SlideShare a Scribd company logo
VARONIS
GDPRA practical guide
3
INDEX
EU GDPR Lesson 1							4
What is the GDPR? Why do we need it?	
EU GDPR Lesson 2							8
Data Protection by Design and by Default
EU GDPR Lesson 3							12
The Right To Be Forgotten
EU GDPR Lesson 4							14
Who Does the EU GDPR Apply To?
EU GDPR Lesson 5							16
What Happens if I Don’t Comply with the EU GDPR?
EU GDPR Lesson 6							18
Next Steps - How to Get There?
Over the past few years of monitoring the development of the
EU General Data Protection Regulation (GDPR) and its effects on
technology, we’ve distilled the parts of the regulation that most
affect your business into this practical guide.
Your Risk Assessment report will outline problem areas, prioritize risk, and
give you concrete steps to take to improve your data security.
www.varonis.com
FIND THEFIND THE
3
Get in Touch:
US: +1-877-292-8767	 UK: +0-800-756-9784	 INTL: +1-646-706-7336
www.varonis.com
5
EU GDPR LESSON 1
What is the GDPR? Why do we need it?
GDPR concisely summarized by Wikipedia:
The General Data Protection Regulation
(GDPR) (Regulation (EU) 2016/679) is
a Regulation by which the European
Commission intends to strengthen and
unify data protection for individuals within
the European Union (EU). It also addresses
export of personal data outside the EU.
The new GDPR is an evolution of the EU’s
existing data rules, the Data Protection Directive
(DPD). It addresses many of the shortcomings in
the DPD: adding requirements for documenting
IT procedures, performing risk assessments
under certain conditions, notifying the consumer
and authorities when there is a breach, as well as
strengthening rules for data minimization.
It’s important to note that the EU GDPR
covers personal data, or as it is called in the
US, personally identifiable information (PII).
Think names, addresses, phone numbers,
account numbers, and more recently email
and IP addresses.
One way to describe the GDPR is that it simply
legislates a lot of common sense data security
ideas, especially from the Privacy by Design
school of thought: minimize collection of
personal data, delete personal data that’s no
longer necessary, restrict access, and secure
data through its entire lifecycle.
7
Privacy by Design – Privacy by Design (PbD) has
always played a part in EU data regulations. But
with the new law, its principles of minimizing data
collection and retention and gaining consent
from consumers when processing data are more
explicitly formalized.
Data Protection Impact Assessments (DPIA)
– When certain data associated with subjects
is to be processed, companies will have to
first analyze the risks to their privacy. This is
another new requirement in the regulation.
Right to Erasure and To Be
Forgotten – There’s been a long standing
requirement in the DPD allowing consumers to
request that their data be deleted. The GDPR
extends this right to include data published on the
web. This is the still controversial right to stay out
of the public view and “be forgotten”.
Extraterritoriality – The new principle of extraterritoriality in
the GDPR says that even if a company doesn’t have a physical
presence in the EU but collects data about EU data subjects
— for example, through a web site—then all the requirements
of GDPR are in effect. In other
words, the new law will extend
outside the EU. This will especially
affect e-commerce companies and
other cloud businesses.
Breach notification – A new requirement not
in the existing DPD is that companies will have
to notify data authorities within 72 hours after a
breach of personal data has been discovered.
Data subjects will also have to be notified but
only if the data poses a “high risk to their rights
and freedoms”.
Fines – The GDPR has a tiered penalty structure that will
take a large bite out of offender’s funds. More serious
infringements can merit a fine of up to 4% of a company’s
global revenue. This can include violations of basic
principles related to data security — especially PbD
principles. A lesser fine of up to 2% of global revenue — still
enormous — can be issued if company records are not in
order or a supervising authority and
data subjects are not notified
after a breach. This makes
breach notification
oversights a serious
and expensive offense.
What are the new requirements? What are the new requirements?
Risk
Assessment
Overall, the message
for companies that fall
under the GDPR is that awareness of your data—
where is sensitive data stored, who’s accessing it,
and who should be accessing it—will now become
even more critical.
9
Data Protection by Design and by Default
Privacy by Design (PbD) is a well-intentioned set of
principles to get the C-suite to take consumer data
privacy and security more seriously. Overall, PbD is a
good idea and you should try to abide by it.
But with the General Data Protection Regulation
(GDPR), it’s more than that: it’s the law if you do
business in the EU zone!
PbD has sensible guidelines and practices concerning
consumer access to their data, and making privacy
policies open and transparent. These are not
controversial ideas, except if you are, ahem, a large
Internet company that collects lots of consumer data.
And PbD also dispenses good general advice on data
security that can be summarized in one word: minimize.
Minimize collection of consumer data,
minimize who you share the data
with, and minimize how long you
keep it. Less is more: less data
for the hacker to take, means a
more secure environment.
The new GDPR has direct,
practical implications. Just as an
example, consider the impact it
will have on web-based marketing.
Businesses are always trying to get
information about their customers and looking to bring
in new leads using the full digital arsenal — web, email,
mobile. And when given half a chance, marketers always
want more data —age, income, postal code, last book
read, favourite ice cream, favourite food, etc. — even for
the simplest consumer interaction.
EU GDPR LESSON 2
11
What the EU GDPR says is that marketers should
limit data to the purpose for which
it is being collected—do I
really need postal codes or
favourite books? — and
not to retain the data
beyond the point where
it’s no longer relevant.
So the data points
you collected from
that web campaign
over five years ago —
maybe containing 5000
email addresses along with
favourite pet names — and now
lives in a spreadsheet no one ever
looks at. Well, you should find it and delete it.
If a hacker gets hold of it, and uses it for
phishing purposes, you’ve created a security risk
for your customers.
Plus, if the local EU authority can trace the breach
back to your company, you can face heavy fines.
SO CAN BIG DATA AND PRIVACY LIVE TOGETHER
HAPPILY EVER AFTER? PRIVACY BY DESIGN
(PBD) SAYS YES – WITH JUST A FEW BASIC STEPS,
YOU CAN ACHIEVE THE PBD VISION:
PbD is referenced heavily in Article 25 of the GDPR, and
in many other places in the new regulation.
It’s not too much of a stretch to say that if you implement
PbD, you’re well on your way to mastering the GDPR.
Minimize data collected
(especially PII) from consumers
Do not retain personal data
beyond its original purpose
Give consumers access and
ownership of their data
13
This means that in the case of a social media service that
publishes personal data of a subscriber to the Web, they would
have to remove not only the initial information, but also contact
other web sites that may have copied the information. This
would not be an easy process!
What if the data controller gives the personal data to
other third-parties, say a cloud-based service for storage
or processing?
The long arm of the EU regulations still apply: as data
processors, the cloud service will also have to erase the
personal data when asked to by the controller.
Translation: the consumer or data subject can request to erase
the data held by companies at any time. In the EU,
the data belongs to the people!
The Right To Be Forgotten
The controversial “right to be forgotten” is now law in the EU.
For most companies, this is really a right for consumers to
erase their data.
The GDPR has strengthened the DPD’s existing rules on deletion
and then adds the right to be forgotten. There’s now language that
would force the controller to take reasonable steps to inform third-
parties of a request to have information deleted.
Discussed in Article 17 of the proposed GDPR, it states that “The
data subject shall have the right to obtain from the controller the
erasure of personal data concerning him or her without undue
delay and the controller shall have the obligation to erase personal
data without undue delay where ... the personal data are no longer
necessary in relation to the purposes for which they were collected
or otherwise processed; ... the data subject withdraws consent
on which the processing is based ... the controller has made the
personal data public and is obliged ... to erase the personal data”.
EU GDPR LESSON 3
15
EU GDPR LESSON 4
Who Does the EU GDPR Apply To?
One of the more complex issues with the new GDPR is what’s being
called “extraterritoriality.” As proposed by EU Parliament, the GDPR will
apply to any data transferred outside the EU zone.
So under these new rules, if a US company collects data from EU
citizens, it would be under the same legal obligations as though the
company had headquarters in say France, UK, or Germany — even
though they don’t have any servers or offices there!
Legal experts note this may not be that easy to enforce, but if a large
enough multinational breaks one of the rules — such as the GDPR’s new
strict breach notification requirement — our guesstimate is that the EU
regulators will likely target it.
Obviously, extraterritoriality is particularly relevant to core web services
such as search, social networking, e-commerce, companies that allow
you to rent apartments online, etc.
You can map these to your own favourite apps to figure out who would
be affected.
SHIFTING MEANINGS
Under the old rules in the Data Protection
Directive (DPD), there was some wiggle room
that allowed data collectors to escape having
to follow the regulations. A common practice
was for service or app providers to keep their data
processing outside the EU.
The idea was that if the main processing and servers weren’t
located in the EU zone, then the rules didn’t apply.
Companies such as Google, Facebook, and other social
networking companies were following this approach.
NOT SO FAST!
Google was famously making this argument when a Spanish
DPA asked it to remove a listing in a search result.
The case eventually made its way to the EU’s
highest court, the ECJ, which ruled against
Google last year.
The long arm of EU law prevailed: the specific
search listing was removed.
Ultimately, the GDPR applies to EU based
companies and companies that collect data of EU citizens,
regardless of a physical presence in the EU.
The GDPR will apply to any data
transferred outside the EU zone.
17
What Happens if I Don’t Comply
with the EU GDPR?
The GDPR has a tiered penalty structure that will
take a large bite out of offender’s funds – and
the EU GDPR rules apply to both data controllers
and processors, that is “the cloud”… therefore
huge cloud providers are not off the hook when it
comes to GDPR enforcement.
EU GDPR LESSON 5
Non-compliance results in fines of up to 4% of
global revenue.
This can include violations of basic principles related to
data security — especially PbD principles. A company can
be fined up to 2% of global revenue for not having their
records in order (article 30), not notifying the supervising
authority and data subject about a breach (articles 33, 34),
or not conducting impact assessments (article 33).
And keep in mind – the GDPR breach notification requires
more than just saying you have had an incident. You’ll
have to include categories of data, records touched, and
approximate number of data subjects affected. And this
means you’ll need some detailed intelligence on what the
hackers and insiders were doing.
More serious infringements merit up to a 4% fine. This
includes violations of basic principles related to data
security (article 5) and conditions for consumer consent
(article 7) — these are essentially violations of the core
Privacy by Design concepts of the law.
One way the GDPR is hoping to keep everything in
line? By requiring companies to have a Data Protection
Officer (DPO). The DPO is supposed to be responsible
for creating access controls, reducing risk, ensuring
compliance, responding to requests, reporting breaches
within 72 hours, and even creating a good data
security policy.
19
EU GDPR LESSON 6
Next Steps - How to Get There?
Let’s break down some of the challenges in the
new GDPR and how to address them:
GDPR Article What does it mean How to address it
Article 25: Data
Protection by Design
and By Default
Embrace accountability
and privacy by design as a
business culture.
Safely remediate access
controls to least privilege.
Article 30: Records of
Processing Activities
Implement technical
and organizational
measures to properly
process personal data.
Create asset register
of sensitive files; Understand
who has access; know
who is accessing it; know
when data can and should
be deleted.
Article 17: Right to
Erasure and “to be
forgotten”
Be able to discover and
target specific data and
automate removal.
Find it, flag it, remove it.
GDPR Article What does it mean How to address it
Article 32: Security of
Processing
Ensure least privilege
access; implement
accountability via
data owners; Provide
reports that policies and
processes are in place
and successful.
Automate and impose least
privileges through entitlement
reviews and proactively
enforced ethical walls.
Article 33: Notification of
personal data breach to
the supervisory authority
Prevent and alert on
data breach activity; have
an incidence response
plan in place.
Detect abnormal data
breach activity, policy
violations and real-time
alert on it as it happens.
Article 35: Data
Protection Impact
Assessment
Quantify data protection
risk profiles.
Conduct regular quantified
data risk assessments.
21
Data classification – Know where personal
data is stored on your system, especially
in unstructured formats in documents,
presentations, and spreadsheets. This is
critical for both protecting the data and also
following through on requests to correct and
erase personal data.
Metadata – With its requirements for limiting data
retention, you’ll need basic information on when
the data was collected, why it was
collected, and its purpose. Personal
data residing in IT systems should be
periodically reviewed to see whether
it needs to be saved for the future.
Governance – With data security
by design and default the law,
companies should focus on data governance
basics. For unstructured data, this should include
understanding who is accessing personal
data in the corporate file system, who
should be authorized to access, and limiting
file permission based on employees’ actual
roles – i.e., role-based access controls.
EU GDPR LESSON 6
PII
Monitoring – The breach notification requirement
places a new burden on data controllers. Under
the GDPR, the IT security mantra should “always
be monitoring”. You’ll need to spot
unusual access patterns against
files containing personal
data, and promptly report
an exposure to the
local data authority.
Failure to do so can
lead to enormous
fines, particularly for
multinationals with large
global revenues.
Varonis helps organizations of all sizes with
GDPR projects. Our software suite automates
what would otherwise be an extremely arduous
and time-consuming task. Take advantage of our
free GDPR readiness assessment today to avoid
any non-compliance issues down the road.
So what should you focus on to meet the
EU General Data Protection Regulation?
23
Get your free GDPR
Readiness Assessment
Our team will do all the heavy-lifting for you:
setup, configuration, and analysis with concrete
steps to improve your General Data Protection
Regulation compliance.
YOUR DEDICATED ENGINEER WILL HELP YOU:
•	 Identify in-scope GDPR data
•	 Find and revoke excessive access to personal information
•	 Audit user activity and detect risky behaviour / ransomware
•	 Identify and prioritize gaps in GDPR compliance
Schedule your assessment!
About Varonis
Varonis is a leading provider of software solutions that
protect data from insider threats and cyberattacks.
Through an innovative software platform, Varonis
allows organizations to analyse, secure, manage,
and migrate their volumes of unstructured data.
Varonis specializes in file and email systems that store
valuable spreadsheets, word processing documents,
presentations, audio and video files, emails, and text.
This rapidly growing data often contains an enterprise’s
financial information, product plans, strategic initiatives,
intellectual property, and confidential employee,
customer or patient records. IT and business personnel
deploy Varonis software for a variety of use cases,
including data security, governance and compliance,
user behaviour analytics, archiving, search, and file
synchronization and sharing.
DETECT PREVENT SUSTAIN
Get in Touch:
US: +1-877-292-8767	 UK: +0-800-756-9784	 INTL: +1-646-706-7336
info.varonis.com/gdpr-risk-assessment
Varonis Headquarters
1250 Broadway, 29th Floor
New York, NY, USA 10001
US: +1-877-292-8767
UK: +0-800-756-9784
INTL: +1-646-706-7336
www.varonis.com

More Related Content

What's hot

How to get started with being GDPR compliant
How to get started with being GDPR compliantHow to get started with being GDPR compliant
How to get started with being GDPR compliant
Siddharth Ram Dinesh
 
GDPR: data needs to be in safe hands
GDPR: data needs to be in safe hands GDPR: data needs to be in safe hands
GDPR: data needs to be in safe hands
legalandgeneral
 
GDPR: how IT works
GDPR: how IT worksGDPR: how IT works
GDPR: how IT works
Morris Dorfer
 
Cognizant business consulting the impacts of gdpr
Cognizant business consulting   the impacts of gdprCognizant business consulting   the impacts of gdpr
Cognizant business consulting the impacts of gdpr
audrey miguel
 
How the EU-GDPR May Affect Your Website
How the EU-GDPR May Affect Your WebsiteHow the EU-GDPR May Affect Your Website
How the EU-GDPR May Affect Your Website
SilverTech
 
"The EU General Data Protection Regulation: GDPR" - TRA Annual Meeting 2018
"The EU General Data Protection Regulation: GDPR" - TRA Annual Meeting 2018"The EU General Data Protection Regulation: GDPR" - TRA Annual Meeting 2018
"The EU General Data Protection Regulation: GDPR" - TRA Annual Meeting 2018
TRA - Tax Representative Alliance
 
GDPR - Are you ready?
GDPR - Are you ready?GDPR - Are you ready?
GDPR - Are you ready?
VILT
 
GDPR: A Threat or Opportunity? www.normanbroadbent.
GDPR: A Threat or Opportunity? www.normanbroadbent.GDPR: A Threat or Opportunity? www.normanbroadbent.
GDPR: A Threat or Opportunity? www.normanbroadbent.
Steven Salter
 
How to get your business GDPR ready
How to get your business GDPR readyHow to get your business GDPR ready
How to get your business GDPR ready
Premier EPOS
 
Marketing data management | The new way to think about your data
Marketing data management | The new way to think about your dataMarketing data management | The new way to think about your data
Marketing data management | The new way to think about your data
Laurence
 
INFOMAGAZINE 8 by REAL security
INFOMAGAZINE 8 by REAL securityINFOMAGAZINE 8 by REAL security
INFOMAGAZINE 8 by REAL security
Samo Zavašnik
 
delphix-wp-gdpr-for-data-masking
delphix-wp-gdpr-for-data-maskingdelphix-wp-gdpr-for-data-masking
delphix-wp-gdpr-for-data-maskingJes Breslaw
 
Companies, digital transformation and information privacy: the next steps
Companies, digital transformation and information privacy: the next stepsCompanies, digital transformation and information privacy: the next steps
Companies, digital transformation and information privacy: the next steps
The Economist Media Businesses
 
The Evolution of Data Privacy: 3 Things You Need To Consider
The Evolution of Data Privacy:  3 Things You Need To ConsiderThe Evolution of Data Privacy:  3 Things You Need To Consider
The Evolution of Data Privacy: 3 Things You Need To Consider
Symantec
 
UK GDPR: What New Direction?
UK GDPR:  What New Direction?UK GDPR:  What New Direction?
UK GDPR: What New Direction?
David Erdos
 
NetSquared London - GDPR for charities
NetSquared London - GDPR for charitiesNetSquared London - GDPR for charities
NetSquared London - GDPR for charities
Tech Trust
 
GDPR ASAP: A Seven-Step Guide to Prepare for the General Data Protection Regu...
GDPR ASAP: A Seven-Step Guide to Prepare for the General Data Protection Regu...GDPR ASAP: A Seven-Step Guide to Prepare for the General Data Protection Regu...
GDPR ASAP: A Seven-Step Guide to Prepare for the General Data Protection Regu...
ObservePoint
 
Disclosure, Exposure and the "Right to be Forgotten" After Google Spain
Disclosure, Exposure and the "Right to be Forgotten" After Google SpainDisclosure, Exposure and the "Right to be Forgotten" After Google Spain
Disclosure, Exposure and the "Right to be Forgotten" After Google Spain
David Erdos
 
The GDPR, Brexit, the UK and adequacy
The GDPR, Brexit, the UK and adequacyThe GDPR, Brexit, the UK and adequacy
The GDPR, Brexit, the UK and adequacy
Lilian Edwards
 
Getting Ready for GDPR
Getting Ready for GDPRGetting Ready for GDPR
Getting Ready for GDPR
Jessvin Thomas
 

What's hot (20)

How to get started with being GDPR compliant
How to get started with being GDPR compliantHow to get started with being GDPR compliant
How to get started with being GDPR compliant
 
GDPR: data needs to be in safe hands
GDPR: data needs to be in safe hands GDPR: data needs to be in safe hands
GDPR: data needs to be in safe hands
 
GDPR: how IT works
GDPR: how IT worksGDPR: how IT works
GDPR: how IT works
 
Cognizant business consulting the impacts of gdpr
Cognizant business consulting   the impacts of gdprCognizant business consulting   the impacts of gdpr
Cognizant business consulting the impacts of gdpr
 
How the EU-GDPR May Affect Your Website
How the EU-GDPR May Affect Your WebsiteHow the EU-GDPR May Affect Your Website
How the EU-GDPR May Affect Your Website
 
"The EU General Data Protection Regulation: GDPR" - TRA Annual Meeting 2018
"The EU General Data Protection Regulation: GDPR" - TRA Annual Meeting 2018"The EU General Data Protection Regulation: GDPR" - TRA Annual Meeting 2018
"The EU General Data Protection Regulation: GDPR" - TRA Annual Meeting 2018
 
GDPR - Are you ready?
GDPR - Are you ready?GDPR - Are you ready?
GDPR - Are you ready?
 
GDPR: A Threat or Opportunity? www.normanbroadbent.
GDPR: A Threat or Opportunity? www.normanbroadbent.GDPR: A Threat or Opportunity? www.normanbroadbent.
GDPR: A Threat or Opportunity? www.normanbroadbent.
 
How to get your business GDPR ready
How to get your business GDPR readyHow to get your business GDPR ready
How to get your business GDPR ready
 
Marketing data management | The new way to think about your data
Marketing data management | The new way to think about your dataMarketing data management | The new way to think about your data
Marketing data management | The new way to think about your data
 
INFOMAGAZINE 8 by REAL security
INFOMAGAZINE 8 by REAL securityINFOMAGAZINE 8 by REAL security
INFOMAGAZINE 8 by REAL security
 
delphix-wp-gdpr-for-data-masking
delphix-wp-gdpr-for-data-maskingdelphix-wp-gdpr-for-data-masking
delphix-wp-gdpr-for-data-masking
 
Companies, digital transformation and information privacy: the next steps
Companies, digital transformation and information privacy: the next stepsCompanies, digital transformation and information privacy: the next steps
Companies, digital transformation and information privacy: the next steps
 
The Evolution of Data Privacy: 3 Things You Need To Consider
The Evolution of Data Privacy:  3 Things You Need To ConsiderThe Evolution of Data Privacy:  3 Things You Need To Consider
The Evolution of Data Privacy: 3 Things You Need To Consider
 
UK GDPR: What New Direction?
UK GDPR:  What New Direction?UK GDPR:  What New Direction?
UK GDPR: What New Direction?
 
NetSquared London - GDPR for charities
NetSquared London - GDPR for charitiesNetSquared London - GDPR for charities
NetSquared London - GDPR for charities
 
GDPR ASAP: A Seven-Step Guide to Prepare for the General Data Protection Regu...
GDPR ASAP: A Seven-Step Guide to Prepare for the General Data Protection Regu...GDPR ASAP: A Seven-Step Guide to Prepare for the General Data Protection Regu...
GDPR ASAP: A Seven-Step Guide to Prepare for the General Data Protection Regu...
 
Disclosure, Exposure and the "Right to be Forgotten" After Google Spain
Disclosure, Exposure and the "Right to be Forgotten" After Google SpainDisclosure, Exposure and the "Right to be Forgotten" After Google Spain
Disclosure, Exposure and the "Right to be Forgotten" After Google Spain
 
The GDPR, Brexit, the UK and adequacy
The GDPR, Brexit, the UK and adequacyThe GDPR, Brexit, the UK and adequacy
The GDPR, Brexit, the UK and adequacy
 
Getting Ready for GDPR
Getting Ready for GDPRGetting Ready for GDPR
Getting Ready for GDPR
 

Similar to GDPR A Practical Guide with Varonis

The Essential Guide to GDPR
The Essential Guide to GDPRThe Essential Guide to GDPR
The Essential Guide to GDPR
Tim Hyman LLB
 
The Essential Guide to GDPR
The Essential Guide to GDPRThe Essential Guide to GDPR
The Essential Guide to GDPR
Tim Hyman LLB
 
The Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowThe Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t know
Symantec
 
All you need to know about GDPR
All you need to know about GDPRAll you need to know about GDPR
All you need to know about GDPR
Hubilo
 
The Definitive GDPR Guide for Event Professionals
The Definitive GDPR Guide for Event ProfessionalsThe Definitive GDPR Guide for Event Professionals
The Definitive GDPR Guide for Event Professionals
Hubilo
 
General Data Protection Regulation (GDPR) - Moving from confusion to readiness
General Data Protection Regulation (GDPR) - Moving from confusion to readinessGeneral Data Protection Regulation (GDPR) - Moving from confusion to readiness
General Data Protection Regulation (GDPR) - Moving from confusion to readiness
Omo Osagiede
 
Operational impact of gdpr finance industries in the caribbean
Operational impact of gdpr finance industries in the caribbeanOperational impact of gdpr finance industries in the caribbean
Operational impact of gdpr finance industries in the caribbean
EquiGov Institute
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection Regulation
Pete S
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
Symantec
 
Fasten Your Belts for #GDPR
Fasten Your Belts for #GDPRFasten Your Belts for #GDPR
Fasten Your Belts for #GDPR
"John "Jeb"" Beckwith
 
Fasten Your Belts for GDPR
Fasten Your Belts for GDPRFasten Your Belts for GDPR
Fasten Your Belts for GDPR
"John "Jeb"" Beckwith
 
Aon GDPR white paper
Aon GDPR white paperAon GDPR white paper
Aon GDPR white paper
Graeme Cross
 
IDC on 10 myths regarding GDPR
IDC on 10 myths regarding GDPRIDC on 10 myths regarding GDPR
IDC on 10 myths regarding GDPR
Veritas Technologies LLC
 
Board Priorities for GDPR Implementation
Board Priorities for GDPR ImplementationBoard Priorities for GDPR Implementation
Board Priorities for GDPR Implementation
Joseph V. Moreno
 
GDPR & Data Privacy Guide - Free Download
GDPR & Data Privacy Guide - Free DownloadGDPR & Data Privacy Guide - Free Download
GDPR & Data Privacy Guide - Free Download
Visitor Analytics
 
GDPRIBMWhitePaper
GDPRIBMWhitePaperGDPRIBMWhitePaper
GDPRIBMWhitePaperJim Wilson
 
GDPR
GDPRGDPR
GDPR
Gopi PD
 
A Brave New World Of Data Protection. Ready? Counting down to GDPR.
A Brave New World Of Data Protection. Ready? Counting down to GDPR. A Brave New World Of Data Protection. Ready? Counting down to GDPR.
A Brave New World Of Data Protection. Ready? Counting down to GDPR.
dan hyde
 
GDPR Explained - A Quick Guide for US Businesses
GDPR Explained - A Quick Guide for US BusinessesGDPR Explained - A Quick Guide for US Businesses
GDPR Explained - A Quick Guide for US Businesses
Jessica Clark
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
Dr. Donald Macfarlane
 

Similar to GDPR A Practical Guide with Varonis (20)

The Essential Guide to GDPR
The Essential Guide to GDPRThe Essential Guide to GDPR
The Essential Guide to GDPR
 
The Essential Guide to GDPR
The Essential Guide to GDPRThe Essential Guide to GDPR
The Essential Guide to GDPR
 
The Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowThe Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t know
 
All you need to know about GDPR
All you need to know about GDPRAll you need to know about GDPR
All you need to know about GDPR
 
The Definitive GDPR Guide for Event Professionals
The Definitive GDPR Guide for Event ProfessionalsThe Definitive GDPR Guide for Event Professionals
The Definitive GDPR Guide for Event Professionals
 
General Data Protection Regulation (GDPR) - Moving from confusion to readiness
General Data Protection Regulation (GDPR) - Moving from confusion to readinessGeneral Data Protection Regulation (GDPR) - Moving from confusion to readiness
General Data Protection Regulation (GDPR) - Moving from confusion to readiness
 
Operational impact of gdpr finance industries in the caribbean
Operational impact of gdpr finance industries in the caribbeanOperational impact of gdpr finance industries in the caribbean
Operational impact of gdpr finance industries in the caribbean
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection Regulation
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
 
Fasten Your Belts for #GDPR
Fasten Your Belts for #GDPRFasten Your Belts for #GDPR
Fasten Your Belts for #GDPR
 
Fasten Your Belts for GDPR
Fasten Your Belts for GDPRFasten Your Belts for GDPR
Fasten Your Belts for GDPR
 
Aon GDPR white paper
Aon GDPR white paperAon GDPR white paper
Aon GDPR white paper
 
IDC on 10 myths regarding GDPR
IDC on 10 myths regarding GDPRIDC on 10 myths regarding GDPR
IDC on 10 myths regarding GDPR
 
Board Priorities for GDPR Implementation
Board Priorities for GDPR ImplementationBoard Priorities for GDPR Implementation
Board Priorities for GDPR Implementation
 
GDPR & Data Privacy Guide - Free Download
GDPR & Data Privacy Guide - Free DownloadGDPR & Data Privacy Guide - Free Download
GDPR & Data Privacy Guide - Free Download
 
GDPRIBMWhitePaper
GDPRIBMWhitePaperGDPRIBMWhitePaper
GDPRIBMWhitePaper
 
GDPR
GDPRGDPR
GDPR
 
A Brave New World Of Data Protection. Ready? Counting down to GDPR.
A Brave New World Of Data Protection. Ready? Counting down to GDPR. A Brave New World Of Data Protection. Ready? Counting down to GDPR.
A Brave New World Of Data Protection. Ready? Counting down to GDPR.
 
GDPR Explained - A Quick Guide for US Businesses
GDPR Explained - A Quick Guide for US BusinessesGDPR Explained - A Quick Guide for US Businesses
GDPR Explained - A Quick Guide for US Businesses
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
 

Recently uploaded

Software Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdfSoftware Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdf
MayankTawar1
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
XfilesPro
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
IES VE
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
Globus
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
Ortus Solutions, Corp
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
kalichargn70th171
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
Jelle | Nordend
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
Tendenci - The Open Source AMS (Association Management Software)
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Globus
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
AMB-Review
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
KrzysztofKkol1
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Natan Silnitsky
 
Visitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.appVisitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.app
NaapbooksPrivateLimi
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
takuyayamamoto1800
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Globus
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
Tier1 app
 

Recently uploaded (20)

Software Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdfSoftware Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdf
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
 
Visitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.appVisitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.app
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 

GDPR A Practical Guide with Varonis

  • 2. 3 INDEX EU GDPR Lesson 1 4 What is the GDPR? Why do we need it? EU GDPR Lesson 2 8 Data Protection by Design and by Default EU GDPR Lesson 3 12 The Right To Be Forgotten EU GDPR Lesson 4 14 Who Does the EU GDPR Apply To? EU GDPR Lesson 5 16 What Happens if I Don’t Comply with the EU GDPR? EU GDPR Lesson 6 18 Next Steps - How to Get There? Over the past few years of monitoring the development of the EU General Data Protection Regulation (GDPR) and its effects on technology, we’ve distilled the parts of the regulation that most affect your business into this practical guide. Your Risk Assessment report will outline problem areas, prioritize risk, and give you concrete steps to take to improve your data security. www.varonis.com FIND THEFIND THE 3 Get in Touch: US: +1-877-292-8767 UK: +0-800-756-9784 INTL: +1-646-706-7336 www.varonis.com
  • 3. 5 EU GDPR LESSON 1 What is the GDPR? Why do we need it? GDPR concisely summarized by Wikipedia: The General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679) is a Regulation by which the European Commission intends to strengthen and unify data protection for individuals within the European Union (EU). It also addresses export of personal data outside the EU. The new GDPR is an evolution of the EU’s existing data rules, the Data Protection Directive (DPD). It addresses many of the shortcomings in the DPD: adding requirements for documenting IT procedures, performing risk assessments under certain conditions, notifying the consumer and authorities when there is a breach, as well as strengthening rules for data minimization. It’s important to note that the EU GDPR covers personal data, or as it is called in the US, personally identifiable information (PII). Think names, addresses, phone numbers, account numbers, and more recently email and IP addresses. One way to describe the GDPR is that it simply legislates a lot of common sense data security ideas, especially from the Privacy by Design school of thought: minimize collection of personal data, delete personal data that’s no longer necessary, restrict access, and secure data through its entire lifecycle.
  • 4. 7 Privacy by Design – Privacy by Design (PbD) has always played a part in EU data regulations. But with the new law, its principles of minimizing data collection and retention and gaining consent from consumers when processing data are more explicitly formalized. Data Protection Impact Assessments (DPIA) – When certain data associated with subjects is to be processed, companies will have to first analyze the risks to their privacy. This is another new requirement in the regulation. Right to Erasure and To Be Forgotten – There’s been a long standing requirement in the DPD allowing consumers to request that their data be deleted. The GDPR extends this right to include data published on the web. This is the still controversial right to stay out of the public view and “be forgotten”. Extraterritoriality – The new principle of extraterritoriality in the GDPR says that even if a company doesn’t have a physical presence in the EU but collects data about EU data subjects — for example, through a web site—then all the requirements of GDPR are in effect. In other words, the new law will extend outside the EU. This will especially affect e-commerce companies and other cloud businesses. Breach notification – A new requirement not in the existing DPD is that companies will have to notify data authorities within 72 hours after a breach of personal data has been discovered. Data subjects will also have to be notified but only if the data poses a “high risk to their rights and freedoms”. Fines – The GDPR has a tiered penalty structure that will take a large bite out of offender’s funds. More serious infringements can merit a fine of up to 4% of a company’s global revenue. This can include violations of basic principles related to data security — especially PbD principles. A lesser fine of up to 2% of global revenue — still enormous — can be issued if company records are not in order or a supervising authority and data subjects are not notified after a breach. This makes breach notification oversights a serious and expensive offense. What are the new requirements? What are the new requirements? Risk Assessment Overall, the message for companies that fall under the GDPR is that awareness of your data— where is sensitive data stored, who’s accessing it, and who should be accessing it—will now become even more critical.
  • 5. 9 Data Protection by Design and by Default Privacy by Design (PbD) is a well-intentioned set of principles to get the C-suite to take consumer data privacy and security more seriously. Overall, PbD is a good idea and you should try to abide by it. But with the General Data Protection Regulation (GDPR), it’s more than that: it’s the law if you do business in the EU zone! PbD has sensible guidelines and practices concerning consumer access to their data, and making privacy policies open and transparent. These are not controversial ideas, except if you are, ahem, a large Internet company that collects lots of consumer data. And PbD also dispenses good general advice on data security that can be summarized in one word: minimize. Minimize collection of consumer data, minimize who you share the data with, and minimize how long you keep it. Less is more: less data for the hacker to take, means a more secure environment. The new GDPR has direct, practical implications. Just as an example, consider the impact it will have on web-based marketing. Businesses are always trying to get information about their customers and looking to bring in new leads using the full digital arsenal — web, email, mobile. And when given half a chance, marketers always want more data —age, income, postal code, last book read, favourite ice cream, favourite food, etc. — even for the simplest consumer interaction. EU GDPR LESSON 2
  • 6. 11 What the EU GDPR says is that marketers should limit data to the purpose for which it is being collected—do I really need postal codes or favourite books? — and not to retain the data beyond the point where it’s no longer relevant. So the data points you collected from that web campaign over five years ago — maybe containing 5000 email addresses along with favourite pet names — and now lives in a spreadsheet no one ever looks at. Well, you should find it and delete it. If a hacker gets hold of it, and uses it for phishing purposes, you’ve created a security risk for your customers. Plus, if the local EU authority can trace the breach back to your company, you can face heavy fines. SO CAN BIG DATA AND PRIVACY LIVE TOGETHER HAPPILY EVER AFTER? PRIVACY BY DESIGN (PBD) SAYS YES – WITH JUST A FEW BASIC STEPS, YOU CAN ACHIEVE THE PBD VISION: PbD is referenced heavily in Article 25 of the GDPR, and in many other places in the new regulation. It’s not too much of a stretch to say that if you implement PbD, you’re well on your way to mastering the GDPR. Minimize data collected (especially PII) from consumers Do not retain personal data beyond its original purpose Give consumers access and ownership of their data
  • 7. 13 This means that in the case of a social media service that publishes personal data of a subscriber to the Web, they would have to remove not only the initial information, but also contact other web sites that may have copied the information. This would not be an easy process! What if the data controller gives the personal data to other third-parties, say a cloud-based service for storage or processing? The long arm of the EU regulations still apply: as data processors, the cloud service will also have to erase the personal data when asked to by the controller. Translation: the consumer or data subject can request to erase the data held by companies at any time. In the EU, the data belongs to the people! The Right To Be Forgotten The controversial “right to be forgotten” is now law in the EU. For most companies, this is really a right for consumers to erase their data. The GDPR has strengthened the DPD’s existing rules on deletion and then adds the right to be forgotten. There’s now language that would force the controller to take reasonable steps to inform third- parties of a request to have information deleted. Discussed in Article 17 of the proposed GDPR, it states that “The data subject shall have the right to obtain from the controller the erasure of personal data concerning him or her without undue delay and the controller shall have the obligation to erase personal data without undue delay where ... the personal data are no longer necessary in relation to the purposes for which they were collected or otherwise processed; ... the data subject withdraws consent on which the processing is based ... the controller has made the personal data public and is obliged ... to erase the personal data”. EU GDPR LESSON 3
  • 8. 15 EU GDPR LESSON 4 Who Does the EU GDPR Apply To? One of the more complex issues with the new GDPR is what’s being called “extraterritoriality.” As proposed by EU Parliament, the GDPR will apply to any data transferred outside the EU zone. So under these new rules, if a US company collects data from EU citizens, it would be under the same legal obligations as though the company had headquarters in say France, UK, or Germany — even though they don’t have any servers or offices there! Legal experts note this may not be that easy to enforce, but if a large enough multinational breaks one of the rules — such as the GDPR’s new strict breach notification requirement — our guesstimate is that the EU regulators will likely target it. Obviously, extraterritoriality is particularly relevant to core web services such as search, social networking, e-commerce, companies that allow you to rent apartments online, etc. You can map these to your own favourite apps to figure out who would be affected. SHIFTING MEANINGS Under the old rules in the Data Protection Directive (DPD), there was some wiggle room that allowed data collectors to escape having to follow the regulations. A common practice was for service or app providers to keep their data processing outside the EU. The idea was that if the main processing and servers weren’t located in the EU zone, then the rules didn’t apply. Companies such as Google, Facebook, and other social networking companies were following this approach. NOT SO FAST! Google was famously making this argument when a Spanish DPA asked it to remove a listing in a search result. The case eventually made its way to the EU’s highest court, the ECJ, which ruled against Google last year. The long arm of EU law prevailed: the specific search listing was removed. Ultimately, the GDPR applies to EU based companies and companies that collect data of EU citizens, regardless of a physical presence in the EU. The GDPR will apply to any data transferred outside the EU zone.
  • 9. 17 What Happens if I Don’t Comply with the EU GDPR? The GDPR has a tiered penalty structure that will take a large bite out of offender’s funds – and the EU GDPR rules apply to both data controllers and processors, that is “the cloud”… therefore huge cloud providers are not off the hook when it comes to GDPR enforcement. EU GDPR LESSON 5 Non-compliance results in fines of up to 4% of global revenue. This can include violations of basic principles related to data security — especially PbD principles. A company can be fined up to 2% of global revenue for not having their records in order (article 30), not notifying the supervising authority and data subject about a breach (articles 33, 34), or not conducting impact assessments (article 33). And keep in mind – the GDPR breach notification requires more than just saying you have had an incident. You’ll have to include categories of data, records touched, and approximate number of data subjects affected. And this means you’ll need some detailed intelligence on what the hackers and insiders were doing. More serious infringements merit up to a 4% fine. This includes violations of basic principles related to data security (article 5) and conditions for consumer consent (article 7) — these are essentially violations of the core Privacy by Design concepts of the law. One way the GDPR is hoping to keep everything in line? By requiring companies to have a Data Protection Officer (DPO). The DPO is supposed to be responsible for creating access controls, reducing risk, ensuring compliance, responding to requests, reporting breaches within 72 hours, and even creating a good data security policy.
  • 10. 19 EU GDPR LESSON 6 Next Steps - How to Get There? Let’s break down some of the challenges in the new GDPR and how to address them: GDPR Article What does it mean How to address it Article 25: Data Protection by Design and By Default Embrace accountability and privacy by design as a business culture. Safely remediate access controls to least privilege. Article 30: Records of Processing Activities Implement technical and organizational measures to properly process personal data. Create asset register of sensitive files; Understand who has access; know who is accessing it; know when data can and should be deleted. Article 17: Right to Erasure and “to be forgotten” Be able to discover and target specific data and automate removal. Find it, flag it, remove it. GDPR Article What does it mean How to address it Article 32: Security of Processing Ensure least privilege access; implement accountability via data owners; Provide reports that policies and processes are in place and successful. Automate and impose least privileges through entitlement reviews and proactively enforced ethical walls. Article 33: Notification of personal data breach to the supervisory authority Prevent and alert on data breach activity; have an incidence response plan in place. Detect abnormal data breach activity, policy violations and real-time alert on it as it happens. Article 35: Data Protection Impact Assessment Quantify data protection risk profiles. Conduct regular quantified data risk assessments.
  • 11. 21 Data classification – Know where personal data is stored on your system, especially in unstructured formats in documents, presentations, and spreadsheets. This is critical for both protecting the data and also following through on requests to correct and erase personal data. Metadata – With its requirements for limiting data retention, you’ll need basic information on when the data was collected, why it was collected, and its purpose. Personal data residing in IT systems should be periodically reviewed to see whether it needs to be saved for the future. Governance – With data security by design and default the law, companies should focus on data governance basics. For unstructured data, this should include understanding who is accessing personal data in the corporate file system, who should be authorized to access, and limiting file permission based on employees’ actual roles – i.e., role-based access controls. EU GDPR LESSON 6 PII Monitoring – The breach notification requirement places a new burden on data controllers. Under the GDPR, the IT security mantra should “always be monitoring”. You’ll need to spot unusual access patterns against files containing personal data, and promptly report an exposure to the local data authority. Failure to do so can lead to enormous fines, particularly for multinationals with large global revenues. Varonis helps organizations of all sizes with GDPR projects. Our software suite automates what would otherwise be an extremely arduous and time-consuming task. Take advantage of our free GDPR readiness assessment today to avoid any non-compliance issues down the road. So what should you focus on to meet the EU General Data Protection Regulation?
  • 12. 23 Get your free GDPR Readiness Assessment Our team will do all the heavy-lifting for you: setup, configuration, and analysis with concrete steps to improve your General Data Protection Regulation compliance. YOUR DEDICATED ENGINEER WILL HELP YOU: • Identify in-scope GDPR data • Find and revoke excessive access to personal information • Audit user activity and detect risky behaviour / ransomware • Identify and prioritize gaps in GDPR compliance Schedule your assessment! About Varonis Varonis is a leading provider of software solutions that protect data from insider threats and cyberattacks. Through an innovative software platform, Varonis allows organizations to analyse, secure, manage, and migrate their volumes of unstructured data. Varonis specializes in file and email systems that store valuable spreadsheets, word processing documents, presentations, audio and video files, emails, and text. This rapidly growing data often contains an enterprise’s financial information, product plans, strategic initiatives, intellectual property, and confidential employee, customer or patient records. IT and business personnel deploy Varonis software for a variety of use cases, including data security, governance and compliance, user behaviour analytics, archiving, search, and file synchronization and sharing. DETECT PREVENT SUSTAIN Get in Touch: US: +1-877-292-8767 UK: +0-800-756-9784 INTL: +1-646-706-7336 info.varonis.com/gdpr-risk-assessment
  • 13. Varonis Headquarters 1250 Broadway, 29th Floor New York, NY, USA 10001 US: +1-877-292-8767 UK: +0-800-756-9784 INTL: +1-646-706-7336 www.varonis.com