SlideShare a Scribd company logo
GDPR GUIDE:
12 STEPS TO TAKE NOW
Recommendations from The United Kingdom’s Information
Commissioner’s Office (ICO) to Prepare for May 2018
When the European General Data Protection Regulation (GDPR) takes effect on May 25,
2018, every organization that collects information on European Union (EU) citizens will
be forced to change how it manages and secures customer data.
Hopefully you’re already taking steps to ensure GDPR compliance, which includes
facilitating better data access, security, and management. This could impact your
organization well beyond just your development team, so getting a head start on
compliance is a good idea.
In the remaining time before GDPR takes effect, the United Kingdom’s Information
Commissioner’s Office suggested “12 steps to take now” to get ahead of GDPR’s impact
on your operations and processes. Here’s a quick recap.
GDPR is Fast Approaching
Building
Internal
Awareness
1
GDPR will impact your business in many ways, so make sure every decision-maker starts
to consider how GDPR affects their department. That means elevating security to the
board level, explaining what’s required for compliance, and making it a recurring topic.
It’s important to stress to others in your organization that GDPR isn’t just a data security
burden. The rules will influence how your product, communications, legal, and other
teams approach security. In bigger and more complex organizations, GDPR could even
force significant resource reallocations in order to have people focused on mitigating
risks, reacting to data requests, or ensuring compliance.
With a $20 million or more in potential fines, this is your opportunity to make security a
boardroom topic.
Building Internal Awareness1
Documenting
Your Data
2
GDPR focuses on user data, user access to their data, and your treatment of the
data. To fully comply, you need to understand what data you currently have, where
it comes from, what you do with it, where it’s stored, and who you share it with.
Depending on your data processes, this might be a significant, audit-like
undertaking.
Next year, if you’re compelled to take a GDPR-related action, such as deleting a
user’s data, you have to take that action along the entire process. If you don’t have a
detailed map of your data flow, you won’t be able to comply.
As you audit your data processes, document what you find and keep detailed
records. GDPR’s rules force you to prove compliance, which means having
documented policies and procedures in place.
Documenting Your Data2
Review Your
Privacy Policy
3
GDPR requires that specific privacy and data information be publicly accessible. This
includes details around data retention periods and users’ right to file complaints.
These new statements should be in your privacy policy, so it may need an update.
That means reviewing your current policy against GDPR to identify gaps and
potential conflicts.
Next, you’ll need to have your security, communications, and legal teams to
determine what needs to be changed, added, or deleted. Since this may take some
time, best to get started early.
Review Your Privacy Policy3
Define How
You’ll Facilitate
Users’ Rights
4
GDPR affords users many rights, such as access to their data, deletion of data, and
more. Unless you already offer avenues to manage many of these requests, you’ll
need to think about the processes, staff, and systems to put in place.
Think about what would be involved. How will users make a request? Who will
manage and respond to requests? How will you identify a particular user’s data?
How will you delete it, from where, and who will do it? If a user requests their own
data, in what form will it be transferred to them?
These types of requests will come up and GDPR only allows 30 days to comply.
Asking the questions now will save both time and resources later.
Define How You’ll Facilitate Users’ Rights4
Define Your
Data Request
Process
5
This is an extension of the previous step. You’ll need a mechanism for individuals to
make requests regarding their data, and if you have many users, it may become
overwhelming.
What’s more, you’ll only have 30 days to comply or to explain your refusal. That’s not
enough time to figure out your process on the fly, so get it defined now.
Also consider how you might handle a large volume of requests. If your process is
to have an individual or small team managing requests, what happens when they’re
out sick or can’t support dozens or thousands of simultaneous requests?
Think about the nuts and bolts as well. How will individuals submit requests (and
how will they know how to submit requests)? How will you communicate with
individuals? How will you comply with the 30 day requirement, and who will track
the duration of each request?
Define Your Data Request Process5
6
Explain Why
You’re Collecting
the Data
GDPR requires that you state the reasons for collecting data, then document it and
explain it to your users. It further provides just 6 situations where lawful data
processing is allowed, such as the user has given consent and processing is
necessary for performance of a contract.
Beyond defining why you’re collecting data, you’ll need to allow review of your data
processing activities, and if requested, explain why you do it and why you believe it’s
lawful. Once again, your legal team will probably get involved, so acting now gives
them ample time to prepare.
Explain Why You’re Collecting the Data
We’re only halfway through, but the recurring theme here is that GDPR
requires accountability, so be sure to document everything.
6
Determine
How You
Gain Consent
7
A major consideration of GDPR is the consent you gain from users before you
collect or process data. But more than just gaining consent, GDPR’s rules might
impact how you seek, record, and manage that consent.
What’s important about how you treat consent is that it cannot be implied, inferred,
or even gained via pre-selected check boxes. It must also be informed consent, and
the language has to be unambiguous. The opt-in must be positive and separate
from that of other terms and conditions. Furthermore, if past consents don’t comply
with GDPR, you need to refresh the consent to meet the standard.
How you currently gain consent may need to change.
Determine How You Gain Consent7
Children
Have Special
Considerations
8
GDPR has two special statements directly concerning children and the protection of
their data. You may need to verify ages and potentially gain parental consent for
data processing if children accessing your systems are under age 16. Adding
complexity, individual EU member states can enforce GDPR’s rules to children as
young as 13.
What might take additional effort is GDPR’s rule that any attempt to gain a child’s
consent has to be in a “concise, transparent, intelligible and easily accessible form,
using clear and plain language,” which implies that it must be written in language a
child would understand.
If you do collect data from children, you’ll also need to determine how you’ll gain
their parental or guardian consent. GDPR further requires that consent to be
verifiable, so an audit trail is important.
Children Have Special Considerations8
Define How
You React to
Data Breaches
9
GDPR compels you to notify organizations or individuals in event of a breach that
concerns their data. Procedures should be in place to ensure you’re also working to
detect and prevent those data breaches.
Documentation is clearly a major part of GDPR, and you’ll need time to prepare the
documentation that supports your breach response process.
This step might also force you to look deeply into what types of data you hold, then
highlight when and where breaches would compel you to notify the appropriate
authorities.
Define How You React to Data Breaches9
Prepare for Data
Protection Impact
Assessments
10
GDPR requires “data protection by design and default”, meaning you have to
document how you design data protection into your overall organization. You’ll
further need to run data protection impact assessments when certain situations
occur, such as deploying a new technology.
Again, since these assessments could ripple throughout your organization, it’s
another reason to raise GDPR to the board level so everyone understands the
importance of any new workload.
For now, determine the situations where you would be required to run an impact
assessment and how you would facilitate it.
Prepare for Data Protection Impact Assessments10
Designate a
Data Protection
Officer
11
Someone needs to be responsible for complying with GDPR, and that’s your Data
Protection Officer, or DPO. It’s a role to be taken seriously, since they DPO is required to
have both the knowledge to understand their role as well as the authority to carry it out.
GDPR specifically states that “the data protection officer shall be designated on the basis of
professional qualities and, in particular, expert knowledge of data protection law and
practices and the ability to fulfil the tasks” related to their role. In other words, it’s not a light
responsibility to add to someone’s job description.
Furthermore, GDPR requires organizations provide DPOs with the “resources necessary to
carry out those tasks and access to personal data and processing operations, and to
maintain his or her expert knowledge.” And, also, “the data protection officer shall directly
report to the highest management level of the controller or the processor.” Those details
imply another level of expertise and authority that might impact your choice for DPO.
Designate a Data Protection Officer11
Determine Your
Supervisory
Authority
11
If you operate in more than one EU member state, you’ll need to determine your
one “lead authority”. It will generally be the member state where your EU “main
establishment” is located. Or it could be the member state where you make the
decisions about data processing.
This might be an easy decision, or it may require you to map out your EU
organization, where decisions are made, and how data is processed and stored.
Determine Your Supervisory Authority12
More to
Think
About
As GDPR looks to update and consolidate data regulations across the EU, many
questions still remain. If you collect data on EU citizens, you’re bound by these rules
and it’s imperative you understand how your data, security, development, and other
practices and people will be affected by these new rules.
Here are two additional items to consider:
○ Our recent blog post, Ready or Not, Here Comes GDPR, offers additional insights
into how GDPR might impact your business, specifically your security team.
○ GDPR requires you to look for, prevent, and investigate breaches. A great first step
is to define a process for white-hat hackers to alert you when they find
vulnerabilities in your applications. It’s called a Vulnerability Disclosure Policy
(VDP), and here’s a quick guide to help you create and publish your own disclosure
policy following industry best-practices.
More to Think About
Get Started with
Hacker-Powered
Security CONTACT US

More Related Content

What's hot

EU GDPR(general data protection regulation)
EU GDPR(general data protection regulation)EU GDPR(general data protection regulation)
EU GDPR(general data protection regulation)
RAKESH S
 
"GDPR - All You Need To Know" presentation from event Nov 16th in Berlin
"GDPR - All You Need To Know" presentation from event Nov 16th in Berlin"GDPR - All You Need To Know" presentation from event Nov 16th in Berlin
"GDPR - All You Need To Know" presentation from event Nov 16th in Berlin
Mailjet
 
EU GDPR (training)
EU GDPR (training)  EU GDPR (training)
EU GDPR (training)
Elizabeth Baker, JD, CRCMP
 
Quick Introduction to the EU GDPR by Sami Zahran
Quick Introduction to the EU GDPR by Sami ZahranQuick Introduction to the EU GDPR by Sami Zahran
Quick Introduction to the EU GDPR by Sami Zahran
Dr. Sami Zahran
 
What does GDPR mean for your charity?
What does GDPR mean for your charity?What does GDPR mean for your charity?
What does GDPR mean for your charity?
NCVO - National Council for Voluntary Organisations
 
Checklist for SMEs for GDPR compliance
Checklist for SMEs for GDPR complianceChecklist for SMEs for GDPR compliance
Checklist for SMEs for GDPR compliance
Sarah Fox
 
GDPR From Implementation to Opportunity
GDPR From Implementation to OpportunityGDPR From Implementation to Opportunity
GDPR From Implementation to Opportunity
Dean Sappey
 
Preparing for GDPR: What Every B2B Marketer Must Know
Preparing for GDPR: What Every B2B Marketer Must KnowPreparing for GDPR: What Every B2B Marketer Must Know
Preparing for GDPR: What Every B2B Marketer Must Know
Integrate
 
GDPR The New Data Protection Law coming into effect May 2018. What does it me...
GDPR The New Data Protection Law coming into effect May 2018. What does it me...GDPR The New Data Protection Law coming into effect May 2018. What does it me...
GDPR The New Data Protection Law coming into effect May 2018. What does it me...
eHealth Forum
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection Regulation
BCC - Solutions for IBM Collaboration Software
 
Getting to grips with General Data Protection Regulation (GDPR)
Getting to grips with General Data Protection Regulation (GDPR)Getting to grips with General Data Protection Regulation (GDPR)
Getting to grips with General Data Protection Regulation (GDPR)
Zoodikers
 
How to get your business GDPR ready
How to get your business GDPR readyHow to get your business GDPR ready
How to get your business GDPR ready
Premier EPOS
 
Gdpr action plan
Gdpr action plan Gdpr action plan
Gdpr action plan
Ulf Mattsson
 
GDPR
GDPRGDPR
GDPR Awareness for YOU
GDPR Awareness for YOUGDPR Awareness for YOU
GDPR Awareness for YOU
Cliff Gibson
 
Do You Have a Roadmap for EU GDPR Compliance?
Do You Have a Roadmap for EU GDPR Compliance?Do You Have a Roadmap for EU GDPR Compliance?
Do You Have a Roadmap for EU GDPR Compliance?
Ulf Mattsson
 
GDPR Demystified
GDPR DemystifiedGDPR Demystified
GDPR Demystified
SPIN Chennai
 
GDPR - a view for the non experts
GDPR - a view for the non expertsGDPR - a view for the non experts
GDPR - a view for the non experts
Claudio Bolla, CISM
 
Getting Ready for GDPR
Getting Ready for GDPRGetting Ready for GDPR
Getting Ready for GDPR
Jessvin Thomas
 

What's hot (20)

EU GDPR(general data protection regulation)
EU GDPR(general data protection regulation)EU GDPR(general data protection regulation)
EU GDPR(general data protection regulation)
 
"GDPR - All You Need To Know" presentation from event Nov 16th in Berlin
"GDPR - All You Need To Know" presentation from event Nov 16th in Berlin"GDPR - All You Need To Know" presentation from event Nov 16th in Berlin
"GDPR - All You Need To Know" presentation from event Nov 16th in Berlin
 
EU GDPR (training)
EU GDPR (training)  EU GDPR (training)
EU GDPR (training)
 
Quick Introduction to the EU GDPR by Sami Zahran
Quick Introduction to the EU GDPR by Sami ZahranQuick Introduction to the EU GDPR by Sami Zahran
Quick Introduction to the EU GDPR by Sami Zahran
 
What does GDPR mean for your charity?
What does GDPR mean for your charity?What does GDPR mean for your charity?
What does GDPR mean for your charity?
 
Checklist for SMEs for GDPR compliance
Checklist for SMEs for GDPR complianceChecklist for SMEs for GDPR compliance
Checklist for SMEs for GDPR compliance
 
GDPR From Implementation to Opportunity
GDPR From Implementation to OpportunityGDPR From Implementation to Opportunity
GDPR From Implementation to Opportunity
 
Preparing for GDPR: What Every B2B Marketer Must Know
Preparing for GDPR: What Every B2B Marketer Must KnowPreparing for GDPR: What Every B2B Marketer Must Know
Preparing for GDPR: What Every B2B Marketer Must Know
 
GDPR The New Data Protection Law coming into effect May 2018. What does it me...
GDPR The New Data Protection Law coming into effect May 2018. What does it me...GDPR The New Data Protection Law coming into effect May 2018. What does it me...
GDPR The New Data Protection Law coming into effect May 2018. What does it me...
 
GDPR-Overview
GDPR-OverviewGDPR-Overview
GDPR-Overview
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection Regulation
 
Getting to grips with General Data Protection Regulation (GDPR)
Getting to grips with General Data Protection Regulation (GDPR)Getting to grips with General Data Protection Regulation (GDPR)
Getting to grips with General Data Protection Regulation (GDPR)
 
How to get your business GDPR ready
How to get your business GDPR readyHow to get your business GDPR ready
How to get your business GDPR ready
 
Gdpr action plan
Gdpr action plan Gdpr action plan
Gdpr action plan
 
GDPR
GDPRGDPR
GDPR
 
GDPR Awareness for YOU
GDPR Awareness for YOUGDPR Awareness for YOU
GDPR Awareness for YOU
 
Do You Have a Roadmap for EU GDPR Compliance?
Do You Have a Roadmap for EU GDPR Compliance?Do You Have a Roadmap for EU GDPR Compliance?
Do You Have a Roadmap for EU GDPR Compliance?
 
GDPR Demystified
GDPR DemystifiedGDPR Demystified
GDPR Demystified
 
GDPR - a view for the non experts
GDPR - a view for the non expertsGDPR - a view for the non experts
GDPR - a view for the non experts
 
Getting Ready for GDPR
Getting Ready for GDPRGetting Ready for GDPR
Getting Ready for GDPR
 

Similar to GDPR Guide: The ICO's 12 Recommended Steps To Take Now

GDPR Preparing for-the-gdpr-12-steps
GDPR Preparing for-the-gdpr-12-stepsGDPR Preparing for-the-gdpr-12-steps
GDPR Preparing for-the-gdpr-12-steps
Dean Bonehill ♠Technology for Business♠
 
ICO's Guide to Preparing for the GDPR
ICO's Guide to Preparing for the GDPRICO's Guide to Preparing for the GDPR
ICO's Guide to Preparing for the GDPR
Benjamin Dibble
 
GDPR 12 Steps infographic
GDPR 12 Steps infographic GDPR 12 Steps infographic
GDPR 12 Steps infographic
Ermine Amies
 
12 steps to prepare for GDPR
12 steps to prepare for GDPR12 steps to prepare for GDPR
12 steps to prepare for GDPR
Gary Chambers
 
The implications of gdpr for the solutions industry tatech 2018
The implications of gdpr for the solutions industry tatech 2018The implications of gdpr for the solutions industry tatech 2018
The implications of gdpr for the solutions industry tatech 2018
Shane Gray
 
GDPR most actionable cheatsheet and checklist by cyberstratg
GDPR most actionable cheatsheet and checklist by cyberstratgGDPR most actionable cheatsheet and checklist by cyberstratg
GDPR most actionable cheatsheet and checklist by cyberstratg
Cyber StratG
 
GDPR Changing Mindset
GDPR Changing MindsetGDPR Changing Mindset
GDPR Changing Mindset
NetworkIQ
 
Horner Downey & Co Newsletter- GDPR
Horner Downey & Co Newsletter- GDPRHorner Downey & Co Newsletter- GDPR
Horner Downey & Co Newsletter- GDPR
Jenny Ferguson
 
GDPR - what you need to know
GDPR -  what you need to know GDPR -  what you need to know
GDPR - what you need to know
Maddie Malling-May
 
How will GDPR affect small businesses?
How will GDPR affect small businesses?How will GDPR affect small businesses?
How will GDPR affect small businesses?
AllBusinessTemplates
 
A Brave New World Of Data Protection. Ready? Counting down to GDPR.
A Brave New World Of Data Protection. Ready? Counting down to GDPR. A Brave New World Of Data Protection. Ready? Counting down to GDPR.
A Brave New World Of Data Protection. Ready? Counting down to GDPR.
dan hyde
 
GDPRIBMWhitePaper
GDPRIBMWhitePaperGDPRIBMWhitePaper
GDPRIBMWhitePaperJim Wilson
 
Top 10 GDPR Requirements
Top 10 GDPR RequirementsTop 10 GDPR Requirements
Top 10 GDPR Requirements
Rusty Stanberry
 
GDPR: the Steps Event Planners Need to Follow
GDPR: the Steps Event Planners Need to FollowGDPR: the Steps Event Planners Need to Follow
GDPR: the Steps Event Planners Need to Follow
etouches
 
How the EU-GDPR May Affect Your Website
How the EU-GDPR May Affect Your WebsiteHow the EU-GDPR May Affect Your Website
How the EU-GDPR May Affect Your Website
SilverTech
 
My presentation- Ala about privacy and GDPR
My presentation- Ala about privacy and GDPRMy presentation- Ala about privacy and GDPR
My presentation- Ala about privacy and GDPR
zayadeen2003
 
The Countdown to the GDPR Regulations
The Countdown to the GDPR RegulationsThe Countdown to the GDPR Regulations
The Countdown to the GDPR Regulations
Elliot Reeman
 
Are you GDPR Ready? Checklist Whitepaper
Are you GDPR Ready? Checklist WhitepaperAre you GDPR Ready? Checklist Whitepaper
Are you GDPR Ready? Checklist Whitepaper
Serversys
 
GDPR: Time to Act
GDPR: Time to ActGDPR: Time to Act
GDPR: Time to Act
Cathy Gilmartin
 
GDPR Checklist Infographic
GDPR Checklist InfographicGDPR Checklist Infographic
GDPR Checklist Infographic
Connexica
 

Similar to GDPR Guide: The ICO's 12 Recommended Steps To Take Now (20)

GDPR Preparing for-the-gdpr-12-steps
GDPR Preparing for-the-gdpr-12-stepsGDPR Preparing for-the-gdpr-12-steps
GDPR Preparing for-the-gdpr-12-steps
 
ICO's Guide to Preparing for the GDPR
ICO's Guide to Preparing for the GDPRICO's Guide to Preparing for the GDPR
ICO's Guide to Preparing for the GDPR
 
GDPR 12 Steps infographic
GDPR 12 Steps infographic GDPR 12 Steps infographic
GDPR 12 Steps infographic
 
12 steps to prepare for GDPR
12 steps to prepare for GDPR12 steps to prepare for GDPR
12 steps to prepare for GDPR
 
The implications of gdpr for the solutions industry tatech 2018
The implications of gdpr for the solutions industry tatech 2018The implications of gdpr for the solutions industry tatech 2018
The implications of gdpr for the solutions industry tatech 2018
 
GDPR most actionable cheatsheet and checklist by cyberstratg
GDPR most actionable cheatsheet and checklist by cyberstratgGDPR most actionable cheatsheet and checklist by cyberstratg
GDPR most actionable cheatsheet and checklist by cyberstratg
 
GDPR Changing Mindset
GDPR Changing MindsetGDPR Changing Mindset
GDPR Changing Mindset
 
Horner Downey & Co Newsletter- GDPR
Horner Downey & Co Newsletter- GDPRHorner Downey & Co Newsletter- GDPR
Horner Downey & Co Newsletter- GDPR
 
GDPR - what you need to know
GDPR -  what you need to know GDPR -  what you need to know
GDPR - what you need to know
 
How will GDPR affect small businesses?
How will GDPR affect small businesses?How will GDPR affect small businesses?
How will GDPR affect small businesses?
 
A Brave New World Of Data Protection. Ready? Counting down to GDPR.
A Brave New World Of Data Protection. Ready? Counting down to GDPR. A Brave New World Of Data Protection. Ready? Counting down to GDPR.
A Brave New World Of Data Protection. Ready? Counting down to GDPR.
 
GDPRIBMWhitePaper
GDPRIBMWhitePaperGDPRIBMWhitePaper
GDPRIBMWhitePaper
 
Top 10 GDPR Requirements
Top 10 GDPR RequirementsTop 10 GDPR Requirements
Top 10 GDPR Requirements
 
GDPR: the Steps Event Planners Need to Follow
GDPR: the Steps Event Planners Need to FollowGDPR: the Steps Event Planners Need to Follow
GDPR: the Steps Event Planners Need to Follow
 
How the EU-GDPR May Affect Your Website
How the EU-GDPR May Affect Your WebsiteHow the EU-GDPR May Affect Your Website
How the EU-GDPR May Affect Your Website
 
My presentation- Ala about privacy and GDPR
My presentation- Ala about privacy and GDPRMy presentation- Ala about privacy and GDPR
My presentation- Ala about privacy and GDPR
 
The Countdown to the GDPR Regulations
The Countdown to the GDPR RegulationsThe Countdown to the GDPR Regulations
The Countdown to the GDPR Regulations
 
Are you GDPR Ready? Checklist Whitepaper
Are you GDPR Ready? Checklist WhitepaperAre you GDPR Ready? Checklist Whitepaper
Are you GDPR Ready? Checklist Whitepaper
 
GDPR: Time to Act
GDPR: Time to ActGDPR: Time to Act
GDPR: Time to Act
 
GDPR Checklist Infographic
GDPR Checklist InfographicGDPR Checklist Infographic
GDPR Checklist Infographic
 

More from HackerOne

Top 20 Public Bug Bounty Programs
Top 20 Public Bug Bounty ProgramsTop 20 Public Bug Bounty Programs
Top 20 Public Bug Bounty Programs
HackerOne
 
118 Hacker-Powered Facts From The 2018 Hacker-Powered Security Report
118 Hacker-Powered Facts From The 2018 Hacker-Powered Security Report118 Hacker-Powered Facts From The 2018 Hacker-Powered Security Report
118 Hacker-Powered Facts From The 2018 Hacker-Powered Security Report
HackerOne
 
Federal Trade Commission's Start With Security Guide
Federal Trade Commission's Start With Security GuideFederal Trade Commission's Start With Security Guide
Federal Trade Commission's Start With Security Guide
HackerOne
 
Understanding Information Security Assessment Types
Understanding Information Security Assessment TypesUnderstanding Information Security Assessment Types
Understanding Information Security Assessment Types
HackerOne
 
Everything you Need to Know about The Data Protection Officer Role
Everything you Need to Know about The Data Protection Officer Role Everything you Need to Know about The Data Protection Officer Role
Everything you Need to Know about The Data Protection Officer Role
HackerOne
 
The 2018 Hacker Report: Insights on the hacker mindset, who they are, and the...
The 2018 Hacker Report: Insights on the hacker mindset, who they are, and the...The 2018 Hacker Report: Insights on the hacker mindset, who they are, and the...
The 2018 Hacker Report: Insights on the hacker mindset, who they are, and the...
HackerOne
 
OWASP Top 10 - 2017
OWASP Top 10 - 2017OWASP Top 10 - 2017
OWASP Top 10 - 2017
HackerOne
 
9 Top Bug Bounty Programs
9 Top Bug Bounty Programs9 Top Bug Bounty Programs
9 Top Bug Bounty Programs
HackerOne
 
Voices of Vulnerability Disclosure Policy
Voices of Vulnerability Disclosure PolicyVoices of Vulnerability Disclosure Policy
Voices of Vulnerability Disclosure Policy
HackerOne
 
Why Executives Underinvest In Cybersecurity
Why Executives Underinvest In CybersecurityWhy Executives Underinvest In Cybersecurity
Why Executives Underinvest In Cybersecurity
HackerOne
 
Bug Bounties and The Path to Secure Software by 451 Research
Bug Bounties and The Path to Secure Software by 451 ResearchBug Bounties and The Path to Secure Software by 451 Research
Bug Bounties and The Path to Secure Software by 451 Research
HackerOne
 
Bug Bounty Basics
Bug Bounty BasicsBug Bounty Basics
Bug Bounty Basics
HackerOne
 
An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...
An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...
An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...
HackerOne
 
How GitLab and HackerOne help organizations innovate faster without compromis...
How GitLab and HackerOne help organizations innovate faster without compromis...How GitLab and HackerOne help organizations innovate faster without compromis...
How GitLab and HackerOne help organizations innovate faster without compromis...
HackerOne
 
HackerOne Presents in China - COO Ning Wang
HackerOne Presents in China - COO Ning WangHackerOne Presents in China - COO Ning Wang
HackerOne Presents in China - COO Ning Wang
HackerOne
 
Tapping Hackers for Continuous Security: That's Hacker-Powered Security
Tapping Hackers for Continuous Security: That's Hacker-Powered SecurityTapping Hackers for Continuous Security: That's Hacker-Powered Security
Tapping Hackers for Continuous Security: That's Hacker-Powered Security
HackerOne
 
Bounty Craft: Bug bounty reports how do they work, @sushihack presents at Nu...
Bounty Craft: Bug bounty reports  how do they work, @sushihack presents at Nu...Bounty Craft: Bug bounty reports  how do they work, @sushihack presents at Nu...
Bounty Craft: Bug bounty reports how do they work, @sushihack presents at Nu...
HackerOne
 
Meet the hackers powering the world's best bug bounty programs
Meet the hackers powering the world's best bug bounty programsMeet the hackers powering the world's best bug bounty programs
Meet the hackers powering the world's best bug bounty programs
HackerOne
 

More from HackerOne (18)

Top 20 Public Bug Bounty Programs
Top 20 Public Bug Bounty ProgramsTop 20 Public Bug Bounty Programs
Top 20 Public Bug Bounty Programs
 
118 Hacker-Powered Facts From The 2018 Hacker-Powered Security Report
118 Hacker-Powered Facts From The 2018 Hacker-Powered Security Report118 Hacker-Powered Facts From The 2018 Hacker-Powered Security Report
118 Hacker-Powered Facts From The 2018 Hacker-Powered Security Report
 
Federal Trade Commission's Start With Security Guide
Federal Trade Commission's Start With Security GuideFederal Trade Commission's Start With Security Guide
Federal Trade Commission's Start With Security Guide
 
Understanding Information Security Assessment Types
Understanding Information Security Assessment TypesUnderstanding Information Security Assessment Types
Understanding Information Security Assessment Types
 
Everything you Need to Know about The Data Protection Officer Role
Everything you Need to Know about The Data Protection Officer Role Everything you Need to Know about The Data Protection Officer Role
Everything you Need to Know about The Data Protection Officer Role
 
The 2018 Hacker Report: Insights on the hacker mindset, who they are, and the...
The 2018 Hacker Report: Insights on the hacker mindset, who they are, and the...The 2018 Hacker Report: Insights on the hacker mindset, who they are, and the...
The 2018 Hacker Report: Insights on the hacker mindset, who they are, and the...
 
OWASP Top 10 - 2017
OWASP Top 10 - 2017OWASP Top 10 - 2017
OWASP Top 10 - 2017
 
9 Top Bug Bounty Programs
9 Top Bug Bounty Programs9 Top Bug Bounty Programs
9 Top Bug Bounty Programs
 
Voices of Vulnerability Disclosure Policy
Voices of Vulnerability Disclosure PolicyVoices of Vulnerability Disclosure Policy
Voices of Vulnerability Disclosure Policy
 
Why Executives Underinvest In Cybersecurity
Why Executives Underinvest In CybersecurityWhy Executives Underinvest In Cybersecurity
Why Executives Underinvest In Cybersecurity
 
Bug Bounties and The Path to Secure Software by 451 Research
Bug Bounties and The Path to Secure Software by 451 ResearchBug Bounties and The Path to Secure Software by 451 Research
Bug Bounties and The Path to Secure Software by 451 Research
 
Bug Bounty Basics
Bug Bounty BasicsBug Bounty Basics
Bug Bounty Basics
 
An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...
An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...
An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...
 
How GitLab and HackerOne help organizations innovate faster without compromis...
How GitLab and HackerOne help organizations innovate faster without compromis...How GitLab and HackerOne help organizations innovate faster without compromis...
How GitLab and HackerOne help organizations innovate faster without compromis...
 
HackerOne Presents in China - COO Ning Wang
HackerOne Presents in China - COO Ning WangHackerOne Presents in China - COO Ning Wang
HackerOne Presents in China - COO Ning Wang
 
Tapping Hackers for Continuous Security: That's Hacker-Powered Security
Tapping Hackers for Continuous Security: That's Hacker-Powered SecurityTapping Hackers for Continuous Security: That's Hacker-Powered Security
Tapping Hackers for Continuous Security: That's Hacker-Powered Security
 
Bounty Craft: Bug bounty reports how do they work, @sushihack presents at Nu...
Bounty Craft: Bug bounty reports  how do they work, @sushihack presents at Nu...Bounty Craft: Bug bounty reports  how do they work, @sushihack presents at Nu...
Bounty Craft: Bug bounty reports how do they work, @sushihack presents at Nu...
 
Meet the hackers powering the world's best bug bounty programs
Meet the hackers powering the world's best bug bounty programsMeet the hackers powering the world's best bug bounty programs
Meet the hackers powering the world's best bug bounty programs
 

Recently uploaded

PPT Item # 7 - BB Inspection Services Agmt
PPT Item # 7 - BB Inspection Services AgmtPPT Item # 7 - BB Inspection Services Agmt
PPT Item # 7 - BB Inspection Services Agmt
ahcitycouncil
 
PPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933FPPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933F
ahcitycouncil
 
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Congressional Budget Office
 
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
ehbuaw
 
Understanding the Challenges of Street Children
Understanding the Challenges of Street ChildrenUnderstanding the Challenges of Street Children
Understanding the Challenges of Street Children
SERUDS INDIA
 
NHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdfNHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdf
AjayVejendla3
 
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
evkovas
 
Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200
GrantManagementInsti
 
The Role of a Process Server in real estate
The Role of a Process Server in real estateThe Role of a Process Server in real estate
The Role of a Process Server in real estate
oklahomajudicialproc1
 
ZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdfZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdf
Saeed Al Dhaheri
 
PPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930FPPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930F
ahcitycouncil
 
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
850fcj96
 
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
ehbuaw
 
Get Government Grants and Assistance Program
Get Government Grants and Assistance ProgramGet Government Grants and Assistance Program
Get Government Grants and Assistance Program
Get Government Grants
 
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
850fcj96
 
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptxPD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
RIDPRO11
 
Many ways to support street children.pptx
Many ways to support street children.pptxMany ways to support street children.pptx
Many ways to support street children.pptx
SERUDS INDIA
 
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptxMHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
ILC- UK
 
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
ehbuaw
 
PPT Item # 8 - Tuxedo Columbine 3way Stop
PPT Item # 8 - Tuxedo Columbine 3way StopPPT Item # 8 - Tuxedo Columbine 3way Stop
PPT Item # 8 - Tuxedo Columbine 3way Stop
ahcitycouncil
 

Recently uploaded (20)

PPT Item # 7 - BB Inspection Services Agmt
PPT Item # 7 - BB Inspection Services AgmtPPT Item # 7 - BB Inspection Services Agmt
PPT Item # 7 - BB Inspection Services Agmt
 
PPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933FPPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933F
 
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
 
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
 
Understanding the Challenges of Street Children
Understanding the Challenges of Street ChildrenUnderstanding the Challenges of Street Children
Understanding the Challenges of Street Children
 
NHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdfNHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdf
 
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
 
Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200
 
The Role of a Process Server in real estate
The Role of a Process Server in real estateThe Role of a Process Server in real estate
The Role of a Process Server in real estate
 
ZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdfZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdf
 
PPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930FPPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930F
 
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
 
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
 
Get Government Grants and Assistance Program
Get Government Grants and Assistance ProgramGet Government Grants and Assistance Program
Get Government Grants and Assistance Program
 
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
 
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptxPD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
 
Many ways to support street children.pptx
Many ways to support street children.pptxMany ways to support street children.pptx
Many ways to support street children.pptx
 
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptxMHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
 
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
 
PPT Item # 8 - Tuxedo Columbine 3way Stop
PPT Item # 8 - Tuxedo Columbine 3way StopPPT Item # 8 - Tuxedo Columbine 3way Stop
PPT Item # 8 - Tuxedo Columbine 3way Stop
 

GDPR Guide: The ICO's 12 Recommended Steps To Take Now

  • 1. GDPR GUIDE: 12 STEPS TO TAKE NOW Recommendations from The United Kingdom’s Information Commissioner’s Office (ICO) to Prepare for May 2018
  • 2. When the European General Data Protection Regulation (GDPR) takes effect on May 25, 2018, every organization that collects information on European Union (EU) citizens will be forced to change how it manages and secures customer data. Hopefully you’re already taking steps to ensure GDPR compliance, which includes facilitating better data access, security, and management. This could impact your organization well beyond just your development team, so getting a head start on compliance is a good idea. In the remaining time before GDPR takes effect, the United Kingdom’s Information Commissioner’s Office suggested “12 steps to take now” to get ahead of GDPR’s impact on your operations and processes. Here’s a quick recap. GDPR is Fast Approaching
  • 4. GDPR will impact your business in many ways, so make sure every decision-maker starts to consider how GDPR affects their department. That means elevating security to the board level, explaining what’s required for compliance, and making it a recurring topic. It’s important to stress to others in your organization that GDPR isn’t just a data security burden. The rules will influence how your product, communications, legal, and other teams approach security. In bigger and more complex organizations, GDPR could even force significant resource reallocations in order to have people focused on mitigating risks, reacting to data requests, or ensuring compliance. With a $20 million or more in potential fines, this is your opportunity to make security a boardroom topic. Building Internal Awareness1
  • 6. GDPR focuses on user data, user access to their data, and your treatment of the data. To fully comply, you need to understand what data you currently have, where it comes from, what you do with it, where it’s stored, and who you share it with. Depending on your data processes, this might be a significant, audit-like undertaking. Next year, if you’re compelled to take a GDPR-related action, such as deleting a user’s data, you have to take that action along the entire process. If you don’t have a detailed map of your data flow, you won’t be able to comply. As you audit your data processes, document what you find and keep detailed records. GDPR’s rules force you to prove compliance, which means having documented policies and procedures in place. Documenting Your Data2
  • 8. GDPR requires that specific privacy and data information be publicly accessible. This includes details around data retention periods and users’ right to file complaints. These new statements should be in your privacy policy, so it may need an update. That means reviewing your current policy against GDPR to identify gaps and potential conflicts. Next, you’ll need to have your security, communications, and legal teams to determine what needs to be changed, added, or deleted. Since this may take some time, best to get started early. Review Your Privacy Policy3
  • 10. GDPR affords users many rights, such as access to their data, deletion of data, and more. Unless you already offer avenues to manage many of these requests, you’ll need to think about the processes, staff, and systems to put in place. Think about what would be involved. How will users make a request? Who will manage and respond to requests? How will you identify a particular user’s data? How will you delete it, from where, and who will do it? If a user requests their own data, in what form will it be transferred to them? These types of requests will come up and GDPR only allows 30 days to comply. Asking the questions now will save both time and resources later. Define How You’ll Facilitate Users’ Rights4
  • 12. This is an extension of the previous step. You’ll need a mechanism for individuals to make requests regarding their data, and if you have many users, it may become overwhelming. What’s more, you’ll only have 30 days to comply or to explain your refusal. That’s not enough time to figure out your process on the fly, so get it defined now. Also consider how you might handle a large volume of requests. If your process is to have an individual or small team managing requests, what happens when they’re out sick or can’t support dozens or thousands of simultaneous requests? Think about the nuts and bolts as well. How will individuals submit requests (and how will they know how to submit requests)? How will you communicate with individuals? How will you comply with the 30 day requirement, and who will track the duration of each request? Define Your Data Request Process5
  • 14. GDPR requires that you state the reasons for collecting data, then document it and explain it to your users. It further provides just 6 situations where lawful data processing is allowed, such as the user has given consent and processing is necessary for performance of a contract. Beyond defining why you’re collecting data, you’ll need to allow review of your data processing activities, and if requested, explain why you do it and why you believe it’s lawful. Once again, your legal team will probably get involved, so acting now gives them ample time to prepare. Explain Why You’re Collecting the Data We’re only halfway through, but the recurring theme here is that GDPR requires accountability, so be sure to document everything. 6
  • 16. A major consideration of GDPR is the consent you gain from users before you collect or process data. But more than just gaining consent, GDPR’s rules might impact how you seek, record, and manage that consent. What’s important about how you treat consent is that it cannot be implied, inferred, or even gained via pre-selected check boxes. It must also be informed consent, and the language has to be unambiguous. The opt-in must be positive and separate from that of other terms and conditions. Furthermore, if past consents don’t comply with GDPR, you need to refresh the consent to meet the standard. How you currently gain consent may need to change. Determine How You Gain Consent7
  • 18. GDPR has two special statements directly concerning children and the protection of their data. You may need to verify ages and potentially gain parental consent for data processing if children accessing your systems are under age 16. Adding complexity, individual EU member states can enforce GDPR’s rules to children as young as 13. What might take additional effort is GDPR’s rule that any attempt to gain a child’s consent has to be in a “concise, transparent, intelligible and easily accessible form, using clear and plain language,” which implies that it must be written in language a child would understand. If you do collect data from children, you’ll also need to determine how you’ll gain their parental or guardian consent. GDPR further requires that consent to be verifiable, so an audit trail is important. Children Have Special Considerations8
  • 19. Define How You React to Data Breaches 9
  • 20. GDPR compels you to notify organizations or individuals in event of a breach that concerns their data. Procedures should be in place to ensure you’re also working to detect and prevent those data breaches. Documentation is clearly a major part of GDPR, and you’ll need time to prepare the documentation that supports your breach response process. This step might also force you to look deeply into what types of data you hold, then highlight when and where breaches would compel you to notify the appropriate authorities. Define How You React to Data Breaches9
  • 21. Prepare for Data Protection Impact Assessments 10
  • 22. GDPR requires “data protection by design and default”, meaning you have to document how you design data protection into your overall organization. You’ll further need to run data protection impact assessments when certain situations occur, such as deploying a new technology. Again, since these assessments could ripple throughout your organization, it’s another reason to raise GDPR to the board level so everyone understands the importance of any new workload. For now, determine the situations where you would be required to run an impact assessment and how you would facilitate it. Prepare for Data Protection Impact Assessments10
  • 24. Someone needs to be responsible for complying with GDPR, and that’s your Data Protection Officer, or DPO. It’s a role to be taken seriously, since they DPO is required to have both the knowledge to understand their role as well as the authority to carry it out. GDPR specifically states that “the data protection officer shall be designated on the basis of professional qualities and, in particular, expert knowledge of data protection law and practices and the ability to fulfil the tasks” related to their role. In other words, it’s not a light responsibility to add to someone’s job description. Furthermore, GDPR requires organizations provide DPOs with the “resources necessary to carry out those tasks and access to personal data and processing operations, and to maintain his or her expert knowledge.” And, also, “the data protection officer shall directly report to the highest management level of the controller or the processor.” Those details imply another level of expertise and authority that might impact your choice for DPO. Designate a Data Protection Officer11
  • 26. If you operate in more than one EU member state, you’ll need to determine your one “lead authority”. It will generally be the member state where your EU “main establishment” is located. Or it could be the member state where you make the decisions about data processing. This might be an easy decision, or it may require you to map out your EU organization, where decisions are made, and how data is processed and stored. Determine Your Supervisory Authority12
  • 28. As GDPR looks to update and consolidate data regulations across the EU, many questions still remain. If you collect data on EU citizens, you’re bound by these rules and it’s imperative you understand how your data, security, development, and other practices and people will be affected by these new rules. Here are two additional items to consider: ○ Our recent blog post, Ready or Not, Here Comes GDPR, offers additional insights into how GDPR might impact your business, specifically your security team. ○ GDPR requires you to look for, prevent, and investigate breaches. A great first step is to define a process for white-hat hackers to alert you when they find vulnerabilities in your applications. It’s called a Vulnerability Disclosure Policy (VDP), and here’s a quick guide to help you create and publish your own disclosure policy following industry best-practices. More to Think About