SlideShare a Scribd company logo
GENERAL DATA
PROTECTION
REGULATION (GDPR)
What does GDPR want?
■ Protection of personal data and
privacy of EU citizens
■ Restriction on export of
personal data outside the EU
Areas protected by GDPR.
When?
■ The regulation was adopted on 27 April, 2016
■ Companies must be able to show compliance by 25 May, 2018
What data does GDPR protect?
■ Personally identifiable information (PII) is any data that can
be used to identify a specific individual, such as:
■ Basic identity information – name, address and ID numbers, and
email addresses
■ Web data – location, IP address, cookie data, RFID tags, login IDs,
social media posts, or digital images, geolocation, biometric, and
behavioral data
■ Health and genetic data
■ Biometric data
■ Racial or ethnic data
■ Political opinions
■ Sexual orientation
The rights of a data subject
Any resident of EU can demand the following:
■ Right to access – find out what information about him or her you
hold, where did it come from, when it was used and who all used
it.
■ Right to be forgotten – ask for all records – and all traces of
him/her be removed. This applies when:
■ The personal data is no longer necessary in relation to the purpose for
which it was collected
■ The individual specifically withdraws consent to processing
■ Personal data has been unlawfully processed
■ The data must be erased in order for a controller to comply with legal
obligations (for example, the deletion of certain data after a set period
of time)
GDPR – algorithms and analytics
■ GDPR will have a significant effect on data capture by
algorithms or for the purpose of analytics
■ In order to use personal data:
■ Data controllers and processors must implement new technical
measures to ‘pseudonymise’ data to reduce the risk of
unauthorized re-identification
■ Data Protection by Default requires data protection to be applied
at the earliest opportunity and requires that steps be affirmatively
taken to make use of personal data
GDPR and automated decision making
■ Article 22 of the regulation
restricts the use of intelligent
algorithms in decision making
and profiling of individuals
■ E.g. Bail, immigration, etc.
Who will be responsible for compliance?
■ Data Controller – is the
user/consumer of the personal data
– a company that wants to act on it
■ Data Processors – the company or
an outsourced partner – who seeks
and works on the data – as a service
provider to the Data Controller
■ Data Protection Officer – an
appointed officer responsible for
responding to all queries and
insuring compliance. Could be an
internal officer or an external
consultant
Which companies does this apply to?
Any company that stores or processes personal information
about EU citizens within EU states that has:
■ A presence in an EU country
■ No presence in the EU, but it processes personal data of
EU residents
■ More than 250 employees
■ Fewer than 250 employees but its data-processing
impacts the rights and freedoms of data subjects.
Information companies must provide
■ Article 13 of the regulation tells us the information to give:
■ Details about the data controller
■ Contact details about the controller’s Data Protection Officer, such as a
generic email address dataprotection@company.com
■ What processing is done and the legal basis for doing it
■ Who data will be passed on to
■ How data is protected if it is passed or stored outside the EU
■ How long data is retained
■ How to exercise the right to have data erased, probably through a
generic email address such as dataprotection@company.com.
■ A ‘self-service’ area on a website for individuals to maintain the personal
data they have provided
The internet is notorious for providing all kinds of personal data in this day and
age. Rampant use of which, makes it difficult to safeguard this very data.
What if you are not GDPR compliant?
■ Steep penalties of up to €20 million or 4 percent of
global annual turnover, whichever is higher, for non-
compliance
6 steps to GDPR
1 – Understand the GDPR legal framework
2 – Create a Data Register, a GDPR diary to maintain proof of the
companies GDPR process
3 – Classify data that can directly or indirectly identify an
EU citizen, then determine its relevance
4 – Privacy and Data Protection Impact
Assessment of policies by evaluating data life
cycles from origination to destruction points
5 – Assess and document additional
risks and processes
6 – Revise and repeat
GDPR and data capture
■ Each time you request data, consent is required, especially, if the data is
being processed for different purposes
■ A single consent does not cover all instances of data capture
■ Businesses will no longer be able to rely on opt-out processes or implicit
consent
■ Inaction on the part of a user does not assume consent
■ Clear, plain language needs to be used every time data is requested
■ To gain consent, companies need:
■ A written statement – including by electronic means
■ An oral statement
■ Ticking of a box on a website
■ Choosing technical settings for information society services
GDPR and data capture
■ Consent should be verifiable, so data controllers will need to keep
detailed records to prove a user has ‘opted-in’ and consented.
■ To stay on the right side of the law, companies will need to:
■ Get valid consent for use of any personal data, with an affirmative act by
the subject
■ Explain how and why data will be processed in any given circumstance
■ Re-obtain consent if the processing methods change or use of that data
alters
■ Provide records of consent and access to the data that has been captured
upon request
Making your organisation GDPR compliant
■ Identify what personal data you have and where it is
■ Logging all use of personal data is extremely important
■ Control the manner in which personal data is accessed and
used
■ Implement measures to prevent, detect, and respond to
vulnerabilities in the system and to data breaches
■ Maintain documentation and handle requests for personal
data and notification of breaches
■ Set up a process for ongoing assessment
Sources
■ https://www.csoonline.com/article/3202771/data-protection/general-data-protection-
regulation-gdpr-requirements-deadlines-and-facts.html
■ https://www.eugdpr.org/
■ https://gdpr-info.eu/
■ http://ec.europa.eu/justice/data-protection/reform/index_en.htm
■ http://www.itpro.co.uk/it-legislation/27814/what-is-gdpr-everything-you-need-to-know-8
■ https://www.csoonline.com/article/3239786/regulation/6-steps-for-gdpr-compliance.html
■ https://ico.org.uk/media/1624219/preparing-for-the-gdpr-12-steps.pdf
■ https://ico.org.uk/for-organisations/resources-and-support/data-protection-self-
assessment/getting-ready-for-the-gdpr/
■ https://gowlingwlg.com/GowlingWLG/media/UK/pdf/170630-gdpr-checklist-for-
compliance.pdf
■ https://ico.org.uk/for-organisations/resources-and-support/data-protection-self-
assessment/data-controllers/
■ https://ico.org.uk/for-organisations/resources-and-support/data-protection-self-
assessment/data-processors/
THANK YOU
Questions?

More Related Content

What's hot

Data Privacy & Security
Data Privacy & SecurityData Privacy & Security
Data Privacy & Security
Eryk Budi Pratama
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
Kimberly Simon MBA
 
What about GDPR?
What about GDPR?What about GDPR?
What about GDPR?
Martin Hawksey
 
GDPR Demystified
GDPR DemystifiedGDPR Demystified
GDPR Demystified
SPIN Chennai
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by Qualsys
Qualsys Ltd
 
GDPR infographic
GDPR infographicGDPR infographic
GDPR and Security.pdf
GDPR and Security.pdfGDPR and Security.pdf
Introduction to GDPR
Introduction to GDPRIntroduction to GDPR
Introduction to GDPR
Priyab Satoshi
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
grahamwell
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protection
sp_krishna
 
Gdpr presentation
Gdpr presentationGdpr presentation
Gdpr presentation
Sudarsan Reddy
 
GDPR training
GDPR training GDPR training
GDPR training
ASL
 
General Data Protection Regulation (GDPR) Compliance
General Data Protection Regulation (GDPR) ComplianceGeneral Data Protection Regulation (GDPR) Compliance
General Data Protection Regulation (GDPR) Compliance
accenture
 
An Overview of GDPR
An Overview of GDPR An Overview of GDPR
An Overview of GDPR
The Pathway Group
 
Data Processing - data privacy and sensitive data
Data Processing - data privacy and sensitive dataData Processing - data privacy and sensitive data
Data Processing - data privacy and sensitive data
OpenAIRE
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection ActSaimaRafiq
 
GDPR Overview
GDPR OverviewGDPR Overview
GDPR Overview
Trish McGinity, CCSK
 
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Priyanka Aash
 
An overview of the Indian Data Privacy Bill
An overview of the Indian Data Privacy Bill An overview of the Indian Data Privacy Bill
An overview of the Indian Data Privacy Bill
Komal Gadia
 

What's hot (20)

Data Privacy & Security
Data Privacy & SecurityData Privacy & Security
Data Privacy & Security
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
What about GDPR?
What about GDPR?What about GDPR?
What about GDPR?
 
GDPR Demystified
GDPR DemystifiedGDPR Demystified
GDPR Demystified
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by Qualsys
 
GDPR infographic
GDPR infographicGDPR infographic
GDPR infographic
 
GDPR and Security.pdf
GDPR and Security.pdfGDPR and Security.pdf
GDPR and Security.pdf
 
Introduction to GDPR
Introduction to GDPRIntroduction to GDPR
Introduction to GDPR
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protection
 
Gdpr presentation
Gdpr presentationGdpr presentation
Gdpr presentation
 
GDPR training
GDPR training GDPR training
GDPR training
 
Data protection
Data protectionData protection
Data protection
 
General Data Protection Regulation (GDPR) Compliance
General Data Protection Regulation (GDPR) ComplianceGeneral Data Protection Regulation (GDPR) Compliance
General Data Protection Regulation (GDPR) Compliance
 
An Overview of GDPR
An Overview of GDPR An Overview of GDPR
An Overview of GDPR
 
Data Processing - data privacy and sensitive data
Data Processing - data privacy and sensitive dataData Processing - data privacy and sensitive data
Data Processing - data privacy and sensitive data
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Act
 
GDPR Overview
GDPR OverviewGDPR Overview
GDPR Overview
 
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
An overview of the Indian Data Privacy Bill
An overview of the Indian Data Privacy Bill An overview of the Indian Data Privacy Bill
An overview of the Indian Data Privacy Bill
 

Similar to General Data Protection Regulation (GDPR)

GDPR for your Payroll Bureau
GDPR for your Payroll BureauGDPR for your Payroll Bureau
GDPR for your Payroll Bureau
BrightPay Payroll and Auto Enrolment Software
 
General Data Protection Regulation (GDPR) for Identity Architects
General Data Protection Regulation (GDPR) for Identity ArchitectsGeneral Data Protection Regulation (GDPR) for Identity Architects
General Data Protection Regulation (GDPR) for Identity Architects
WSO2
 
Introduction to EU General Data Protection Regulation: Planning, Implementat...
 Introduction to EU General Data Protection Regulation: Planning, Implementat... Introduction to EU General Data Protection Regulation: Planning, Implementat...
Introduction to EU General Data Protection Regulation: Planning, Implementat...
Financial Poise
 
GDPR: Key Article Overview
GDPR: Key Article OverviewGDPR: Key Article Overview
GDPR: Key Article Overview
Craig Clark ITIL, CIS LI,EU GDPR P
 
Things to know about GDPR in 2018
Things to know about GDPR in 2018Things to know about GDPR in 2018
Things to know about GDPR in 2018
Webkul Software Pvt. Ltd.
 
Gdpr action plan
Gdpr action plan Gdpr action plan
Gdpr action plan
Ulf Mattsson
 
Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...
Financial Poise
 
eu-market-access-gdpr-fundamentals-by-risk-associates
eu-market-access-gdpr-fundamentals-by-risk-associateseu-market-access-gdpr-fundamentals-by-risk-associates
eu-market-access-gdpr-fundamentals-by-risk-associates
Mohsin Termezy
 
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Burton Lee
 
ABM Display Advertising Success in the World of GDPR [PPT]
ABM Display Advertising Success in the World of GDPR [PPT]ABM Display Advertising Success in the World of GDPR [PPT]
ABM Display Advertising Success in the World of GDPR [PPT]
Kwanzoo Inc
 
Data transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPRData transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPR
IT Governance Ltd
 
An introduction to data protection - Manchester - 24/06/15
An introduction to data protection - Manchester - 24/06/15An introduction to data protection - Manchester - 24/06/15
An introduction to data protection - Manchester - 24/06/15
Rachel Aldighieri
 
Charity Law Updates for 2018: Making the Most of Change
Charity Law Updates for 2018: Making the Most of ChangeCharity Law Updates for 2018: Making the Most of Change
Charity Law Updates for 2018: Making the Most of Change
IBB Law
 
Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1
Dione McBride, CISSP, CIPP/E
 
An introduction to data protection - 2/09/2015
An introduction to data protection - 2/09/2015An introduction to data protection - 2/09/2015
An introduction to data protection - 2/09/2015
Rachel Aldighieri
 
3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICECFG
 
Living with gdpr
Living with gdprLiving with gdpr
Living with gdpr
Sarah Chadbourne
 
What does GDPR mean for your business?
What does GDPR mean for your business?What does GDPR mean for your business?
What does GDPR mean for your business?
BrightPay Payroll and Auto Enrolment Software
 
Introduction to data protection - Edinburgh - 29/04/15
Introduction to data protection - Edinburgh - 29/04/15Introduction to data protection - Edinburgh - 29/04/15
Introduction to data protection - Edinburgh - 29/04/15
Rachel Aldighieri
 
A Brief Overview on GDPR
A Brief Overview on GDPRA Brief Overview on GDPR
A Brief Overview on GDPR
Neha Patel
 

Similar to General Data Protection Regulation (GDPR) (20)

GDPR for your Payroll Bureau
GDPR for your Payroll BureauGDPR for your Payroll Bureau
GDPR for your Payroll Bureau
 
General Data Protection Regulation (GDPR) for Identity Architects
General Data Protection Regulation (GDPR) for Identity ArchitectsGeneral Data Protection Regulation (GDPR) for Identity Architects
General Data Protection Regulation (GDPR) for Identity Architects
 
Introduction to EU General Data Protection Regulation: Planning, Implementat...
 Introduction to EU General Data Protection Regulation: Planning, Implementat... Introduction to EU General Data Protection Regulation: Planning, Implementat...
Introduction to EU General Data Protection Regulation: Planning, Implementat...
 
GDPR: Key Article Overview
GDPR: Key Article OverviewGDPR: Key Article Overview
GDPR: Key Article Overview
 
Things to know about GDPR in 2018
Things to know about GDPR in 2018Things to know about GDPR in 2018
Things to know about GDPR in 2018
 
Gdpr action plan
Gdpr action plan Gdpr action plan
Gdpr action plan
 
Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...
 
eu-market-access-gdpr-fundamentals-by-risk-associates
eu-market-access-gdpr-fundamentals-by-risk-associateseu-market-access-gdpr-fundamentals-by-risk-associates
eu-market-access-gdpr-fundamentals-by-risk-associates
 
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
 
ABM Display Advertising Success in the World of GDPR [PPT]
ABM Display Advertising Success in the World of GDPR [PPT]ABM Display Advertising Success in the World of GDPR [PPT]
ABM Display Advertising Success in the World of GDPR [PPT]
 
Data transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPRData transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPR
 
An introduction to data protection - Manchester - 24/06/15
An introduction to data protection - Manchester - 24/06/15An introduction to data protection - Manchester - 24/06/15
An introduction to data protection - Manchester - 24/06/15
 
Charity Law Updates for 2018: Making the Most of Change
Charity Law Updates for 2018: Making the Most of ChangeCharity Law Updates for 2018: Making the Most of Change
Charity Law Updates for 2018: Making the Most of Change
 
Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1
 
An introduction to data protection - 2/09/2015
An introduction to data protection - 2/09/2015An introduction to data protection - 2/09/2015
An introduction to data protection - 2/09/2015
 
3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE
 
Living with gdpr
Living with gdprLiving with gdpr
Living with gdpr
 
What does GDPR mean for your business?
What does GDPR mean for your business?What does GDPR mean for your business?
What does GDPR mean for your business?
 
Introduction to data protection - Edinburgh - 29/04/15
Introduction to data protection - Edinburgh - 29/04/15Introduction to data protection - Edinburgh - 29/04/15
Introduction to data protection - Edinburgh - 29/04/15
 
A Brief Overview on GDPR
A Brief Overview on GDPRA Brief Overview on GDPR
A Brief Overview on GDPR
 

More from Extentia Information Technology

What is Application Modernization? A Comprehensive Guide.pptx
What is Application Modernization?  A Comprehensive Guide.pptxWhat is Application Modernization?  A Comprehensive Guide.pptx
What is Application Modernization? A Comprehensive Guide.pptx
Extentia Information Technology
 
Let's Talk About - Wearable Technology Trends in 2024 - Repaired.pptx
Let's Talk About - Wearable Technology Trends in 2024  -  Repaired.pptxLet's Talk About - Wearable Technology Trends in 2024  -  Repaired.pptx
Let's Talk About - Wearable Technology Trends in 2024 - Repaired.pptx
Extentia Information Technology
 
Mastering Digital Communication in the Workplace: Top Strategies for Success....
Mastering Digital Communication in the Workplace: Top Strategies for Success....Mastering Digital Communication in the Workplace: Top Strategies for Success....
Mastering Digital Communication in the Workplace: Top Strategies for Success....
Extentia Information Technology
 
Mastering Teamwork: The Art Of Hard And Soft Skills.pptx
Mastering Teamwork: The Art Of Hard And Soft Skills.pptxMastering Teamwork: The Art Of Hard And Soft Skills.pptx
Mastering Teamwork: The Art Of Hard And Soft Skills.pptx
Extentia Information Technology
 
Exploring the Future of Healthcare Technology and Its Challenges.pptx
Exploring the Future of Healthcare Technology and Its Challenges.pptxExploring the Future of Healthcare Technology and Its Challenges.pptx
Exploring the Future of Healthcare Technology and Its Challenges.pptx
Extentia Information Technology
 
The Promising Role of AI Across Various Areas in Healthcare.pptx
The Promising Role of AI Across Various Areas in Healthcare.pptxThe Promising Role of AI Across Various Areas in Healthcare.pptx
The Promising Role of AI Across Various Areas in Healthcare.pptx
Extentia Information Technology
 
Benefits of Artificial Intelligence in Healthcare.pptx
Benefits of Artificial Intelligence in Healthcare.pptxBenefits of Artificial Intelligence in Healthcare.pptx
Benefits of Artificial Intelligence in Healthcare.pptx
Extentia Information Technology
 
How is AI-Powered Healthcare Redefining Patient Care?.pptx
How is AI-Powered Healthcare Redefining Patient Care?.pptxHow is AI-Powered Healthcare Redefining Patient Care?.pptx
How is AI-Powered Healthcare Redefining Patient Care?.pptx
Extentia Information Technology
 
Navigating the Top Trends in AR and VR.pptx
Navigating the Top Trends in AR and VR.pptxNavigating the Top Trends in AR and VR.pptx
Navigating the Top Trends in AR and VR.pptx
Extentia Information Technology
 
Comprehensive Guide to Start a Digital Detox Routine.pptx
Comprehensive Guide to Start a Digital Detox Routine.pptxComprehensive Guide to Start a Digital Detox Routine.pptx
Comprehensive Guide to Start a Digital Detox Routine.pptx
Extentia Information Technology
 
Learning The Best Practices for Computer Security.pptx
Learning The Best Practices for Computer Security.pptxLearning The Best Practices for Computer Security.pptx
Learning The Best Practices for Computer Security.pptx
Extentia Information Technology
 
Microsoft Azure over other clouds
Microsoft Azure over other cloudsMicrosoft Azure over other clouds
Microsoft Azure over other clouds
Extentia Information Technology
 
Get Started with Microsoft Azure
Get Started with Microsoft AzureGet Started with Microsoft Azure
Get Started with Microsoft Azure
Extentia Information Technology
 
Understanding Microsoft Azure
Understanding Microsoft AzureUnderstanding Microsoft Azure
Understanding Microsoft Azure
Extentia Information Technology
 
Modern Technologies Disrupting the Banking Sector
Modern Technologies Disrupting the Banking SectorModern Technologies Disrupting the Banking Sector
Modern Technologies Disrupting the Banking Sector
Extentia Information Technology
 
The Global Fintech Trends of 2021-2022 and Its Undercurrents
The Global Fintech Trends of 2021-2022 and Its UndercurrentsThe Global Fintech Trends of 2021-2022 and Its Undercurrents
The Global Fintech Trends of 2021-2022 and Its Undercurrents
Extentia Information Technology
 
Fintech Revolution During COVID-19 Pandemic
Fintech Revolution During COVID-19 PandemicFintech Revolution During COVID-19 Pandemic
Fintech Revolution During COVID-19 Pandemic
Extentia Information Technology
 
The Evolution of Fintech Space
The Evolution of Fintech SpaceThe Evolution of Fintech Space
The Evolution of Fintech Space
Extentia Information Technology
 
The Desirability and Feasibility of a Design.pptx
The Desirability and Feasibility of a Design.pptxThe Desirability and Feasibility of a Design.pptx
The Desirability and Feasibility of a Design.pptx
Extentia Information Technology
 
Unraveling the Layers of Design Thinking.pptx
Unraveling the Layers of Design Thinking.pptxUnraveling the Layers of Design Thinking.pptx
Unraveling the Layers of Design Thinking.pptx
Extentia Information Technology
 

More from Extentia Information Technology (20)

What is Application Modernization? A Comprehensive Guide.pptx
What is Application Modernization?  A Comprehensive Guide.pptxWhat is Application Modernization?  A Comprehensive Guide.pptx
What is Application Modernization? A Comprehensive Guide.pptx
 
Let's Talk About - Wearable Technology Trends in 2024 - Repaired.pptx
Let's Talk About - Wearable Technology Trends in 2024  -  Repaired.pptxLet's Talk About - Wearable Technology Trends in 2024  -  Repaired.pptx
Let's Talk About - Wearable Technology Trends in 2024 - Repaired.pptx
 
Mastering Digital Communication in the Workplace: Top Strategies for Success....
Mastering Digital Communication in the Workplace: Top Strategies for Success....Mastering Digital Communication in the Workplace: Top Strategies for Success....
Mastering Digital Communication in the Workplace: Top Strategies for Success....
 
Mastering Teamwork: The Art Of Hard And Soft Skills.pptx
Mastering Teamwork: The Art Of Hard And Soft Skills.pptxMastering Teamwork: The Art Of Hard And Soft Skills.pptx
Mastering Teamwork: The Art Of Hard And Soft Skills.pptx
 
Exploring the Future of Healthcare Technology and Its Challenges.pptx
Exploring the Future of Healthcare Technology and Its Challenges.pptxExploring the Future of Healthcare Technology and Its Challenges.pptx
Exploring the Future of Healthcare Technology and Its Challenges.pptx
 
The Promising Role of AI Across Various Areas in Healthcare.pptx
The Promising Role of AI Across Various Areas in Healthcare.pptxThe Promising Role of AI Across Various Areas in Healthcare.pptx
The Promising Role of AI Across Various Areas in Healthcare.pptx
 
Benefits of Artificial Intelligence in Healthcare.pptx
Benefits of Artificial Intelligence in Healthcare.pptxBenefits of Artificial Intelligence in Healthcare.pptx
Benefits of Artificial Intelligence in Healthcare.pptx
 
How is AI-Powered Healthcare Redefining Patient Care?.pptx
How is AI-Powered Healthcare Redefining Patient Care?.pptxHow is AI-Powered Healthcare Redefining Patient Care?.pptx
How is AI-Powered Healthcare Redefining Patient Care?.pptx
 
Navigating the Top Trends in AR and VR.pptx
Navigating the Top Trends in AR and VR.pptxNavigating the Top Trends in AR and VR.pptx
Navigating the Top Trends in AR and VR.pptx
 
Comprehensive Guide to Start a Digital Detox Routine.pptx
Comprehensive Guide to Start a Digital Detox Routine.pptxComprehensive Guide to Start a Digital Detox Routine.pptx
Comprehensive Guide to Start a Digital Detox Routine.pptx
 
Learning The Best Practices for Computer Security.pptx
Learning The Best Practices for Computer Security.pptxLearning The Best Practices for Computer Security.pptx
Learning The Best Practices for Computer Security.pptx
 
Microsoft Azure over other clouds
Microsoft Azure over other cloudsMicrosoft Azure over other clouds
Microsoft Azure over other clouds
 
Get Started with Microsoft Azure
Get Started with Microsoft AzureGet Started with Microsoft Azure
Get Started with Microsoft Azure
 
Understanding Microsoft Azure
Understanding Microsoft AzureUnderstanding Microsoft Azure
Understanding Microsoft Azure
 
Modern Technologies Disrupting the Banking Sector
Modern Technologies Disrupting the Banking SectorModern Technologies Disrupting the Banking Sector
Modern Technologies Disrupting the Banking Sector
 
The Global Fintech Trends of 2021-2022 and Its Undercurrents
The Global Fintech Trends of 2021-2022 and Its UndercurrentsThe Global Fintech Trends of 2021-2022 and Its Undercurrents
The Global Fintech Trends of 2021-2022 and Its Undercurrents
 
Fintech Revolution During COVID-19 Pandemic
Fintech Revolution During COVID-19 PandemicFintech Revolution During COVID-19 Pandemic
Fintech Revolution During COVID-19 Pandemic
 
The Evolution of Fintech Space
The Evolution of Fintech SpaceThe Evolution of Fintech Space
The Evolution of Fintech Space
 
The Desirability and Feasibility of a Design.pptx
The Desirability and Feasibility of a Design.pptxThe Desirability and Feasibility of a Design.pptx
The Desirability and Feasibility of a Design.pptx
 
Unraveling the Layers of Design Thinking.pptx
Unraveling the Layers of Design Thinking.pptxUnraveling the Layers of Design Thinking.pptx
Unraveling the Layers of Design Thinking.pptx
 

Recently uploaded

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 

Recently uploaded (20)

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 

General Data Protection Regulation (GDPR)

  • 2. What does GDPR want? ■ Protection of personal data and privacy of EU citizens ■ Restriction on export of personal data outside the EU
  • 4. When? ■ The regulation was adopted on 27 April, 2016 ■ Companies must be able to show compliance by 25 May, 2018
  • 5. What data does GDPR protect? ■ Personally identifiable information (PII) is any data that can be used to identify a specific individual, such as: ■ Basic identity information – name, address and ID numbers, and email addresses ■ Web data – location, IP address, cookie data, RFID tags, login IDs, social media posts, or digital images, geolocation, biometric, and behavioral data ■ Health and genetic data ■ Biometric data ■ Racial or ethnic data ■ Political opinions ■ Sexual orientation
  • 6. The rights of a data subject Any resident of EU can demand the following: ■ Right to access – find out what information about him or her you hold, where did it come from, when it was used and who all used it. ■ Right to be forgotten – ask for all records – and all traces of him/her be removed. This applies when: ■ The personal data is no longer necessary in relation to the purpose for which it was collected ■ The individual specifically withdraws consent to processing ■ Personal data has been unlawfully processed ■ The data must be erased in order for a controller to comply with legal obligations (for example, the deletion of certain data after a set period of time)
  • 7. GDPR – algorithms and analytics ■ GDPR will have a significant effect on data capture by algorithms or for the purpose of analytics ■ In order to use personal data: ■ Data controllers and processors must implement new technical measures to ‘pseudonymise’ data to reduce the risk of unauthorized re-identification ■ Data Protection by Default requires data protection to be applied at the earliest opportunity and requires that steps be affirmatively taken to make use of personal data
  • 8. GDPR and automated decision making ■ Article 22 of the regulation restricts the use of intelligent algorithms in decision making and profiling of individuals ■ E.g. Bail, immigration, etc.
  • 9. Who will be responsible for compliance? ■ Data Controller – is the user/consumer of the personal data – a company that wants to act on it ■ Data Processors – the company or an outsourced partner – who seeks and works on the data – as a service provider to the Data Controller ■ Data Protection Officer – an appointed officer responsible for responding to all queries and insuring compliance. Could be an internal officer or an external consultant
  • 10. Which companies does this apply to? Any company that stores or processes personal information about EU citizens within EU states that has: ■ A presence in an EU country ■ No presence in the EU, but it processes personal data of EU residents ■ More than 250 employees ■ Fewer than 250 employees but its data-processing impacts the rights and freedoms of data subjects.
  • 11. Information companies must provide ■ Article 13 of the regulation tells us the information to give: ■ Details about the data controller ■ Contact details about the controller’s Data Protection Officer, such as a generic email address dataprotection@company.com ■ What processing is done and the legal basis for doing it ■ Who data will be passed on to ■ How data is protected if it is passed or stored outside the EU ■ How long data is retained ■ How to exercise the right to have data erased, probably through a generic email address such as dataprotection@company.com. ■ A ‘self-service’ area on a website for individuals to maintain the personal data they have provided
  • 12. The internet is notorious for providing all kinds of personal data in this day and age. Rampant use of which, makes it difficult to safeguard this very data.
  • 13. What if you are not GDPR compliant? ■ Steep penalties of up to €20 million or 4 percent of global annual turnover, whichever is higher, for non- compliance
  • 14. 6 steps to GDPR 1 – Understand the GDPR legal framework 2 – Create a Data Register, a GDPR diary to maintain proof of the companies GDPR process 3 – Classify data that can directly or indirectly identify an EU citizen, then determine its relevance 4 – Privacy and Data Protection Impact Assessment of policies by evaluating data life cycles from origination to destruction points 5 – Assess and document additional risks and processes 6 – Revise and repeat
  • 15. GDPR and data capture ■ Each time you request data, consent is required, especially, if the data is being processed for different purposes ■ A single consent does not cover all instances of data capture ■ Businesses will no longer be able to rely on opt-out processes or implicit consent ■ Inaction on the part of a user does not assume consent ■ Clear, plain language needs to be used every time data is requested ■ To gain consent, companies need: ■ A written statement – including by electronic means ■ An oral statement ■ Ticking of a box on a website ■ Choosing technical settings for information society services
  • 16. GDPR and data capture ■ Consent should be verifiable, so data controllers will need to keep detailed records to prove a user has ‘opted-in’ and consented. ■ To stay on the right side of the law, companies will need to: ■ Get valid consent for use of any personal data, with an affirmative act by the subject ■ Explain how and why data will be processed in any given circumstance ■ Re-obtain consent if the processing methods change or use of that data alters ■ Provide records of consent and access to the data that has been captured upon request
  • 17. Making your organisation GDPR compliant ■ Identify what personal data you have and where it is ■ Logging all use of personal data is extremely important ■ Control the manner in which personal data is accessed and used ■ Implement measures to prevent, detect, and respond to vulnerabilities in the system and to data breaches ■ Maintain documentation and handle requests for personal data and notification of breaches ■ Set up a process for ongoing assessment
  • 18. Sources ■ https://www.csoonline.com/article/3202771/data-protection/general-data-protection- regulation-gdpr-requirements-deadlines-and-facts.html ■ https://www.eugdpr.org/ ■ https://gdpr-info.eu/ ■ http://ec.europa.eu/justice/data-protection/reform/index_en.htm ■ http://www.itpro.co.uk/it-legislation/27814/what-is-gdpr-everything-you-need-to-know-8 ■ https://www.csoonline.com/article/3239786/regulation/6-steps-for-gdpr-compliance.html ■ https://ico.org.uk/media/1624219/preparing-for-the-gdpr-12-steps.pdf ■ https://ico.org.uk/for-organisations/resources-and-support/data-protection-self- assessment/getting-ready-for-the-gdpr/ ■ https://gowlingwlg.com/GowlingWLG/media/UK/pdf/170630-gdpr-checklist-for- compliance.pdf ■ https://ico.org.uk/for-organisations/resources-and-support/data-protection-self- assessment/data-controllers/ ■ https://ico.org.uk/for-organisations/resources-and-support/data-protection-self- assessment/data-processors/

Editor's Notes

  1. GDPR – General Data Protection Regulation