SlideShare a Scribd company logo
1 of 1
Download to read offline
DPO ROLES
INFORM & ADVISE
organizations on data protection
MONITOR
data management and processing
ASSESS
the impact of protection and level of risk
NOTIFY
data subjects of breaches
COOPERATE
with supervisory authority
DATA PROTECTION PRINCIPLES
FULL
FUNCTIONALITY
Processes and technologies
serve only their pre-defined
purpose and will not deviate
EMBEDDED
Security measurements
are embedded in the
design of the data
handling process
VISIBILITY
All data handling activities
and processes are visible
and accountable
RESPECT
All acts executed during
the data handling process
are in respect for the data
subjects’ privacy
PROACTIVE
Immediate response
capability and
implementation of
preventative tools
END-TO-END
Security measurements
needs to cover the
entirety of the data
handling process
DEFAULT
Deviation from prior
agreements between data
subjects and other data
entities is forbidden
01
02
03
04
05
06
07
GENERAL DATA PROTECTION REGULATION
BALABIT HELPS TO COMPLY
PROTECT CONTROL UNIFY SIMPLIFY
The goals of the GDPR
the duties and
responsibilities of
controllers and
processors
the means of
data collection
and processing
EU citizens’
personal data
is provided to data
subjects over their
processed data
PERSONAL DATA HANDLING PROCESS
1. COLLECTION
2. ENCRYPTION AND STORAGE
3. FORWARDING
4. PROCESSING
DATA SUBJECT DATA CONTROLLER DATA PROCESSOR
WITH THE GDPR'S SHIFT IN POLICY, DATA SUBJECTS
WILL HAVE MORE CONTROL OVER THEIR PERSONAL DATA
 THE GDPR DEFINES PERSONAL DATA AS INFORMATION
THAT IS BOTH DIRECTLY AND INDIRECTLY RELATABLE TO A DATA SUBJECT
THE GDPR EMPHASIZES THE HANDLING OF PERSONAL DATA,
AND FOCUSES ON DESIGNS THAT CENTER AROUND DATA SUBJECTS
The right to data correction
Tighter consent requisitions
The right to be forgotten
Chance for data portability
Notification on data endangerment
Privacy by default measures
THE RIGHTS OF
THE DATA SUBJECTS
Accountability for violations and breaches
Harsh sanctions for not complying
Embedded security measures
Transparency of data flow
Full functionality of data handling
Guaranteed end-to-end security
THE RESPONSIBILITIES OF THE DATA
CONTROLLERS AND PROCESSORS
RIGHTS & RESPONSIBILITIES
 ALL TECHNOLOGY AND SECURITY REQUIREMENTS LISTED IN THE GDPR ORIGINATE
FROM THE PRIVACY AND DATA PROTECTION BY DESIGN REPORT CREATED BY
THE EUROPEAN UNION AGENCY FOR NETWORK AND INFORMATION SECURITY (ENISA)
Hide
Separate
Minimize
Aggregate
Enforce
Demonstrate
Control
Inform
DATA
PROTECTION
STRATEGIES
Restrict the processed
amount of personal data to
the necessary minimum.
Data subjects should be
provided an agency over
the processing of their
personal data.
Any personal data, and
their interrelationships,
should be hidden
from plain view.
personal data should be
stored in a distributed
fashion with separated
components.
Data should be processed
at large quantities in
centralized areas.
A privacy policy should
be in place and
enforced.
Controllers and
processors are able to
demonstrate compliance
and security incidents.
Data subjects should be
informed when personal data
is processed or endangered.
YOU NEED TWO DISTINCT APPROACHES TO PROTECT
THE PERSONAL DATA OF YOUR DATA SUBJECTS
Shell Control Box
A log management system that safeguards log
information during collection, transfer and
storage. Capable to handling mass volumes of
information and forwarding them to
designated endpoints.
syslog-ng
www.balabit.com
ORGANIZATIONS MUST PROTECT DATA ACCORDING TO THE LEVEL OF RISKS,
AND CANNOT ALLOW DATA PROTECTION TO BE AN AFTERTHOUGHT
IN THE INFRASTRUCTURE DESIGN
TO GUARANTEE THE INTEGRITY OF PERSONAL DATA, AND TO PREVENT
ANY VIOLATION OF THE GDPR OBLIGATIONS, ALL ORGANIZATIONS
MUST HAVE A DATA PROTECTION OFFICER AS A MEANS OF SUPERVISION
A privileged user monitoring tool that allows
DPOs to supervise all processes executed
against personal data. The ability to manage all
access points and monitor activities that could
violate the GDPR obligations. Providing review
and reporting capability on all events.
BALABIT
SOLUTION
Access
management
Restrict the access to
personal data
Real-time
monitoring
Against policy violations and
enforcing compliance
Audit trails
For data breach
investigation and for
notifying relevant parties
Reporting
Demonstration capability
to authorities for review
and forensics
Filtering
and parsing
Keeping visible information
at a necessary minimum
Encryption and
anonymization
Secured format of personal
data elements
Pseudonymization
Separation of personal and
processable elements of
data
Centralization
Collection of data in an
aggregated format
Privileged Access Monitoring Log Management
BY 2018 ALL AND ANY ORGANIZATION THAT COLLECTS
OR PROCESSES PERSONAL DATA OF EU CITIZENS MUST
BE COMPLIANT WITH THE REQUIREMENTS STATED IN
THE GDPR.
GDPR DEADLINE
2018

More Related Content

Similar to GDPR infographic

DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptxTranVu383073
 
CISSP Certification-Asset Security
CISSP Certification-Asset SecurityCISSP Certification-Asset Security
CISSP Certification-Asset SecurityHamed Moghaddam
 
WHAT_IS_DATA_SECURITY_-_TYPES_STRATEGY_COMPLIANCE_AND_REGULATIONS.pdf
WHAT_IS_DATA_SECURITY_-_TYPES_STRATEGY_COMPLIANCE_AND_REGULATIONS.pdfWHAT_IS_DATA_SECURITY_-_TYPES_STRATEGY_COMPLIANCE_AND_REGULATIONS.pdf
WHAT_IS_DATA_SECURITY_-_TYPES_STRATEGY_COMPLIANCE_AND_REGULATIONS.pdfSprintzeal
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET Journal
 
Microsoft Azure Information Protection
Microsoft Azure Information Protection Microsoft Azure Information Protection
Microsoft Azure Information Protection Syed Sabhi Haider
 
Chapter 6 Security of Information and Cyber Security(FASS)
Chapter 6 Security of Information and Cyber Security(FASS)Chapter 6 Security of Information and Cyber Security(FASS)
Chapter 6 Security of Information and Cyber Security(FASS)Md Shaifullar Rabbi
 
Setting the right GDPR priorities
Setting the right GDPR prioritiesSetting the right GDPR priorities
Setting the right GDPR prioritiesAlberto Canadè
 
01-introductiontosecurity-111122004432-phpapp02.pdf
01-introductiontosecurity-111122004432-phpapp02.pdf01-introductiontosecurity-111122004432-phpapp02.pdf
01-introductiontosecurity-111122004432-phpapp02.pdfRiyaSonawane
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessSirius
 
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec
 

Similar to GDPR infographic (20)

DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptx
 
CISSP Certification-Asset Security
CISSP Certification-Asset SecurityCISSP Certification-Asset Security
CISSP Certification-Asset Security
 
WHAT_IS_DATA_SECURITY_-_TYPES_STRATEGY_COMPLIANCE_AND_REGULATIONS.pdf
WHAT_IS_DATA_SECURITY_-_TYPES_STRATEGY_COMPLIANCE_AND_REGULATIONS.pdfWHAT_IS_DATA_SECURITY_-_TYPES_STRATEGY_COMPLIANCE_AND_REGULATIONS.pdf
WHAT_IS_DATA_SECURITY_-_TYPES_STRATEGY_COMPLIANCE_AND_REGULATIONS.pdf
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Gdpr brief and controls ver2.0
Gdpr brief and controls ver2.0Gdpr brief and controls ver2.0
Gdpr brief and controls ver2.0
 
Microsoft 365 Compliance
Microsoft 365 ComplianceMicrosoft 365 Compliance
Microsoft 365 Compliance
 
Unit 5 v2
Unit 5 v2Unit 5 v2
Unit 5 v2
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
 
Data security
Data securityData security
Data security
 
Microsoft Azure Information Protection
Microsoft Azure Information Protection Microsoft Azure Information Protection
Microsoft Azure Information Protection
 
Chapter 6 Security of Information and Cyber Security(FASS)
Chapter 6 Security of Information and Cyber Security(FASS)Chapter 6 Security of Information and Cyber Security(FASS)
Chapter 6 Security of Information and Cyber Security(FASS)
 
Setting the right GDPR priorities
Setting the right GDPR prioritiesSetting the right GDPR priorities
Setting the right GDPR priorities
 
GDPR infographic
GDPR infographicGDPR infographic
GDPR infographic
 
Data Security
Data SecurityData Security
Data Security
 
Privacy (1).pptx
Privacy (1).pptxPrivacy (1).pptx
Privacy (1).pptx
 
01-introductiontosecurity-111122004432-phpapp02.pdf
01-introductiontosecurity-111122004432-phpapp02.pdf01-introductiontosecurity-111122004432-phpapp02.pdf
01-introductiontosecurity-111122004432-phpapp02.pdf
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
 
GDPR How to get started?
GDPR  How to get started?GDPR  How to get started?
GDPR How to get started?
 
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
 
Encrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdfEncrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdf
 

Recently uploaded

VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...SUHANI PANDEY
 
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxxIncident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxxPeter Miles
 
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...tanu pandey
 
2024 Zoom Reinstein Legacy Asbestos Webinar
2024 Zoom Reinstein Legacy Asbestos Webinar2024 Zoom Reinstein Legacy Asbestos Webinar
2024 Zoom Reinstein Legacy Asbestos WebinarLinda Reinstein
 
Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'NAP Global Network
 
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Postal Ballots-For home voting step by step process 2024.pptx
Postal Ballots-For home voting step by step process 2024.pptxPostal Ballots-For home voting step by step process 2024.pptx
Postal Ballots-For home voting step by step process 2024.pptxSwastiRanjanNayak
 
Booking open Available Pune Call Girls Shukrawar Peth 6297143586 Call Hot In...
Booking open Available Pune Call Girls Shukrawar Peth  6297143586 Call Hot In...Booking open Available Pune Call Girls Shukrawar Peth  6297143586 Call Hot In...
Booking open Available Pune Call Girls Shukrawar Peth 6297143586 Call Hot In...tanu pandey
 
2024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 302024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 30JSchaus & Associates
 
Finance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCCFinance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCCNAP Global Network
 
celebrity 💋 Agra Escorts Just Dail 8250092165 service available anytime 24 hour
celebrity 💋 Agra Escorts Just Dail 8250092165 service available anytime 24 hourcelebrity 💋 Agra Escorts Just Dail 8250092165 service available anytime 24 hour
celebrity 💋 Agra Escorts Just Dail 8250092165 service available anytime 24 hourCall Girls in Nagpur High Profile
 
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'IsraëlAntisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'IsraëlEdouardHusson
 
Item # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdfItem # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdfahcitycouncil
 
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation -  Humble BeginningsZechariah Boodey Farmstead Collaborative presentation -  Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginningsinfo695895
 
Call On 6297143586 Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
Call On 6297143586  Viman Nagar Call Girls In All Pune 24/7 Provide Call With...Call On 6297143586  Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
Call On 6297143586 Viman Nagar Call Girls In All Pune 24/7 Provide Call With...tanu pandey
 
CBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related TopicsCBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related TopicsCongressional Budget Office
 
TEST BANK For Essentials of Negotiation, 7th Edition by Roy Lewicki, Bruce Ba...
TEST BANK For Essentials of Negotiation, 7th Edition by Roy Lewicki, Bruce Ba...TEST BANK For Essentials of Negotiation, 7th Edition by Roy Lewicki, Bruce Ba...
TEST BANK For Essentials of Negotiation, 7th Edition by Roy Lewicki, Bruce Ba...robinsonayot
 
The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...nservice241
 

Recently uploaded (20)

VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...
 
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxxIncident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
 
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
 
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
2024 Zoom Reinstein Legacy Asbestos Webinar
2024 Zoom Reinstein Legacy Asbestos Webinar2024 Zoom Reinstein Legacy Asbestos Webinar
2024 Zoom Reinstein Legacy Asbestos Webinar
 
Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'
 
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
 
Postal Ballots-For home voting step by step process 2024.pptx
Postal Ballots-For home voting step by step process 2024.pptxPostal Ballots-For home voting step by step process 2024.pptx
Postal Ballots-For home voting step by step process 2024.pptx
 
Booking open Available Pune Call Girls Shukrawar Peth 6297143586 Call Hot In...
Booking open Available Pune Call Girls Shukrawar Peth  6297143586 Call Hot In...Booking open Available Pune Call Girls Shukrawar Peth  6297143586 Call Hot In...
Booking open Available Pune Call Girls Shukrawar Peth 6297143586 Call Hot In...
 
2024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 302024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 30
 
Finance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCCFinance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCC
 
(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7
(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7
(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7
 
celebrity 💋 Agra Escorts Just Dail 8250092165 service available anytime 24 hour
celebrity 💋 Agra Escorts Just Dail 8250092165 service available anytime 24 hourcelebrity 💋 Agra Escorts Just Dail 8250092165 service available anytime 24 hour
celebrity 💋 Agra Escorts Just Dail 8250092165 service available anytime 24 hour
 
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'IsraëlAntisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
 
Item # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdfItem # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdf
 
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation -  Humble BeginningsZechariah Boodey Farmstead Collaborative presentation -  Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
 
Call On 6297143586 Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
Call On 6297143586  Viman Nagar Call Girls In All Pune 24/7 Provide Call With...Call On 6297143586  Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
Call On 6297143586 Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
 
CBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related TopicsCBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related Topics
 
TEST BANK For Essentials of Negotiation, 7th Edition by Roy Lewicki, Bruce Ba...
TEST BANK For Essentials of Negotiation, 7th Edition by Roy Lewicki, Bruce Ba...TEST BANK For Essentials of Negotiation, 7th Edition by Roy Lewicki, Bruce Ba...
TEST BANK For Essentials of Negotiation, 7th Edition by Roy Lewicki, Bruce Ba...
 
The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...
 

GDPR infographic

  • 1. DPO ROLES INFORM & ADVISE organizations on data protection MONITOR data management and processing ASSESS the impact of protection and level of risk NOTIFY data subjects of breaches COOPERATE with supervisory authority DATA PROTECTION PRINCIPLES FULL FUNCTIONALITY Processes and technologies serve only their pre-defined purpose and will not deviate EMBEDDED Security measurements are embedded in the design of the data handling process VISIBILITY All data handling activities and processes are visible and accountable RESPECT All acts executed during the data handling process are in respect for the data subjects’ privacy PROACTIVE Immediate response capability and implementation of preventative tools END-TO-END Security measurements needs to cover the entirety of the data handling process DEFAULT Deviation from prior agreements between data subjects and other data entities is forbidden 01 02 03 04 05 06 07 GENERAL DATA PROTECTION REGULATION BALABIT HELPS TO COMPLY PROTECT CONTROL UNIFY SIMPLIFY The goals of the GDPR the duties and responsibilities of controllers and processors the means of data collection and processing EU citizens’ personal data is provided to data subjects over their processed data PERSONAL DATA HANDLING PROCESS 1. COLLECTION 2. ENCRYPTION AND STORAGE 3. FORWARDING 4. PROCESSING DATA SUBJECT DATA CONTROLLER DATA PROCESSOR WITH THE GDPR'S SHIFT IN POLICY, DATA SUBJECTS WILL HAVE MORE CONTROL OVER THEIR PERSONAL DATA  THE GDPR DEFINES PERSONAL DATA AS INFORMATION THAT IS BOTH DIRECTLY AND INDIRECTLY RELATABLE TO A DATA SUBJECT THE GDPR EMPHASIZES THE HANDLING OF PERSONAL DATA, AND FOCUSES ON DESIGNS THAT CENTER AROUND DATA SUBJECTS The right to data correction Tighter consent requisitions The right to be forgotten Chance for data portability Notification on data endangerment Privacy by default measures THE RIGHTS OF THE DATA SUBJECTS Accountability for violations and breaches Harsh sanctions for not complying Embedded security measures Transparency of data flow Full functionality of data handling Guaranteed end-to-end security THE RESPONSIBILITIES OF THE DATA CONTROLLERS AND PROCESSORS RIGHTS & RESPONSIBILITIES  ALL TECHNOLOGY AND SECURITY REQUIREMENTS LISTED IN THE GDPR ORIGINATE FROM THE PRIVACY AND DATA PROTECTION BY DESIGN REPORT CREATED BY THE EUROPEAN UNION AGENCY FOR NETWORK AND INFORMATION SECURITY (ENISA) Hide Separate Minimize Aggregate Enforce Demonstrate Control Inform DATA PROTECTION STRATEGIES Restrict the processed amount of personal data to the necessary minimum. Data subjects should be provided an agency over the processing of their personal data. Any personal data, and their interrelationships, should be hidden from plain view. personal data should be stored in a distributed fashion with separated components. Data should be processed at large quantities in centralized areas. A privacy policy should be in place and enforced. Controllers and processors are able to demonstrate compliance and security incidents. Data subjects should be informed when personal data is processed or endangered. YOU NEED TWO DISTINCT APPROACHES TO PROTECT THE PERSONAL DATA OF YOUR DATA SUBJECTS Shell Control Box A log management system that safeguards log information during collection, transfer and storage. Capable to handling mass volumes of information and forwarding them to designated endpoints. syslog-ng www.balabit.com ORGANIZATIONS MUST PROTECT DATA ACCORDING TO THE LEVEL OF RISKS, AND CANNOT ALLOW DATA PROTECTION TO BE AN AFTERTHOUGHT IN THE INFRASTRUCTURE DESIGN TO GUARANTEE THE INTEGRITY OF PERSONAL DATA, AND TO PREVENT ANY VIOLATION OF THE GDPR OBLIGATIONS, ALL ORGANIZATIONS MUST HAVE A DATA PROTECTION OFFICER AS A MEANS OF SUPERVISION A privileged user monitoring tool that allows DPOs to supervise all processes executed against personal data. The ability to manage all access points and monitor activities that could violate the GDPR obligations. Providing review and reporting capability on all events. BALABIT SOLUTION Access management Restrict the access to personal data Real-time monitoring Against policy violations and enforcing compliance Audit trails For data breach investigation and for notifying relevant parties Reporting Demonstration capability to authorities for review and forensics Filtering and parsing Keeping visible information at a necessary minimum Encryption and anonymization Secured format of personal data elements Pseudonymization Separation of personal and processable elements of data Centralization Collection of data in an aggregated format Privileged Access Monitoring Log Management BY 2018 ALL AND ANY ORGANIZATION THAT COLLECTS OR PROCESSES PERSONAL DATA OF EU CITIZENS MUST BE COMPLIANT WITH THE REQUIREMENTS STATED IN THE GDPR. GDPR DEADLINE 2018