")
The General Data Protection Regulation ("GDPR")The General Data Protection Regulation ("GDPR")
The General Data Protection Regulation ("GDPR")
Parsons Behle & Latimer
 
Come cambia la cybersecurity con il regolamento privacy europeo
Come cambia la cybersecurity con il regolamento privacy europeoCome cambia la cybersecurity con il regolamento privacy europeo
Come cambia la cybersecurity con il regolamento privacy europeo
Giulio Coraggio
 

What's hot (20)

Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and Privacy
 
Data Privacy & Security
Data Privacy & SecurityData Privacy & Security
Data Privacy & Security
 
Gdpr overview ciso platform presentation
Gdpr overview ciso platform presentationGdpr overview ciso platform presentation
Gdpr overview ciso platform presentation
 
The GDPR for Techies
The GDPR for TechiesThe GDPR for Techies
The GDPR for Techies
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protection
 
Payroll Data & GDPR: What you need to know?
Payroll Data & GDPR: What you need to know?Payroll Data & GDPR: What you need to know?
Payroll Data & GDPR: What you need to know?
 
Teradata's approach to addressing GDPR
Teradata's approach to addressing GDPRTeradata's approach to addressing GDPR
Teradata's approach to addressing GDPR
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by Qualsys
 
GDPR Workshop
GDPR WorkshopGDPR Workshop
GDPR Workshop
 
NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...
 
Privacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital WorldPrivacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital World
 
How IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity LegislationHow IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity Legislation
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
 
GDPR-Overview
GDPR-OverviewGDPR-Overview
GDPR-Overview
 
#CyberSafeLambeth
#CyberSafeLambeth#CyberSafeLambeth
#CyberSafeLambeth
 
Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?
 
GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slides
 
Get you and your business GDPR ready
Get you and your business GDPR readyGet you and your business GDPR ready
Get you and your business GDPR ready
 
The General Data Protection Regulation ("GDPR")
The General Data Protection Regulation ("GDPR")The General Data Protection Regulation ("GDPR")
The General Data Protection Regulation ("GDPR")
 
Come cambia la cybersecurity con il regolamento privacy europeo
Come cambia la cybersecurity con il regolamento privacy europeoCome cambia la cybersecurity con il regolamento privacy europeo
Come cambia la cybersecurity con il regolamento privacy europeo
 

Viewers also liked

Tietojärjestelmät ja tietosuoja - ongelmia ja niiden ratkaisukeinoja
Tietojärjestelmät ja tietosuoja - ongelmia ja niiden ratkaisukeinojaTietojärjestelmät ja tietosuoja - ongelmia ja niiden ratkaisukeinoja
Tietojärjestelmät ja tietosuoja - ongelmia ja niiden ratkaisukeinoja
Karri Vainio
 
Data Management / MDM - Avaus Open
Data Management / MDM - Avaus OpenData Management / MDM - Avaus Open
Data Management / MDM - Avaus Open
Avaus
 
Kuinka toimitaan oikeammin kun havaitaan tietoturvapoikkeama
Kuinka toimitaan oikeammin kun havaitaan tietoturvapoikkeamaKuinka toimitaan oikeammin kun havaitaan tietoturvapoikkeama
Kuinka toimitaan oikeammin kun havaitaan tietoturvapoikkeama
Nixu Corporation
 
Phish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other RegulationsPhish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
ObserveIT
 
When people are your most important asset: Data Governance, Privacy & UX
When people are your most important asset: Data Governance, Privacy & UXWhen people are your most important asset: Data Governance, Privacy & UX
When people are your most important asset: Data Governance, Privacy & UX
Ann Wuyts
 
Tietoturva ja IT-arkkitehtuuri
Tietoturva ja IT-arkkitehtuuriTietoturva ja IT-arkkitehtuuri
Tietoturva ja IT-arkkitehtuuri
Thomas Malmberg
 
Pilvipalvelut - vääjäämättömyys vai mahdottomuus –ISACA 17.2.2011
Pilvipalvelut - vääjäämättömyys vai mahdottomuus –ISACA 17.2.2011Pilvipalvelut - vääjäämättömyys vai mahdottomuus –ISACA 17.2.2011
Pilvipalvelut - vääjäämättömyys vai mahdottomuus –ISACA 17.2.2011
Petri Aukia
 
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada SymposiumImpact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Constantine Karbaliotis
 
Oksala tietosuojan hyvat_kaytannot
Oksala tietosuojan hyvat_kaytannotOksala tietosuojan hyvat_kaytannot
Oksala tietosuojan hyvat_kaytannot
THL
 
Käytännön kokemuksia tietosuojaan liittyvistä asiakascaseista
Käytännön kokemuksia tietosuojaan liittyvistä asiakascaseistaKäytännön kokemuksia tietosuojaan liittyvistä asiakascaseista
Käytännön kokemuksia tietosuojaan liittyvistä asiakascaseista
Loihde Advisory
 
Johdatus tietosuojakulttuuriin
Johdatus tietosuojakulttuuriinJohdatus tietosuojakulttuuriin
Johdatus tietosuojakulttuuriin
Loihde Advisory
 
EU:n tietosuoja-asetus muuttaa asianhallinnan arkea - mutta miten?
EU:n tietosuoja-asetus muuttaa asianhallinnan arkea - mutta miten?EU:n tietosuoja-asetus muuttaa asianhallinnan arkea - mutta miten?
EU:n tietosuoja-asetus muuttaa asianhallinnan arkea - mutta miten?
Affecto
 
Masters_Thesis_Laura_Final
Masters_Thesis_Laura_FinalMasters_Thesis_Laura_Final
Masters_Thesis_Laura_Final
Laura Kemppainen
 
EU:n tietosuoja-asetus
EU:n tietosuoja-asetusEU:n tietosuoja-asetus
EU:n tietosuoja-asetus
Finanssiala ry - Finance Finland
 
EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer
IT Governance Ltd
 
Varautuminen EU-henkilötietosuoja-asetukseen
Varautuminen EU-henkilötietosuoja-asetukseenVarautuminen EU-henkilötietosuoja-asetukseen
Varautuminen EU-henkilötietosuoja-asetukseen
Tieto Corporation
 
Gdpr security services
Gdpr security servicesGdpr security services
Gdpr security services
Frederick Penaud
 
BIMA Breakfast Briefing | GDPR & Why People Say YES to Marketing
BIMA Breakfast Briefing | GDPR & Why People Say YES to MarketingBIMA Breakfast Briefing | GDPR & Why People Say YES to Marketing
BIMA Breakfast Briefing | GDPR & Why People Say YES to Marketing
BIMA (British Interactive Media Association)
 
GDPR security services - Areyou ready ?
GDPR security services - Areyou ready ?GDPR security services - Areyou ready ?
GDPR security services - Areyou ready ?
Frederick Penaud
 
Modelling the General Data Protection Regulation
Modelling the General Data Protection RegulationModelling the General Data Protection Regulation
Modelling the General Data Protection Regulation
Sabrina Kirrane
 

Viewers also liked (20)

Tietojärjestelmät ja tietosuoja - ongelmia ja niiden ratkaisukeinoja
Tietojärjestelmät ja tietosuoja - ongelmia ja niiden ratkaisukeinojaTietojärjestelmät ja tietosuoja - ongelmia ja niiden ratkaisukeinoja
Tietojärjestelmät ja tietosuoja - ongelmia ja niiden ratkaisukeinoja
 
Data Management / MDM - Avaus Open
Data Management / MDM - Avaus OpenData Management / MDM - Avaus Open
Data Management / MDM - Avaus Open
 
Kuinka toimitaan oikeammin kun havaitaan tietoturvapoikkeama
Kuinka toimitaan oikeammin kun havaitaan tietoturvapoikkeamaKuinka toimitaan oikeammin kun havaitaan tietoturvapoikkeama
Kuinka toimitaan oikeammin kun havaitaan tietoturvapoikkeama
 
Phish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other RegulationsPhish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
 
When people are your most important asset: Data Governance, Privacy & UX
When people are your most important asset: Data Governance, Privacy & UXWhen people are your most important asset: Data Governance, Privacy & UX
When people are your most important asset: Data Governance, Privacy & UX
 
Tietoturva ja IT-arkkitehtuuri
Tietoturva ja IT-arkkitehtuuriTietoturva ja IT-arkkitehtuuri
Tietoturva ja IT-arkkitehtuuri
 
Pilvipalvelut - vääjäämättömyys vai mahdottomuus –ISACA 17.2.2011
Pilvipalvelut - vääjäämättömyys vai mahdottomuus –ISACA 17.2.2011Pilvipalvelut - vääjäämättömyys vai mahdottomuus –ISACA 17.2.2011
Pilvipalvelut - vääjäämättömyys vai mahdottomuus –ISACA 17.2.2011
 
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada SymposiumImpact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
 
Oksala tietosuojan hyvat_kaytannot
Oksala tietosuojan hyvat_kaytannotOksala tietosuojan hyvat_kaytannot
Oksala tietosuojan hyvat_kaytannot
 
Käytännön kokemuksia tietosuojaan liittyvistä asiakascaseista
Käytännön kokemuksia tietosuojaan liittyvistä asiakascaseistaKäytännön kokemuksia tietosuojaan liittyvistä asiakascaseista
Käytännön kokemuksia tietosuojaan liittyvistä asiakascaseista
 
Johdatus tietosuojakulttuuriin
Johdatus tietosuojakulttuuriinJohdatus tietosuojakulttuuriin
Johdatus tietosuojakulttuuriin
 
EU:n tietosuoja-asetus muuttaa asianhallinnan arkea - mutta miten?
EU:n tietosuoja-asetus muuttaa asianhallinnan arkea - mutta miten?EU:n tietosuoja-asetus muuttaa asianhallinnan arkea - mutta miten?
EU:n tietosuoja-asetus muuttaa asianhallinnan arkea - mutta miten?
 
Masters_Thesis_Laura_Final
Masters_Thesis_Laura_FinalMasters_Thesis_Laura_Final
Masters_Thesis_Laura_Final
 
EU:n tietosuoja-asetus
EU:n tietosuoja-asetusEU:n tietosuoja-asetus
EU:n tietosuoja-asetus
 
EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer
 
Varautuminen EU-henkilötietosuoja-asetukseen
Varautuminen EU-henkilötietosuoja-asetukseenVarautuminen EU-henkilötietosuoja-asetukseen
Varautuminen EU-henkilötietosuoja-asetukseen
 
Gdpr security services
Gdpr security servicesGdpr security services
Gdpr security services
 
BIMA Breakfast Briefing | GDPR & Why People Say YES to Marketing
BIMA Breakfast Briefing | GDPR & Why People Say YES to MarketingBIMA Breakfast Briefing | GDPR & Why People Say YES to Marketing
BIMA Breakfast Briefing | GDPR & Why People Say YES to Marketing
 
GDPR security services - Areyou ready ?
GDPR security services - Areyou ready ?GDPR security services - Areyou ready ?
GDPR security services - Areyou ready ?
 
Modelling the General Data Protection Regulation
Modelling the General Data Protection RegulationModelling the General Data Protection Regulation
Modelling the General Data Protection Regulation
 

Similar to EU Data Protection Legislation, Peter Ridley (HPE)

The Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowThe Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t know
Symantec
 
Data Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your businessData Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your business
Eversheds Sutherland
 
The Evolution of Data Privacy: 3 Things You Need To Consider
The Evolution of Data Privacy:  3 Things You Need To ConsiderThe Evolution of Data Privacy:  3 Things You Need To Consider
The Evolution of Data Privacy: 3 Things You Need To Consider
Symantec
 
Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)
Acquia
 
General data protection regulation - European union
General data protection regulation  - European unionGeneral data protection regulation  - European union
General data protection regulation - European union
Rohana K Amarakoon
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?
Lumension
 
The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...
IT Governance Ltd
 
The general data protection act overview
The general data protection act overviewThe general data protection act overview
The general data protection act overview
Roy Biakpara, MSc.,CISA,CISSP,CISM,ISO27KLA
 
Data Privacy Protection Competrency Guide by a Data Subject
Data Privacy Protection Competrency Guide by a Data SubjectData Privacy Protection Competrency Guide by a Data Subject
Data Privacy Protection Competrency Guide by a Data Subject
John Macasio
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
Dr. Donald Macfarlane
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Dr. Donald Macfarlane
 
Associates quick guide to gdpr v 1.0
Associates quick guide to gdpr v 1.0Associates quick guide to gdpr v 1.0
Associates quick guide to gdpr v 1.0
Aaron Banham
 
GDPR: The Regulator's Perspective, Peter Brown, ICO
GDPR: The Regulator's Perspective, Peter Brown, ICOGDPR: The Regulator's Perspective, Peter Brown, ICO
GDPR: The Regulator's Perspective, Peter Brown, ICO
BCS Data Management Specialist Group
 
Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR Success
Sirius
 
CyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPRCyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPR
Iryna Chekanava
 
The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law
Owako Rodah
 
CyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRCyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPR
Shadi A. Razak
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
Symantec
 
Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?
IT Governance Ltd
 
Automatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy StandardsAutomatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy Standards
automatskicorporation
 

Similar to EU Data Protection Legislation, Peter Ridley (HPE) (20)

The Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowThe Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t know
 
Data Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your businessData Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your business
 
The Evolution of Data Privacy: 3 Things You Need To Consider
The Evolution of Data Privacy:  3 Things You Need To ConsiderThe Evolution of Data Privacy:  3 Things You Need To Consider
The Evolution of Data Privacy: 3 Things You Need To Consider
 
Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)
 
General data protection regulation - European union
General data protection regulation  - European unionGeneral data protection regulation  - European union
General data protection regulation - European union
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?
 
The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...
 
The general data protection act overview
The general data protection act overviewThe general data protection act overview
The general data protection act overview
 
Data Privacy Protection Competrency Guide by a Data Subject
Data Privacy Protection Competrency Guide by a Data SubjectData Privacy Protection Competrency Guide by a Data Subject
Data Privacy Protection Competrency Guide by a Data Subject
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
 
Associates quick guide to gdpr v 1.0
Associates quick guide to gdpr v 1.0Associates quick guide to gdpr v 1.0
Associates quick guide to gdpr v 1.0
 
GDPR: The Regulator's Perspective, Peter Brown, ICO
GDPR: The Regulator's Perspective, Peter Brown, ICOGDPR: The Regulator's Perspective, Peter Brown, ICO
GDPR: The Regulator's Perspective, Peter Brown, ICO
 
Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR Success
 
CyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPRCyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPR
 
The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law
 
CyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRCyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPR
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
 
Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?
 
Automatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy StandardsAutomatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy Standards
 

More from Napier University

Intrusion Detection Systems
Intrusion Detection SystemsIntrusion Detection Systems
Intrusion Detection Systems
Napier University
 
Networks
NetworksNetworks
Memory, Big Data and SIEM
Memory, Big Data and SIEMMemory, Big Data and SIEM
Memory, Big Data and SIEM
Napier University
 
What is Cyber Data?
What is Cyber Data?What is Cyber Data?
What is Cyber Data?
Napier University
 
Open Source Intelligence
Open Source IntelligenceOpen Source Intelligence
Open Source Intelligence
Napier University
 
10. Data to Information: NumPy and Pandas
10. Data to Information: NumPy and Pandas10. Data to Information: NumPy and Pandas
10. Data to Information: NumPy and Pandas
Napier University
 
2. Defence Systems
2. Defence Systems2. Defence Systems
2. Defence Systems
Napier University
 
1. Cyber and Intelligence
1. Cyber and Intelligence1. Cyber and Intelligence
1. Cyber and Intelligence
Napier University
 
The Road Ahead for Ripple, Marjan Delatinne
The Road Ahead for Ripple, Marjan DelatinneThe Road Ahead for Ripple, Marjan Delatinne
The Road Ahead for Ripple, Marjan Delatinne
Napier University
 
Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt
 Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt
Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt
Napier University
 
ARTiFACTS, Emma Boswood
ARTiFACTS, Emma BoswoodARTiFACTS, Emma Boswood
ARTiFACTS, Emma Boswood
Napier University
 
RMIT Blockchain Innovation Hub, Chris Berg
RMIT Blockchain Innovation Hub, Chris BergRMIT Blockchain Innovation Hub, Chris Berg
RMIT Blockchain Innovation Hub, Chris Berg
Napier University
 
Keynote, Naseem Naqvi
Keynote, Naseem Naqvi Keynote, Naseem Naqvi
Keynote, Naseem Naqvi
Napier University
 
Browser-based Crypto M, C. F Mondschein
Browser-based Crypto M, C. F MondscheinBrowser-based Crypto M, C. F Mondschein
Browser-based Crypto M, C. F Mondschein
Napier University
 
Should we transform or adapt to blockchain - a public sector perspective?, Al...
Should we transform or adapt to blockchain - a public sector perspective?, Al...Should we transform or adapt to blockchain - a public sector perspective?, Al...
Should we transform or adapt to blockchain - a public sector perspective?, Al...
Napier University
 
IoT device attestation system using blockchain, Alistair Duke
IoT device attestation system using blockchain, Alistair DukeIoT device attestation system using blockchain, Alistair Duke
IoT device attestation system using blockchain, Alistair Duke
Napier University
 
Robust Programming of Smart Contracts in Solidity+, RK Shyamasundar
Robust Programming of Smart Contracts in Solidity+, RK ShyamasundarRobust Programming of Smart Contracts in Solidity+, RK Shyamasundar
Robust Programming of Smart Contracts in Solidity+, RK Shyamasundar
Napier University
 
Using Blockchain for Evidence Purpose, Rafael Prabucki
Using Blockchain for Evidence Purpose, Rafael PrabuckiUsing Blockchain for Evidence Purpose, Rafael Prabucki
Using Blockchain for Evidence Purpose, Rafael Prabucki
Napier University
 
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...
Napier University
 
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata Fereirra
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata FereirraEmerging Regulatory Approaches to Blockchain-based Token Economy, Agata Fereirra
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata Fereirra
Napier University
 

More from Napier University (20)

Intrusion Detection Systems
Intrusion Detection SystemsIntrusion Detection Systems
Intrusion Detection Systems
 
Networks
NetworksNetworks
Networks
 
Memory, Big Data and SIEM
Memory, Big Data and SIEMMemory, Big Data and SIEM
Memory, Big Data and SIEM
 
What is Cyber Data?
What is Cyber Data?What is Cyber Data?
What is Cyber Data?
 
Open Source Intelligence
Open Source IntelligenceOpen Source Intelligence
Open Source Intelligence
 
10. Data to Information: NumPy and Pandas
10. Data to Information: NumPy and Pandas10. Data to Information: NumPy and Pandas
10. Data to Information: NumPy and Pandas
 
2. Defence Systems
2. Defence Systems2. Defence Systems
2. Defence Systems
 
1. Cyber and Intelligence
1. Cyber and Intelligence1. Cyber and Intelligence
1. Cyber and Intelligence
 
The Road Ahead for Ripple, Marjan Delatinne
The Road Ahead for Ripple, Marjan DelatinneThe Road Ahead for Ripple, Marjan Delatinne
The Road Ahead for Ripple, Marjan Delatinne
 
Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt
 Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt
Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt
 
ARTiFACTS, Emma Boswood
ARTiFACTS, Emma BoswoodARTiFACTS, Emma Boswood
ARTiFACTS, Emma Boswood
 
RMIT Blockchain Innovation Hub, Chris Berg
RMIT Blockchain Innovation Hub, Chris BergRMIT Blockchain Innovation Hub, Chris Berg
RMIT Blockchain Innovation Hub, Chris Berg
 
Keynote, Naseem Naqvi
Keynote, Naseem Naqvi Keynote, Naseem Naqvi
Keynote, Naseem Naqvi
 
Browser-based Crypto M, C. F Mondschein
Browser-based Crypto M, C. F MondscheinBrowser-based Crypto M, C. F Mondschein
Browser-based Crypto M, C. F Mondschein
 
Should we transform or adapt to blockchain - a public sector perspective?, Al...
Should we transform or adapt to blockchain - a public sector perspective?, Al...Should we transform or adapt to blockchain - a public sector perspective?, Al...
Should we transform or adapt to blockchain - a public sector perspective?, Al...
 
IoT device attestation system using blockchain, Alistair Duke
IoT device attestation system using blockchain, Alistair DukeIoT device attestation system using blockchain, Alistair Duke
IoT device attestation system using blockchain, Alistair Duke
 
Robust Programming of Smart Contracts in Solidity+, RK Shyamasundar
Robust Programming of Smart Contracts in Solidity+, RK ShyamasundarRobust Programming of Smart Contracts in Solidity+, RK Shyamasundar
Robust Programming of Smart Contracts in Solidity+, RK Shyamasundar
 
Using Blockchain for Evidence Purpose, Rafael Prabucki
Using Blockchain for Evidence Purpose, Rafael PrabuckiUsing Blockchain for Evidence Purpose, Rafael Prabucki
Using Blockchain for Evidence Purpose, Rafael Prabucki
 
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...
 
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata Fereirra
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata FereirraEmerging Regulatory Approaches to Blockchain-based Token Economy, Agata Fereirra
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata Fereirra
 

Recently uploaded

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 

Recently uploaded (20)

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 

EU Data Protection Legislation, Peter Ridley (HPE)

  • 1. EU Data Protection Legislation The General Data Protection Regulation April 2016
  • 2. Accelerating Next – Continual and rapid advancement in technologies – Changes in global thinking regarding data protection and privacy – Business frameworks need revision and enhancement. – EU agreed the new General Data Protection Regulation in Europe. – Other countries are also reviewing their existing Data Protection & Privacy arrangements. Global Changes in Data Protection & Privacy Concepts
  • 3. What are the issues facing our customers data? Technological factors 3 Market trends − 13.9% year-on-year growth in cyber crime costs to business − 46 days to contain cyber incidents − 53% of the cost of dealing with cyber incidents was spent on detection and recovery − financial services and utilities & energy experience substantially higher cyber crime costs Business trends − Malicious insiders cause the most costly cyber attacks − 1.9 attacks per company are successful every week − $7.7 million is the global annualized cost is to detect, respond to, and mitigate a breach − US annualized costs are higher at $15 million Business Problem − How do I detect and deal with the new type of Advanced Persistent Threats (APTs)? − How do I deal with malicious insider attacks more rapidly and cost-effectively? − How do I stop my business being disrupted and damaged by legal actions following a cyber attack? Source: Ponemon 2015 Cost of Cyber Crime Study: Global & UBM 2016 Cybersecurity Trend Report
  • 4. What are the issues facing our customers? Human Factors – UK Local Authorities 4 Market trends − UK Local authorities commit 4 data breaches a day − 4236 known data breaches over 3 year period − Breach increase of > 300% over 3 years Business trends − More than 400 instances of loss or theft − 197 mobile phone, computers, tablets, USB lost − 628 cases where information was inappropriately shared via email, fax or letter − 99 cases of unauthorized people accessing or disclosing data Business Problem − How do I detect and deal with the negligent human factor threats? − How do I deal with malicious human factor threat more rapidly and cost-effectively? − How do I stop my business being disrupted and damaged by legal actions following an unauthorized disclosure or loss of personal data? Source: Big Brother Watch Report 2015
  • 5. Recent Regulatory Enforcement UK 5 – An online holiday insurance company Staysure.co.uk Ltd was fined £175,000 after IT security failings let hackers access customer records – South Wales Police served with a £160,000 fine for losing a video recording which formed part of the evidence in a sexual abuse case. – The Ministry of Justice was fined £180,000 over serious failings in the way prisons in England and Wales have been handling people’s information & previously £140,000 for incorrect disclosure of data via email – Sony fined £250,000 over security failings that exposed 'millions' of customers' personal data Fundamental failing to protect data
  • 6. NEW EU GENERAL DATA PROTECTION REGULATION –New ‘one law’ for all EU Countries and is called the General Data Protection Regulations (GDPR) – Will replace all current EU data protection laws drawn from the European Data Protection Directive 95/46 EC –It is now law as of Q1 2016 – Provides businesses with a two year transitional period to implement the requirements. – Current laws remain effective until that date. – Full business compliance is expected by May 2018. –Breaches will face tougher sanctions/fines – The Regulations relate to the processing of data relating to people – anyone! (Customers, clients, staff, etc). – Applies to all EU businesses, and companies they engage – Any business providing services in EU regardless of location. 6
  • 7. HIGH-LEVEL OBLIGATIONS/PRINCIPLES OF THE REGULATIONS – OPENNESS & TRANSPARENCY – data processing must be fair and lawful and transparent – PURPOSE LIMITATION – data shall only be processed for an explicit and legitimate purpose and shall not be further processed in any manner that is incompatible with that purpose. – DATA MINIMISATION – only necessary data shall be processed to achieve the purpose and shall not be excessive – ACCURACY – data must be accurate for the processing purpose and inaccuracies must be erased or rectified without delay – STORAGE LIMITATION – data can only be kept for as long as is necessary to fulfil the purpose and then must be anonymised or erased – INTEGRITY AND CONFIDENTIALITY – data can only be processed if it is done in a secure way – e.g. encryption, data loss prevention, access controls, policies, process, procedures. – ACCOUNTABILITY – Businesses must be able to actively ‘demonstrate compliance’ to the regulations. 7
  • 8. FOR INDIVIDUALS The new rules strengthen the existing rights and provide individuals with more control over their personal data. – MORE INFORMATION ABOUT DATA – individuals will be provided with more information on how their data is processed; this information must be available in a clear and understandable way – DATA PORTABILITY – provisions for easier transfer of personal data between service providers – "RIGHT TO BE FORGOTTEN“ – when an individual no longer want their data to be processed, and provided that there are no legitimate grounds for retaining it, the data shall be deleted 8
  • 9. FOR BUSINESSES – ONE LAW – One set of rules for all 28 EU states, which will make it simpler and cheaper for companies to do business in the EU. – ONE-STOP-SHOP – businesses will only have to deal with one national supervisory authority. – TERRITORIAL REACH – companies based outside of Europe will have to apply the same rules if offering services in the EU. – RISK-BASED APPROACH – No one size fits all obligation; the rules allow for tailoring based on a balance of respective risk. – PRIVACY BY DESIGN – Businesses must apply data protection safeguards into all products and services (Privacy by design). For example, privacy enhancing technologies and techniques such as encryption and pseudonomysation. – NO MORE REGISTRATION – registration not needed, but businesses must maintain documentary evidence of compliance. – DATA PROTECTION OFFICER – where businesses meet certain criteria they must designate a Data Protection Officer – PRIVACY IMPACT ASSESSMENTS – Privacy impact assessment are to be conducted where processing activities present specific risk to the rights and freedoms of individuals – BREACH NOTIFICATION – Businesses must notify of a breach within 72 hours so that users can take appropriate measures. – TOUGHER SANCTIONS – for businesses that flout the rules of the regulations they could face fines of up to 4% of global turnover or €20m whichever is greater. 9
  • 10. Data Protection & Privacy CRA – Cyber Risk Architecture 10
  • 11. Data Protection & Privacy (DPP) Objective Securing the information assets Methods, tools and techniques to identify and classify information, define data security modeling and associated security requirements, to protect data by preventing unauthorized loss, modification and use of data. Sub-Domains Physical Security (PS) Strategy, Leadership & Governance (SLG) Security Resilient Architecture (SRA) Cyber Defense (CD) Applications Security (AS) Converged Security (CS) Risk & Compliance Management (RCM) Resilient Workforce (RW) Security & Operations Management (SOM) Identity & Access Management (IAM) Infrastructure & Network Security (INS) Data Protection & Privacy (DPP) Data Security Lifecycle Management Certificate & Key Management Data Discovery & Classification Data ProtectionData Assurance © Copyright 2016 Hewlett Packard Enterprise Development LP 11
  • 12. Data ProtectionData Assurance Data Discovery & Classification Identifying, classifying and tagging data elements such as geolocation, content, file type or other attributes. Based on information asset classification schema and data patterns, process to automatically discover and identify data repositories in the organization, how data is used and by whom or which processes, then by analyzing data patterns and values, improving data inventory and classification. Data Protection & Privacy (DPP) Capabilities Certificate & Key Management Data Security Lifecycle Management Data Tagging Data Discovery & Inventory © Copyright 2016 Hewlett Packard Enterprise Development LP 12
  • 13. Data ProtectionData Assurance Data Discovery & Classification Activities to define a data model and semantics for security to support technical experts and security officers understanding of the data security requirements to be taken into account in application design or system development (example: Database design). This includes business oriented data constraints and relationships among data defined by the organization, by industry standards or some regulations to allow interoperability between organizations and applications (example: bank routing codes to allow inter-bank transactions). Activities to ensure that data is cleansed and standardized to a defined model before it is used, including data origin identification for audit and compliance purpose. Data Protection & Privacy (DPP) Capabilities Certificate & Key Management Data Security Lifecycle Management Data Security Modeling Data Assurance © Copyright 2016 Hewlett Packard Enterprise Development LP 13
  • 14. Data ProtectionData Assurance Data Discovery & Classification Methods and tools to prevent copying, modification or distribution of intellectual property, copyrighted material or other digital media, by copy-, write-, forward- or print-protecting the information. Protecting Personally Identifiable Information, Personal Health Information, cardholder data, or other confidential and sensitive records by substituting field values with a vault-based or vault-less tokens stored in look-up tables that can be used to de-tokenize to original values. Data Protection & Privacy (DPP) Capabilities Certificate & Key Management Data Security Lifecycle Management Digital Rights Management Data Tokenization Protecting Personally Identifiable Information, Personal Health Information, cardholder data or other confidential and sensitive records by hiding data with random characters, and by using different techniques such as substitution, encryption or shuffling. Synonymous with data anonymization. Data Masking Preventing unauthorized loss and use of sensitive or confidential information, by protecting data in use, in transit and at rest, based on information classification labels, tags or other identifiers. Preventing unauthorized access to sensitive or confidential information by administrators or third parties, by encrypting data at rest in databases or file systems. Data Loss Prevention Data Encryption continued on next slide… © Copyright 2016 Hewlett Packard Enterprise Development LP 14
  • 15. Data ProtectionData Assurance Data Discovery & Classification Preventing unauthorized use and loss of sensitive or confidential information in case of theft or loss of endpoint device, by encrypting internal or removable storage. Preventing data from being modified, tampered or altered by unauthorized users. Data Protection & Privacy (DPP) Capabilities Certificate & Key Management Data Security Lifecycle Management Disk Encryption Data Integrity © Copyright 2016 Hewlett Packard Enterprise Development LP 15
  • 16. Data ProtectionData Assurance Data Discovery & Classification Solutions for data restoration in the event of hardware or software failures or disasters. Solutions for backup generation which can subsequently be used in the event of hardware or software failures or disasters. Data Protection & Privacy (DPP) Capabilities Certificate & Key Management Data Security Lifecycle Management Data Recovery Data Backup The process of moving older data that is no longer actively used to a separate storage device for long-term retention, needed future references, as well as for regulatory compliance. Data Archiving Recovering and converting data from complex, outdated or decommissioned systems. Irrevocably destroying data prior to disposal of internal or removable storage or when terminating third party ICT services. Data Migration Data Destruction © Copyright 2016 Hewlett Packard Enterprise Development LP 16
  • 17. Data ProtectionData Assurance Data Discovery & Classification The complete process of registration, issuance, distribution, storage, backup, usage, renewal, expiration, revocation, recovery, notification, archiving and auditing of certificates in PKI environments. The trusted entity that issues certificates and vouches that certificates belong to an individual or organization, compliant to the Certificate Policy (CP) and Certificate Practice Statement (CPS). Data Protection & Privacy (DPP) Capabilities Certificate & Key Management Data Security Lifecycle Management Certificate Lifecycle Management Certificate Authority The organizational entity responsible for assuring the identity and authenticity of entities requesting certificates. Registration Authority The defined business practices and procedures surrounding the entire use of PKI. The defined business practices and procedures surrounding the entire use of keys. Certificate Policy Management Key Policy Management continued on next slide… © Copyright 2016 Hewlett Packard Enterprise Development LP 17
  • 18. Data ProtectionData Assurance Data Discovery & Classification The complete process of registration, key generation, distribution, storage, backup, integrity, usage, renewal, expiration, revocation, recovery, notification, archiving and auditing of private and public keys including but not limited to SSH and IPSec. The science and mathematics of encrypting and decrypting data by using block ciphers, stream ciphers or hashes with symmetric or asymmetric algorithms, and by using different strengths and protocol to prevent unauthorized users to decrypt the data. Data Protection & Privacy (DPP) Capabilities Certificate & Key Management Data Security Lifecycle Management Key Lifecycle Management Cryptography © Copyright 2016 Hewlett Packard Enterprise Development LP 18
  • 19. Thankyou 19 Peter Ridley UK&I Practice Lead Data Protection & Privacy Enterprise Security Services