SlideShare a Scribd company logo
1 of 26
General Data Protection
Regulation (GDPR)
Kishor Vaswani, CEO – ControlCase
Agenda
• About GDPR
• Non Compliance Consequences
• Required Steps
› Data Impact Assessment (DIA)
› Data Protection Officer
• GDPR Articles
• GDPR Tactical Compliance
› Security
› Rights Management
› Privacy
› Breach notification
• ControlCase Solutions
• Q&A
1
What is General Data Protection Regulation (GDPR)?
2
GDPR
Related to processing of personal data
Harmonizes data privacy laws/regulation across Europe
Protects EU citizen data privacy
Established fines for non compliance
Establishes breach notification guidelines
Goes into effect May 2018
Types of data include address, phone numbers, email address,
name
Key Definitions
3
• A controller is the entity that determines the purposes, conditions and means of
• the processing of personal data, while the processor is an entity which processes
• personal data on behalf of the controller.
Data Processor vs Data Controller
• A regulation is a binding legislative act. It must be applied in its entirety
• across the EU, while a directive is a legislative act that sets out a goal that all
• EU countries must achieve. However, it is up to the individual countries to decide
• how. It is important to note that the GDPR is a regulation, in contrast the
previous
• legislation, which is a directive.
Regulation vs Directive
• Data Protection Authority
DPA
Non Compliance Consequences
• Lodging complaints with a supervisory authority
• Judicial remedy
• In case of breach, fines include
› Upto 4% of annual revenue, OR
› Euro 20 million
› Whichever is higher
4
Required: Data Impact Assessment
• Must Carry Out Data Impact Assessment (DIA) as determined by
supervisory authorities
• Managed by Data Protection Officer (DPO)
• Assessment Must Include:
› Details of processing operations
› Purpose of processing
› Risks to privacy of individuals
› Security assessment
• When
› Prior to “processing” personal data
› After any changes to systems or processing mechanism
5
Required: Data Protection Officer
• Data Protection Officer is required in multiple scenarios including:
› Processing by public bodies
› Processor includes storage/process/transmission of large amounts
of personal information
• Multiple entities can combine to have a single DPO
• Can be an employee or outsourced
• Must be independent and “cannot” be dismissed for doing their job
• Tasks include
› Monitor compliance to GDPR
› Provide advice within the organization for GDPR
› Coordinate with supervisory authority/DPA
6
Key articles of GDPR
Principles relating to processing of personal data
Rights of individuals
Consent
Responsibility of the controller/processor
Security of data
Data processing impact assessment
Data protection officer
7
Tactical steps for GDPR
8
Security of
Processing
• Asset &
Vulnerability
Management
• Data Management
• Logical Access
• Physical Access
• Risk Assessment
• Policy Management
• Third Party
Management
• Incident
Management
Rights
Management
Privacy
Breach
Notification
Management
Asset and Vulnerability Management
9
 Asset list
 Management of vulnerabilities and
dispositions
 Training to development and support staff
 Management reporting if unmitigated
vulnerability
Data Management
10
 Identification of personally identifiable data
 Classification of data
 Encryption of data
 Monitoring of data
Logical Access
11
 Username
 Password
 Access based on need to know
 Protection of data
Physical Security
12
 Badges
 Visitor Access
 CCTV
 Biometric
 Media Inventory
 Media Destruction
Risk Management
13
 Input of key criterion
 Numeric algorithms to compute risk
 Output of risk dashboards
Policy Management
14
 Appropriate update of policies and procedures
 Link/Mapping to controls and standards
 Communication, training and attestation
 Monitoring of compliance to corporate policies
Vendor/Third Party Management
15
 Management of third parties/vendors
 Self attestation by third parties/vendors
 Remediation tracking
Reg/Standard Coverage area
ISO 27001 A.6, A.10
PCI 12
EI3PA 12
HIPAA 164.308b1
FISMA PS-3
FERC/NERC Multiple
Requirements
Incident Management
16
 Monitoring
 Detection
 Reporting
 Responding
 Approving
Lost Laptop
Changes to
firewall
rulesets
Upgrades to
applications
Intrusion
Alerting
Rights Management
Rights of data subjects:
• Right to receive information on data processor
• Right to ask for modification of data
• Right to ask for deletion of data
• Right to ask processor to restrict use of data for certain purposes
• Right around movement of data
Processor Required to Provide These Details
• Requires breach notification to the Controlling Entity
• Provides an accounting of disclosures.
17
Privacy Management
Privacy Rule Main Points:
• Requires appropriate safeguards to protect the privacy of personal
information
• Sets limits and conditions on the uses and disclosures that may be made of
such information without authorization
• Gives individuals rights over their health information, including rights to
examine and obtain a copy of their records, and to request erasure or
change
• Records of processing activities
• Right to “be forgotten”
For Third Parties
• Requires breach notification to the Controlling Entity
• Provide an accounting of disclosures.
18
Breach Notification Management
19
Definition of Breach
A breach is, generally, an impermissible use or disclosure that compromises the
security or privacy of personal information.
Breach Notification Mechanism
Notify to Data Protection Authorities (DPA) with 72 hours.
Notify individuals without undue delay.
Notify volume of breach.
Vendors/Third parties to notify the customer without undue delay.
Content of Breach Notification
Approximate number of records compromised
Categories of data compromised
Point if contact of data protection officer
Likely consequences of data breach
Measures takes to address/mitigate the breach
ControlCase Solution 1: Data Impact Assessment
• 48 items in portal questionnaire
• 2 week engagement
• Assessment Includes
› Review of processing operations documents
› Risk assessment to privacy of individuals
› Security assessment of personal data
• Deliverable
› DIA Report (Required)
› GDPR Certificate of Compliance (COC) if no gaps are found
› NOTE: Additional iterative review methodology can also be deployed
until compliance is achieved
• Team
› Security Assessor – Partnership Approach
› Success Team: PMO Milestone Management & Account Manager for
Escalation Management
• Secure Portal
› Upload Evidence, See History of Comments & Track Status
20
ControlCase Solution 2: Data Discovery Software
• Identify and pinpoint sensitive data across
› File Shares
› Servers
› Databases
› Email
› Log files
• Types of data
› Name
› Email
› Address
› Phone number
› Pictures
› Credit Card Numbers
21
Why ControlCase – Global Reach
22
Americas
• United States
• Canada
• Mexico
• Argentina
• Brazil
• Chile
• Colombia
• Guatemala
Europe
• United Kingdom
• Belgium
• France
• Germany
• Poland
• Romania
• Russia
• Sweden
• Spain
• Italy
• Bulgaria
• Macedonia
Asia Pacific
• India
• Australia
• Indonesia
• Brunei
• Japan
• South Korea
• Maldives
• Malaysia
• Philippines
• Singapore
• Sri Lanka
• Thailand
• Vietnam
Middle East
and Africa
• Saudi Arabia
• Egypt
• Jordan
• Kenya
• Kuwait
• Morocco
• South Africa
• Tunisia
• United Arab Emirates
• Senegal
• Cameroun
• Madegascar
• Congo
Global Reach: ControlCase has 500+ clients and has
performed engagements across the US, CEMEA, Europe,
Latin America and Asia/Pacific regions.
Why ControlCase – Focus on Compliance
PCI DSS
Qualified Security
Assessor (QSA)
Company
ISO 27001 & 27002
International
Organization for
Standardization
SOC 1, SOC 2 & SOC 3
Service Organization
Controls (AICPA)
HITRUST CSF
Health Information
Trust Alliance
Common Security
Framework (CSF)
HIPAA
Health Insurance
Portability and
Accountability Act
MARS-E
Minimum Acceptable
Risk Standards for
Exchanges
GDPR
General Data
Protection Regulation
NIST 800-53
National Institute of
Standards and
Technology
EI3PA
Experian Independent
Third Party
Assessment
PA-DSS
Payment Application
Qualified Security
Assessor (QSA)
Third Party Risk
Assessor
Shared Assessments
Program Certified
product licensee for
SIG and AUP
Microsoft SSPA
Supplier Security and
Privacy Assurance
To Learn More …
23
Visit www.controlcase.com
Email us at contact@controlcase.com
Q & A
24

More Related Content

What's hot

Presentation on GDPR
Presentation on GDPRPresentation on GDPR
Presentation on GDPRDipanjanDey12
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...IT Governance Ltd
 
Data Protection (Download for slideshow)
Data Protection (Download for slideshow)Data Protection (Download for slideshow)
Data Protection (Download for slideshow)Andrew Sharpe
 
Training privacy by design
Training privacy by designTraining privacy by design
Training privacy by designTommy Vandepitte
 
General Data Protection Regulation (GDPR) Compliance
General Data Protection Regulation (GDPR) ComplianceGeneral Data Protection Regulation (GDPR) Compliance
General Data Protection Regulation (GDPR) Complianceaccenture
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data SecurityWilmerHale
 
GDPR Introduction and overview
GDPR Introduction and overviewGDPR Introduction and overview
GDPR Introduction and overviewJane Lambert
 
Data Privacy Trends in 2021: Compliance with New Regulations
Data Privacy Trends in 2021: Compliance with New RegulationsData Privacy Trends in 2021: Compliance with New Regulations
Data Privacy Trends in 2021: Compliance with New RegulationsPECB
 
skillcast-gdpr-training-presentation-q320.pptx
skillcast-gdpr-training-presentation-q320.pptxskillcast-gdpr-training-presentation-q320.pptx
skillcast-gdpr-training-presentation-q320.pptxRahulGarg294918
 

What's hot (20)

GDPR Demystified
GDPR DemystifiedGDPR Demystified
GDPR Demystified
 
Presentation on GDPR
Presentation on GDPRPresentation on GDPR
Presentation on GDPR
 
GDPR
GDPRGDPR
GDPR
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...
 
Data Protection (Download for slideshow)
Data Protection (Download for slideshow)Data Protection (Download for slideshow)
Data Protection (Download for slideshow)
 
Training privacy by design
Training privacy by designTraining privacy by design
Training privacy by design
 
General Data Protection Regulation (GDPR) Compliance
General Data Protection Regulation (GDPR) ComplianceGeneral Data Protection Regulation (GDPR) Compliance
General Data Protection Regulation (GDPR) Compliance
 
An Overview of GDPR
An Overview of GDPR An Overview of GDPR
An Overview of GDPR
 
GDPR RACI.pdf
GDPR RACI.pdfGDPR RACI.pdf
GDPR RACI.pdf
 
What about GDPR?
What about GDPR?What about GDPR?
What about GDPR?
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
GDPR Introduction and overview
GDPR Introduction and overviewGDPR Introduction and overview
GDPR Introduction and overview
 
GDPR for Dummies
GDPR for DummiesGDPR for Dummies
GDPR for Dummies
 
Data protection
Data protectionData protection
Data protection
 
Data Privacy & Security
Data Privacy & SecurityData Privacy & Security
Data Privacy & Security
 
Gdpr presentation
Gdpr presentationGdpr presentation
Gdpr presentation
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
Data Privacy Trends in 2021: Compliance with New Regulations
Data Privacy Trends in 2021: Compliance with New RegulationsData Privacy Trends in 2021: Compliance with New Regulations
Data Privacy Trends in 2021: Compliance with New Regulations
 
DPIA
DPIADPIA
DPIA
 
skillcast-gdpr-training-presentation-q320.pptx
skillcast-gdpr-training-presentation-q320.pptxskillcast-gdpr-training-presentation-q320.pptx
skillcast-gdpr-training-presentation-q320.pptx
 

Similar to EU's General Data Protection Regulation (GDPR)

General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) Kimberly Simon MBA
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) ControlCase
 
GDPR Privacy Introduction
GDPR Privacy IntroductionGDPR Privacy Introduction
GDPR Privacy IntroductionNiclasGranqvist
 
Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion
 
How does GDPR affect your business?
How does GDPR affect your business?How does GDPR affect your business?
How does GDPR affect your business?Christiana Kozakou
 
Flash Friday: Data Quality & GDPR
Flash Friday: Data Quality & GDPRFlash Friday: Data Quality & GDPR
Flash Friday: Data Quality & GDPRPrecisely
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? SecurityScorecard
 
Jadu GDPR guide: A easy to follow guide for Digital Service Managers and Webs...
Jadu GDPR guide: A easy to follow guide for Digital Service Managers and Webs...Jadu GDPR guide: A easy to follow guide for Digital Service Managers and Webs...
Jadu GDPR guide: A easy to follow guide for Digital Service Managers and Webs...Jadu
 
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"Ragnar Heil
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection RegulationGrittyCC
 
Getting Ready for GDPR
Getting Ready for GDPRGetting Ready for GDPR
Getting Ready for GDPRJessvin Thomas
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by QualsysQualsys Ltd
 
7 Key GDPR Requirements & the Role of Data Governance
7 Key GDPR Requirements & the Role of Data Governance7 Key GDPR Requirements & the Role of Data Governance
7 Key GDPR Requirements & the Role of Data GovernanceDATUM LLC
 
GDPR & Your Cloud Provider - What You Need to Know
GDPR & Your Cloud Provider - What You Need to KnowGDPR & Your Cloud Provider - What You Need to Know
GDPR & Your Cloud Provider - What You Need to KnowRachel Roach
 
GDPR in the Healthcare Industry
GDPR in the Healthcare IndustryGDPR in the Healthcare Industry
GDPR in the Healthcare IndustryEMMAIntl
 

Similar to EU's General Data Protection Regulation (GDPR) (20)

General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
GDPR Privacy Introduction
GDPR Privacy IntroductionGDPR Privacy Introduction
GDPR Privacy Introduction
 
Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event
 
GDPR for your Payroll Bureau
GDPR for your Payroll BureauGDPR for your Payroll Bureau
GDPR for your Payroll Bureau
 
How does GDPR affect your business?
How does GDPR affect your business?How does GDPR affect your business?
How does GDPR affect your business?
 
Flash Friday: Data Quality & GDPR
Flash Friday: Data Quality & GDPRFlash Friday: Data Quality & GDPR
Flash Friday: Data Quality & GDPR
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready?
 
Jadu GDPR guide: A easy to follow guide for Digital Service Managers and Webs...
Jadu GDPR guide: A easy to follow guide for Digital Service Managers and Webs...Jadu GDPR guide: A easy to follow guide for Digital Service Managers and Webs...
Jadu GDPR guide: A easy to follow guide for Digital Service Managers and Webs...
 
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection Regulation
 
GDPR: What does it mean for your business?
GDPR: What does it mean for your business?GDPR: What does it mean for your business?
GDPR: What does it mean for your business?
 
Getting Ready for GDPR
Getting Ready for GDPRGetting Ready for GDPR
Getting Ready for GDPR
 
GDPR for your Payroll Bureau
GDPR for your Payroll BureauGDPR for your Payroll Bureau
GDPR for your Payroll Bureau
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by Qualsys
 
GDPR: What does it mean for your business?
GDPR: What does it mean for your business?GDPR: What does it mean for your business?
GDPR: What does it mean for your business?
 
7 Key GDPR Requirements & the Role of Data Governance
7 Key GDPR Requirements & the Role of Data Governance7 Key GDPR Requirements & the Role of Data Governance
7 Key GDPR Requirements & the Role of Data Governance
 
GDPR & Your Cloud Provider - What You Need to Know
GDPR & Your Cloud Provider - What You Need to KnowGDPR & Your Cloud Provider - What You Need to Know
GDPR & Your Cloud Provider - What You Need to Know
 
What does GDPR mean for your business?
What does GDPR mean for your business?What does GDPR mean for your business?
What does GDPR mean for your business?
 
GDPR in the Healthcare Industry
GDPR in the Healthcare IndustryGDPR in the Healthcare Industry
GDPR in the Healthcare Industry
 

More from Kimberly Simon MBA

HealthCare Compliance - HIPAA & HITRUST
HealthCare Compliance - HIPAA & HITRUSTHealthCare Compliance - HIPAA & HITRUST
HealthCare Compliance - HIPAA & HITRUSTKimberly Simon MBA
 
Introduction to Token Service Provider (TSP) Certification
Introduction to Token Service Provider (TSP) CertificationIntroduction to Token Service Provider (TSP) Certification
Introduction to Token Service Provider (TSP) CertificationKimberly Simon MBA
 
PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)Kimberly Simon MBA
 
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIECVendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIECKimberly Simon MBA
 
Health care compliance webinar may 10 2017
Health care compliance webinar may 10 2017Health care compliance webinar may 10 2017
Health care compliance webinar may 10 2017Kimberly Simon MBA
 
Log Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity MonitoringLog Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity MonitoringKimberly Simon MBA
 
Card Data Discovery and PCI DSS
Card Data Discovery and PCI DSSCard Data Discovery and PCI DSS
Card Data Discovery and PCI DSSKimberly Simon MBA
 
Continual Compliance Monitoring
Continual Compliance MonitoringContinual Compliance Monitoring
Continual Compliance MonitoringKimberly Simon MBA
 
PCI DSS 3.2 - Business as Usual
PCI DSS 3.2 - Business as UsualPCI DSS 3.2 - Business as Usual
PCI DSS 3.2 - Business as UsualKimberly Simon MBA
 
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIECVendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIECKimberly Simon MBA
 
HealthCare Compliance - HIPAA and HITRUST
HealthCare Compliance - HIPAA and HITRUSTHealthCare Compliance - HIPAA and HITRUST
HealthCare Compliance - HIPAA and HITRUSTKimberly Simon MBA
 

More from Kimberly Simon MBA (20)

PCI DSSand PA DSS
PCI DSSand PA DSSPCI DSSand PA DSS
PCI DSSand PA DSS
 
HealthCare Compliance - HIPAA & HITRUST
HealthCare Compliance - HIPAA & HITRUSTHealthCare Compliance - HIPAA & HITRUST
HealthCare Compliance - HIPAA & HITRUST
 
Introduction to Token Service Provider (TSP) Certification
Introduction to Token Service Provider (TSP) CertificationIntroduction to Token Service Provider (TSP) Certification
Introduction to Token Service Provider (TSP) Certification
 
PCI DSS and PA DSS
PCI DSS and PA DSSPCI DSS and PA DSS
PCI DSS and PA DSS
 
Data Discovery and PCI DSS
Data Discovery and PCI DSSData Discovery and PCI DSS
Data Discovery and PCI DSS
 
PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)
 
PCI Compliance in the Cloud
PCI Compliance in the CloudPCI Compliance in the Cloud
PCI Compliance in the Cloud
 
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIECVendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
 
Integrated Compliance
Integrated ComplianceIntegrated Compliance
Integrated Compliance
 
Health care compliance webinar may 10 2017
Health care compliance webinar may 10 2017Health care compliance webinar may 10 2017
Health care compliance webinar may 10 2017
 
PCI DSS and PA DSS Compliance
PCI DSS and PA DSS CompliancePCI DSS and PA DSS Compliance
PCI DSS and PA DSS Compliance
 
Log Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity MonitoringLog Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity Monitoring
 
Card Data Discovery and PCI DSS
Card Data Discovery and PCI DSSCard Data Discovery and PCI DSS
Card Data Discovery and PCI DSS
 
Continual Compliance Monitoring
Continual Compliance MonitoringContinual Compliance Monitoring
Continual Compliance Monitoring
 
PCI DSS 3.2 - Business as Usual
PCI DSS 3.2 - Business as UsualPCI DSS 3.2 - Business as Usual
PCI DSS 3.2 - Business as Usual
 
PCI Compliance in the Cloud
PCI Compliance in the CloudPCI Compliance in the Cloud
PCI Compliance in the Cloud
 
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIECVendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
 
PCI DSS 3.2
PCI DSS 3.2PCI DSS 3.2
PCI DSS 3.2
 
Integrated Compliance
Integrated ComplianceIntegrated Compliance
Integrated Compliance
 
HealthCare Compliance - HIPAA and HITRUST
HealthCare Compliance - HIPAA and HITRUSTHealthCare Compliance - HIPAA and HITRUST
HealthCare Compliance - HIPAA and HITRUST
 

Recently uploaded

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

EU's General Data Protection Regulation (GDPR)

  • 1. General Data Protection Regulation (GDPR) Kishor Vaswani, CEO – ControlCase
  • 2. Agenda • About GDPR • Non Compliance Consequences • Required Steps › Data Impact Assessment (DIA) › Data Protection Officer • GDPR Articles • GDPR Tactical Compliance › Security › Rights Management › Privacy › Breach notification • ControlCase Solutions • Q&A 1
  • 3. What is General Data Protection Regulation (GDPR)? 2 GDPR Related to processing of personal data Harmonizes data privacy laws/regulation across Europe Protects EU citizen data privacy Established fines for non compliance Establishes breach notification guidelines Goes into effect May 2018 Types of data include address, phone numbers, email address, name
  • 4. Key Definitions 3 • A controller is the entity that determines the purposes, conditions and means of • the processing of personal data, while the processor is an entity which processes • personal data on behalf of the controller. Data Processor vs Data Controller • A regulation is a binding legislative act. It must be applied in its entirety • across the EU, while a directive is a legislative act that sets out a goal that all • EU countries must achieve. However, it is up to the individual countries to decide • how. It is important to note that the GDPR is a regulation, in contrast the previous • legislation, which is a directive. Regulation vs Directive • Data Protection Authority DPA
  • 5. Non Compliance Consequences • Lodging complaints with a supervisory authority • Judicial remedy • In case of breach, fines include › Upto 4% of annual revenue, OR › Euro 20 million › Whichever is higher 4
  • 6. Required: Data Impact Assessment • Must Carry Out Data Impact Assessment (DIA) as determined by supervisory authorities • Managed by Data Protection Officer (DPO) • Assessment Must Include: › Details of processing operations › Purpose of processing › Risks to privacy of individuals › Security assessment • When › Prior to “processing” personal data › After any changes to systems or processing mechanism 5
  • 7. Required: Data Protection Officer • Data Protection Officer is required in multiple scenarios including: › Processing by public bodies › Processor includes storage/process/transmission of large amounts of personal information • Multiple entities can combine to have a single DPO • Can be an employee or outsourced • Must be independent and “cannot” be dismissed for doing their job • Tasks include › Monitor compliance to GDPR › Provide advice within the organization for GDPR › Coordinate with supervisory authority/DPA 6
  • 8. Key articles of GDPR Principles relating to processing of personal data Rights of individuals Consent Responsibility of the controller/processor Security of data Data processing impact assessment Data protection officer 7
  • 9. Tactical steps for GDPR 8 Security of Processing • Asset & Vulnerability Management • Data Management • Logical Access • Physical Access • Risk Assessment • Policy Management • Third Party Management • Incident Management Rights Management Privacy Breach Notification Management
  • 10. Asset and Vulnerability Management 9  Asset list  Management of vulnerabilities and dispositions  Training to development and support staff  Management reporting if unmitigated vulnerability
  • 11. Data Management 10  Identification of personally identifiable data  Classification of data  Encryption of data  Monitoring of data
  • 12. Logical Access 11  Username  Password  Access based on need to know  Protection of data
  • 13. Physical Security 12  Badges  Visitor Access  CCTV  Biometric  Media Inventory  Media Destruction
  • 14. Risk Management 13  Input of key criterion  Numeric algorithms to compute risk  Output of risk dashboards
  • 15. Policy Management 14  Appropriate update of policies and procedures  Link/Mapping to controls and standards  Communication, training and attestation  Monitoring of compliance to corporate policies
  • 16. Vendor/Third Party Management 15  Management of third parties/vendors  Self attestation by third parties/vendors  Remediation tracking Reg/Standard Coverage area ISO 27001 A.6, A.10 PCI 12 EI3PA 12 HIPAA 164.308b1 FISMA PS-3 FERC/NERC Multiple Requirements
  • 17. Incident Management 16  Monitoring  Detection  Reporting  Responding  Approving Lost Laptop Changes to firewall rulesets Upgrades to applications Intrusion Alerting
  • 18. Rights Management Rights of data subjects: • Right to receive information on data processor • Right to ask for modification of data • Right to ask for deletion of data • Right to ask processor to restrict use of data for certain purposes • Right around movement of data Processor Required to Provide These Details • Requires breach notification to the Controlling Entity • Provides an accounting of disclosures. 17
  • 19. Privacy Management Privacy Rule Main Points: • Requires appropriate safeguards to protect the privacy of personal information • Sets limits and conditions on the uses and disclosures that may be made of such information without authorization • Gives individuals rights over their health information, including rights to examine and obtain a copy of their records, and to request erasure or change • Records of processing activities • Right to “be forgotten” For Third Parties • Requires breach notification to the Controlling Entity • Provide an accounting of disclosures. 18
  • 20. Breach Notification Management 19 Definition of Breach A breach is, generally, an impermissible use or disclosure that compromises the security or privacy of personal information. Breach Notification Mechanism Notify to Data Protection Authorities (DPA) with 72 hours. Notify individuals without undue delay. Notify volume of breach. Vendors/Third parties to notify the customer without undue delay. Content of Breach Notification Approximate number of records compromised Categories of data compromised Point if contact of data protection officer Likely consequences of data breach Measures takes to address/mitigate the breach
  • 21. ControlCase Solution 1: Data Impact Assessment • 48 items in portal questionnaire • 2 week engagement • Assessment Includes › Review of processing operations documents › Risk assessment to privacy of individuals › Security assessment of personal data • Deliverable › DIA Report (Required) › GDPR Certificate of Compliance (COC) if no gaps are found › NOTE: Additional iterative review methodology can also be deployed until compliance is achieved • Team › Security Assessor – Partnership Approach › Success Team: PMO Milestone Management & Account Manager for Escalation Management • Secure Portal › Upload Evidence, See History of Comments & Track Status 20
  • 22. ControlCase Solution 2: Data Discovery Software • Identify and pinpoint sensitive data across › File Shares › Servers › Databases › Email › Log files • Types of data › Name › Email › Address › Phone number › Pictures › Credit Card Numbers 21
  • 23. Why ControlCase – Global Reach 22 Americas • United States • Canada • Mexico • Argentina • Brazil • Chile • Colombia • Guatemala Europe • United Kingdom • Belgium • France • Germany • Poland • Romania • Russia • Sweden • Spain • Italy • Bulgaria • Macedonia Asia Pacific • India • Australia • Indonesia • Brunei • Japan • South Korea • Maldives • Malaysia • Philippines • Singapore • Sri Lanka • Thailand • Vietnam Middle East and Africa • Saudi Arabia • Egypt • Jordan • Kenya • Kuwait • Morocco • South Africa • Tunisia • United Arab Emirates • Senegal • Cameroun • Madegascar • Congo Global Reach: ControlCase has 500+ clients and has performed engagements across the US, CEMEA, Europe, Latin America and Asia/Pacific regions.
  • 24. Why ControlCase – Focus on Compliance PCI DSS Qualified Security Assessor (QSA) Company ISO 27001 & 27002 International Organization for Standardization SOC 1, SOC 2 & SOC 3 Service Organization Controls (AICPA) HITRUST CSF Health Information Trust Alliance Common Security Framework (CSF) HIPAA Health Insurance Portability and Accountability Act MARS-E Minimum Acceptable Risk Standards for Exchanges GDPR General Data Protection Regulation NIST 800-53 National Institute of Standards and Technology EI3PA Experian Independent Third Party Assessment PA-DSS Payment Application Qualified Security Assessor (QSA) Third Party Risk Assessor Shared Assessments Program Certified product licensee for SIG and AUP Microsoft SSPA Supplier Security and Privacy Assurance
  • 25. To Learn More … 23 Visit www.controlcase.com Email us at contact@controlcase.com